Method and apparatus for a secure network install
First Claim
1. A computer implemented method in a proxy server for a secure network install, the computer implemented method comprising:
- receiving a request for a boot image file from a client at the proxy server to form a received request, wherein the proxy server and the client are on a same subnet;
locating a boot image file server from a list of servers and corresponding boot image files for the boot image file to form a located boot image file;
retrieving the located boot image file from the boot image file server using a secure file transfer protocol to form a retrieved boot image file; and
sending the retrieved boot image file to the client.
1 Assignment
0 Petitions
Accused Products
Abstract
A method, an apparatus, and computer instructions are provided for a secure network install. One aspect of the present invention provides a proxy server within the same subnet of the client for performing a lookup of the boot image file and downloading the boot image file from a boot file server in a secure manner. The client in turn downloads the file from the proxy TFTP server. Another aspect of the present invention modifies the client remote boot code to include a secure boot file download discovery (SBDD) mode. The client starts the SBDD mode by sending a request for a boot image file to a subnet broadcast address and port, which is listened by a proxy TFTP server. The proxy TFTP server receives the client request and downloads the boot image file. The client in turn downloads the boot image file from the proxy TFTP server.
-
Citations
30 Claims
-
1. A computer implemented method in a proxy server for a secure network install, the computer implemented method comprising:
-
receiving a request for a boot image file from a client at the proxy server to form a received request, wherein the proxy server and the client are on a same subnet;
locating a boot image file server from a list of servers and corresponding boot image files for the boot image file to form a located boot image file;
retrieving the located boot image file from the boot image file server using a secure file transfer protocol to form a retrieved boot image file; and
sending the retrieved boot image file to the client. - View Dependent Claims (2, 3, 4, 5, 6)
-
-
7. A computer implemented method in a proxy server for a secure network install, the computer implemented method comprising:
-
detecting a broadcast of a boot image file request initiated by a client at a subnet broadcast address and port used by the proxy server to form a detected request;
retrieving the boot image file from a boot image file server to the proxy server using a secure file transfer protocol based on the detected request to form a retrieved boot image file; and
sending the retrieved boot image file to the client. - View Dependent Claims (9, 11, 12, 13, 14)
-
-
8. A computer implemented method in a client for a secure network install, the computer implemented method comprising:
-
detecting a modification of a remote boot code of the client to include a secure boot image file download discovery mode;
initiating the secure boot image file download discovery mode to send a request for a boot image file to a subnet broadcast address and port; and
receiving the boot image file from a proxy server, wherein the proxy server and the client are on a same subnet. - View Dependent Claims (10)
-
-
15. A computer program product comprising:
-
a computer usable medium having computer usable program code for a secure network install, the computer program product including;
computer usable program code for receiving a request for a boot image file from a client at a proxy server to form a received request, wherein the proxy server and the client are on a same subnet;
computer usable program code for locating a boot image file server from a list of servers and corresponding boot image files for the boot image file to form a located boot image file;
computer usable program code for retrieving the located boot image file from the boot image file server using a secure file transfer protocol to form a retrieved boot image file; and
computer usable program code for sending the retrieved boot image file to the client. - View Dependent Claims (16, 17, 18, 19, 20, 21)
-
-
22. A computer program product comprising:
-
a computer usable medium having computer usable program code for a secure network install, the computer program product including;
computer usable program code for detecting a broadcast of a boot image file request initiated by a client at a subnet broadcast address and port used by a proxy server to form a detected request;
computer usable program code for retrieving the boot image file from a boot image file server using a secure file transfer protocol based on the detected request to form a retrieved boot image file; and
computer usable program code for sending the retrieved boot image file to the client. - View Dependent Claims (23, 24, 25, 26, 27, 28, 29, 30)
-
Specification