Sun Microsystems 4000 manual Tx-underrun

Page 72

TABLE 3-14TX and RX MAC Counters (Continued)

Parameter

Description

Stable or Unstable

 

 

 

tx-underrun

16-bit loadable counter increments after

Unstable

 

a valid frame has been received from

 

 

the network.

 

rx-length-err

16-bit loadable counter increments after

Unstable

 

a frame, whose length is greater than

 

 

the value that was programmed in the

 

 

Maximum Frame Size Register, has

 

 

been received from the network.

 

rx-alignment-err

16-bit loadable counter increments

Unstable

 

when an alignment error is detected in

 

 

a receive frame. An alignment error is

 

 

reported when a receive frame fails the

 

 

CRC checking algorithm, AND the

 

 

frame contains a noninteger number of

 

 

bytes (that is, the frame size in bits

 

 

modulo 8 is not equal to zero).

 

rx-crc-err

16-bit loadable counter increments

Unstable

 

when a receive frame fails the CRC

 

 

checking algorithm, AND the frame

 

 

contains an integer number of bytes

 

 

(that is, the frame size in bits modulo 8

 

 

is equal to zero).

 

rx-code-violations

16-bit loadable counter increments

Unstable

 

when an Rx_Err indication is generated

 

 

by the XCVR over the MII, while a

 

 

frame is being received. This indication

 

 

is generated by the transceiver when it

 

 

detects an invalid code in the received

 

 

data stream. A receive code violation is

 

 

not counted as an FCS or an Alignment

 

 

error.

 

rx-overflows

Number of Ethernet frames dropped

Unstable

 

due to lack of resources.

 

rx-no-buf

Number of times the hardware cannot

Unstable

 

receive data because there is no more

 

 

receive buffer space.

 

rx-no-comp-wb

Number of times the hardware cannot

Unstable

 

post completion entries for received

 

 

data.

 

rx-len-mismatch

Number of received frames where the

Unstable

 

asserted length does not match the

 

 

actual frame length.

 

 

 

 

46 Sun Crypto Accelerator 4000 Board Installation and User’s Guide • May 2003

Image 72
Contents Page Please Recycle European Union Product Family Name Sun Crypto Accelerator 4000 Fiber X4012ASupplementary Information EN 609502000, 3rd Edition IEC 609502000, 3rd EditionSafety Page Regulatory Compliance Statements FCC Class a NoticeFCC Class B Notice ICES-003 Class a Notice Avis NMB-003, Classe a ICES-003 Class B Notice Avis NMB-003, Classe BBsmi Class a Notice Page Contents Installing the Sun Crypto Accelerator 4000 Board Configuring Driver ParametersContents Page Contents Diagnostics and Troubleshooting 119 Specifications 134Third Party License Terms Frequently Asked Questions Manual Pages Zeroizing the HardwareTables 106 108123 137141 144145 146Page Preface How This Book Is OrganizedUsing Unix Commands Solaris Hardware Platform GuideTypographic Conventions Shell PromptsAccessing Sun Documentation Online Sun Welcomes Your CommentsProduct Features Key Protocols and InterfacesKey Features Supported ApplicationsSupported Cryptographic Protocols Diagnostic Support Cryptographic Algorithm AccelerationSupported Cryptographic Algorithms 1IPsec Cryptographic AlgorithmsBulk Encryption 3Supported SSL Algorithms# touch /etc/opt/SUNWconn/cryptov2/sslreg # rm /etc/opt/SUNWconn/cryptov2/sslregHardware Overview IPsec Hardware AccelerationSun Crypto Accelerator 4000 MMF Adapter LED Displays4Front Panel Display LEDs for the MMF Adapter Sun Crypto Accelerator 4000 UTP Adapter 2Sun Crypto Accelerator 4000 UTP Adapter5Front Panel Display LEDs for the UTP Adapter Dynamic Reconfiguration and High Availability Load SharingHardware and Software Requirements Required PatchesApache Web Server Patch 6Hardware and Software RequirementsSolaris 8 Patches Solaris 9 PatchesThere are currently no required Solaris 9 patches Page Installing the Sun Crypto Accelerator 4000 Board Handling the BoardInstalling the Board To Install the HardwareOk show-devs Ok cd /pci@8,600000/network@1 Ok .properties Installing the Sun Crypto Accelerator 4000 Software To Install the Software# mount -F hsfs -o ro /dev/dsk/c0t6d0s2 /cdrom VCA Administration 1Files in the /cdrom/cdrom0 DirectoryVCA Firmware Installing the Optional Packages Install the required software packages by typing# prtdiag # modinfo grep CryptoDirectories and Files 2Sun Crypto Accelerator 4000 DirectoriesApache configuration support Encrypted keysApplication executables Development Application Support librariesRemoving the Software To Remove the SoftwarePage Configuring Driver Parameters Driver Parameter Values and Definitions 1vca Driver Parameter, Status, and DescriptionsAdvertised Link Parameters 2Operational Mode Parameters Flow Control Parameters 3Read-Write Flow Control Keyword DescriptionsGigabit Forced Mode Parameter 4Gigabit Forced Mode ParameterInterpacket Gap Parameters 5Parameters Defining enable-ipg0and ipg0 Interrupt Parameters Random Early Drop Parameters7describes the receive interrupt blanking values 7RX Blanking Register for Alias ReadWhen Fifo threshold is greater than 6,144 bytes PCI Bus Interface Parameters 9PCI Bus Interface ParametersSetting vca Driver Parameters Setting Parameters Using the ndd UtilityTo Specify Device Instances for the ndd Utility Use the instance number to select the deviceNoninteractive and Interactive Modes Device remains selected until you change the selectionTo modify a parameter value, use the -setoption # ndd -set /dev/vcaN parameter valueNdd utility then prompts you for the name of the parameter # ndd /dev/vcaNSetting Autonegotiation or Forced Mode # ndd /dev/vcaTo Disable Autonegotiation Mode Set the adv-autoneg-capparameter to# ndd -set /dev/vcaNadv-autoneg-cap Setting Parameters Using the vca.conf File To Set Driver Parameters Using a vca.conf FileRefer to the online manual pages for pathtoinst4 # grep vca /etc/driveraliases vca pci108e,3de810Device Path Name Example vca.conf File Following is an example vca.conf file11Local Link Network Device Parameters Ok boot netspeed=100,duplex=half Ok boot netspeed=1000,duplex=half,link-clock=masterOk boot netspeed=10,duplex=auto Ok boot netspeed=10Cryptographic Driver Statistics Refer to the Ieee 802.3 documentation for further detailsEthernet Driver Statistics 13describes the Ethernet driver statistics13Ethernet Driver Statistics 14describes the transmit and receive MAC counters 14TX and RX MAC CountersTx-underrun 15Current Ethernet Link Properties 16Read-Only vca Device CapabilitiesReporting the Link Partner Capabilities 17describes the read-only link partner capabilities17Read-Only Link Partner Capabilities 18Driver-Specific Parameters Ethernet Transmit CountersEthernet Receive Counters To Check Link Partner Settings As superuser, type the kstat vcaN command# kstat vcaN Network Configuration Configuring the Network Host FilesLocate the correct vca interfaces and instance numbers Instance number in the previous example is# cat /etc/hosts # Internet host table Localhost Zardoz Loghost Zardoz-11Page Using vcaadm $ PATH=$PATH/opt/SUNWconn/bin $ export PathVcaadm command-line syntax is Modes of Operation1shows the options for the vcaadm utility Single-Command Mode File Mode$ vcaadm -s secofficer create user webadmin $ vcaadm show userInteractive Mode Logging In and Out With vcaadm$ vcaadm -f deluser.scr -y Logging In to a Board With vcaadm Logging In to a New BoardLogging In to a Board With a Changed Remote Access Key # vcaadm -h hostnameVcaadm prompt in Interactive mode is displayed as follows Logging Out of a Board With vcaadmFollowing table describes the vcaadm prompt variables 2vcaadm Prompt Variable Definitions3connect Command Optional Parameters Vcaadm connect host hostname dev vca2Entering Commands With vcaadm WebadminTom Getting Help for Commands VcaadmvcaN@hostname, secofficer set ?Quitting the vcaadm Program in Interactive Mode Select Fips 140-2 mode or non-FIPS mode Create a keystore name Refer to Naming Requirements onVerify the configuration information Enter the path and password to the backup file Password Requirements Managing Keystores With vcaadmNaming Requirements Setting the Password Requirements 5Password Requirement SettingsPopulating a Keystore With Security Officers Populating a Keystore With Users Changing Passwords Listing Users and Security OfficersTo enable an account, enter the enable user command Enabling or Disabling UsersDeleting Users Deleting Security OfficersBacking Up the Master Key Locking the Keystore to Prevent Backups Setting the Auto-Logout Time Managing Boards With vcaadmDisplaying Board Status VcaadmvcaN@hostname, secofficer show status Board StatusResetting a Sun Crypto Accelerator 4000 Board Loading New FirmwareRekeying a Sun Crypto Accelerator 4000 Board Key TypesUsing the vcaadm diagnostics Command Zeroizing a Sun Crypto Accelerator 4000 BoardVcadiag command-line syntax is VcaadmvcaN@hostname, secofficer diagnostics1shows the options for the vcadiag utility Following is an example of the -DoptionFollowing is an example of the -Foption # vcadiag -D vca0Following is an example of the -Koption Following is an example of the -QoptionFollowing is an example of the -Roption Following is an example of the -ZoptionPage Administering Security for Sun ONE Web Servers Concepts and Terminology Tokens and Token Files Token FilesFollowing is an example of the contents in a token file Enabling and Disabling Bulk EncryptionConfiguring Sun ONE Web Servers Passwords1Passwords Required for Sun ONE Web Servers Refer to Using vcaadm on Populating a KeystoreTo Populate a Keystore Populate the board’s keystore with usersCreate a user with the create user command Overview for Enabling Sun ONE Web ServersExit vcaadm Installing and Configuring Sun ONE Web Server Installing Sun ONE Web ServerTo Install Sun ONE Web Server Start the Sun ONE Web Server 4.1 Administration Server Response provides the URL for connecting to your serversTo Create a Trust Database Select OK# /opt/SUNWconn/bin/iplsslcfg To Generate a Server Certificate Type 0 to quitCreate Trust Database page is displayed This password is the usernamepassword Table Select the Cryptographic Module you want to use2Requestor Information Fields To Install the Server Certificate Configuring Sun ONE Web Server 4.1 for SSL To Configure the Sun ONE Web ServerFill out the form to install your certificate 3Fields for the Certificate to InstallWeb server is now configured to run in secure mode Set encryption to OnUsr/iplanet/servers Start the Sun ONE Web Server 6.0 Administration Server Create the trust database for the web server instance# /usr/iplanet/servers/https-admserv/start # /opt/SUNWconn/crypto/bin/iplsslcfg To Generate a Server Certificate Create Trust Database window is displayed 4Requestor Information Fields To Install the Server Certificate Configuring Sun ONE Web Server 6.0 for SSL 5Fields for the Certificate to InstallSelect the OK button to apply these changes Page 111 To Enable the Apache Web Server Create an httpd configuration fileEnabling the Board for Apache Web Servers Enabling Apache Web ServersSelect 1 to configure your Apache Web Server to use SSL Create an RSA keypair for your systemCreating a Certificate Choose a base name for the key materialProvide a key length between 512 and 2048 bits Create your PEM pass phraseTo Create a Certificate Modify the /etc/apache/httpd.conf file as directed Select 0 to quit when you finish with apsslcfg Copy your certificate request with the headers from Start the Apache Web Server# /usr/apache/bin/apachectl start Diagnostics and Troubleshooting SunVTS Diagnostic SoftwarePage To Perform vcatest As superuser, start SunVTS# /opt/SUNWvts/bin/sunvts Page Vcatest Command-Line Syntax Test Parameter Options for vcatest2describes the vcatest subtests To Perform netlbtest To Perform nettest VcaN up inet ip-addressplumb Diagnostics and Troubleshooting Using kstat to Determine Cryptographic Activity # kstat Vca0Using the OpenBoot Prom FCode Self- Test Performing the Ethernet FCode Self-Test DiagnosticOk setenv auto-boot? false Shut down the systemReset the system Perform the self-test using the test commandOk reset-all Ok show-netsSet the auto-boot?configuration parameter to true Reset and reboot the systemType the following If the test passes, you see the following messagesTroubleshooting the Sun Crypto Accelerator 4000 Board Show-devsProperties Watch-net Connectors Sun Crypto Accelerator 4000 MMF AdapterFigure A-1Sun Crypto Accelerator 4000 MMF Adapter Connector Table A-1SC Connector Link Characteristics Ieee P802.3zPhysical Dimensions Performance SpecificationsPower Requirements Interface Specifications Environmental SpecificationsTable A-5Interface Specifications Table A-6Environmental SpecificationsFigure A-2Sun Crypto Accelerator 4000 UTP Adapter Connector Table A-7Cat-5 Connector Link CharacteristicsTable A-9Performance Specifications Table A-10Power RequirementsTable A-11Interface Specifications Table A-12Environmental SpecificationsPage SSL Configuration Directives for Apache Web Servers Table B-1SSL Protocols Preceding statement is equivalent to SSL Aliases Default value of cipher-specis Table B-4Special Characters to Configure Cipher PreferenceTable B-3SSL Aliases Context Global, virtual host Table B-5SSL Verify Client LevelsTable B-6SSL Log Level Values Options are listed and described in Table B-7 Table B-7Available SSL OptionsOpt/SUNWconn/cryptov2/include Page Software Licenses Page Appendix D Software Licenses Openssl License Issues Third Party License TermsOriginal SSLeay License Modssl License Appendix D Software Licenses Page Man -M /opt/SUNWconn/man Table E-1Sun Crypto Accelerator 4000 Online Manual PagesKcl2 device driver is a multithreaded loadable kernel module Zeroizing the Hardware Page Reconnect to Sun Crypto Accelerator 4000 board with vcaadm Page Frequently Asked Questions # chmod 400 password.conf Enter the following command Reboot the systemEnter the following command at the OBP prompt Boot the operating environmentHow Do I Self-Sign a Certificate for Testing? Index ExtensionAdvertised link parameters Commands Failsafe mode Page Pause capability Command-line syntax, 123 test parameter options Rx-intr-pktsparameter, 25Vca driver URL Vca.conf file, exampleWatch-netcommand Zeroize command, 163 zeroizing the hardware
Related manuals
Manual 334 pages 12.65 Kb Manual 72 pages 39 Kb Manual 28 pages 54.7 Kb

4000 specifications

Sun Microsystems, a pivotal player in the computing industry during the late 20th and early 21st centuries, was renowned for its innovative hardware and software solutions. Among its notable offerings were the Sun-6000, Sun-5000, and Sun-4000 series, powerful workstations and servers designed for a range of enterprise-level applications.

The Sun-6000 series, introduced in the early 1990s, marked a significant advancement in computing performance. These systems were built on the SPARC architecture, which facilitated high levels of processing power and multitasking capabilities. One of the main features of the 6000 series was its scalability, allowing organizations to increase their processing power by adding more modules. It also offered robust graphics performance, making it ideal for scientific visualization and complex data analysis.

Next in line was the Sun-5000 series. Launched shortly after the 6000 series, the 5000 line was celebrated for its reliability and ease of management. This series emphasized a balanced architecture, which combined processing capabilities with ample memory and storage options. Key characteristics included support for multiple processors, leading to improved performance for demanding applications. Additionally, the 5000 systems featured advanced input/output capabilities, ensuring fast data transfers—crucial for database applications and web servers.

Finally, the Sun-4000 series targeted businesses seeking affordable yet potent computing solutions. These servers boasted a modular design, allowing for easy upgrades and maintenance. The 4000 series was particularly notable for its support for various operating systems, including SunOS and Solaris. These systems were engineered to handle a range of workloads, from enterprise resource planning to web hosting, while still fitting into a value-driven budget.

Across all three series, Sun Microsystems prioritized compatibility and integration, ensuring that each system offered seamless connectivity with Sun's software solutions and third-party applications. Their commitment to open standards and interoperability set them apart in the competitive landscape of enterprise computing. Additionally, the use of high-quality components lent the systems durability, making them a wise investment for organizations looking to future-proof their IT infrastructure.

In summary, the Sun-6000, 5000, and 4000 series exemplified Sun Microsystems' ethos of innovation and reliability. These powerful systems catered to diverse business needs, setting benchmarks in performance and functionality that continue to influence modern computing.