Differences
This shows you the differences between two versions of the page.
| Both sides previous revisionPrevious revisionNext revision | Previous revision | ||
| en:veos:installation [2024/01/15 13:53] – [Preparation of the installation USB memory stick] elena.krasnobryzh | en:veos:installation [2025/10/31 09:09] (current) – elena.krasnobryzh | ||
|---|---|---|---|
| Line 2: | Line 2: | ||
| {{indexmenu_n> | {{indexmenu_n> | ||
| - | <note tip>Due to the fact that Red Hat discontinued support for CentOS 8 at the end of 2021, VAS Experts offers a strategy for the continued use of Red Hat as Control Plane.\\ | + | <note tip>Before rack-mounting |
| - | **The transition to the new OS edition is planned in the form of an in-house upgrade (without reinstallation), | + | |
| - | <note important> | + | |
| + | | ||
| + | | ||
| - | * [[en: | + | :!: If any discrepancies are found at this stage, contact [[en: |
| - | * [[en: | + | |
| - | * [[en: | + | |
| - | + | ||
| - | If any discrepancies are found at this stage, contact [[en: | + | |
| ===== ISO Links ===== | ===== ISO Links ===== | ||
| - | | + | |
| [[en: | [[en: | ||
| + | <note important> | ||
| + | When partitioning a disk for SSG software: | ||
| + | * ~ 20 GB for root partition | ||
| + | * Allocate the remaining space for the ''/ | ||
| + | * The Stingray SG does not use a SWAP partition, but it is needed for system tasks and requires a 4 GB allocation. | ||
| + | **Disable Hyper-threading in BIOS for SSG software!** | ||
| + | </ | ||
| ===== Preparation of the installation USB memory stick ===== | ===== Preparation of the installation USB memory stick ===== | ||
| The most popular current method of installing an operating system on a computer is to install it from an installable USB memory stick. | The most popular current method of installing an operating system on a computer is to install it from an installable USB memory stick. | ||
| Line 28: | Line 32: | ||
| > dd if=VEOS-8.7-x86_64-Minimal.iso of=/dev/sdz bs=1M | > dd if=VEOS-8.7-x86_64-Minimal.iso of=/dev/sdz bs=1M | ||
| - | <note important> | + | :!: When writing, you must specify the **entire disk**, not the partition on it (i.e. '' |
| ==== Writing a USB Disk to Windows ==== | ==== Writing a USB Disk to Windows ==== | ||
| Line 48: | Line 52: | ||
| ==== Recording a disk image in the MS Windows operating system ==== | ==== Recording a disk image in the MS Windows operating system ==== | ||
| - | An ISO disk image file is a special format file prepared to burn on a disk. To burn an ISO image in the MS Windows use special programs: [[http:// | + | An ISO disk image file is a special format file prepared to burn on a disk. To burn an ISO image in the MS Windows use special programs: [[http:// |
| === Recording a disk image with Small CD-Writer === | === Recording a disk image with Small CD-Writer === | ||
| Line 92: | Line 96: | ||
| - finishing installation and rebooting. | - finishing installation and rebooting. | ||
| - | < | + | |
| - | * When partitioning a disk for SSG software: < | + | |
| - | Allocate the remaining space for the /var directory. | + | |
| - | The Stingray SG does not use a SWAP partition, but it is needed for system tasks and requires a 4 GB allocation.</ | + | |
| - | * Disable Hyper-threading in BIOS for SSG software! | + | |
| - | </ | + | |
| ===== Pre-configuring VEOS ===== | ===== Pre-configuring VEOS ===== | ||
| Line 108: | Line 107: | ||
| - Save the password for **vasexpertsmnt**. | - Save the password for **vasexpertsmnt**. | ||
| - Set permission for users of the wheel group to use all commands on behalf of all users, for this you need to add to /// | - Set permission for users of the wheel group to use all commands on behalf of all users, for this you need to add to /// | ||
| - | - To provide remote access via SSH and set restrictions on valid IP addresses from the list: < | + | - To provide remote access via SSH and set restrictions on valid IP addresses from the list: < |
| + | <code> | ||
| < | < | ||
| - | iptables -A INPUT -m conntrack --ctstate RELATED, ESTABLISHED -j ACCEPT | + | iptables -A INPUT -m conntrack --ctstate RELATED, |
| - | iptables -A INPUT -p tcp -s 45.151.108.0/ | + | iptables -A INPUT -p tcp -s 45.151.108.0/ |
| - | iptables -A INPUT -p tcp -s 94.140.198.64/ | + | iptables -A INPUT -p tcp -s 94.140.198.64/ |
| - | iptables -A INPUT -p tcp -s 78.140.234.98 | + | iptables -A INPUT -p tcp -s 193.218.143.187 -m tcp --dport 22 -j ACCEPT |
| - | iptables -A INPUT -p tcp -s 193.218.143.187 | + | iptables -A INPUT -p tcp -s 93.100.73.160 -m tcp --dport 22 -j ACCEPT |
| - | iptables -A INPUT -p tcp -s 93.100.47.212 | + | iptables -A INPUT -p tcp -s 78.140.234.98 -m tcp --dport 22 -j ACCEPT |
| - | iptables -A INPUT -p tcp -s 93.100.73.160 -m tcp --dport 22 -j ACCEPT | + | iptables -A INPUT -p tcp -s 93.159.236.11 -m tcp --dport 22 -j ACCEPT |
| - | iptables -A INPUT -p tcp -s 77.247.170.134 -m tcp --dport 22 -j ACCEPT | + | iptables -A INPUT -p tcp -s 46.243.181.35 -m tcp --dport 22 -j ACCEPT |
| - | iptables -A INPUT -p tcp -s 91.197.172.2 -m tcp --dport 22 -j ACCEPT | + | iptables -A INPUT -p tcp -s 46.243.181.242 -m tcp --dport 22 -j ACCEPT |
| - | iptables -A INPUT -p tcp -s 46.243.181.242 -m tcp --dport 22 -j ACCEPT | + | iptables -A INPUT -p tcp --dport 22 -j DROP |
| - | iptables -A INPUT -p tcp -s 93.159.236.11 -m tcp --dport 22 -j ACCEPT | + | service iptables save |
| - | iptables -A INPUT -p tcp --dport 22 -j DROP | + | |
| - | service iptables save | + | |
| </ | </ | ||
| If you are using firewalld: | If you are using firewalld: | ||
| < | < | ||
| - | firewall-cmd --permanent --zone = public --add-rich-rule = 'rule family = " | + | firewall-cmd --permanent --zone=public --add-rich-rule=' |
| - | firewall-cmd --permanent --zone = public --add-rich-rule = 'rule family = " | + | firewall-cmd --permanent --zone=public --add-rich-rule=' |
| - | firewall-cmd --permanent --zone = public --add-rich-rule = 'rule family = " | + | firewall-cmd --permanent --zone=public --add-rich-rule=' |
| - | firewall-cmd --permanent --zone = public --add-rich-rule = 'rule family = " | + | firewall-cmd --permanent --zone=public --add-rich-rule=' |
| - | firewall-cmd --permanent --zone = public --add-rich-rule = 'rule family = " | + | firewall-cmd --permanent --zone=public --add-rich-rule=' |
| - | firewall-cmd --permanent --zone = public --add-rich-rule = 'rule family = " | + | firewall-cmd --permanent --zone=public --add-rich-rule=' |
| - | firewall-cmd --permanent --zone = public --add-rich-rule = 'rule family = " | + | firewall-cmd --permanent --zone=public --add-rich-rule=' |
| - | firewall-cmd --permanent --zone = public --add-rich-rule = 'rule family = " | + | firewall-cmd --permanent --zone=public --add-rich-rule=' |
| - | firewall-cmd --permanent --zone = public --add-rich-rule = 'rule family = " | + | firewall-cmd --zone=public --remove-service=ssh --permanent |
| - | firewall-cmd | + | firewall-cmd --reload |
| - | firewall-cmd --reload | + | |
| - | firewall-cmd --zone = public --remove-service = ssh --permanent | + | |
| </ | </ | ||
| **!Save your settings as the server will be rebooted during installation!** \\ | **!Save your settings as the server will be rebooted during installation!** \\ | ||
| \\ | \\ | ||
| - | After making sure that remote access via SSH is provided, send to [[en: | + | After making sure that remote access via SSH is provided, send to [[en: |
| Line 151: | Line 147: | ||
| <note warning> | <note warning> | ||
| - | Do not update the operating system kernel until the system is activated [[en: | + | Do not update the operating system kernel until the system is activated [[en: |
| - | this may cause the network card driver to fail (([[en: | + | this may cause the network card driver to fail (([[en: |
| </ | </ | ||