| | 51 | {{{ |
| | 52 | Volgende stappen nog niet getest |
| | 53 | 8. 1. If you have a fresh new Air OS install you can upload the following image to |
| | 54 | your bullet. You will get a message that this is not a ubnt image, you |
| | 55 | can ignore this message. Just in case be ready to use method 2 |
| | 56 | (recovery mode) with a ubnt image. |
| | 57 | |
| | 58 | $R/openwrt/bin/ar71xx/openwrt-ar71xx-ubnt-bullet-m-squashfs-factory.bin |
| | 59 | |
| | 60 | 8. 2. You need a tftp client for this, tested on Ubuntu 10.10 |
| | 61 | |
| | 62 | 1. First of all, power off the device |
| | 63 | 2. Set your laptop in the 192.168.1.0/24 range, not being 192.168.1.20 |
| | 64 | 3. Connect the Bullet your computer via a utp cable |
| | 65 | 4. Begin by pressing the reset button. Keep holding, then power the |
| | 66 | unit on. Wait 8 seconds then release the button. Signal LEDs will be |
| | 67 | lit indicating that the device is ready for recovery. |
| | 68 | |
| | 69 | On your computer |
| | 70 | 5. cd $R/openwrt/bin/ar71xx/ resp. $R/openwrt/bin/atheros/ |
| | 71 | 6. tftp 192.168.1.20 |
| | 72 | 7. bin |
| | 73 | 8. trace |
| | 74 | 9. put openwrt-ar71xx-ubnt-bullet-m-squashfs-factory.bin |
| | 75 | 10. quit |
| | 76 | 11. Wait for a couple of minutes, your bullet will be reachable on 192.168.1.1 as openwrt |
| | 77 | |
| | 78 | 9. Default password: Edur0@m |
| | 79 | |
| | 80 | 10. Creating unique vpn info: |
| | 81 | |
| | 82 | 1. Make up a fancy name, in this manual it will be 'name' or <name> |
| | 83 | 2. Login into a certnode (For wl:sunfire) |
| | 84 | 3. Execute from your own user: sudo eduroam-cert <name> |
| | 85 | 4. Output will look like: |
| | 86 | |
| | 87 | sunfire% sudo eduroam-cert name |
| | 88 | NOTE: If you run ./clean-all, I will be doing a rm -rf on /usr/local/share/doc/openvpn/easy-rsa/2.0/keys |
| | 89 | Generating a 1024 bit RSA private key |
| | 90 | .....++++++ |
| | 91 | .....................++++++ |
| | 92 | writing new private key to 'name.key' |
| | 93 | ----- |
| | 94 | Using configuration from /usr/local/share/doc/openvpn/easy-rsa/2.0/openssl-0.9.8.cnf |
| | 95 | Check that the request matches the signature |
| | 96 | Signature ok |
| | 97 | The Subject's Distinguished Name is as follows |
| | 98 | countryName :PRINTABLE:'NL' |
| | 99 | stateOrProvinceName :PRINTABLE:'ZH' |
| | 100 | localityName :PRINTABLE:'Leiden' |
| | 101 | organizationName :PRINTABLE:'WL' |
| | 102 | organizationalUnitName:PRINTABLE:'Techniek' |
| | 103 | commonName :PRINTABLE:'name' |
| | 104 | name :PRINTABLE:'WL' |
| | 105 | emailAddress :IA5STRING:'noreply@wirelessleiden.nl' |
| | 106 | Certificate is to be certified until Feb 27 13:32:30 2022 GMT (3650 days) |
| | 107 | |
| | 108 | Write out database with 1 new entries |
| | 109 | Data Base Updated |
| | 110 | |
| | 111 | 5. in you home directory there will be a file called <name>.tar, copy this file |
| | 112 | to a network reachable the bullet locally |
| | 113 | 6. untar it: tar -xf <name>.tar |
| | 114 | 7. In the current directory there will now be a folder called keys, cd in to it |
| | 115 | 8. execeute: sh upload <local ip of bullet> |
| | 116 | 9. Enter the root password twice, after which your bullet will reboot |
| | 117 | 10. You bullet will build a vpn connection according to the data in the tar file |
| | 118 | |
| | 119 | |
| | 120 | To add: |
| | 121 | If something goes wrong I need: |
| | 122 | |
| | 123 | the output of the following commands |
| | 124 | |
| | 125 | ls -l /usr/sbin/ |
| | 126 | cat /var/log/openvpn.log |
| | 127 | ifconfig -a |
| | 128 | iwconfig |
| | 129 | |
| | 130 | }}} |