Home
        Sun Microsystems 4000 Whiteboard Accessories User Manual
         Contents
1.            OO  O  On     Oxo        O   O  OO  O O O O OGOOGO OOO Oo       Chapter 2 Installing the Sun Crypto Accelerator 4000 Board 15       Installing the Sun Crypto Accelerator  4000 Software    The Sun Crypto Accelerator 4000 software is included on the Sun Crypto Accelerator  4000 CD  You may need to download patches from the SunSolve web site  See     Required Patches    on page 10 for more information     v To Install the Software    1  Insert the Sun Crypto Accelerator 4000 CD into a CD ROM drive that is connected  to your system     m If your system is running Sun Enterprise Volume Manager     it should  automatically mount the CD ROM to the  cdrom cdrom0 directory      If your system is not running Sun Enterprise Volume Manager  mount the CD   ROM as follows          mount  F hsfs  o ro  dev dsk c0t6d0s2  cdrom             16 Sun Crypto Accelerator 4000 Board Installation and User s Guide     May 2003    You see the following files and directories in the  cdrom cdrom0 directory     TABLE 2 1 Files in the  cdrom cdrom0 Directory       File or Directory    Contents       Copyright  FR_Copyright    Docs    Packages    U S  copyright file  French copyright file    Sun Crypto Accelerator 4000 Board Installation and User   s Guide  Sun Crypto Accelerator 4000 Board Release Notes    Contains the Sun Crypto Accelerator 4000 software packages     SUNWkcl2r Cryptography Kernel Components   SUNWkcl2u Cryptographic Administration Utility and Libraries  SUNWkcl2a SSL Support fo
2.       instance  adv autoneg cap  adv 1000fdx cap  adv 1000hdx cap  adv 100fdx cap  adv 100hdx cap  adv 10fdx cap  adv 10hdx cap  adv asmpause cap  adv pause cap  pause on threshold  pause off threshold  link master  enable ipg0    ipg0d read and write  ipgl read and write  ipg2 read and write    read and write  read and write  read and write  read and write  read and write  read and write  read and write  read and write  read and write  read and write    rx intr pkts  rx intr time  red p4k to 6k  red p6k to 8k  red p8k to 10k  red p1l0k to 12k  tx dma weight  rx dma weight  infinite burst  disable 64bit  name to get set                     Setting Autonegotiation or Forced Mode  The following link parameters can be set to operate in either autonegotiation or  forced mode     m speed  m duplex  m link clock    36 Sun Crypto Accelerator 4000 Board Installation and User   s Guide   May 2003    By default  autonegotiation mode is enabled for these link parameters  When either  of these parameters are in autonegotiation mode  the vca device communicates with  the link partner to negotiate a compatible value and flow control capability  When a  value other than auto is set for either of these parameters  no negotiation occurs  and the link parameter is configured in forced mode  In forced mode  the value for  the speed parameter must match between link partners  See    Enabling  Autonegotiation or Forced Mode for Link Parameters With the OpenBoot PROM    on  page 41     To Disable 
3.      The following instructions assume that SunVTS was started using the CDE user  interface     2  On the SunVTS Diagnostic main window  set the System Map to Logical mode        Note     Physical mode is also supported  however  this procedure assumes you are  using Logical mode     3  Disable all tests by clearing their check boxes     4  Select the check box for Network  then select the plus box for Network to display  all tests in the Network group     5  Clear check boxes in the Network group that are not named vcaN  nettest    Note that N specifies the placement of the instance number of the device under  test     a IfavcaN nettest  is displayed  then go to Step 6    a IfavcaN nettest  is not displayed  enter ifconfig  a in another window  on the server containing the vcaN board  There should be an entry listed as  follows     veaN up inet ip address plumb    If the preceding ifconfig entry is not listed  the nettest probe will not consider  the device testable  and you should follow the ifconfig online manual page  instructions for bringing an interface online     Once the ifconfig  a produces the preceding entry  return to the SunVTS  Diagnostic main window and probe the system to find vca by selecting Reprobe  system in the Commands drop down menu     Refer to the SunVTS user   s guide for the exact procedure  When the probe completes  and a vca0  nettest  is displayed  continue to Step 6     6  Select one of the instances of vcaN  nettest   then right click and dra
4.     TABLE 1 2    TABLE 1 3    TABLE 1 4    TABLE 1 5    TABLE 1 6    TABLE 1 7    TABLE 2 1    TABLE 2 2    TABLE 3 1    TABLE 3 2    TABLE 3 3    TABLE 3 4    TABLE 3 5    TABLE 3 6    TABLE 3 7    TABLE 3 8    TABLE 3 9    TABLE 3 10       TABLE 3 11    Tables    IPsec Cryptographic Algorithms 3   SSL Cryptographic Algorithms 3   Supported SSL Algorithms 4   Front Panel Display LEDs for the MMF Adapter 6   Front Panel Display LEDs for the UTP Adapter 8   Hardware and Software Requirements 10   Required Solaris 8 Patches for Sun Crypto Accelerator 4000 Software 11  Files in the  cdrom cdrom0 Directory 17   Sun Crypto Accelerator 4000 Directories 19   vca Driver Parameter  Status  and Descriptions 24   Operational Mode Parameters 26   Read Write Flow Control Keyword Descriptions 27   Gigabit Forced Mode Parameter 28   Parameters Defining enable ipg0 and ipg0 29   Read Write Interoacket Gap Parameter Values and Descriptions 29  RX Blanking Register for Alias Read 30   RX Random Early Detecting 8 Bit Vectors 30   PCI Bus Interface Parameters 32   Device Path Name 39    Local Link Network Device Parameters 41    xix    TABLE 3 12    TABLE 3 13    TABLE 3 14    TABLE 3 15    TABLE 3 16    TABLE 3 17    TABLE 3 18    TABLE 4 1    TABLE 4 2    TABLE 4 3    TABLE 4 4    TABLE 4 5    TABLE 4 6    TABLE 4 7    TABLE 5 1    TABLE 5 2    TABLE 5 3    TABLE 5 4    TABLE 5 5    TABLE 7 1    TABLE 7 2    TABLE 7 3    TABLE A 1    TABLE A 2    TABLE A 3    TABLE A 4    TABLE A 5    TABLE A 
5.     cd  cdrom cdrom0 Packages      pkgadd  d   SUNWkcl2r SUNWkcl2u SUNWvcar SUNWvcau SUNWvcaa SUNWvcafw       3   Optional  To verify that the software is installed properly  run the pkginfo  command       pkginfo SUNWkcl2r SUNWkcl2u SUNWvcar SUNWvcau SUNWvcaa SUNWvcafw  system SUNWkc1l2r Cryptography Kernel Components  system SUNWkc12u Cryptographic Administration Utility and Libraries       system SUNWvcar VCA Crypto Accelerator  Root   system SUNWvcau Crypto Accelerator Gigabit Ethernet  Usr   system SUNWvcaa VCA Administration    system SUNWvcafw VCA Firmware          4   Optional  To ensure that the driver is attached  you can run the prtdiag  command  Refer to the prtdiag 1m  online manual pages       prtdiag  v    5   Optional  Run the modinfo command to see that modules are loaded          modinfo   grep Crypto   62 1317f  62 20b1f 198 1 vca  VCA Crypto Ethernet v1 102    63 13360e9 12510 200 1 kcl2  Kernel Crypto Library vl1 148   197 136d5d6 19b0 199 1 veactl  VCA Crypto Control v1 19           Installing the Optional Packages    To install only the optional packages that provide the SSL support for Apache Web  Server and the cryptographic administration utility and libraries  type the following          cd  cdrom cdrom0 Packages    pkgadd  d   SUNWkcl2a SUNWkcl2m             18 Sun Crypto Accelerator 4000 Board Installation and User s Guide     May 2003    To install all of the optional software packages  type the following       cd  cdrom cdrom0 Packages      pkga
6.    1000 Indicates Gigabit Ethernet  Green  Activity  no label  Link is transmitting or receiving  Amber  Link  no label  Link up  Green    Note     The service pack numbers  SP9 or SP1  are implied whenever Sun ONE Web  Server 4 1 or 6 0 is mentioned     8 Sun Crypto Accelerator 4000 Board Installation and User   s Guide     May 2003    Dynamic Reconfiguration and High Availability    The Sun Crypto Accelerator 4000 hardware and associated software provides the  capability to work effectively on Sun platforms supporting Dynamic Reconfiguration   DR  and hot plugging  During a DR or hot plug operation  the Sun Crypto  Accelerator 4000 software layer automatically detects the addition or removal of a  board and adjusts the scheduling algorithms to accommodate the change in  hardware resources     For High Availability  HA  configurations  multiple Sun Crypto Accelerator 4000  boards can be installed within a system or domain to insure that hardware  acceleration is continuously available  In the unlikely event of a Sun Crypto  Accelerator 4000 hardware failure  the software layer detects the failure and removes  the failed board from the list of available hardware cryptographic accelerators  Sun  Crypto Accelerator 4000 adjusts the scheduling algorithms to accommodate the  reduction in hardware resources  Subsequent cryptographic requests are scheduled  to the remaining boards     Note that the Sun Crypto Accelerator 4000 hardware provides a source for high   quality entropy fo
7.   1  Abort this connection  2  Trust the board for this session only   3  Replace the current trusted key with the new key        Your Choice    gt        60 Sun Crypto Accelerator 4000 Board Installation and User   s Guide   May 2003       vcaadm Prompt    The vcaadm prompt in Interactive mode is displayed as follows     vceaadm vcaN hostname  sec_officer  gt  command    The following table describes the vcaadm prompt variables     TABLE 4 2 vcaadm Prompt Variable Definitions    Prompt Variable Definition    vcaN vca is a string that represents the Sun Crypto Accelerator 4000  board  N is the device instance number  unit address  that is in the  device path name of the board  Refer to    To Set Driver Parameters  Using a vca conf File    on page 38 for details on retrieving this  number for a device     hostname The name of the host for which the Sun Crypto Accelerator 4000  board is physically connected  hostname may be replaced with the  physical host   s IP address     sec_officer The name of the security officer that is currently logged in to the  board        Logging Out of a Board With vcaadm    If you are working in Interactive mode  you may want to disconnect from one board  and connect to another board without completely exiting vcaadm  To disconnect  from a board and logout  but remain in Interactive mode  use the logout command        vceaadm vcaN   hostname  sec_officer  gt  logout  vcaadm gt              Chapter 4 Administering the Sun Crypto Accelerator 4000 Bo
8.   63  file mode  57   getting help  64  initializing the board  65  interactive mode  58  listing security officers  72  listing users  72   loading new firmware  78  locking to prevent backups  75  logging in and out  58  managing boards  76  modes of operation  56  naming requirements  69  options  56   password requirements  69  prompt  61   quitting  65   rekeying a board  79  resetting a board  78  setting auto logout  76  user name requirements  69  using  55   utility  55   zeroizing board  80    vcadiag    command line syntax  81  examples  82  83  options  82   using  81   utility  81    vectors  30    Index 177    Ww    watch net command  134    Z    zeroize command  163  zeroizing the hardware  163    178 Sun Crypto Accelerator 4000 Board Installation and User   s Guide   May 2003    
9.   Confirm password    Security Officer password has been set           User passwords may be changed through the PKCS 11 interface with the Sun ONE  Web Server modutil utility  Refer to the Sun ONE Web Server documentation for  modutil for details     72 Sun Crypto Accelerator 4000 Board Installation and User   s Guide   May 2003    Enabling or Disabling Users       Note     Security officers cannot be disabled  Once a security officer is created  it is  enabled until it is deleted        By default each user is created in the enabled state  Users may be disabled  Disabled  users cannot access their key material with the PKCS 11 interface  Enabling a  disabled user will restore access to all of that user   s key material     When enabling or disabling a user  the user name is an optional parameter on the  command line  If the user name is omitted  vcaadm will prompt you for the user  name  To disable a user account  enter the disable user command        vcaadm vcaN   hostname  sec_officer  gt  disable user Tom  User Tom disabled    vceaadm vcaN   hostname  sec_officer  gt  disable user  User name  web_admin   User web_admin disabled        To enable an account  enter the enable user command        vcaadm vcaN hostname  sec_officer  gt  enable user Tom  User Tom enabled     vcaadm vcaN   hostname  sec_officer  gt  enable user  User name  web_admin  User web_admin enabled           Chapter 4 Administering the Sun Crypto Accelerator 4000 Board With the vcaadm and vcadiag Utiliti
10.   If an entry is shown in the Required Overlay Patch column in TABLE 7 1  you must  use the patchadd command to install that patch over the SunVTS packages shown  in the Base SunVTS Software column  Do not remove the previously installed  SunVTS packages before adding the required patch     Sun Crypto Accelerator 4000 Board Installation and User   s Guide   May 2003    Using the patchadd command to install patch 113614 11 is the equivalent of  replacing the previously installed SunVTS packages with the SunVTS5 1ps2  packages     The replacement packages are available at   http   www sun com oem products vts     The overlay patches are available at   http   sunsolve sun com        Note     The required SunVTS packages and any required patches must be installed  before the SUNWvcav package is installed  The SUNWvcav package contains the  SunVTS test vcatest        Using SunVTS Software to Perform vcatest   nettest  and netlbtest    Refer to the SunVTS test reference manual  user   s guide  and quick reference card for  instructions on how to perform and monitor these diagnostics tests  These  documents are available on the Solaris on Sun Hardware Documentation Set at    http   docs sun com  These documents are also provided on the Solaris  Software Supplement CD that is distributed with the Solaris release on your system     Note     SunVTS can be used only if you have installed the required SunVTS  packages and any required SunVTS patches     v To Perform vcatest    1  As supe
11.   for Software under this Agreement  The foregoing limitations will apply even if the  above stated warranty fails of its essential purpose     6  TERMINATION  This Agreement is effective until terminated  You may terminate  this Agreement at any time by destroying all copies of Software  This Agreement  will terminate immediately without notice from Sun if you fail to comply with any  provision of this Agreement  Upon Termination  you must destroy all copies of  Software     7  EXPORT REGULATIONS  All Software and technical data delivered under this  Agreement are subject to US export control laws and may be subject to export or  import regulations in other countries  You agree to comply strictly with all such laws  and regulations and acknowledge that you have the responsibility to obtain such  licenses to export  re export  or import as may be required after delivery to you     8  U S  GOVERNMENT RESTRICTED RIGHTS  If Software is being acquired by or  on behalf of the U S  Government or by a U S  Government prime contractor or  subcontractor  at any tier   then the Government   s rights in Software and  accompanying documentation will be only as set forth in this Agreement  this is in  accordance with 48 CFR 227 7201 through 227 7202 4  for Department of Defense   DOD  acquisitions  and with 48 CFR 2 101 and 12 212  for non DOD acquisitions      154 Sun Crypto Accelerator 4000 Board Installation and User   s Guide   May 2003    9  GOVERNING LAW  Any action related to this 
12.   list of conditions and the following disclaimer in the documentation and or other  materials provided with the distribution     Appendix D Software Licenses 157    3  All advertising materials mentioning features or use of this software must display  the following acknowledgement   This product includes cryptographic software  written by Eric Young  eay cryptsoft com   The word    cryptographic    can be left  out if the rouines from the library being used are not cryptographic related         4  If you include any Windows specific code  or a derivative thereof  from the apps  directory  application code  you must include an acknowledgement   This  product includes software written by Tim Hudson  tjh cryptsoft com      THIS SOFTWARE IS PROVIDED BY ERIC YOUNG    AS IS  AND ANY EXPRESS  OR IMPLIED WARRANTIES  INCLUDING  BUT NOT LIMITED TO  THE IMPLIED  WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR  PURPOSE ARE DISCLAIMED  IN NO EVENT SHALL THE AUTHOR OR  CONTRIBUTORS BE LIABLE FOR ANY DIRECT  INDIRECT  INCIDENTAL   SPECIAL  EXEMPLARY  OR CONSEQUENTIAL DAMAGES  INCLUDING  BUT  NOT LIMITED TO  PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES   LOSS OF USE  DATA  OR PROFITS  OR BUSINESS INTERRUPTION  HOWEVER  CAUSED AND ON ANY THEORY OF LIABILITY  WHETHER IN CONTRACT   STRICT LIABILITY  OR TORT  INCLUDING NEGLIGENCE OR OTHERWISE   ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE  EVEN IF  ADVISED OF THE POSSIBILITY OF SUCH DAMAGE     The licence and distribution terms 
13.   reflect cryptographic activity on the board  To determine whether cryptographic  work requests are actually being performed on the board  use the kstat 1M   command to display the device usage          kstat vca 0  module  vca instance  0  name  vca0 class  misc  3desbytes 3040  3desjobs 5  crtime 65 342725895  dsasign 0  dsaverify 0  rngbytes 10592  rngjobs 187  rngshalbytes 16328  rngshaljobs 327  rsaprivate 9  rsapublic 0  snaptime 106956 467004482             Note     In the previous example  0 is the instance number of the vca device  This  number should reflect the instance number of the board for which you are  performing the kstat command        Displaying the kstat information indicates whether cryptographic requests or     jobs    are being sent to the Sun Crypto Accelerator 4000 board  A change in the jobs  values over time indicates that the board is accelerating cryptographic work requests  sent to the Sun Crypto Accelerator 4000 board  If cryptographic work requests are  not being sent to the board  verify your web server configuration per the web server  specific configuration     Do not attempt to interpret the kernel driver statistic values returned by  kstat 1M   These values are maintained within the driver to facilitate field support   The meanings and actual names may change over time     Sun Crypto Accelerator 4000 Board Installation and User   s Guide   May 2003    Note     If the nostats property is defined in the  kernel drv vca conf file  the  capt
14.   set passreq  Password security level  low med high   high       Populating a Keystore With Security Officers    There may be more than one security officer for a keystore  Security officer names  are known only within the domain of the Sun Crypto Accelerator 4000 board and do  not need to be identical to any user name on the host system     70 Sun Crypto Accelerator 4000 Board Installation and User   s Guide     May 2003    When creating a security officer  the name is an optional parameter on the command  line  If the security officer name is omitted  vcaadm will prompt you for the name    See    Naming Requirements    on page 69      vcaadm vcaN   hostname  sec_officer  gt  create so Alice  Enter new security officer password    Confirm password    Security Officer Alice created successfully           vcaadm vcaN   hostname  sec_officer  gt  create so  ew security officer name  Bob   Enter new security officer password   Confirm password    Security Officer Bob created successfully                 Populating a Keystore With Users    These user names are known only within the domain of the Sun Crypto Accelerator  4000 board and do not need to be identical to the UNIX user name that the web  server process actually runs as     When creating a user  the user name is an optional parameter on the command line   If the user name is omitted  vcaadm will prompt you for the user name   See     Naming Requirements    on page 69      vceaadm vcaN   hostname  sec_officer  gt  create 
15.   the first hardware transmit queue     Number of packets queued for transmission on  the second hardware transmit queue     Number of packets queued for transmission on  the third hardware transmit queue     Stable or Unstable    Unstable    Unstable    Unstable    G    nstable          nstable    Unstable    Unstable       Unstable    Chapter 3 Configuring Driver Parameters 49    TABLE 3 18 Driver Specific Parameters  Continued     Parameter    Description    Stable or Unstable       tx queue3    Number of packets queued for transmission on  the fourth hardware transmit queue     Ethernet Receive Counters    rx hdr pkts    rx mtu pkts    rx split pkts    rx nocanput    rx msgdup fail    rx allocb fail    rx new pages    rx new hdr pages    rx new mtu pages       rx new nxt pages    rx page alloc fail    rx mtu drops    rx hdr drops    rx nxt drops    Number of packets received that were less  than 256 bytes     Number of packets received that were greater  than 256 bytes and less than 1514 bytes     Number of packets that were split across two  pages     Number of packets dropped due to failures on  delivery to the IP stack     Number of packets that could not be  duplicated     Number of block allocation failures     Number of pages that got replaced during  reception        Number of pages that were filled with packets  less than 256 bytes that got replaced during  reception     Number of pages that were filled with packets  greater than 256 bytes and less than 1514 that 
16.  1 full    Current pause setting for the link  see    Flow Control  Parameters    on page 27    Current pause setting for the link  see    Flow Control  Parameters    on page 27    1 up  0 down  1 up  0 down    Type of transceiver in use  1 internal MII   2 external MII  3 external PCS    Stable or Unstable  Stable  Stable  Stable    Stable    Stable  Stable  Stable       TABLE 3 16 describes the read only Media Independent Interface  MII  capabilities   These parameters define the capabilities of the hardware  The Gigabit Media  Independent Interface  GMII  supports all of the following capabilities     TABLE 3 16 Read Only vca Device Capabilities       Parameter    cap autoneg    cap 1000fdx    cap 1000hdx    cap 100fdx       cap 100hdx    Description    0   Not capable of autonegotiation  1   Autonegotiation capable    Local interface full duplex capability  0   Not 1000 Mbps full duplex capable  1   1000 Mbps full duplex capable       Local interface half duplex capability  0   Not 1000 Mbps half duplex capable  1   1000 Mbps half duplex capable    Local interface full duplex capability  0   Not 100 Mbps full duplex capable  1   100 Mbps full duplex capable    Local interface half duplex capability  0   Not 100 Mbps half duplex capable  1   100 Mbps half duplex capable          Stable or Unstable    Stable    Stable    Stable    Stable    Stable       Chapter 3 Configuring Driver Parameters 47    TABLE 3 16 Read Only vca Device Capabilities  Continued     Parameter Descri
17.  4000 board to  the factory state which is the failsafe mode for the board     m Appendix G provides answers to frequently asked questions        Using UNIX Commands    This document does not contain information on basic UNIX   commands and  procedures such as shutting down the system  booting the system  and configuring  devices    See one or more of the following for this information      Solaris Hardware Platform Guide    m Online documentation for the Solaris operating environment available at   http   docs sun com    a Other software documentation that you received with your system    xxiv Sun Crypto Accelerator 4000 Board Installation and User   s Guide     May 2003       Typographic Conventions       Typeface Meaning    AaBbCc123 The names of commands  files   and directories  on screen  computer output    AaBbCc123 What you type  when  contrasted with on screen  computer output    AaBbCc123 Book titles  new words or terms   words to be emphasized    Command line variable  replace  with a real name or value       Shell Prompts    Shell    Examples    Edit your   login file   Use 1s  a to list all files     o      You have mail     S su    Password   Read Chapter 6 in the User   s Guide   These are called class options     You must be superuser to do this     To delete a file  type rm filename     Prompt       C shell  C shell superuser  Bourne shell and Korn shell    Bourne shell and Korn shell superuser    machine_name   machine_name              Preface xxv       Acc
18.  Creating a Certificate    The following procedure describes how to create the certificate required to enable  Apache Web Servers to use the Sun Crypto Accelerator 4000 board     114 Sun Crypto Accelerator 4000 Board Installation and User   s Guide   May 2003    v To Create a Certificate    1  Create a certificate request using the keys you created in    To Enable the Apache  Web Server    on page 112     You must first enter the password to access your keys  Then provide the appropriate  information for the following fields     m Country Name  The two letter ISO code for the country  which is asserted on the  certificate and is a required field  for example  the United States is US     m State or Province Name   Optional  The full name of the state in this field  or type  a dot character     and press Return        Locality   Optional  City  county  principality  or country  which is also asserted on  the certificate if provided    m Organization Name  A value for the organization to be asserted on the certificate    m Organizational Unit Name   Optional  A value for the organizational unit to be  asserted on the certificate    m SSL Server Name  Website domain that is typed in a visitor   s browser    a Email Address  Contact information for requestor    The following is an example of how the certificate fields are entered                    Enter PEM pass phrase    You are about to be asked to enter information that will be incorporated into  your certificate request    Wh
19.  Crypto Accelerator 4000 board for use  with Sun ONE 6 0 Web Servers  This section includes the following     a    Installing Sun ONE Web Server 6 0    on page 101  m    Configuring Sun ONE Web Server 6 0 for SSL    on page 108    Installing Sun ONE Web Server 6 0    You must perform these procedures in order  Refer to the Sun ONE Web Server  documentation for more information about using Sun ONE Web Servers     v To Install Sun ONE Web Server 6 0    1  Download the Sun ONE Web Server 6 0 software   You can find the web server software at the following URL     http   www sun com     2  Install the web server     This section includes instructions for one example  you may decide to configure  your Sun ONE Web Server differently  The default path name for the server is    usr iplanet servers    Accept the default path during the Sun ONE Web Server installation  This book  refers to the default paths  If you decide to install the software in a different location   be sure to note where you installed it     3  Run the setup program     4  Answer the prompts in the installation script     Except for the following prompts  you can accept the defaults for ease of use   a  Agree to accept the license terms by typing yes     b  Enter a fully qualified hostname domain     Chapter 5 Configuring Sun ONE Server Software for Use With the Sun Crypto Accelerator 4000 Board 101    c  Enter the Sun ONE Web Server 6 0 Administration Server password twice     d  Press Return when prompted     wv
20.  Pass    iv Sun Crypto Accelerator 4000 Board Installation and User   s Guide   May 2003    m m m m    E    EN61000 4 11    N61000 4 2  N61000 4 3  N61000 4 4  N61000 4 5    N61000 4 6          6 kV  Direct   8 kV  Air   3 V m 80 1000MHz  10 V m 800 960 MHz and 1400 2000 MHz  1 kV AC and DC Power Lines  0 5 kV Signal Lines     2 kV AC Line Gnd  1 kV AC Line Line and Outdoor Signal Lines   0 5 kV Indoor Signal Lines  gt  10m     3V  Pass    As information Technology Equipment  ITE  Class B per  as applicable      EN55022 1998   CISPR22     1997    EN55024 1998 Required Limits     m m m mh    E  E    EN61000 4 11    N61000 4 2  N61000 4 3  N61000 4 4  N61000 4 5    N61000 4 6  N61000 4 8          EN61000 3 2 1995   A1  A2  A14    EN61000 3 3 1995    Safety    Class B    4 kV  Direct   8 kV  Air   3 V m  1 kV AC Power Lines  0 5 kV Signal and DC Power Lines    1 kV AC Line Line and Outdoor Signal Lines  2 kV AC Line Gnd   0 5 kV DC Power Lines    3V   1 A m  Pass  Pass  Pass    This equipment complies with the following requirements of the Low Voltage Directive 73 23  EEC     EC Type Examination Certificates     EN 60950 2000     TEC 60950 2000  3rd Edition  Evaluated to all CB Countries    3rd Edition    UL 60950  3rd Edition  CSA C22 2 No  60950 00    Supplementary Information    This product was tested and complies with all the requirements for the CE Mark      S     Dennis P  Symanski    Manager  Compliance Engineering    Sun Microsystems  Inc     4150 Network Circle  MPK15 
21.  To Create a Trust Database    1  Start the Sun ONE Web Server 6 0 Administration Server     To start a Sun ONE Web Server 6 0 Administration Server  use the following  command  instead of running startconsole as setup requests            usr iplanet servers https   admserv start    SunONE WebServer Enterprise 6 0SP1 B08 20 2001 00 58   warning  daemon is running as super user    LS l1s1  http   hostname domain port 8888 ready to accept requests  startup  server started successfully                The response provides the URL for connecting to your servers     2  Start the Administration GUI by opening up a web browser and typing     http    hostname domain admin_port    In the authentication dialog box  enter the Sun ONE Web Server 6 0 Administration  Server user name and password you selected while running setup           Note     If you used the default settings during Sun ONE Web Server setup  enter  admin for the User ID or the Sun ONE Web Server 6 0 Administration Server user  name        3  Select OK   The Sun ONE Web Server 6 0 Administration Server window is displayed     4  Create the trust database for the web server instance     You might want to enable security on more than one web server instance  If so   repeat Step 1 through Step 4 for each web server instance        Note     If you want to run SSL on the Sun ONE Web Server 6 0 Administration  Server as well  the process of setting up a trust database is similar  Refer to the  iPlanet Web Server  Enterprise E
22.  a    Sun Crypto Accelerator 4000 UTP Adapter    on page 138       Sun Crypto Accelerator 4000 MMF  Adapter    This section provides the specifications for the Sun Crypto Accelerator 4000 MMF  adapter     Connectors    FIGURE A 1 shows the connector for the Sun Crypto Accelerator 4000 MMF adapter     135                  LINK                      Q    PA  P    FIGURE A 1 Sun Crypto Accelerator 4000 MMF Adapter Connector    TABLE A 1 lists the characteristics of the SC connector  850 nm      TABLE A 1 SC Connector Link Characteristics  IEEE P802 3z        Characteristic 62 5 Micron MMF 50 Micron MMF       Operating range Up to 260 meters Up to 550 meters    136 Sun Crypto Accelerator 4000 Board Installation and User   s Guide   May 2003    Physical Dimensions    TABLE A 2 Physical Dimensions       Dimension Measurement Metric Measurement  Length 12 283 inches 312 00 mm  Width 4 200 inches 106 68 mm       Performance Specifications    TABLE A 3 Performance Specifications          Feature Specification   PCI clock 33 66 MHz max   PCI data burst transfer rate Up to 64 byte bursts  PCI data address width 32  64 bit   PCI modes Master slave   1 Gbps  850 nm 1000 Mbps  full duplex     Power Requirements    TABLE A 4 Power Requirements    Specification Measurement   Maximum power consumption 6 25 W   5V  12 75 W   3 3V   Voltage tolerance 5V     5   3 3V     5     Appendix A Specifications 137    Interface Specifications    TABLE A 5 Interface Specifications       Feature Specificati
23.  and  for kstat 1M      Chapter 4 Administering the Sun Crypto Accelerator 4000 Board With the vcaadm and vcadiag Utilities 77    Loading New Firmware    It is possible to update the firmware for the Sun Crypto Accelerator 4000 board as  new features are added  To load firmware  issue the loadfw command and provide  a path to the firmware file     A successful update of the firmware requires you to manually reset the board with  the reset command  When you reset the board  the currently logged in security  officer is logged out        vceaadm vcaN   hostname  sec_officer  gt  loadfw  opt SUNWconn cryptov2 firmware sca4000fw  Security Officer Login  sec_officer  Security Officer Password   WARNING  This command will load new firmware onto the  the target device  You must issue a reset  command and log back into the target device in  order to use the new firmware              Proceed with firmware update   Y Yes N No   No   y             Resetting a Sun Crypto Accelerator 4000 Board    In certain situations  it might be necessary to reset the board  To do this  you must  issue the reset command  You will be asked if this is what you wish to do   Resetting a Sun Crypto Accelerator 4000 board may temporarily cease the  acceleration of cryptography on the system unless there are other active Sun Crypto  Accelerator 4000 boards able to take over the load  Also  this command will  automatically log you out of vcaadm  so you must reconnect to the device by  logging back into vcaadm i
24.  architecture developed by Sun Microsystems  Inc  Netscape is a  trademark or registered trademark of Netscape Communications Corporation  This product includes software developed by the OpenSSL  Project for use in the OpenSSL Toolkit  http     www openssl org    This product includes cryptographic software written by Eric Young   eay cryptsoft com   This product includes software developed by Ralf S  Engelschall  lt rse engelschall com gt  for use in the mod_ss l project   http    www modssl org       The OPEN LOOK and Sun    Graphical User Interface was developed by Sun Microsystems  Inc  for its users and licensees  Sun acknowledges  the pioneering efforts of Xerox in researching and developing the concept of visual or graphical user interfaces for the computer industry  Sun  holds a non exclusive license from Xerox to the Xerox Graphical User Interface  which license also covers Sun   s licensees who implement OPEN  LOOK GUIs and otherwise comply with Sun   s written license agreements     DOCUMENTATION IS PROVIDED    AS IS    AND ALL EXPRESS OR IMPLIED CONDITIONS  REPRESENTATIONS AND WARRANTIES   INCLUDING ANY IMPLIED WARRANTY OF MERCHANTABILITY  FITNESS FOR A PARTICULAR PURPOSE OR NON INFRINGEMENT   ARE DISCLAIMED  EXCEPT TO THE EXTENT THAT SUCH DISCLAIMERS ARE HELD TO BE LEGALLY INVALID     Copyright 2003 Sun Microsystems  Inc   4150 Network Circle  Santa Clara  CA 95054 Etats Unis  Tous droits r  serv  s     Ce produit ou document est distribu   avec des licences qui 
25.  are immediately prompted to  log in as security officer if a successful network connection was made     The vcaadm program establishes an encrypted network connection  channel   between the vcaadm application and the Sun Crypto Accelerator 4000 firmware  running on a specific board     During setup of the encrypted channel  boards identify themselves by their  hardware Ethernet address and an RSA public key  A trust database   SHOME  vcaadm trustdb  is created the first time vcaadm connects to a board   This file contains all of the boards that are currently trusted by the security officer        58 Sun Crypto Accelerator 4000 Board Installation and User   s Guide   May 2003    Logging In to a Board With vcaadm    If the security officer connects to a new board  vcaadm will notify the security officer  and prompt the following options        1  Abort the connection       Trust the connection one time only  no changes to trust  database   3  Trust this board forever  adds the hardwar thernet address       and RSA public key to the trust database         If the security officer connects to a board that has a remote access key that has been  changed  vcaadm will notify the security officer and prompt the following three  options     Abort the connection  Trust the connection one time only  no changes to trust  database     Replace the old public key bound to this hardware ethernet  address with the new public key        Logging In to a New Board    Note     The remaining exampl
26.  be added or removed  For  example  to disable support for SSLv2  the following directive could be used     SSLProtocol all  SSLv2    The preceding statement is equivalent to     SSLProtocol  SSLv3  TLSv1l       4  SSLCipherSuite cipher spec    Context  Global  virtual host  directory   htaccess    The SSLCipherSuite directive is used to configure which SSL ciphers are available  for use and their preference  In global context or virtual host context  directive is  used during the initial SSL handshake  In per directory context  it forces an SSL  renegotiation to use the named ciphers  The renegotation takes place after the  request is read  but before the response is sent     The cipher spec is a colon delimited list of the ciphers described in TABLE B 2  In  TABLE B 2  DH refers to Diffie Hellman and DSS refers to the Digital Signature    Standard     TABLE B 2 Available SSL Ciphers    Cipher Tag  DES CBC3 SHA  DES CBC3 MD5  RC4 SHA   RC4 MD5   RC4 MD5  RC2 CBC MD5  DES CBC SHA  RC4 64 MD5  DES CBC MD5  EXP DES CBC SHA  EXP RC2 CBC MD5    EXP RC2 CBC MD5       EXP RC4 MD5    Protocol    SSLv3  SSLv2  SSLv3  SSLv3  SSLv2  SSLv2  SSLv3  SSLv2  SSLv2  SSLv3  SSLv2  SSLv3  SSLv3    Key Exchange  RSA  RSA  RSA  RSA  RSA  RSA  RSA  RSA  RSA  RSA  512 bit   RSA  512 bit   RSA  512 bit   RSA  512 bit     Auth     RSA  RSA  RSA  RSA  RSA  RSA  RSA  RSA  RSA  RSA  RSA  RSA  RSA    Encryption   3DES  168 bit   3DES  168 bit   ARCFOUR  128 bit   ARCFOUR  128 bit   ARCFOUR  128 bit   AR
27.  by Eric Young   eay cryptsoft com   This product includes software written by Tim Hudson   tjh cryptsoft com      Original SSLeay License  Copyright  C  1995 1998 Eric Young  eay cryptsoft com  All rights reserved     This package is an SSL implementation written by Eric Young  eay cryptsoft com    The implementation was written so as to conform with Netscapes SSL     This library is free for commercial and non commercial use as long as the following  conditions are aheared to  The following conditions apply to all code found in this  distribution  be it the RC4  RSA  lhash  DES  etc   code  not just the SSL code  The  SSL documentation included with this distribution is covered by the same copyright  terms except that the holder is Tim Hudson  tjh cryptsoft com      Copyright remains Eric Young s  and as such any Copyright notices in the code are  not to be removed     If this package is used in a product  Eric Young should be given attribution as the  author of the parts of the library used  This can be in the form of a textual message  at program startup or in documentation  online or textual  provided with the  package     Redistribution and use in source and binary forms  with or without modification  are  permitted provided that the following conditions are met     1  Redistributions of source code must retain the copyright notice  this list of  conditions and the following disclaimer     2  Redistributions in binary form must reproduce the above copyright notice  this
28.  got replaced during reception     Number of pages that contained packets that  were split across pages that got replaced  during reception     Number of page allocation failures           Number of times a whole page of packets  greater than 256 bytes and less than 1514 was  dropped because the driver was unable to map  a new one to replace it     Number of times a whole page of packets less  than 256 bytes was dropped because the driver  was unable to map a new one to replace it     Number of times a page with a split packet  was dropped because the driver was unable to  map a new one to replace it     Sun Crypto Accelerator 4000 Board Installation and User   s Guide     May 2003    Unstable    Unstable    Unstable    Unstable    Unstable    Unstable    io    nstable    cq    nstable    Unstable    Unstable    Unstable         nstable       C    nstable    Unstable    Unstable    TABLE 3 18 Driver Specific Parameters  Continued                 Parameter Description Stable or Unstable  rx rel flow Number of times the driver was told to release Unstable  a flow   Ethernet PCI Properties  rev id Revision ID of the Sun Crypto Accelerator Unstable  4000 Ethernet device useful for recognition of  device being used in the field   pci err Sum of all PCI errors  Unstable  pei rta err Number of target aborts received  Unstable  pci rma err Number of master aborts received  Unstable  pci parity err Number of PCI parity errors detected  Unstable  pcei drto err Number of times the delay
29.  link partner  If the duplex parameter does not match between   the local link and the link partner  the link may come up  however  traffic collisions  will occur     When the local link speed parameter is set to autonegotiation and the link partner  speed parameter is set to forced  the link may come up depending on whether the  speed value can be negotiated between the local link and the link partner  The  interface in autonegotiation mode will always try to establish a link  if there is a  speed match  at half duplex by default  Because one of the two interfaces is not in  autonegotiation mode  the interface in autonegotiation mode detects only the speed  parameter  the duplex parameter is not detected  This method is called parallel   detection     Caution     The establishment of a link with a duplex conflict always leads to traffic  collisions     For a local link parameter to operate in forced mode  the parameter must have a  value other than auto  For example  to establish a forced mode link at 100 Mbps  with half duplex  type the following at the OBP prompt     ok boot net  speed 100  duplex half    Note     In the examples in this section  net is an alias for the default  integrated  network interface device path  You can configure other network devices by  specifying a device path instead of using net           To establish a forced mode link at 1000 Mbps with half duplex that is a clock master   type the following command at the OBP prompt     ok boot net speed 10
30.  mode goes to the standard output stream  This  output can be redirected using standard UNIX shell based methods     File Mode    In File mode  you must authenticate as security officer for every file you run  You are  logged out of vcaadm after the commands in the command file are executed     Chapter 4 Administering the Sun Crypto Accelerator 4000 Board With the vcaadm and vcadiag Utilities 57    To enter commands in File mode  you specify a file from which vcaadm reads one or  more commands  The file must be ASCII text  consisting of one command per line   Begin each comment with a pound sign     character  If the File mode option is set   vcaadm ignores any command line arguments after the last option  The following  example runs the commands in the deluser scr file and answers all prompts in  the affirmative       veaadm  f deluser scr  y    Interactive Mode       In Interactive mode  you must authenticate as security officer every time you  connect to a board  This is the default operating mode for vcaadm  To logout of  vcaadm in Interactive mode  use the logout command  Refer to    Logging In and  Out With vcaadm    on page 58     Interactive mode presents the user with an interface similar to ftp 1   where  commands can be entered one at a time  The  y option is not supported in  interactive mode        Logging In and Out With vcaadm    When you use vcaadm from the command line and specify host  port  and device  using the  h     p  and  d attributes respectively  you
31.  net  134  OBP configuration variables  auto boot   129 131  diag switch   130  OBP PROM  129  132  occupancy  FIFO  30  online manual pages  161  apsslcfg 1m   162  iplsslcfg 1m   162  kc12 7d   161  162  vca 7d   161  vcaadm 1m   161  vcad 1m   161  vcadiag 1m   161  OpenBoot PROM  41  129  132  OpenBoot PROM FCode self test  129  OpenSSL compatible applications  151  operating environment  10  operating statistics  43  operational mode parameters  25  26  opt SUNWconn crypto bin   sslpassword  143  opt  SUNWconn cryptov2 firmware   sca4000fw  165  opt SUNWconn cryptov2 include  151  optimize throughput  9  optional packages  17  descriptions  17  installing  18    174 Sun Crypto Accelerator 4000 Board Installation and User   s Guide   May 2003    P    packages  optional  17  required  17  parallel detection  42  parameter values  how to modify and display  34  parameters  25  8 bit vectors  30  adv asmpause cap  27  adv autoneg cap  24  adv pause cap  27  driver specific  49  early detecting 8 bit vectors  30  early drop  30  enable ipg0  28  flow control  27  forced mode  28  Gigabit forced mode parameter  28  infinit burst  25  interpacket gap  28  interrupt  30  ipg0  28  ipg1  28  ipg2  28  libcrypto a  152  libssl a  152  link  25  link capabilities  27  link master  24  operational mode  26  pause off threshold  24  PCI bus interface  32  RX random early detecting 8 bit vectors  30  rx intr pkts  25 30  rx intr time  30  setting for all vcadevices  40  setting with v
32.  packet was known to have Stable  been discarded because no buffer could be  allocated for receive  long     noxmtbuf Packets discarded on output because transmit Stable    buffer was busy  or no buffer could be allocated for  transmit  long      Sun Crypto Accelerator 4000 Board Installation and User   s Guide     May 2003    TABLE 3 14 describes the transmit and receive MAC counters     TABLE 3 14 TX and RX MAC Counters       Parameter    tx collisions    tx first    collisions    tx excessive collisions    tx late collisions    tx defer timer    tx peak attempts    Description Stable or Unstable    16 bit loadable counter increments for Stable  every frame transmission attempt that  resulted in a collision     16 bit loadable counter increments for Unstable  every frame transmission that   experienced a collision on the first   attempt  but was successfully   transmitted on the second attempt     16 bit loadable counter increments for Unstable  every frame transmission that has  exceeded the Attempts Limit     16 bit loadable counter increments for Unstable  every frame transmission that has  experienced a collision  It indicates the  number of frames that the TxMAC has  dropped due to collisions that occurred  after it has transmitted at least the  Minimum Frame Size number of bytes   Usually this is an indication that there  is at least one station on the network  that violates the maximum allowed  span of the network     16 bit loadable timer increments when Unstable  t
33.  performed  The subtests for t 1 are  separated by the    plus  character  The supported subtests are  CDMF  DES  3DES  DSA  RSA  MD5  SHA1  and RNG  so  t1 CDMF DES 3DES DSA RSA MD5 SHA1 RNG enables all    subtests  You can also insert t1 al1 which performs all tests   Defaults to all if no subtests are specified     v To Perform netlbtest    1  As superuser  start SunVTS        opt SUNWvts bin sunvts    Refer to the SunVTS user   s guide for detailed startup instructions        The following instructions assume that SunVTS was started using the CDE user  interface     2  On the SunVTS Diagnostic main window  set the System Map to Logical mode     Note     Physical mode is also supported  however  this procedure assumes you are  using Logical mode     3  Disable all tests by clearing their check boxes     4  Select the check box for Network  then select the plus box for Network to display  all tests in the Network group     124 Sun Crypto Accelerator 4000 Board Installation and User   s Guide e May 2003    5     10     11     Clear check boxes in the Network group that are not named vcaN netlbtest    Note that N specifies the placement of the instance number of the device under  test     a IfavcaN netlbtest  is displayed  then go to Step 6   m IfavcaN netlbtest  is not displayed  probe the system to find it by selecting  Reprobe system in the Commands drop down menu     Refer to the SunVTS user   s guide for the exact procedure  When the probe completes  and a vcaN  netlbtes
34.  preset probability  The  probability should increase when the FIFO level increases  Control packets are never  dropped and are not counted in the statistics     TABLE 3 8 RX Random Early Detecting 8 Bit Vectors    Field Name Values Description       red dv4to6ok 0 to 255 Random early detection and packet drop vectors for  when FIFO threshold is greater than 4096 bytes and less  than 6 144 bytes  Probability of drop can be  programmed on a 12 5 percent granularity  For  example  if bit 0 is set  the first packet out of every  eight will be dropped in this region   Default 0     30 Sun Crypto Accelerator 4000 Board Installation and User   s Guide     May 2003    TABLE 3 8 RX Random Early Detecting 8 Bit Vectors  Continued     Field Name Values Description       red dv6to8k 0 to 255 Random early detection and packet drop vectors for  when FIFO threshold is greater than 6 144 bytes and  less than 8 192 bytes  Probability of drop can be  programmed on a 12 5 percent granularity  For  example  if bit 8 is set  the first packet out of every  eight will be dropped in this region   Default 0     red dv8tol0k 0 to 255 Random early detection and packet drop vectors for  when FIFO threshold is greater than 8 192 bytes and  less than 10 240 bytes  Probability of drop can be  programmed on a 12 5 percent granularity  For  example  if bit 16 is set  the first packet out of every  eight will be dropped in this region   Default 0     red dv10tol2k 0 to 255 Random early detection and packet d
35.  text  with headers            FIGURE 5 2 The Install a Server Certificate Page of the Sun ONE Web Server 4 1  Administration Server    98 Sun Crypto Accelerator 4000 Board Installation and User   s Guide   May 2003    4  Fill out the form to install your certificate     TABLE 5 3 Fields for the Certificate to Install       Fields Description   Certificate For This server   Cryptographic Each keystore has its own entry in this pull down menu  Be sure to  Module select the correct keystore name  To use the Sun Crypto Accelerator    4000  you must select a module with the same name you assigned  the keystore     Key Pair File This password is the username password  TABLE 5 1    Password  Certificate Name In most cases  you can leave this blank  If you provide a name  it    will alter the name the web server uses to access the certificate and  key when running with SSL support  The default for this field is    Server Cert     5  Paste the certificate you copied from the certificate authority  in Step 8 of the    To  Generate a Server Certificate    on page 95  into the Message box     You are shown some basic information about the certificate   6  Select the OK button at the bottom of the page     7  If everything looks correct  select the Add Server Certificate button     On screen messages tell you to restart the server  This is not necessary because the  web server instance has been shut down the entire time     You are also notified that in order for the web server to use SS
36.  the page     This selection applies the changes through the Sun ONE Web Server 4 1  Administration Server    9  Select the Load Configuration Files button to apply the changes you just made to  the magnus conf file   You are redirected to a page that enables you to start your web server instance     If you select the Apply Changes button when the server is off  an authentication  dialog box prompts you for the username password  This window is not resizable  and  you might have a problem submitting the change     There are two workarounds for this problem     m Select the Load Configuration Files instead   m Start up the web server first  and select the Apply Changes button     10  In the Sun ONE Web Server 4 1 Administration Server window  select the On Off  link on the left side of the window     11  Enter the passwords for the servers and select the OK button     You are prompted for one or more passwords  At the Module Internal prompt   provide the password for the web server trust database     At the Module keystore_name prompt  enter the username password for that keystore   Enter the username password for other keystores as prompted     12  Verify the new SSL enabled web server at the following URL     https    hostname domain server_port      100 Sun Crypto Accelerator 4000 Board Installation and User   s Guide e May 2003    Note     The default server_port is 443        Installing and Configuring Sun ONE  Web Server 6 0    This section explains how to enable the Sun
37.  troubleshooting for the Sun Crypto  Accelerator 4000 software  This chapter includes the following sections        SunVTS Diagnostic Software    on page 119     Using kstat to Determine Cryptographic Activity    on page 128     Using the OpenBoot PROM FCode Self Test    on page 129    a  m  a  a    Troubleshooting the Sun Crypto Accelerator 4000 Board    on page 132       SunVTS Diagnostic Software    The core SunVTS wrapper provides test control and a user interface to a suite of  tests  Some of those tests are delivered in packages SUNWvts and SUNWvtsx along  with the core to make up a bundle that is contained on the Solaris 8 9 Software  Supplement CD  Other  unbundled  tests that use the SunVTS core are packaged  with the driver software of the device tested     The Sun Crypto Accelerator 4000 board can be tested by three SunVTS tests  Two of  those tests  nettest and netlbtest are bundled with the core SunVTS software  beginning with the release of SunVTS 5 1 Patch Set  PS  2  These tests operate on the  Ethernet circuitry of the board     The third SunVTS test  vcatest  is delivered in the SUNWvcav package on the Sun  Crypto Accelerator 4000 CD and operates with the core SunVTS wrapper to provide  diagnostics of the cryptographic circuitry of the board     119    120    Installing SunVTS net lbtest and nettest  Support for the vca Driver    TABLE 7 1 shows the method of updating installed SunVTS software to provide  SunVTS netlbtest and nettest support for the vca driv
38.  up of three parts   device parent name  device node name  and device unit address  See TABLE 3 10     TABLE 3 10 Device Path Name       Entire Device Path Name Parent Name Portion Node Name Portion Unit Address Portion    pci 8 600000 network 1   pcit8  600000 network 1    pci 8 700000 network 1   pci 8  700000 network 1       To identify a PCI device unambiguously in the vca conf file  use the entire device  path name  parent name  node name  and the unit address  for the device  Refer to  the pci 4  online manual page for more information about the PCI device  specification       Set the parameters for the above devices in the  kernel drv vca conf file     In the following entry  the adv autoneg cap parameter is disabled for a particular  Sun Crypto Accelerator 4000 Ethernet device        pcil08e  3de8  parent   pci 8  700000  unit address  1  adv   autoneg cap 0                   Save the vca conf file     Save and close all files and programs  and exit the windowing system       Shut down and reboot the system     Setting Parameters for All Sun Crypto Accelerator 4000 vca  Devices With the vca conf File    If you omit the device path name  parent name  node name  and the unit address    the variable is set for all instances of all Sun Crypto Accelerator 4000 Ethernet  devices     Chapter 3 Configuring Driver Parameters 39       v To Set Parameters for All Sun Crypto Accelerator 4000 vca  Devices With the vca conf File    1  Add a line in the vca conf file to change the v
39.  warnings and leave kernel  modules loaded     If you installed all the packages  you would remove them as follows          pkgrm SUNWkc120 SUNWvcav SUNWvcar SUNWkcl2a SUNWkcl2u SUNWkcl2r  SUNWvcamn SUNWkc12m SUNWkc12i SUNWvcaa SUNWvcafw SUNWvcau             Chapter 2 Installing the Sun Crypto Accelerator 4000 Board 21    Note     After installing or removing the SunVTS test  SUNWvcav  for the Sun Crypto  Accelerator 4000 board  if SunVTS is already running it might be necessary to  reprobe the system to update the available tests  See your SunVTS documentation    for more information     22 Sun Crypto Accelerator 4000 Board Installation and User   s Guide   May 2003    CHAPTER 3       Configuring Driver Parameters       This chapter describes how to configure the vca device driver parameters used by  both the Sun Crypto Accelerator 4000 UTP and MMF Ethernet adapters  This chapter  contains the following sections     m    Sun Crypto Accelerator 4000 Ethernet Device Driver  vca  Parameters    on  page 23   m    Setting vca Driver Parameters    on page 33   m    Enabling Autonegotiation or Forced Mode for Link Parameters With the  OpenBoot PROM    on page 41   m    Sun Crypto Accelerator 4000 Cryptographic and Ethernet Driver Operating  Statistics    on page 43   m    Network Configuration    on page 52       Sun Crypto Accelerator 4000 Ethernet  Device Driver  vca  Parameters    The vca device driver controls the Sun Crypto Accelerator 4000 UTP and MMF  Ethernet devices  The v
40. 00  duplex half  link clock master    Note     The link clock parameter must have a value that corresponds to the  link clock value of the link partner  For example  if the 1ink clock value on the  local link is set to master  the 1ink clock value on the link partner must be set to  slave              42 Sun Crypto Accelerator 4000 Board Installation and User   s Guide   May 2003    To establish a forced mode for a speed of 10 Mbps and an autonegotiation mode for  duplex  type the following at the OBP prompt     ok boot net speed 10  duplex auto    You could also type the following at the OBP prompt to establish the same local link  parameters as the previous example     ok boot net speed 10    Refer to the IEEE 802 3 documentation for further details        Sun Crypto Accelerator 4000  Cryptographic and Ethernet Driver  Operating Statistics    This section describes the statistics presented by the kstat 1M  command     Cryptographic Driver Statistics    TABLE 3 12 describes the cryptographic driver statistics     TABLE 3 12 Cryptographic Driver Statistics    Parameter Description Stable or Unstable       vs mode The values are FIPS  standard  or unitialized  Stable  FIPS indicates that the board is in FIPS mode   standard indicates that the board is in not in  FIPS mode  unitialized indicates that the board  is not initialized     vs status The values are ready  faulted  or failsafe  Stable  ready indicates that the board is operating  normally  faulted indicates that the bo
41. 00 Board    on page 80     vceaadm vcaN   hostname  sec_officer  gt  set lock  WARNING  Issuing this command will lock the  master key  You will be unable to back  up your master key once this command  is issued  Once set  the only way to  remove this lock is to zeroize the board   Do you wish to lock the master key   Y Yes N No   No   y  The master key is now locked           Chapter 4 Administering the Sun Crypto Accelerator 4000 Board With the vcaadm and vcadiag Utilities 75       Managing Boards With vcaadm    This section describes how to manage Sun Crypto Accelerator 4000 boards with the  vcaadm utility     Setting the Auto Logout Time    To customize the amount of time before a security officer is automatically logged out  of the board  use the set timeout command  To change the auto logout time  enter  the set timeout command followed by a single number that is the number of  minutes before a security officer is automatically logged out  A value of 0 will  disable the automatic logout feature and the maximum delay is 1 440 minutes  1  day   A newly initialized Sun Crypto Accelerator 4000 board will default to 5  minutes     The following command changes the auto logout time for a security officer to 10  minutes     vcaadm vcaN hostname  sec_officer  gt  set timeout 10    76 Sun Crypto Accelerator 4000 Board Installation and User   s Guide   May 2003    Displaying Board Status    To get the current status of a Sun Crypto Accelerator 4000 board  issue the show  status c
42. 003    Keyword    If all of the previous parameters are set to 1  autonegotiation will use the highest  speed possible  If all of the previous parameters are set to 0  you will receive the  following error message     E  Last setting will leave vca0 with no link capabilities        G  vca0  Restoring previous setting        Note     In the previous example  vca0 is the Sun Crypto Accelerator 4000 board  device name where the string  vca  is used for every Sun Crypto Accelerator 4000  board  This string is always immediately followed by the device instance number of  the board  Hence  the device instance number of the vca0 board is 0     Flow Control Parameters    The vca device is capable of sourcing  transmitting  and terminating  receiving   pause frames conforming to the IEEE 802 3x Frame Based Link Level Flow Control  Protocol  In response to received flow control frames  the vca device is capable of  reducing its transmit rate  Alternately  the vca device is capable of sourcing flow  control frames  requesting the link partner to reduce its transmit rate if the link  partner supports this feature  By default  the driver advertises both transmit and  receive pause capability during autonegotiation     TABLE 3 3 provides flow control keywords and describes their function     TABLE 3 3 Read Write Flow Control Keyword Descriptions    Description    adv asmpause cap Both the MMF and UTP adapters support asymmetric pause  hence  the vca    adv pause cap    device can pause onl
43. 1  Default 0      Switches off 64 bit capability of the adapter   Note  for UltraSPARC   III based platforms  this parameter may be    set to 1 by default  For UltraSPARC II based platforms  the default is  0  The values are 0 or 1  Default 0  which enables 64 bit capability         Sun Crypto Accelerator 4000 Board Installation and User   s Guide   May 2003       Setting vca Driver Parameters    You can set the vca device driver parameters in two ways   a Using the ndd utility  m Using the vca conf file    If you use the ndd utility  the parameters are valid only until you reboot the system   This method is good for testing parameter settings     To set parameters so they remain in effect after you reboot the system  create a   kernel drv vca conf file and add parameter values to this file when you need  to set a particular parameter for a device in the system  See    To Set Driver  Parameters Using a vca conf File    on page 38 for details     Setting Parameters Using the ndd Utility    Use the ndd utility to configure parameters that are valid until you reboot the  system     The following sections describe how you can use the vca driver and the ndd utility  to modify  with the  set option  or display  without the  set option  the  parameters for each vca device     v To Specify Device Instances for the ndd Utility    Before you use the ndd utility to get or set a parameter for a vca device  you must  specify the device instance for the utility     1  Check the  etc path_t
44. 102  Santa Clara  CA 95054  USA    Tel  650 786 3255  Fax  650 786 3723     S     Pamela J Dullaghan   Quality Program Manager   Sun Microsystems Scotland  Limited  Springfield  Linlithgow   West Lothian  EH49 7LR   Scotland  United Kingdom   Tel   44 1 506 672 395   Fax   44 1 506 672 855    vi Sun Crypto Accelerator 4000 Board Installation and User   s Guide   May 2003    Regulatory Compliance Statements    Your Sun product is marked to indicate its compliance class     e Federal Communications Commission  FCC      USA   e Industry Canada Equipment Standard for Digital Equipment  ICES 003      Canada  e Voluntary Control Council for Interference  VCCI      Japan   e Bureau of Standards Metrology and Inspection  BSMI      Taiwan    Please read the appropriate section that corresponds to the marking on your Sun product before attempting to install the  product     FCC Class A Notice    This device complies with Part 15 of the FCC Rules  Operation is subject to the following two conditions     1  This device may not cause harmful interference   2  This device must accept any interference received  including interference that may cause undesired operation     Note  This equipment has been tested and found to comply with the limits for a Class A digital device  pursuant to Part 15 of  the FCC Rules  These limits are designed to provide reasonable protection against harmful interference when the equipment  is operated in a commercial environment  This equipment generates  uses  a
45. 12A     EMC  USA   FCC Class B    This equipment complies with Part 15 of the FCC Rules  Operation is subject to the following two  conditions     1  This equipment may not cause harmful interference    2  This equipment must accept any interference that may cause undesired operation   European Union   This equipment complies with the following requirements of the EMC Directive 89 336 EEC     As Telecommunication Network Equipment  TNE  in both Telecom Centers and Other Than Telecom Centers per  as  applicable      EN300 386 V 1 3 1  09 2001  Required Limits           EN55022 CISPR22 Class B   EN61000 3 2 Pass   EN61000 3 3 Pass   EN61000 4 2 6 kV  Direct   8 kV  Air    EN61000 4 3 3 V m 80 1000MHz  10 V m 800 960 MHz and 1400 2000 MHz   EN61000 4 4 1 kV AC and DC Power Lines  0 5 kV Signal Lines    EN61000 4 5 2 kV AC Line Gnd  1 kV AC Line Line and Outdoor Signal Lines   0 5 kV Indoor Signal Lines  gt  10m    EN61000 4 6 3V   EN61000 4 11 Pass    As information Technology Equipment  ITE  Class B per  as applicable            EN55022 1998  CISPR22 1997 Class B  EN55024 1998 Required Limits   EN61000 4 2 4 kV  Direct   8 kV  Air   EN61000 4 3 3 V m  EN61000 4 4 1 kV AC Power Lines  0 5 kV Signal and DC Power Lines  EN61000 4 5 1 kV AC Line Line and Outdoor Signal Lines  2 kV AC Line Gnd   0 5 kV DC Power Lines  EN61000 4 6 3V  EN61000 4 8 1 A m  EN61000 4 11 Pass  EN61000 3 2 1995   A1  A2  A14 Pass  EN61000 3 3 1995 Pass  Safety    This equipment complies with the following 
46. 17 Read Only Link Partner Capabilities  Continued     Parameter    Description    Stable or Unstable       lp cap 10hdx    lp cap asm pause    lp cap pause    0   No 10 Mbps half duplex transmission  1   10 Mbps half duplex    0   Not asymmetric pause capable   1   Asymmetric pause towards link partner  capability  See    Flow Control Parameters    on  page 27     0   Not symmetric pause capable  1   Symmetric pause capable  See    Flow  Control Parameters    on page 27     Stable    Stable    Stable       If the link partner is not capable of autonegotiation  when 1p cap autoneg is 0    the remaining information described in TABLE 3 17 is not relevant and the parameter    value is 0     If the link partner is capable of autonegotiation  when 1p cap autoneg is 1   then  the speed and mode information is displayed when you use autonegotiation and the  link partner capabilities     TABLE 3 18 describes the driver specific parameters     TABLE 3 18 Driver Specific Parameters       Parameter    lb mode    promisc    Description  Copy of the loopback mode the device is in  if  any     When enabled  the device is in promiscuous  mode  When disabled  the device is not in  promiscuous mode     Ethernet Transmit Counters    tx wsrv    tx msgdup fail  tx allocb fail    tx queue0    tx queuel    tx queue2    Count of the number of times the transmit ring  is full     Attempt to duplicate packet failure   Attempt to allocate memory failure     Number of packets queued for transmission on
47. 2 Read and write Interpacket Gap parameter    rx intr pkts  rx intr time  red dv4to6k  red dv6to8k  red dv8tol10k  red dv1l0tol12k  tx dma weight  rx dma weight  infinit    burst    disable 64bit    Read and write  Read and write  Read and write  Read and write  Read and write  Read and write  Read and write  Read and write  Read and write    Read and write    Receive interrupt blanking values   Receive interrupt blanking values   Random early detection and packet drop vectors  Random early detection and packet drop vectors  Random early detection and packet drop vectors  Random early detection and packet drop vectors  PCI Interface parameter   PCI Interface parameter   PCI Interface parameter    PCI Interface parameter    Advertised Link Parameters    The following parameters determine the transmit and receive speed and duplex    link parameters to be advertised by the vca driver to its link partner  TABLE 3 2  describes the operational mode parameters and their default values     Note     If a parameter   s initial setting is 0  it cannot be changed  If you try to change    an initial setting of 0  it will revert back to 0  By default  these parameters are set to    the capabilities of the vca device     Chapter 3 Configuring Driver Parameters    25    The Sun Crypto Accelerator 4000 UTP adapter advertised link parameters are  different from those of the Sun Crypto Accelerator 4000 MMF adapter as shown in  TABLE 3 2     TABLE 3 2 Operational Mode Parameters    Parameter Des
48. 2003    v To Install the Server Certificate    1  Select the Install Certificate link on the left side of the Sun ONE Web Server 6 0  Administration Server window     Once your request has been approved by a certificate authority and a certificate has  been issued  you must install the certificate in the Sun ONE Web Server     2  Select the Security tab     3  On the left pane  choose the Install Certificate link        iPlanet  Web Server 6 0 Server Manager    Preferences    ij   Monitor   Virtual Server Class   Java   Legacy Servlets   Search    Install a Server Certificate    Certificate For   IS This Server  I Server Certificate Chain  IE Trusted Certificate Authority  CA     Select the module to use with this certificate     cr  tote      Key Pair File Password   I       Enter Certificate Name ONLY if certificate is not for    This Server           Certificate Name              IS Message is in this file   a   H Message text  with headers      f                   FIGURE 5 4 Install a Server Certificate Page of the Sun ONE Web Server 6 0  Administration Server    Chapter 5 Configuring Sun ONE Server Software for Use With the Sun Crypto Accelerator 4000 Board 107    4  Fill out the form to install your certificate     TABLE 5 5 Fields for the Certificate to Install       Fields Description   Certificate For This server   Cryptographic Each keystore has its own entry in this pull down menu  Be sure  Module that you select the correct keystore name  To use the Sun Crypto    
49. 4000 Board Installation and User   s Guide   May 2003    10       Power on the system        Caution     When you power on the system after adjusting the Sun Crypto  Accelerator 4000 board jumper  all firmware  key material  and configuration  information is deleted  This process returns the board to the factory state and places  the board in failsafe mode          Power off the system       Remove the jumper from pins 0 and 1 of the jumper block and store the jumper in    the original location       Power on the system       Connect to the Sun Crypto Accelerator 4000 board with vcaadm     vcaadm prompts you for a path to upgrade the firmware       Type  opt  SUNWconn cryptov2 firmware sca4000fw as the path for    installing the firmware     The firmware is automatically installed and you are logged out of vcaadm     Reconnect to Sun Crypto Accelerator 4000 board with vcaadm     vcaadm prompts you to either initialize the board with a new keystore  or initialize  the board to use an existing keystore  See    Initializing the Sun Crypto Accelerator  4000 Board With vcaadm    on page 65     Appendix F  Zeroizing the Hardware 165    166 Sun Crypto Accelerator 4000 Board Installation and User   s Guide   May 2003    APPENDIX G    Frequently Asked Questions       How Do I Configure the Web Server to Startup Without User  Interaction on Reboot     You can enable both Sun ONE and Apache Web Servers to perform an unattended  startup at reboot with an encrypted key     To Create an En
50. 6    TABLE A 7       TABLE A 8    Cryptographic Driver Statistics 43   Ethernet Driver Statistics 44   TX and RX MAC Counters 45   Current Ethernet Link Properties 47   Read Only vca Device Capabilities 47   Read Only Link Partner Capabilities 48   Driver Specific Parameters 49   vcaadm Options 56   vcaadm Prompt Variable Definitions 61   connect Command Optional Parameters 62   Security Officer Name  User Name  and Keystore Name Requirements 69  Password Requirement Settings 70   Key Types 79   vcadiag Options 82   Passwords Required for Sun ONE Web Servers 89  Requestor Information Fields 97   Fields for the Certificate to Install 99   Requestor Information Fields 106   Fields for the Certificate to Install 108   SunVTS net lbtest and nettest Required Software for the vca Driver 120  vcatest Subtests 123   vcatest Command Line Syntax 124   SC Connector Link Characteristics  IEEE P802 3z  136  Physical Dimensions 137   Performance Specifications 137   Power Requirements 137   Interface Specifications 138   Environmental Specifications 138   Cat 5 Connector Link Characteristics 139    Physical Dimensions 140    xx Sun Crypto Accelerator 4000 Board Installation and User   s Guide   May 2003    TABLE A 9    TABLE A 10    TABLE A 11    TABLE A 12    TABLE B 1    TABLE B 2    TABLE B 3    TABLE B 4    TABLE B 5    TABLE B 6    TABLE B 7       TABLE E 1    Performance Specifications 140  Power Requirements 140  Interface Specifications 141  Environmental Specifications 141  SSL Pr
51. 6 0 101  Installing Sun ONE Web Server 6 0 101  v To Install Sun ONE Web Server 6 0 101  v To Create a Trust Database 102  v To Generate a Server Certificate 104  v To Install the Server Certificate 107  Configuring Sun ONE Web Server 6 0 for SSL 108  v To Configure the Sun ONE Web Server 6 0 108   6  Configuring Apache Web Servers for Use With the Sun Crypto Accelerator 4000   Board 111   Enabling the Board for Apache Web Servers 112  Enabling Apache Web Servers 112  v To Enable the Apache Web Server 112  Creating a Certificate 114    v To Create a Certificate 115    7  Diagnostics and Troubleshooting 119  SunVTS Diagnostic Software 119    Installing SunVTS netlbtest and nettest Support for the vca  Driver 120    Using SunVTS Software to Perform vcatest  nettest  and  netlbtest 121    v ToPerformvcatest 121  Test Parameter Options for vcatest 123  vcatest Command Line Syntax 123  v ToPerformnetlbtest 124  v ToPerformnettest 125  Using kstat to Determine Cryptographic Activity 128  Using the OpenBoot PROM FCode Self Test 129    xvi Sun Crypto Accelerator 4000 Board Installation and User s Guide   May 2003    v Performing the Ethernet FCode Self Test Diagnostic 129  Troubleshooting the Sun Crypto Accelerator 4000 Board 132  show devs 132   properties 133    watch net 134    Specifications 135  Sun Crypto Accelerator 4000 MMF Adapter 135  Connectors 135  Physical Dimensions 137  Performance Specifications 137  Power Requirements 137  Interface Specifications 138  Environmental 
52. Accelerator 4000  you must select a module in the form of  keystore_name     Key Pair File This password is the username password  TABLE 5 1    Password  Certificate Name In most cases  you can leave this blank  If you provide a name  it    will alter the name the web server uses to access the certificate and  key when running with SSL support  The default for this field is    Server Cert     5  Paste the certificate you copied from the certificate authority  in Step 8 of the    To  Generate a Server Certificate    on page 104  into the Message text box     You are shown some basic information about the certificate   6  Select the OK button at the bottom of the page     7  If everything looks correct  select the Add Server Certificate button     On screen messages tell you to restart the server  This is not necessary because the  web server instance has been shut down the entire time     You are also notified that in order for the web server to use SSL  the web server must  be configured to do so  Use the following procedure to configure the web server     Configuring Sun ONE Web Server 6 0 for SSL    Now that your web server and the Server Certificate are installed  you must  configure the web server for SSL     v To Configure the Sun ONE Web Server 6 0    1  Select the Preferences tab near the top of the page     2  Select the Edit Listen Sockets link on the left pane     The main pane lists all the listen sockets set for the web server instance     a  Alter the following f
53. Agreement will be governed by  California law and controlling U S  federal law  No choice of law rules of any  jurisdiction will apply     10  SEVERABILITY  If any provision of this Agreement is held to be unenforceable   this Agreement will remain in effect with the provision omitted  unless omission  would frustrate the intent of the parties  in which case this Agreement will  immediately terminate     11  INTEGRATION  This Agreement is the entire agreement between you and Sun  relating to its subject matter  It supersedes all prior or contemporaneous oral or  written communications  proposals  representations and warranties and prevails  over any conflicting or additional terms of any quote  order  acknowledgment  or  other communication between the parties relating to its subject matter during the  term of this Agreement  No modification of this Agreement will be binding  unless  in writing and signed by an authorized representative of each party     For inquiries please contact  Sun Microsystems  Inc  4150 Network Circle  Santa  Clara  California 95054     Form ID 011801   Sun Microsystems  Inc     Supplemental Terms for Sun Crypto Accelerator 4000    These Supplemental Terms for the Sun Crypto Accelerator 4000 supplement the  terms of the Binary Code License Agreement   BCL    Capitalized terms not defined  herein shall have the meanings ascribed to them in the BCL  These Supplemental  Terms will supersede any inconsistent or conflicting terms in the BCL  Use of the  So
54. Autonegotiation Mode    If your network equipment does not support autonegotiation  or if you want to force  your network speed  duplex  or link clock parameters  you can disable the  autonegotiation mode on the vca device       Set the following driver parameters to the values that are described in the  documentation delivered with your link partner device  for example  a switch      adv 1000fdx cap  adv 1000hdx cap  adv 100fdx cap  adv 100hdx cap  adv 10fdx cap  adv 10hdx cap  adv asmpause cap  adv pause cap    See TABLE 3 2 for the descriptions and possible values of these parameters       Set the adv autoneg    cap parameter to 0       ndd  set  dev vcaN adv autoneg cap 0    When you change any ndd link parameter  a message similar to the following  appears     link up 1000 Mbps half duplex    Note     If you disable autonegotiation  you must enable the speed  duplex  and  link clock  1000 Mbps only  parameters to operate in forced mode  For  instructions  see    Enabling Autonegotiation or Forced Mode for Link Parameters  With the OpenBoot PROM    on page 41        Chapter 3 Configuring Driver Parameters 37    Setting Parameters Using the vca conf File    You can also specify the driver parameter properties by adding entries to the  vca conf file in the  kernel drv directory  The parameter names are the same  names listed in    Driver Parameter Values and Definitions    on page 24        Caution     Do not remove any of the default entries in the   kernel drv vca conf fi
55. CTWO  128 bit   DES  56 bit   ARCFOUR  64 bit   DES  56 bit    DES  40 bit   ARCTWO  40 bit   ARCTWO  40 bit   ARCFOUR  40 bit     MAC  SHA1  MD5  SHA1  MD5  MD5    SHA1  MD5  MD5  SHA1  SHA1  SHA1  MD5    Type    export  export  export    export       Appendix B    SSL Configuration Directives for Apache Web Servers 145    TABLE B 2 Available SSL Ciphers  Continued     Protocol Key Exchange Auth  Encryption MAC Type                         Cipher Tag   EXP RC4 MD5 SSLv2 RSA  512 bit  RSA ARCFOUR  40 bit  MD5 export  NULL SHA SSLv3 RSA RSA None SHA1   NULL MD5 SSLv3 RSA RSA None MD5  ADH DES CBC3 SHA SSLv3 DH None 3DES  168 bit  SHA1  ADH DES CBC SHA SSLv3 DH None DES  56 bit  SHA1  ADH RC4 MD5 SSLv3 DH None ARCFOUR  128 bit  MD5  EDH RSA DES    CBC3 SHA SSLv3 DH RSA 3DES  168 bit  SHA1  EDH DSS DES    CBC3 SHA SSLv3 DH DSS 3DES  168 bit  SHA1  EDH RSA DES    CBC SHA SSLv3 DH RSA DES  56 bit  SHA1  EDH DSS DES    CBC SHA SSLv3 DH DSS DES  56 bit  SHA1  EXP EDH RSA DES CBC SHA SSLv3 DH  512 bit  RSA DES  40 bit  SHA1 export  EXP EDH DSS DES CBC SHA SSLv3 DH  512 bit  DSS DES  40 bit  SHA1 export  EXP ADH DES CBC SHA SSLv3 DH  512 bit  None DES  40 bit  SHA1 export  EXP ADH RC4 MD5 SSLv3          1 DH  512 bit  None ARCFOUR  40 bit    MD5 export    TABLE B 3 lists and describes the aliases that provide macro like groupings     TABLE B 3    Alias    SSL Aliases    Description       SSLv2       SSLv3  EXP  EXPORT40  EXPORT56  LOW  EDIUM  HIGH   RSA    DH          EDH    All SSL v
56. Description       Requestor Name Contact information for the requestor    Telephone Number Contact information for the requestor    Common Name Website Domain that is typed in a visitor   s browser hostname domain  Email Address Contact information for requestor  Organization A value for the organization to be asserted on the certificate    Organizational Unit  Optional  A value for the organizational unit that will be asserted  on the certificate    Locality  Optional  City  county  principality  or country  which is also  asserted on the certificate if provided   State  Optional  The full name of the state   Country The two letter ISO code for the country  for example  the United    States is US        e  Select the OK button to submit the information     7  Use a certificate authority to generate the certificate     a If you choose to post your certificate request to a CA URL  the certificate request  is automatically posted there     a If you choose the CA Email Address  copy the certificate request that was emailed  to you with the headers and hand it off to your certificate authority     8  Once the certificate is generated  copy it  along with the headers  to the clipboard     Note     The certificate is different from the certificate request and is usually  presented to you in text form  Keep this data on the clipboard for Step 5 of the    To  Install the Server Certificate    on page 107     106 Sun Crypto Accelerator 4000 Board Installation and User   s Guide e May 
57. IX  user that the web server runs as can read the file  This user should be the same user  as configured with the standard Apache User directive        If not specified  the default behavior uses an internal prompting mechanism  Do  not use the default  use the supplied sslpassword program instead  to avoid  problems with interaction at system startup     2  SSLEngine  on off        Context  Global  virtual host    This directive enables the SSL protocol  It is typically used in a virtual host to  enable SSL on a subset of servers  One form commonly used is         lt VirtualHost _default_ 443 gt   SSLEngine on   lt  VirtualHost gt                 This statement configures the use of SSL for any servers listening on port 443  the  standard HTTPS port   If not present  this protocol is turned off by default     3  SSLProtocol      protocol  Context  global  virtual host    This directive configures the protocol s  that the server should use for SSL  transactions  The available protocols are listed and described in TABLE B 1     TABLE B 1 SSL Protocols       Protocol Description  SSLv2 Original standard SSL protocol from Netscape  SSLv3 Updated version of the SSL protocol  supported by most popular    web browsers    TLSv1 Update to SSLv3 currently undergoing IETF standardization  with  minimal browser support    all Enable all protocols       144 Sun Crypto Accelerator 4000 Board Installation and User   s Guide   May 2003    Using the plus     or minus     signs  protocols can
58. Import keys from PKCS 12 format for Sun ONE Web Server  Your selection  0 to quit   1             7  Enter the path of the web server root directory when prompted and press Return        Pleas nter the full path of the web server  root directory   usr iplanet servers    usr iplanet servers                Chapter 5 Configuring Sun ONE Server Software for Use With the Sun Crypto Accelerator 4000 Board 103       8  Type y and press Return when prompted  if you want to proceed        This script will update your Sun ONE Web Server installation  in  usr iplanet servers to use the Sun Crypto Accelerator  You will need to restart your admin server after this has  completed    Ok to proceed   Y N   y    Using database directory  usr iplanet servers alias     Module  Sun Crypto Accelerator 4000  added to database    usr iplanet servers has been configured to use   the Sun Crypto Accelerator               lt Press ENTER to continue gt              9  Type 0 to quit     v To Generate a Server Certificate    1  Restart the Sun ONE Web Server 6 0 Administration Server by typing the  following commands        usr iplanet servers https   admserv stop       usr iplanet servers https   admserv start       The response provides the URL for connecting to your servers     2  Start the Administration GUI by opening up a web browser and typing     http    hostname domain admin_port    In the authentication dialog box enter the Sun ONE Web Server 6 0 Administration  Server user name and password yo
59. L  the web server must  be configured to do so  Use the following procedure to configure the web server     Configuring Sun ONE Web Server 4 1 for SSL    Now that your web server and the server certificate are installed  you must  configure the web server for SSL     v To Configure the Sun ONE Web Server 4 1    1  From the main Sun ONE Web Server 4 1 Administration Server page  select the  web server instance you want to work with and select Manage     2  If the Preferences tab is not selected at the top of the page  select the Preferences  tab     3  Select the Encryption On Off link on the left side of the page     Chapter 5 Configuring Sun ONE Server Software for Use With the Sun Crypto Accelerator 4000 Board 99    4  Set encryption to On     The Port field in the dialog box should update to the default SSL port number 443   Alter the port number if necessary     5  Select the OK button     6  Apply these changes by selecting the Save button     The web server is now configured to run in secure mode     7  Edit the  usr netscape server4 https hostname config magnus conf file   hostname is the name of the web server  by adding the following line     CERTDefaultNickname keystore_name   Server Cert    By default  the certificate you generated is named Server Cert  If your certificate  has a different name  be sure to use the name you chose instead of Server Cert           8  Select the server you want to administer and select the Apply button in the far  upper right corner of
60. L Log Level Values   Value Description   none no logging  but error messages are still sent to the standard Apache  error log   warn Include warning messages   info Include information messages   trace Include trace messages   debug Include debugging messages    14  SSLOptions      option    Context  Global  virtual host  directory   htaccess    This directive configures SSL runtime options on a per directory basis  Options  can be added to the current configuration by prefixing them with a plus sign       or removed using a minus sign      If multiple options could apply to a directory   the most restrictive option is used  the options are not merged     Appendix B SSL Configuration Directives for Apache Web Servers 149    Options are listed and described in TABLE B 7     TABLE B 7 Available SSL Options       Options Description    StdEnvVars Standard set of SSL related CGI SSI environment variables are  created   there is a performance penalty for this     ExportCertData Causes the SSL_SERVER_CERT  SSL_CLIENT_CERT and  SSL_CLIENT_CERT_CHAINn  n   0  1       environment variables to  be exported  These variables contain PEM encoded certificates for  the client and server     FakeBasicAuth Distinguished Name  DN  of the client certificate is translated into  an HTTP Basic Authentication Username  and is    faked    to have  authentication  This allows the use of standard Apache access  control mechanisms with SSL client authentication without  prompting the user for a passwor
61. Server may run as a UNIX user who has no  home directory  in which case this approach might not be feasible        3  The file  etc opt  SUNWconn cryptov2 tokens    If no token file exists  the Sun Crypto Accelerator 4000 software presents all tokens  to Sun ONE Web Servers     Chapter 5 Configuring Sun ONE Server Software for Use With the Sun Crypto Accelerator 4000 Board 87    The following is an example of the contents in a token file             This is an example token fil             engineering   Comments are acceptable on the same lin  legal      Because the finance keystore is not listed  the Sun Crypto    Accelerator will not present it to the Sun ONE Web Server                          Note     Comments are preceded by a pound sign     and empty lines are acceptable        If none of the files described in this subsection are found  then the default method  described in    Tokens and Token Files    on page 87 is used     Enabling and Disabling Bulk Encryption    The bulk encryption feature for SunONE server software is disabled by default  You  may want to enable this feature for securely transferring primarily large files     To enable Sun ONE server software to use bulk encryption on the Sun Crypto  Accelerator 4000 board  you simply create an empty file in the   etc opt SUNWconn cryptov2  directory named sslreg  and restart the server  software       touch  etc opt SUNWconn cryptov2 sslreg    To disable the bulk encryption feature  you must delete the sslreg fil
62. Specifications 138  Sun Crypto Accelerator 4000 UTP Adapter 138  Connectors 138  Physical Dimensions 140  Performance Specifications 140  Power Requirements 140  Interface Specifications 141    Environmental Specifications 141  SSL Configuration Directives for Apache Web Servers 143    Building Applications for Use With the Sun Crypto Accelerator 4000  Board 151    Software Licenses 153    Third Party License Terms 156    Contents xvii    E  Manual Pages 161    F  Zeroizing the Hardware 163  Zeroizing the Sun Crypto Accelerator 4000 Hardware to the Factory State 163    v To Zeroize the Sun Crypto Accelerator 4000 Board With the Hardware  Jumper 164    G  Frequently Asked Questions 167    How Do I Configure the Web Server to Startup Without User  Interaction on Reboot  167    v To Create an Encrypted Key for Automatic Startup of Apache Web  Servers on Reboot 167    v To Create an Encrypted Key for Automatic Startup of Sun ONE Web  Servers on Reboot 168    How Do I Assign Different MAC Addresses to Multiple Boards  Installed in the Same Server  168    v To Assign Different MAC Addresses From a Terminal Window 169    To Assign Different MAC Addresses From the OpenBoot PROM  Level 169    How Can I Configure the Sun Crypto Accelerator 1000 for Use With  Apache After I Have Installed the Sun Crypto Accelerator 4000  Software  169    How Do I Self Sign a Certificate for Testing  170    xviii    Sun Crypto Accelerator 4000 Board Installation and User   s Guide   May 2003    TABLE 1 1
63. Sun Crypto Accelerator 4000 Board Installation and User s Guide     May 2003    CHAPTER 2       Installing the Sun Crypto  Accelerator 4000 Board    This chapter describes how to install the Sun Crypto Accelerator 4000 hardware and    software  This chapter includes the following sections        Handling the Board    on page 13      Installing the Board    on page 14      Installing the Sun Crypto Accelerator 4000 Software    on page 16     Directories and Files    on page 19      Removing the Software    on page 21       Handling the Board    Each board is packed in a special antistatic bag to protect it during shipping and  storage  To avoid damaging the static sensitive components on the board  reduce  any static electricity on your body before touching the board by using one of the  following methods     m Touch the metal frame of the computer   m Attach an antistatic wrist strap to your wrist and to a grounded metal surface        Caution     To avoid damaging the sensitive components on the board  wear an    antistatic wrist strap when handling the board  hold the board by its edges only  and    always place the board on an antistatic surface  such as the plastic bag it came in         Installing the Board    Installing the Sun Crypto Accelerator 4000 board involves inserting the board into  the system and loading the software tools  The hardware installation instructions  include only general steps for installing the board  Refer to the documentation that  came with yo
64. The Sun Crypto Accelerator 4000 driver  vca  examines each cryptographic request  and determines the best location for the acceleration  host processor or Sun Crypto  Accelerator 4000   to achieve maximum throughput  Load distribution is based on  the cryptographic algorithm  the current job load  and the data size     Sun Crypto Accelerator 4000 board accelerates the following IPsec algorithms     TABLE 1 1 IPsec Cryptographic Algorithms       Type Algorithm    Symmetric DES  3DES    The Sun Crypto Accelerator 4000 board accelerates the following SSL algorithms     TABLE 1 2 SSL Cryptographic Algorithms       Type Algorithm   Symmetric DES  3DES  ARCFOUR   Asymmetric Diffie Hellman  Apache only  and RSA  up to 2048 bit key   DSA  Hash MD5  SHA1    Chapter 1 Product Overview 3    SSL Acceleration    TABLE 1 3 shows which SSL accelerated algorithms may be off loaded to hardware  and which software algorithms are provided for Sun ONE and Apache Web Servers     TABLE 1 3 Supported SSL Algorithms    Sun ONE Web Servers Apache Web Servers    Algorithm Hardware Software Hardware Software  RSA X X X X   DSA X X X X  ARCFOUR X   Diffie Hellman X X   DES X X X X   3DES X X X X   MD5 X X   SHA1 X X   Bulk Encryption    The Sun Crypto Accelerator 4000 bulk encryption feature for Sun ONE server  software is disabled by default  You must manually enable this feature by creating a  file and restarting the Sun ONE server software     To enable Sun ONE server software to use bulk encryption 
65. The kc12 device driver is a multithreaded loadable kernel module  providing support for Sun cryptographic provider drivers     The kc12 driver requires the presence of layered software for  applications and kernel clients to access the provided services     apsslcfg 1m  apssicfg is the configuration utility for Apache Web Servers     iplsslcfg 1m  iplsslcfg is the configuration utility for Sun ONE Web Servers        162 Sun Crypto Accelerator 4000 Board Installation and User   s Guide   May 2003    APPENDIX F    Zeroizing the Hardware       This appendix describes how to zeroize the Sun Crypto Accelerator 4000 board to  the factory state which is the failsafe mode for the board        Caution     You should use the procedures described in this appendix only if it is  absolutely necessary  The zeroize command in vcaadm is appropriate if you need  to remove all key material  Refer to    Zeroizing a Sun Crypto Accelerator 4000  Board    on page 80 for details on the zeroize command  Also refer to the online  manual pages for vcadiag 4  for removing all key material           Note     The procedures described in this appendix remove the Sun Crypto  Accelerator 4000 firmware  You will have to reinstall the firmware which is provided  with the Sun Crypto Accelerator 4000 software        Zeroizing the Sun Crypto Accelerator  4000 Hardware to the Factory State    In some situations  it may become necessary to return a board to failsafe mode   and clear it of all key material and conf
66. URL  the certificate request  is automatically posted there     a If you choose the CA Email Address  copy the certificate request that was emailed  to you with the headers and hand it off to your certificate authority     8  Once the certificate is generated  copy it  along with the headers  to the clipboard     Note     The certificate is different from the certificate request and is usually  presented to you in text form  Keep this data on the clipboard for Step 5 of the  following section     Chapter 5 Configuring Sun ONE Server Software for Use With the Sun Crypto Accelerator 4000 Board 97    Vv To Install the Server Certificate    1  Select the Install Certificate link on the left side of the Sun ONE Web Server 4 1  Administration Server window     Once your request has been approved by a certificate authority and a certificate has  been issued  you must install the certificate in the Sun ONE Web Server   2  Select the Security tab     3  On the left pane  choose the Install Certificate link       PEs 41 integrate Server Manager    j Preferences   Programs   Servlets    Seia Wt C E TTT EN    Install a Server Certificate    Certificate For   I8 This Server  IH Server Certificate Chain  E Trusted Certificate Authority  CA           Select the module to use with this certificate   cmt na ttre      Key Pair File Password   I       Enter Certificate Name ONLY if certificate is not for  This Server           Certificate Name   I    IS Message is in this file           Message
67. WARE MEDIA PACKAGE  YOU AGREE TO THE TERMS OF THIS  AGREEMENT  IF YOU ARE ACCESSING THE SOFTWARE ELECTRONICALLY   INDICATE YOUR ACCEPTANCE OF THESE TERMS BY SELECTING THE   ACCEPT  BUTTON AT THE END OF THIS AGREEMENT  IF YOU DO NOT  AGREE TO ALL THESE TERMS  PROMPTLY RETURN THE UNUSED SOFTWARE  TO YOUR PLACE OF PURCHASE FOR A REFUND OR  IF THE SOFTWARE IS  ACCESSED ELECTRONICALLY  SELECT THE  DECLINE  BUTTON AT THE END  OF THIS AGREEMENT     1  LICENSE TO USE  Sun grants you a non exclusive and non transferable license  for the internal use only of the accompanying software and documentation and any  error corrections provided by Sun  collectively  Software    by the number of users  and the class of computer hardware for which the corresponding fee has been paid     2  RESTRICTIONS Software is confidential and copyrighted  Title to Software and all  associated intellectual property rights is retained by Sun and or its licensors  Except  as specifically authorized in any Supplemental License Terms  you may not make  copies of Software  other than a single copy of Software for archival purposes   Unless enforcement is prohibited by applicable law  you may not modify  decompile   or reverse engineer Software  You acknowledge that Software is not designed     153    licensed or intended for use in the design  construction  operation or maintenance of  any nuclear facility  Sun disclaims any express or implied warranty of fitness for  such uses  No right  title or interest in or 
68. _nam          Is this correct   Y Yes N No   No   y  Restoring data to crypto accelerator board             68 Sun Crypto Accelerator 4000 Board Installation and User   s Guide     May 2003       Managing Keystores With vcaadm    A keystore is a repository for key material  Associated with a keystore are security  officers and users  Keystores not only provide storage  but a means for key objects to  be owned by user accounts  This enables keys to be hidden from applications that do  not authenticate as the owner  Keystores have three components     a Key objects   Long term keys that are stored for applications such as the Sun  ONE Web Server     m User accounts     These accounts provide applications a means to authenticate and  access specific keys     m Security officer accounts     These accounts provide access to key management  functions through vcaadm     Note     A single Sun Crypto Accelerator 4000 board must have exactly one keystore   Multiple Sun Crypto Accelerator 4000 boards can be configured to collectively work  with the same keystore to provide additional performance and fault tolerance     Naming Requirements    Security officer names  user names  and keystore names must meet the following  requirements     TABLE 4 4 Security Officer Name  User Name  and Keystore Name Requirements    Name Requirement Description   Minimum length At least one character   Maximum length 63 characters for user names and 32 characters for keystore names  Valid characters Alphan
69. a address width 32  64 bit   PCI modes Master slave   1 Gbps  850 nm 1000 Mbps  full duplex     Power Requirements    TABLE A 10 Power Requirements    Specification Measurement   Maximum power consumption 6 25 W   5V  12 75 W   3 3V   Voltage tolerance 5V     5   3 3V     5     140 Sun Crypto Accelerator 4000 Board Installation and User   s Guide   May 2003    Interface Specifications    TABLE A 11 Interface Specifications       Feature Specification   PCI clock 33 MHz or 66 MHz   Host interface PCI 2 1 with support for 33 MHz or 66 MHz clock rate and 3 3V or  5V power   PCI bus width 32 bits or 64 bits    Environmental Specifications    TABLE A 12 Environmental Specifications    Condition Operating Specification Storage Specification  Temperature 0   to  55   C   32   to  131   F  40   to  75   C   40   to  167   F  Relative humidity 5 to 85  noncondensing 0 to 95  noncondensing       Appendix A Specifications    141    142 Sun Crypto Accelerator 4000 Board Installation and User   s Guide   May 2003    APPENDIX B    SSL Configuration Directives for  Apache Web Servers    This appendix lists directives for using Sun Crypto Accelerator 4000 software to  configure SSL support for Apache Web Servers  Configure directives in your  http conf file  Refer to the Apache Web Server documentation for more  information     1  SSLPassPhraseDialog exec  program  Context  Global    This directive informs the Apache Web Server that the specified program should  be executed to collect the pa
70. alue of a parameter for all  instances by entering parameter value      The following example sets the adv autoneg cap parameter to 1 for all instances  of all Sun Crypto Accelerator 4000 Ethernet devices     adv autoneg cap 1     Example vca conf File          The following is an example vca conf file     Copyright 2002 Sun Microsystems  Inc  All rights reserved   Use is subject to license terms     ident      vca conf T2 02 06 26 SMI   Use the new Solaris 9 properties to ensure that the driver is attached    on boot  to get us to register with KCL2  This also prevents us from  being unloaded by the cleanup modunload  i 0              ddi forceattach 1 ddi no autodetach 1   name  pcil08e  3de8  parent   pci 8 700000  unit address  1  adv autoneg cap 0   adv autoneg cap 1                       40 Sun Crypto Accelerator 4000 Board Installation and User   s Guide     May 2003       Enabling Autonegotiation or Forced  Mode for Link Parameters With the  OpenBoot PROM    The following parameters can be configured to operate in autonegotiation or forced  mode at the OpenBoot PROM  OBP  interface     TABLE 3 11 Local Link Network Device Parameters    Parameter Description       speed This parameter can be set to auto  1000  100  or 10  the syntax is as follows   e speed auto  default   e speed 1000  e speed 100  e speed 10    duplex This parameter can be set to auto  full  or half  the syntax is as follows   e duplex auto  default   e duplex full  e duplex half    link clock This pa
71. ange any adv parameter  a message similar to the following appears       link up 1000 Mbps half duplex      To display the value of a parameter  specify the parameter name and omit the  value        When you omit the  set option  a query operation is assumed and the utility  queries the named driver instance  retrieves the value associated with the specified  parameter  and prints it          ndd  dev vcaN parameter             34 Sun Crypto Accelerator 4000 Board Installation and User   s Guide     May 2003    Using the ndd Utility in Interactive Mode      To modify a parameter value in interactive mode  specify ndd  dev vca  as  shown below     The ndd utility then prompts you for the name of the parameter       ndd  dev vcaN  name to get set   Enter the parameter name or   to view all          parameters           After typing the parameter name  the ndd utility prompts you for the parameter  value  see TABLE 3 1 through TABLE 3 9      Chapter 3 Configuring Driver Parameters 35       To list all the parameters supported by the vca driver  type ndd  dev vca    See TABLE 3 1 through TABLE 3 9 for parameter descriptions           ndd  dev vca   name to get set        read only    read and write  read and write  read and write  read and write  read and write  read and write  read and write  read and write  read and write  read and write  read and write  read and write  read and write                                           read and write                                      
72. ard With the vcaadm and vcadiag Utilities 61    In the previous example  notice the vcaadm gt  prompt no longer displays the device  instance number  hostname  or security officer name  To log in to another device   type the connect command with the following optional parameters     TABLE 4 3 connect Command Optional Parameters    Parameter Meaning       dev vcaN Connect to the Sun Crypto Accelerator 4000 board with the driver  instance number of N  For example  da vca1 connects to the device  vcal  this defaults to device vca0     host hostname Connect to the Sun Crypto Accelerator 4000 board on hostname   defaults to the loopback address   hostname may be replaced with  the physical host   s IP address     port port Connect to the Sun Crypto Accelerator 4000 board on port port   defaults to 6870      Example        vceaadm vcaN   hostname  sec_officer  gt  logout  vcaadm gt  connect host hostname dev vca2  Security Officer Login  sec_officer  Security Officer Password   vceaadm vcaN hostname  sec_officer    gt        vcaadm will not let you issue the connect command if you are already connected  to a Sun Crypto Accelerator 4000 board  You must first logout and then issue the  connect command     Each new connection will cause vcaadm and the target Sun Crypto Accelerator 4000  firmware to renegotiate new session keys to protect the administrative data that is  sent     62 Sun Crypto Accelerator 4000 Board Installation and User   s Guide   May 2003       Entering Commands Wit
73. ard not  operating  failsafe indicates failsafe mode  which is the original factory state of the board     Chapter 3 Configuring Driver Parameters 43    Ethernet Driver Statistics    TABLE 3 13 describes the Ethernet driver statistics     TABLE 3 13 Ethernet Driver Statistics          Parameter Description Stable or Unstable   ipackets Number of inbound packets  Stable   ipackets64 64 bit version of ipackets  Stable   ierrors Total packets received that could not be processed Stable  because they contained errors  long     opackets Total packets requested to be transmitted on the Stable  interface    opackets64 Total packets requested to be transmitted on the Stable  interface  64 bit     oerrors Total packets that were not successfully Stable  transmitted because of errors  long     rbytes Total bytes successfully received on the interface  Stable   rbytes64 Total bytes successfully received on the interface Stable   64 bit     obytes Total bytes requested to be transmitted on the Stable  interface    obytes64 Total bytes requested to be transmitted on the Stable  interface  64 bit     multircv Multicast packets successfully received  including Stable  group and functional addresses  long     multixmt Multicast packets requested to be transmitted  Stable  including group and functional addresses  long     brdcstrev Broadcast packets successfully received  long   Stable   brdcstxmt Broadcast packets requested to be transmitted Stable   long     norcvbuf Times a valid incoming
74. at the command line  replacing ip_address with the adapter   s IP  address       ifconfig vcaN plumb ip_address up    Note     In the examples in this section  N specifies the instance number of the  device           Refer to the ifconfig 1M  online manual page and the Solaris documentation for  more information     a If you want a setup that will remain the same after you reboot  create an   etc hostname vcaN file  where N corresponds to the instance number of the  vca interface you plan to use     52 Sun Crypto Accelerator 4000 Board Installation and User   s Guide   May 2003    To use the vca interface of the example shown in Step 1  create an   etc hostname vcaN file  where N corresponds to the instance number of the  device which is 0 in this example  If the instance number were 1  the file name  would be  etc hostname vcal     a Do not create an  etc hostname vcaN file for a Sun Crypto Accelerator 4000  interface you plan to leave unused     a The  etc hostname vcaN file must contain the host name for the appropriate  vca interface     a The host name must have an IP address and must be listed in the  etc hosts  file     m The host name must be different from any other host name of any other interface   for example   etc hostname vca0 and  etc hostname vcai1 cannot share the  same host name     The following example shows the  etc hostname vcaN file required for a system  named zardoz that has a Sun Crypto Accelerator 4000 board  zardoz 11           cat  etc hostname  h
75. at you are about to enter is what is called a Distinguished Name or a DN   There are quite a few fields but you can leave some blank   For some fields there will be a default value    If you enter          the field will be left blank     Country Nam  2 letter code   US  US                      State or Province Name  full name   Some State      Locality Name  eg  city         Organization Name  eg  company      Fictional Company  Inc   Organizational Unit Name  eg  section      Online Sales Division  SSL Server Name  eg  www company com      www fictional company com  Email Address     admin fictional company com       Chapter 6 Configuring Apache Web Servers for Use With the Sun Crypto Accelerator 4000 Board 115       2  Modify the  etc apache httpd conf file as directed     You are shown information concerning your key and certificate files  You are also  instructed on how to modify the etc apache httpd conf file for use with the Sun  Crypto Accelerator 4000 software           The keyfile is stored in  etc apache keys base_name key pem   The certificate request is in  etc apache keys base_name certreq pem           You will need to edit  etc apache httpd conf for the following items        You must specify the ports that Apache will listen to for  SSL connections  as well as for non SSL connections  One  way to accomplish this is to add the following lines in  the Listen section        Listen 80  Listen 443    In the LoadModule section  add the following        LoadModule 
76. ator 4000 vca Devices  With the vca conf File 40    Example vca conf File 40    Enabling Autonegotiation or Forced Mode for Link Parameters With the  OpenBoot PROM 41    Sun Crypto Accelerator 4000 Cryptographic and Ethernet Driver Operating  Statistics 43    Cryptographic Driver Statistics 43   Ethernet Driver Statistics 44   Reporting the Link Partner Capabilities 48   v To Check Link Partner Settings 51  Network Configuration 52    Configuring the Network Host Files 52    Administering the Sun Crypto Accelerator 4000 Board With the vcaadm and  vcadiag Utilities 55    Using vcaadm 55  Modes of Operation 56  Single Command Mode 57  File Mode 57  Interactive Mode 58  Logging In and Out With vcaadm 58  Logging In to a Board With vcaadm 59    Contents xiii    Logging In toa New Board 59  Logging In to a Board With a Changed Remote Access Key 60  vcaadmPrompt 61  Logging Out of a Board With vcaadm 61  Entering Commands With vcaadm 63  Getting Help forCommands 64  Quitting the vcaadm Program in Interactive Mode 65  Initializing the Sun Crypto Accelerator 4000 Board With vcaadm 65    v To Initialize the Sun Crypto Accelerator 4000 Board With a New  Keystore 66    Initializing the Sun Crypto Accelerator 4000 Board to Use an Existing  Keystore 67    v To Initialize the Sun Crypto Accelerator 4000 Board to Use an Existing  Keystore 68    Managing Keystores With vcaadm 69  Naming Requirements 69  Password Requirements 69  Setting the Password Requirements 70  Populating a Keystore Wit
77. ay be  useful  but without any warranty  If you require a Sun supported solution  please  contact Sun Professional Services to learn about your options        You must first install the SUNWkc12o package  which contains the required header  files and libraries     Your application must be configured to include OpenSSL headers from   opt  SUNWconn cryptov2 include  such as with the compiler flag      I opt SUNWconn cryptov2 include       151    Additionally  the linker must be directed to include references to the appropriate  libraries  Most OpenSSL compatible applications reference either or both of the  libcrypto aand libss1l a libraries  The Sun cryptographic libraries must also be  included  The following linker attributes will accomplish this      L opt SUNWconn cryptov2 lib  R opt SUNWconn cryptov2 lib       lcerypto  lssl  lkcl       152 Sun Crypto Accelerator 4000 Board Installation and User   s Guide   May 2003    APPENDIX D    Software Licenses       This appendix provides the Sun Binary Code License Agreement and third party  software notices and licenses        Note     The third party licenses and notices provided in this appendix are included  exactly as they are provided by the owners of the software licenses and notices        Sun Microsystems  Inc     Binary Code License Agreement    READ THE TERMS OF THIS AGREEMENT AND ANY PROVIDED  SUPPLEMENTAL LICENSE TERMS COLLECTIVELY  AGREEMENT   CAREFULLY  BEFORE OPENING THE SOFTWARE MEDIA PACKAGE  BY OPENING THE  SOFT
78. b Command Description   passreq Set password requirements   password Change an existing security officer password  timeout Set the auto logout time          You can also enter a question mark at the vcaadm prompt to see a list of all of the  vcaadm commands and their description  for example              vcaadm vcaN   hostname  sec_officer  gt      Sub Command Description   backup Backup master key   connect Begin admin session with firmware  ereate Create users and accounts  delete Delete users and accounts  diagnostics Run diagnostic tests   disable Disable a user   enable Enable a user   exit Exit vcaadm   loadfw Load new firmware   logout Logout current session   quit Exit vcaadm   rekey Generate new system keys   reset Reset the hardware   set Set operating parameters   show Show system settings   zeroize Delete all keys and reset board          64 Sun Crypto Accelerator 4000 Board Installation and User   s Guide     May 2003    When not in vcaadm Interactive mode  the         character could be interpreted by the  shell in which you are working  In this case  be sure to use the command shell  escape character before the question mark     Quitting the vcaadm Program in Interactive Mode    Two commands allow you to exit from vcaadm  quit and exit  The Ctrl D key  sequence also exits from vcaadm        Initializing the Sun Crypto Accelerator  4000 Board With vcaadm    The first step in configuring a Sun Crypto Accelerator 4000 board is to initialize it   When you initializ
79. c 62 35 35 35 2e 31 30 38   00000800 00000000 00000000 00000000 00000000  02000810 00000000 00000000 00000000 00002000  02000814 00000000 00000000 00000000 00000100  02000818 00000000 00000000 00000000 00200000  02000830 00000000 00000000 00000000 00100000   00 00 00 30   00 00 40 00   ethernet   network   network   08 00 20 aa bb cc   Sun PCI Crypto Accelerator 4000 1000Base T Code    mif   501 6039  SUNW  pci vca  00000000    00000001  00100000  00000001  00000040  00000010  00000040  00000040  00003de8  0000108e  00000002  0000b555  00008086    Chapter 7 Diagnostics and Troubleshooting    133       134    watch net    To monitor a network connection  from the OBP prompt  type the apply watch   net command with the device path        ok apply watch net  pci 8  600000 network 1   pci 8 600000 network 1  1000 Mbps full duplex link up  Watch ethernet packets           is a good packet and    X    is a bad packet   Press any key to stop             wu    The system monitors network traffic  displaying         each time it receives an error   free packet and    X    each time it receives a packet with an error that can be detected  by the network hardware interface     Sun Crypto Accelerator 4000 Board Installation and User   s Guide   May 2003       APPENDIX A    Specifications       This appendix lists the specifications for the Sun Crypto Accelerator 4000 MMF and  UTP adapters  It contains the following sections     a    Sun Crypto Accelerator 4000 MMF Adapter    on page 135 
80. c hosts file  53   etc opt SUNWconn vca keydata  19   etc path_to_inst file  38   kernel drv vca conf file  129   opt SUNWconn crypto bin   sslpassword  143        opt SUNWconn cryptov2 firmware   sca4000fw  165   opt SUNWconn cryptov2 include  151   opt SUNWconn cryptov2 lib  19   opt SUNWconn cryptov2 sbin  19                   NUMERICS    16 bit loadable counter increments  45  8 bit vectors  30    A  administering Sun ONE Web Servers  85    administrative commands  19  adv asmpause cap  27  adv asmpause cap parameter  27  adv autoneg cap  24  adv autoneg cap parameter  24  advertised link parameters  25  adv pause cap  27       adv pause cap parameter  27   algorithms  4   alias read  30   Apache SSL directives  143   Apache Web Servers  17   creating a certificate  114  directives  143  144  145  146  147  148  149  150    htaccess  145  available SSL Ciphers  145  cipher preference  147  special characters  147  SSL aliases  146  SSLCACertificateFile  148  SSLCARevocationFile  148  SSLCertificateChainFile  147  SSLCertificateFile  147  SSLCertificateKeyFile  147  SSLCipherSuite  145  147  SSLEngine  144  SSLLog  148  SSLLogLevel  149  SSLOptions  149  SSLPassPhraseDialog  143  sslpassword  143  SSLProtocol  144             Index 171    SSLRequireSSL  150  SSLVerifyClient  148  SSLVerifyDepth  148  enabling  112  enabling the board  112  applications  building  151  assigning an IP address  52  auto boot  configuration variable  129  131  autonegotiation  23  27  disabli
81. c_officer  gt  rekey     master remote all   all       Key typ  WARNING     Rekeying the master key will render all old board backups  useless with the new keystore file  If other boards use this  keystore  they will need to have this new key backed up and  restored to those boards  Rekeying the remote access key will  terminate this session and force you to log in again           Rekey board   Y Yes N No   No   y  Rekey of master key successful           Rekey of remote access key successful  Logging out        Chapter 4 Administering the Sun Crypto Accelerator 4000 Board With the vcaadm and vcadiag Utilities 79    Zeroizing a Sun Crypto Accelerator 4000 Board    In some situations  it might be necessary to clear a board of all its key material  This  can be done using two methods  The first method is with a hardware jumper  this  form of zeroizing will return the Sun Crypto Accelerator 4000 board to its original  factory state  failsafe mode   See    Zeroizing the Sun Crypto Accelerator 4000  Hardware to the Factory State    on page 163  The second method is to use the  zeroize command        Note     The zeroize command only removes the key material  and leaves any  updated firmware intact  This command also logs the security officer out upon  successful completion        To zeroize a board with the zeroize command  enter the following     vceaadm vcaN   hostname  sec_officer  gt  zeroize   WARNING  Issuing this command will zeroize all keys  on the board  Once zeroized  t
82. ca   conf file  38  40  parameters and settings  24  password requirements  69  passwords  list required for Sun ONE Web Servers  89  system administrator  90  vcaadm  69 90  patches  11  required  11  Solaris 8  11  Solaris 9  11    path names  39  path_to_inst file  38  pause capability  27  pause off threshold  24  pause off threshold parameter  24  PCI adapters  23  PCI bus interface parameters  32  pci name property  23  PKCS 11 interface  72  PKCS 11 interface definitions for users  86  pkgadd command  18  pkginfo command  18  platforms  10  product features  1  properties   current Ethernet link  47   Ethernet  47   link  47   Ethernet PCI  51   link  47   nostats  129  protocols and interfaces  1       prtconf command  38  prtdiag command  18    Q    quitting vcaadm  65    R    random early detecting 8 bit vectors  30  random early drop parameters  30  read only link partner capabilities  48  read only vca device capabilities  47  read write flow control  27   receive counters  50   receive interrupt blanking values  25  30  receive MAC counters  45   receive random early detecting 8 bit vectors  30  register for alias read  30   request coalescing  9   required packages  17    Index 175    required patches  10   RSA keypair  113   RX blanking register for alias read  30   RX MAC counters  45   RX random early detecting 8 bit vectors  30  rx intr pkts  25 30   rx intr pkts parameter  25  30  rx intr time  30    rx intr time parameter  30    S    security officer accou
83. ca driver is attached to the UNIX pci name property  pcil08e  3de8 for the Sun Crypto Accelerator 4000  108e is the vendor ID and  3de8 is the PCI device ID      You can manually configure the vca device driver parameters to customize each Sun  Crypto Accelerator 4000 device in your system  This section provides an overview of  the capabilities of the Sun Crypto Accelerator 4000 Ethernet device used in the  board  lists the available vca device driver parameters  and describes how to  configure these parameters     The Sun Crypto Accelerator 4000 Ethernet UTP and MMF PCI adapters are capable  of the operating speeds and modes listed in    Setting Autonegotiation or Forced  Mode    on page 36  By default  the vca device operates in autonegotiation mode    23    with the remote end of the link  link partner  to select a common mode of operation  for the speed  duplex  and link clock parameters  The 1ink clock parameter  is applicable only if the board is operating at a 1000 Mbps  The vca device can also    be configured to operate in forced mode for each of these parameters     Caution     To establish a proper link  both link partners must operate in either  autonegotiation or forced mode for each of the speed  duplex  and link clock   1000 Mbps only  parameters  If both link partners are not operating in the same  mode for each of these parameters  network errors will occur  See    Enabling    Autonegotiation or Forced Mode for Link Parameters With the OpenBoot PROM    on    
84. ccelerator 4000  added to database    usr netscape server4 has been configured to use   the Sun Crypto Accelerator               lt Press ENTER to continue gt              9  Type 0 to quit     v To Generate a Server Certificate    1  Restart the Sun ONE Web Server 4 1 Administration Server by typing the  following commands        usr netscape server4 https   admserv stop       usr netscape server4 https   admserv start       The response provides the URL for connecting to your servers     2  Start the Administration GUI by opening up a web browser and typing     http    hostname domain admin_port    In the authentication dialog box  enter the Sun ONE Web Server 4 1 Administration  Server user name and password you selected while running setup        Note     If you used the default settings during Sun ONE Web Server setup  type  admin for the User ID or the Sun ONE Web Server 4 1 Administration Server user  name        3  Select OK   The Sun ONE Web Server 4 1 Administration Server window is displayed     Chapter 5 Configuring Sun ONE Server Software for Use With the Sun Crypto Accelerator 4000 Board 95    4  To request the server certificate  select the Security tab near the top of the Sun  ONE Web Server 4 1 Administration Server window  FIGURE 5 1      The Create Trust Database page is displayed     5  Select the Request a Certificate link on the left pane  FIGURE 5 1      File Edit View Go Communicator                 3    a      Ff z    Back Forward Reload Home Search N
85. celerator 4000 UTP adapter self test for a 1000 Mbps connection to work  a  remote 1000Base T port must be connected        Type the following        ok test device_path             If the test passes  you see the following messages        ok test  pci 8 600000 network l   Testing  pci 8 600000 network 1   Register tests  passed   Internal loopback test  passed   pci 8 600000 network 1  100 Mbps half duplex link up          If the board is not connected to a network  you see the following messages        ok test  pci 8 600000 network l  Testing  pci 8 600000 network 1  Register tests  passed   Internal loopback test  passed   pci 8 600000 network 1  link down       6  After testing the adapter  type the following to return the OBP interface to  standard operating mode     ok setenv diag switch  false    7  Set the auto boot  configuration parameter to true           ok setenv auto boot  true             8  Reset and reboot the system     Chapter 7 Diagnostics and Troubleshooting 131       Troubleshooting the Sun Crypto  Accelerator 4000 Board    This section describes the commands available at the OBP level for troubleshooting  the board  Refer to the OpenBoot Command Reference Manual for more information on  the commands described in the following subsections     show devs    To determine whether the Sun Crypto Accelerator 4000 device is listed in the system   from the OBP prompt  type show devs to display the list of devices  You should see  lines in the list of devices  si
86. ch as a production key and a development key  to reflect the  organizations the user is supporting         Note     The term user or user account refers to Sun Crypto Accelerator 4000 users  created in vcaadm  not traditional UNIX user accounts  There is no fixed mapping  between UNIX user names and Sun Crypto Accelerator 4000 user names        A keystore is a repository for key material  Associated with a keystore are security  officers and users  Keystores not only provide storage  but a means for key objects to  be owned by user accounts  This allows keys to be hidden from applications that do  not authenticate as the owner  Keystores have three components     a Key objects   Long term keys that are stored for applications such as the Sun  ONE Web Server     a User accounts     These accounts provide applications a means to authenticate and  access specific keys      Security officer accounts     These accounts provide access to key management  functions through vcaadm        Note     A single Sun Crypto Accelerator 4000 board must have exactly one keystore   Multiple Sun Crypto Accelerator 4000 boards can be configured to collectively work  with the same keystore to provide additional performance and fault tolerance        A typical installation contains a single keystore with a single user  For example  such  a configuration might consist of a single keystore web_server and a single user within  that keystore  web_admin  This would allow the user web_admin to own and mai
87. classe B est conforme a la norme NMB 003 du Canada     VCCI   TT    viii    232 AVCCI   DT    JIA AVCCOORRRHIJ    Y AFV VBEOAT Y a IL  7 DAA Rt  WAC  CNDORN MEIZ PHROHADKRIET        DREJ FURA eK E EB He Lh  VCCI  OFRVEICIED lt S IA  A A RELATE Ai Co  COR EAR CHATS CERES eS ARCTCEM  HOEFT  COBRIIHMEA SAH YTS ok ERINA TENDEN ET           23A B VCCI   DT    PIABVCCI DER  ME MHAI   VAF   V a BEUTI a  9  ABRAM CT  CHSOMMICI  FRORAMRY LET        EA ERUR ee a EE A EB WA  VCC  ORCE VIA  o Ri CT  COREL  KERETET CLRANWELTIRETA   DREBEMNIVAPCTV EV a VSR LUTES NA Ee  SSeS Se  ZCTTEMHOET   WRB Ichi TEU MORVNELTS ES          1             Sun Crypto Accelerator 4000 Board Installation and User   s Guide     May 2003    BSMI Class A Notice  The following statement is applicable to products shipped to Taiwan and marked as Class A on the product compliance  label     Beak     jexe HARA Saletan  HE EAE eA  AFF ESERIA iB  gt  TARIST  gt    2 FAS SRE RRNA       x Sun Crypto Accelerator 4000 Board Installation and User   s Guide   May 2003    Contents    Product Overview 1  Product Features 1  Key Protocols and Interfaces 1  Key Features 2  Supported Applications 2  Supported Cryptographic Protocols 2  Diagnostic Support 3  Cryptographic Algorithm Acceleration 3  Supported Cryptographic Algorithms 3  Bulk Encryption 4  Hardware Overview 5  IPsec Hardware Acceleration 5  Sun Crypto Accelerator 4000 MMF Adapter 6  LED Displays 6  Sun Crypto Accelerator 4000 UTP Adapter 7  LED Displays 8  Dynamic Re
88. configuration and High Availability 9  Load Sharing 9    Hardware and Software Requirements 10    xi    Required Patches 10   Apache Web Server Patch 10  Solaris 8 Patches 11  Solaris 9 Patches 11    2  Installing the Sun Crypto Accelerator 4000 Board 13  Handling the Board 13  Installing the Board 14  v_ TolInstall the Hardware 14  Installing the Sun Crypto Accelerator 4000 Software 16  v To Install the Software 16  Installing the Optional Packages 18  Directories and Files 19  Removing the Software 21    v To Remove the Software 21    3  Configuring Driver Parameters 23   Sun Crypto Accelerator 4000 Ethernet Device Driver  vca  Parameters 23  Driver Parameter Values and Definitions 24  Advertised Link Parameters 25  Flow Control Parameters 27  Gigabit Forced Mode Parameter 28  Interpacket Gap Parameters 28  Interrupt Parameters 30  Random Early Drop Parameters 30  PCI Bus Interface Parameters 32   Setting vca Driver Parameters 33  Setting Parameters Using the ndd Utility 33    v To Specify Device Instances for the ndd Utility 33    xii Sun Crypto Accelerator 4000 Board Installation and User   s Guide   May 2003    Noninteractive and Interactive Modes 34  Setting Autonegotiation or Forced Mode 36  v To Disable Autonegotiation Mode 37  Setting Parameters Using the vca conf File 38  v To Set Driver Parameters Using avca conf File 38    Setting Parameters for All Sun Crypto Accelerator 4000 vca Devices  With the vca conf File 39    v To Set Parameters for All Sun Crypto Acceler
89. cription       The following parameter is for both the Sun Crypto Accelerator 4000 UTP and MMF adapters     adv autoneg cap Local interface capability advertised by the hardware  0   Forced mode  1   Autonegotiation  default     The following parameter is for the Sun Crypto Accelerator 4000 MMF adapter only     adv 1000f  dx cap Local interface capability advertised by the hardware  0   Not 1000 Mbps full duplex capable  1   1000 Mbps full duplex capable  default     The following parameter is for both the Sun Crypto Accelerator 4000 UTP and MMF adapters     adv 1000hdx cap Local interface capability advertised by the hardware  0   Not 1000 Mbps half duplex capable  1   1000 Mbps half duplex capable  default     The following parameters are for the Sun Crypto Accelerator 4000 UTP adapter only     adv 100fdx cap Local interface capability advertised by the hardware  0   Not 100 Mbps full duplex capable  1   100 Mbps full duplex capable  default     adv 100hdx cap Local interface capability advertised by the hardware  0   Not 100 Mbps half duplex capable  1   100 Mbps half duplex capable  default     adv 10fdx cap Local interface capability advertised by the hardware  0   Not 10 Mbps full duplex capable  1   10 Mbps full duplex capable  default     adv 10hdx cap Local interface capability advertised by the hardware  0   Not 10 Mbps half duplex capable  1   10 Mbps half duplex capable  default           26 Sun Crypto Accelerator 4000 Board Installation and User   s Guide   May 2
90. crypted Key for Automatic Startup of  Apache Web Servers on Reboot      Verify that the following entry exists in the httpd conf file        SSLPassPhraseDialog exec  opt SUNWconn cryptov2 bin apgetpass    This directive retrieves a password from a protected password file in the   etc apache directory       Create a password file that contains only the password in the  etc apache    directory with the following file name convention     server_name port  KEYTYPE   pass    m server_name     The value that you put in the    ServerName    directive in the  httpd conf file    m port     The port that this SSL server will run on  for example  443    m KEYTYPE   Either RSA or DSA    167    Example  For a server named webserv101 running SSL on port 443 with an RSA  key  you create the following file in  etc apache     webservl101 443 RSA pass    It is recommended to change the permissions and ownership of the password file as  follows       chmod 400 server_name port KEYTYPE pass      chown root server_name  port  KEYTYPE pass       Refer to the mod_SSL and OpenSSL documentation for more information     v To Create an Encrypted Key for Automatic Startup of Sun  ONE Web Servers on Reboot    1  Navigate to the config subdirectory for your Sun ONE Web Server instance   for  example   usr iplanet servers https webserver_instance_name config      2  Create a password conf file with only the following lines  See TABLE 5 1 for  password definitions      internal  trust_db_password    keysto
91. d    Entries for these users in the Apache password files must use the  encrypted password xx 4j31ZMTZzkVA  which is just an encrypted  form  crypt 3c   of the word    password        StrictRequire Forces a forbidden access due to SSLRequireSSL to be denied   even in the presence of other directives  such as Satisfy Any   which might override this     15  SSLRequireSSL  Context  Directory   htaccess    This directive forbids access in a given directory unless HTTPS is used  Use the  directive to guard against misconfigurations that might otherwise leave a  directory s contents available to unauthenticated and unencrypted accesses     150 Sun Crypto Accelerator 4000 Board Installation and User   s Guide   May 2003    APPENDIX C    Building Applications for Use With  the Sun Crypto Accelerator 4000  Board    This appendix describes the software supplied with the Sun Crypto Accelerator  4000  which can be used to build OpenSSL compatible applications to take  advantage of the cryptographic acceleration features of the Sun Crypto Accelerator  4000 board  Not all OpenSSL applications will benefit from being compiled in this  fashion  as opposed to being built with the stock OpenSSL library  which can be  downloaded from www openssl org      Note     This information on building applications to use the Sun Crypto Accelerator  4000 software and hardware is provided strictly as is  and is not an officially  supported part of this product  This information is provided in the hope it m
92. dd  d   SUNWkcl2a SUNWkcl2m SUNWvcamn SUNWvcav SUNWkcl20 SUNWkc12i u       Refer to TABLE 2 1 for a description of the package contents of the optional packages  in the previous examples        Directories and Files    TABLE 2 2 shows the directories created by the default installation of the Sun Crypto  Accelerator 4000 software     TABLE 2 2 Sun Crypto Accelerator 4000 Directories       Directory Contents   etc opt SUNWconn vca keydata Keystore data  encrypted    opt SUNWconn cryptov2 bin Utilities   opt SUNWconn cryptov2 lib Support libraries   opt SUNWconn cryptov2 sbin Administrative commands    FIGURE 2 1 shows the hierarchy of these directories and files     Chapter 2 Installing the Sun Crypto Accelerator 4000 Board 19                                                                                            etc  opt   opt   SUNWconn   SUNWconn   vca  cryptov2   keydata  Encrypted  keys  ce  include Nib eras J epi Gni  Application Development    Application Manual Daemon Apache  executables support libraries pages executables configuration  support  FIGURE 2 1 Sun Crypto Accelerator 4000 Directories and Files    Sun Crypto Accelerator 4000 Board Installation and User   s Guide     May 2003       Note     Once you have installed the hardware and software of the board  you need  to initialize the board with configuration and keystore information  Refer to      Initializing the Sun Crypto Accelerator 4000 Board With vcaadm    on page 65 for  information on how to initiali
93. de  the path to vcatest is  opt  SUNWvts bin   In 64 bit mode  the  path to vcatest is  opt SUNWvts bin sparcv9      All SunVTS standard options are supported from the command line interface for  vcatest  Test specific options are specified with the  o argument     Refer to the SunVTS test reference manual for a definition of the standard command   line arguments  The vcatest is a Functional mode test  therefore   f must be  included  Include  u to display a usage message  or  v for VERBOSE messages   Items enclosed in square brackets denote optional entries     The following is an example of invoking vcatest in 32 bit mode as a standalone  program  The following command performs all subtests on vca0        opt SUNWvts bin vcatest  f  o dev vca0 tl all       Chapter 7 Diagnostics and Troubleshooting 123    The following is an example of invoking vcatest in 64 bit mode from the SunVTS  infrastructure  The following command tests RSA  DSA  and MD5 on vca2        opt SUNWvts bin sparcv9 vcatest  f  o dev vca2 t1 RSA DSA MD5    When performing vcatest from the command line  omission of an option produces  the default behavior for that option  as stated in TABLE 7 3     TABLE 7 3 vcatest Command Line Syntax       Option Description    dev vcaN Specifies the instance of the device to test such as vca0 or vca2   Defaults to vca0 if not included  Note that N specifies the placement  of the instance number of the device being tested     t1 testlist Specifies the list of subtests to be
94. dition Administrator   s Guide at  http   docs sun com for more information        102 Sun Crypto Accelerator 4000 Board Installation and User   s Guide e May 2003    a  Select the Servers tab in the Sun ONE Web Server 6 0 Administration Server  window     b  Select a server and select the Manage button     c  Select the Security tab near the top of the page and select the Create Database  link     d  Enter a password  web server trust database  TABLE 5 1   in the two dialog boxes  and select OK     Choose a password of at least eight characters  This will be the password used to  start the internal cryptographic modules when the Sun ONE Web Server runs in  secure mode     5  Execute the following script to enable the Sun Crypto Accelerator 4000 board           opt SUNWconn crypto bin iplsslcfg          This script prompts you to choose a web server  It installs the Sun Crypto  Accelerator 4000 cryptographic modules for the Sun ONE Web Server  The script  then updates the configuration files to enable the Sun Crypto Accelerator 4000  board     6  Type 1 to configure your Sun ONE Web Server to use SSL and press Return           Sun Crypto Accelerator Sun ONE Installation       This script will install the Sun Crypto Accelerator  cryptographic modules for Sun ONE Products        Please select what you wish to do                    1  Configure Sun ONE Web Server for SSL   2  Configure Sun ONE Application Server for SSL   3  Export Sun ONE Web Server keys to PKCS 12 format   4  
95. e a board it is necessary to create a keystore  refer to    Concepts  and Terminology    on page 86  You can either initialize the Sun Crypto Accelerator  4000 board with a new keystore or use a backup file to initialize the board to use an  existing keystore     When you first connect to a Sun Crypto Accelerator 4000 board with vcaadm  you  are prompted to initialize the board with a new keystore or initialize the board to  use an existing keystore which is stored in a backup file  vcaadm prompts you for all  of the required information for either type of board initialization     Chapter 4 Administering the Sun Crypto Accelerator 4000 Board With the vcaadm and vcadiag Utilities 65    v To Initialize the Sun Crypto Accelerator 4000  Board With a New Keystore    1  Enter vcaadm at a command prompt of the system with the Sun Crypto  Accelerator 4000 board installed or enter vcaadm  h hostname if the system is  remote  and select 1 to initialize the board          veaadm  h hostname   This board is uninitialized    You will now initialize the board  You may  either completely initialize the board and  start with a new keystore or restore the board  using a backup file        1  Initialize the board with a new keystore  2  Initialize the board to use an existing keystore    Your Choice  0 to exit     gt  1          2  Create an initial security officer name and password  Refer to    Naming  Requirements    on page 69      Initial Security Officer Name  sec_officer  Initial Securi
96. e and restart  the server software       rm  etc opt SUNWconn cryptov2 sslreg    88 Sun Crypto Accelerator 4000 Board Installation and User   s Guide   May 2003       Configuring Sun ONE Web Servers    This section describes the following     Passwords       Passwords    on page 89      Populating a Keystore    on page 90      Overview for Enabling Sun ONE Web Servers    on page 91     Installing and Configuring Sun ONE Web Server 4 1    on page 92     Configuring Sun ONE Web Server 4 1 for SSL    on page 99     Installing and Configuring Sun ONE Web Server 6 0    on page 101     Configuring Sun ONE Web Server 6 0 for SSL    on page 108    You are asked for several passwords in the course of enabling a Sun ONE Web  Server  TABLE 5 1 provides a description of each  These passwords are referred to  throughout this chapter  If there is any confusion about which password to use  refer    to TABLE 5 1     TABLE 5 1 Passwords Required for Sun ONE Web Servers       Type of Password    Sun ONE Web Server  Administration  Server    Web Server Trust  Database    Security Officer    username password    Description    Required to start up the Sun ONE Web Server Administration  Server  This password was assigned during the Sun ONE Web  Server setup     Required to start the internal cryptographic module when running  in secure mode  This password was assigned when creating a trust  database through the Sun ONE Web Server Administration Server   This password is also required when request
97. ed transaction retry Unstable  time out was reached   dma mode Used by the Sun Crypto Accelerator 4000 Unstable  driver  vca    To Check Link Partner Settings  As superuser  type the kstat vca N command     kstat vca N  module  vca instance   name  vca0 class  misc             Note     In the previous example  N is the instance number of the vca device  This  number should reflect the instance number of the board for which you are running    the kstat command        Chapter 3 Configuring Driver Parameters 51          Network Configuration    This section describes how to edit the network host files after the adapter has been  installed on your system     Configuring the Network Host Files    After installing the driver software  you must create a hostname vcaN file for the  adapter   s Ethernet interface  Note that in the file name hostname vcaN  N  corresponds to the instance number of the vca interface you plan to use  You must  also create both an IP address and a host name for its Ethernet interface in the   etc hosts file     1  Locate the correct vca interfaces and instance numbers in the   etc path_to_inst file     Refer to the online manual pages for path_to_inst 4           grep vca  etc path_to_inst    pci 8 600000 network 1  0  vca              The instance number in the previous example is 0     2  Use the ifconfig 1M  command to set up the adapter   s vca interface     Use the ifconfig command to assign an IP address to the network interface  Type  the following 
98. ed while running setup        Note     If you used the default settings during the Sun ONE Web Server setup  type  admin for the User ID or the Sun ONE Web Server 4 1 Adminstration Server user  name          Select OK   The Sun ONE Web Server 4 1 Administration Server server window is displayed       Create the trust database for the web server instance     a  Select the Servers tab in the Sun ONE Web Server 4 1 Administration Server  window     b  Select a server and select the Manage button     c  Select the Security tab near the top of the page and select the Create Database  link     d  Enter a password  web server trust database  see TABLE 5 1  in the two dialog  boxes and select OK     Choose a password of at least eight characters  You will use this password to start  the internal cryptographic modules when the Sun ONE Web Server runs in secure  mode     You might want to enable security on more than one web server instance  If so   repeat Step 1 through Step 4 for each web server instance     Chapter 5 Configuring Sun ONE Server Software for Use With the Sun Crypto Accelerator 4000 Board 93    Note     If you want to run Secure Socket Layer  SSL  on the Sun ONE Web Server 4 1  Administration Server server as well  the process of setting up a trust database is  similar  Refer to the iPlanet Web Server  Enterprise Edition Administrator   s Guide at  http   docs sun com for more information     5  Execute the following script to enable the Sun Crypto Accelerator 4000 boa
99. elect the Load Configuration Files link to apply the changes   You are redirected to a page that allows you to start your web server instance     If you select the Apply Changes button when the server is off  an authentication  dialog box prompts you for the username password  This window is not resizable  and  you might have a problem submitting the change     There are two workarounds for this problem   m Select the Load Configuration Files instead   m Start up the web server first  and select the Apply Changes button     10  In the Sun ONE Web Server 6 0 Administration Server window  select the On Off  link on the left side of the window     11  Enter the passwords for the servers and select the OK button     You are prompted for one or more passwords  At the Module Internal prompt   provide the password for the web server trust database     Chapter 5 Configuring Sun ONE Server Software for Use With the Sun Crypto Accelerator 4000 Board 109    At the Module keystore_name prompt  enter the username password   Enter the username password for other keystores as prompted     12  Verify the new SSL enabled web server at the following URL     https    hostname domain server_port         Note     The default server_port is 443        110 Sun Crypto Accelerator 4000 Board Installation and User   s Guide   May 2003    CHAPTER 6       Configuring Apache Web Servers  for Use With the Sun Crypto  Accelerator 4000 Board    This chapter explains how to configure the Sun Crypto Accelerat
100. en restreignent l utilisation  la copie  la distribution  et la d  compilation  Aucune  partie de ce produit ou document ne peut   tre reproduite sous aucune forme  par quelque moyen que ce soit  sans l autorisation pr  alable et    crite de Sun et de ses bailleurs de licence  s il y en a  Le logiciel d  tenu par des tiers  et qui comprend la technologie relative aux polices de  caract  res  est prot  g   par un copyright et licenci   par des fournisseurs de Sun     Des parties de ce produit pourront   tre d  riv  es des syst  mes Berkeley BSD licenci  s par l Universit   de Californie  UNIX est une marque  d  pos  e aux Etats Unis et dans d   autres pays et licenci  e exclusivement par X Open Company  Ltd     Sun  Sun Microsystems  le logo Sun  SunVTS  AnswerBook2  docs sun com  Sun ONE  Sun Enterprise  Sun Enterprise Volume Manager  Sun  Fire  SunSolve  Netra  et Solaris sont des marques de fabrique ou des marques d  pos  es  ou marques de service  de Sun Microsystems  Inc  aux  Etats Unis et dans d   autres pays  Toutes les marques SPARC sont utilis  es sous licence et sont des marques de fabrique ou des marques  d  pos  es de SPARC International  Inc  aux Etats Unis et dans d   autres pays  Les produits portant les marques SPARC sont bas  s sur une  architecture d  velopp  e par Sun Microsystems  Inc  Netscape est une marque de Netscape Communications Corporation aux Etats Unis et  dans d   autres pays  Ce produit comprend le logiciel d  velopp   par le Project OpenSSL po
101. er     TABLE7 1 SunVTS netlbtest and nettest Required Software for the vca Driver    Required Required   Base Solaris Software Base SunVTS Software Replacement Package Overlay Patch  Solaris 8 7 01 SunVTS4 4 111854 04  Solaris 8 10 01 SunVTS4 5 112250 04  Solaris 8 2 02 SunVTS4 6 SunVTS5 1ps2   Solaris 9 5 02 SunVTS5 0 SunVTS5 1ps2   Solaris 9 9 02 SunVTS5 1 113614 11  Solaris 8 HW 12 02 SunVTS5 1ps1 113614 11  Solaris 9 12 02 SunVTS5 1ps1 113614 11    Solaris 8 HW 5 03 SunVTS5 1ps2  Solaris 9 4 03 SunVTS5 1ps2    SunVTS software is delivered on the Solaris Software Supplement CD that is  distributed with each Solaris release  The version of SunVTS software listed in the  Base SunVTS Software column of TABLE 7 1 is distributed on the Solaris Software  Supplement CD included in the Solaris release identified on the same line     Entries in TABLE 7 1 that begin with    SunVTS    identify the version of a set of SunVTS  packages  Within each SunVTS package set  the SUNWvts and SUNWvtsx packages  must be installed     The Required Replacement Packages column in TABLE 7 1 lists the SunVTS package  sets that must replace the previously installed SunVTS package set  You must  remove the previously installed SunVTS packages before adding the SunVTS  replacement packages  The previously installed SunVTS packages must be removed  with the same method you installed them  For example  if you used the pkgadd  command to install the packages  use the pkgrm command to remove the packages   
102. er   default        Interpacket Gap Parameters    The vca device supports a programmable mode called enable ipg0     Before transmitting a packet with enable ipg0 enabled  default   the vca device  adds an additional time delay  This delay  set by the ipg0 parameter  is in addition  to the delay set by the ipg1 and ipg2 parameters  The additional ipg0 delay  reduces collisions     If enable ipg0 is disabled  the value of ipg0 is ignored and no additional delay is  set  Only the delays set by ipg1 and ipg2 will be used  Disable enable ipg0 if  other systems keep sending a large number of continuous packets  Systems that    28 Sun Crypto Accelerator 4000 Board Installation and User   s Guide   May 2003    have enable ipg0 enabled might not have enough time on the network  You can  add the additional delay by setting the ipg0 parameter from 0 to 255  which is the  media byte time delay  TABLE 3 5 defines the enable ipg0 and ipg0 parameters     TABLE 3 5 Parameters Defining enable ipg0 and ipg0       Parameter Values Description  enable ipg0 0 enable ipg0 enable  1 enable ipg0 disable  Default 1   ipg0 0 to 255 The additional time delay  or gap  before    transmitting a packet  after receiving the  packet   Default 8        The vca device supports the programmable interpacket gap parameters  IPG  ipg1  and ipg2  The total IPG is the sum of ipg1 and ipg2  The total IPG is 0 096  microseconds for the link speed of 1000 Mbps     TABLE 3 6 lists the default values and allowable value
103. ersion 2 0 ciphers   All SSL version 3 0 ciphers   All export grade ciphers   All 40 bit export ciphers   All 56 bit export ciphers   Lower strength ciphers  DES  40 bit RC4    All 128 bit ciphers   All ciphers using Triple DES   All ciphers using RSA key exchange   All ciphers using Diffie Hellman key exchange  All ciphers using Ephemeral Diffie Hellman key exchange    146 Sun Crypto Accelerator 4000 Board Installation and User   s Guide   May 2003    TABLE B 3 SSL Aliases  Continued        Alias Description   ADH All ciphers using anonymous Diffie Hellman key exchange  DSS All ciphers using DSS authentication   NULL All ciphers using no encryption    The preference of ciphers can be configured using the special characters listed and  described in TABLE B 4     TABLE B 4 Special Characters to Configure Cipher Preference       Character Description        lt none gt  Add cipher to list              Remove a cipher from the list entirely   it cannot be added again  Add cipher to list  and pull to current location  possibly demoting it     Remove cipher from list  can be added later in list     The default value of cipher spec is    SSLCipherSuite ALL   ADH RC4 RSA  HIGH   MEDIUM  LOW  SSLv2  EXP          The default configures all ciphers except anonymous  unauthenticated  Diffie   Hellman  giving preference to ARCFOUR and RSA  and then higher grades of  encryption over the lower grades    SSLCertificateFile file   Context  Global  virtual host    This directive specifies the 
104. es  OpenSSL Toolkit  and  OpenSSL Project  must not be used to endorse  or promote products derived from this software without prior written permission   For written permission  please contact openssl core openssl org     5  Products derived from this software may not be called  OpenSSL  nor may   OpenSSL  appear in their names without prior written permission of the  OpenSSL Project     6  Redistributions of any form whatsoever must retain the following  acknowledgment   This product includes software developed by the OpenSSL  Project for use in the OpenSSL Toolkit  http   www openssl org       THIS SOFTWARE IS PROVIDED BY THE OpenSSL PROJECT    AS IS  AND ANY  EXPRESSED OR IMPLIED WARRANTIES  INCLUDING  BUT NOT LIMITED TO   THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A  PARTICULAR PURPOSE ARE DISCLAIMED  IN NO EVENT SHALL THE    156 Sun Crypto Accelerator 4000 Board Installation and User   s Guide   May 2003    OpenSSL PROJECT OR ITS CONTRIBUTORS BE LIABLE FOR ANY DIRECT   INDIRECT  INCIDENTAL  SPECIAL  EXEMPLARY  OR CONSEQUENTIAL  DAMAGES  INCLUDING  BUT NOT LIMITED TO  PROCUREMENT OF  SUBSTITUTE GOODS OR SERVICES  LOSS OF USE  DATA  OR PROFITS  OR  BUSINESS INTERRUPTION  HOWEVER CAUSED AND ON ANY THEORY OF  LIABILITY  WHETHER IN CONTRACT  STRICT LIABILITY  OR TORT   INCLUDING NEGLIGENCE OR OTHERWISE  ARISING IN ANY WAY OUT OF  THE USE OF THIS SOFTWARE  EVEN IF ADVISED OF THE POSSIBILITY OF  SUCH DAMAGE     This product includes cryptographic software written
105. es 73    Deleting Users    Issue the delete user command and specify the user to be deleted  When deleting  a user  the user name is an optional parameter on the command line  If the user  name is omitted  vcaadm will prompt you for the user name        vceaadm vcaN   hostname  sec_officer  gt  delete user web_admin  Delete user web_admin   Y Yes N No   No   y  User web_admin deleted successfully     vceaadm vcaN   hostname  sec_officer  gt  delete user  User name  Tom   Delete user Tom   Y Yes N No   No   y  User Tom deleted successfully              Deleting Security Officers    Issue the delete so command and specify the security officer to be deleted  When  deleting a security officer  the security officer name is an optional parameter on the  command line  If the security officer name is omitted  vcaadm will prompt you for   the security officer name        vceaadm vcaN   hostname  sec_officer  gt  delete so Bob  Delete Security Officer Bob   Y Yes N No   No   y  Security Officer Bob deleted     vcaadm vcaN   hostname  sec_officer  gt  delete so   Security Officer name  Alice   Delete Security Officer Alice   Y Yes N No   No   y  Security Officer Alice deleted                    Backing Up the Master Key    Keystores are stored on the disk and encrypted in a master key  This master key is  stored in the Sun Crypto Accelerator 4000 firmware and can be backed up by a  security officer     To back up the master key  use the backup command  The backup command  requires a pat
106. es in this chapter were created with the Interactive  mode of vcaadm        Chapter 4 Administering the Sun Crypto Accelerator 4000 Board With the vcaadm and vcadiag Utilities 59    When connecting to a new board  vcaadm must create a new entry in the trust  database  The following is an example of logging in to a new board       veaadm  h hostname  Warning  MAC ID and Public Key Not Found       The MAC ID and public key presented by this board were  not found in your trust database        MAC ID  08 00 20 EE EE EE  Key Fingerprint  29FC 7A54 4014 442F 7FD9 5FEA 8411 CFB4                                  Please select an action     1  Abort this connection       2  Trust the board for this session only   3  Trust the board for all future sessions   Your Choice    gt              Logging In to a Board With a Changed Remote Access Key    When connecting to a board that has a changed remote access key  vcaadm must  change the entry corresponding to the board in the trust database  The following is  an example of logging in to a board with a changed remote access key          veaadm  h hostname  Warning  Public Key Conflict       The public key presented by the board you are connecting  to is different than the public key that is trusted for  this MAC ID              MAC ID  08 00 20 EE EE EE  New Key Fingerprint  29FC 7A54 4014 442F 7FD9 5FEA 8411 CFB4  Trusted Key Fingerprint  A508 38D1 FED8    8103 7ACC 0D19 C9C9 11F2                                  Please select an action   
107. essing Sun Documentation Online    You can view  print  or purchase a broad selection of Sun documentation  including  localized versions  at     http   www sun com documentation       Sun Welcomes Your Comments    Sun is interested in improving its documentation and welcomes your comments and  suggestions  You can email your comments to Sun at     docfeedback sun com    Please include the part number  817 0431 10  of your document in the subject line of  your email     xxvi Sun Crypto Accelerator 4000 Board Installation and User   s Guide   May 2003    CHAPTER 1       Product Overview       This chapter provides an overview of the Sun Crypto Accelerator 4000 board  and  contains the following sections     m    Product Features    on page 1  a    Hardware Overview    on page 5  a    Hardware and Software Requirements    on page 10       Product Features    The Sun Crypto Accelerator 4000 board is a Gigabit Ethernet based network  interface card that supports cryptographic hardware acceleration for IPsec and SSL   both symmetric and asymmetric  on Sun servers  In addition to operating as a  standard Gigabit Ethernet network interface card for unencrypted network traffic   the board contains cryptographic hardware to support a higher throughput for  encrypted IPsec traffic than the standard software solution     Key Protocols and Interfaces    The Sun Crypto Accelerator 4000 board is interoperable with existing Ethernet  equipment assuming standard Ethernet minimum and maximum 
108. est  125  required software  120  software  119  vca driver  120  vcatest  command line syntax  123  test parameter options  123  veatest  121  SunVTS 4 4  17  SunVTS 5 1 Patch Set  PS  2  119  SunVTS 5 x  17  support libraries  19  supported  algorithms  4  cryptographic algorithms  3  hardware  10  operating environments  10  platforms  10    176 Sun Crypto Accelerator 4000 Board Installation and User   s Guide   May 2003    software  10  Solaris operating environments  10  SSL algorithms  4    T  token files  87  tokens  87  transmit and receive pause capability  27  transmit counters  49  transmit MAC counters  45  troubleshooting  132  trust database  creating  Sun ONE Web Server 4 1  93  Sun ONE Web Server 6 0  102  vcaadm  58  TX and RX MAC counters  45  TX MAC counters  45    U  UNIX pci name property  23  URL   for OpenSSL  151   for Sun ONE software  92  101  user accounts  69  user concepts and terminology  86  utilities  19  UTP  23    V    values and definitions  24   vca driver  120  required software  120   vca driver parameters  configuring  23  forced mode  24  parameters and settings  24  values and definitions  24   vca interface  52   vca conf file  38    vca conf file  example  40    vcaadm    populating a keystore  with security officers  70  with users  71    vcaadm    backups  74   changing passwords  72  character requirements  69  command line syntax  56  deleting users  74  diagnostics command  80  enabling and disabling users  73  entering commands
109. etscape Print Security Stop                      E        Bookmarks  amp  GoTo        Has Ee 41 integrate Server Manager          Re ta Certificate Request a Server Certificate                   Install Certificate IS New certificate   Change Password T  Certificate renewal   Manage Certificates                Migrate Certificate             Submit to Certificate Authority via   T     CA Email Address  I          H ca uRL f    Select the module to use with this certificate     Cryptographic Module  keystore_name s      Key Pair File Password  lI             on ere requesting a certificate  you should read the overview of the certificate process  and then go through the detailed steps       on creating a correct distinguished name which you should enter below  You will also generate the   proper authorization letter  that you will use to obtain your certificate from a certification authority           Requestor name          Telephone number   I       Common name  ji       Email address  i                    ie 4 aP a          FIGURE 5 1 Request a Server Certificate Page of the Sun ONE Web Server 4 1  Administration Server    6  Fill out the form to generate a certificate request  using the following information     a  Select a New Certificate     If you can directly post your certificate request to a web capable certificate  authority or registration authority  select the CA URL link  Otherwise  select CA  Email Address and enter an email address where you would like the cert
110. f this directory does not exist  it is created     Where would you like the keys stored    etc apache keys    etc apache keys    Chapter 6 Configuring Apache Web Servers for Use With the Sun Crypto Accelerator 4000 Board    113    9  Choose a base name for the key material     This name is appended with different suffixes to distinguish key files  certificate  request files and later on  certificate files from one another           Please choose a base name for the key and request file  base_name             10  Provide a key length between 512 and 2048 bits     For most web server applications  1024 bits is sufficiently strong  but you can choose  stronger keys if preferred        What size would you like the RSA key to be  1024   1024   Using configuration from  opt SUNWconn cryptov2 ssl openssl cnf  Generating a 1024 bit RSA private key   ORE          a e E a rE Met erste cen E EE aie E a O E EE E a aG I E E E EEEn ENE hahha  writing new private key to  etc apache keys base_nam                11  Create your PEM pass phrase     This pass phrase protects the key material  Be sure to select a strong pass phrase  but  one that you can remember  If you forget the pass phrase  you will be unable to  access your keys                 Enter PEM pass phrase              Verifying password   Enter PEM pass phrase           Caution     You must remember the pass phrase you enter  Without the pass phrase   you cannot access your keys  There is no way to retrieve a lost pass phrase    
111. f you wish to continue administering it        vceaadm vcaN   hostname  sec_officer  gt  reset  WARNING  Issuing this command will reset the  the board and close this connection     Proceed with reset   Y Yes N No   No   y  Reset successful        78 Sun Crypto Accelerator 4000 Board Installation and User   s Guide   May 2003       Rekeying a Sun Crypto Accelerator 4000 Board    Over time  it may be necessary because of your security policy to use new keys as  the master key or remote access key  The rekey command allows you to regenerate  either of these keys  or both     Rekeying the master key also causes the keystore to be reencrypted under the new  key  and invalidates older backed up master key files with the new keystore file  It is  advisable to make a backup of the master key whenever it is rekeyed  If you have  multiple Sun Crypto Accelerator 4000 boards using the same keystore  you will need  to backup this new master key and restore it to the other boards     Rekeying the remote access key logs the security officer out  forcing a new  connection that uses the new remote access key     You may specify one of three key types when issuing the rekey command     TABLE 4 6 Key Types       Key Type Action   master Rekey the master key    remote Rekey the remote access key  Logs the security officer out   all Rekeys both master and remote access keys     The following is an example of entering a key type of a11 with the rekey  command           vceaadm vcaN   hostname  se
112. ficer name     Modes of Operation    vcaadm can run in one of three modes  These modes differ mainly in how  commands are passed into vcaadm  The three modes are Single Command mode   File mode  and Interactive mode     56 Sun Crypto Accelerator 4000 Board Installation and User   s Guide   May 2003    Note     To use vcaadm  you must authenticate as security officer  How often you  need to authenticate as security officer is determined by which operating mode you  are using     Single Command Mode    In Single Command mode  you must authenticate as security officer for every  command  Once the command is executed  you are logged out of vcaadm     When entering commands in Single Command mode  you specify the command to  be run after all the command line switches are specified  For example  in Single   Command mode  the following command would show all the users in a given  keystore and return the user to the command shell prompt       vcaadm show user  Security Officer Name  sec_officer    Security Officer Password        The following command performs a login as the security officer  sec_officer  and  creates the user web_admin in the keystore       veaadm  s sec_officer create user web_admin  Security Officer Password    Enter new user password    Confirm password    User web_admin created successfully           Note     The first password is for the security officer  followed by the password and  confirmation for the new user web_admin        All output from Single Command
113. fig command  52  infinit burst  25  infinit   burst parameter  25  initializing the board  20  installation  directories and files  19  files and directories  17  software packages  18  installing the optional packages  18  interface  Gigabit media independent  47  interface  media independent  47  interface  vca interface  52  interpacket gap parameters  28  interrupt blanking values  25  30  interrupt parameters  30  ipg0  28  ipg0 parameter  28  ipgl  28  ipgl parameter  28  ipg2  28  ipg2 parameter  28    Index 173    K  kernel statistic values  128  kernel drv vca conf file  129  key length  114  key objects  69  keystore data  19  keystores  66  67  86   managing with vcaadm  69  kstat command  43 51  128    L    libcrypto a parameter  152  libraries  cryptographic  152  libssl a parameter  152  link capabilities  27  link parameters  25  link partner  24  27  47 51  checking  51  settings  51  link properties  47  link master  24  link master parameter  24  load balancing  9  load sharing  9  locking to prevent backups  75  long term keys  9    man page descriptions  161   media independent interface  MII   47  MMF  23   mode  FIPS 140 2  66   modinfo command  18    N    name property  23  naming requirements  69  ndd utility  33   network configuration  52    network host files  52  nostats property  129    O    OBP commands   properties  133  reset all  130  setenv auto boot   129  setenv diag switch   131  show devs  132  show nets  130  test device_path  131  watch
114. for any publically available version or derivative  of this code cannot be changed  i e  this code cannot simply be copied and put  under another distribution licence  including the GNU Public Licence         Tan Fleming was a UNIX fan   How do I know  Well  James Bond  had the  license to kill  number 007   i e  he could execute anyone        Unknown    MOD_SSL LICENSE    The mod_ssl package falls under the Open Source Software label because it s  distributed under a BSD style license  The detailed license information follows     Copyright  c  1998 2000 Ralf S  Engelschall  All rights reserved     Redistribution and use in source and binary forms  with or without modification  are  permitted provided that the following conditions are met     1  Redistributions of source code must retain the above copyright notice  this list of  conditions and the following disclaimer     158 Sun Crypto Accelerator 4000 Board Installation and User   s Guide   May 2003    2  Redistributions in binary form must reproduce the above copyright notice  this  list of conditions and the following disclaimer in the documentation and or other  materials provided with the distribution     3  All advertising materials mentioning features or use of this software must display  the following acknowledgment   This product includes software developed by  Ralf S  Engelschall  lt rse engelschall com gt  for use in the mod_ssl project   http    www modsslLorg        4  The names  mod_ssl  must not be used to end
115. frame size  64 to  1518 bytes   frame format  and compliance with the following standards and  protocols     Full size PCI 33 66 Mhz  32 64 bit   IEEE 802 3 CSMA CD  Ethernet    IEEE 802 2 Logical Link Control   SNMP  limited MIB    Full  and half duplex Gigabit Ethernet interface  IEEE 802 z   Universal dual voltage signaling  3 3V and 5V     Key Features    m Gigabit Ethernet with either copper or fiber interface  a Accelerates IPsec and SSL cryptographic functions   m Session establishment rate  up to 4300 operations per second   a Bulk encryption rate  up to 800 Mbps   m Provides up to 2048 bit RSA encryption   m Delivers up to 10 times faster 3DES bulk data encryption   m Provides tamper proof  centralized security key and certificate administration for  Sun ONE Web Server for increased security and simplified key management  Designed for FIPS 140 2 Level 3 certification   Low CPU utilization   frees up server system resource and bandwidth   Secure private key storage and management   Dynamic reconfiguration  DR  and redundancy failover support on Sun   s  midframe and high end servers   m Load balancing for RX packets among multiple CPUs   a Full flow control support  IEEE 802 3x     The Sun Crypto Accelerator 4000 boards are designed to comply with the security  requirements for cryptographic modules as documented in the Federal Information  Processing Standard  FIPS  140 2  Level 3     Supported Applications    m Solaris 8 and 9 operating environments  IPsec VPN   m S
116. ftware constitutes acceptance of the BCL as supplemented hereby     1  THIRD PARTY LICENSE TERMS  Some portions of Software are provided with  notices and or licenses from other parties which govern the use of those portions     Appendix D Software Licenses 155       Third Party License Terms    OPENSSL LICENSE ISSUES    The OpenSSL toolkit stays under a dual license  i e  both the conditions of the  OpenSSL License and the original SSLeay license apply to the toolkit  See below for  the actual license texts  Actually both licenses are BSD style Open Source licenses  In  case of any license issues related to OpenSSL please contact  openss  core openssl org     OpenSSL License  Copyright  c  1998 2001 The OpenSSL Project  All rights reserved     Redistribution and use in source and binary forms  with or without modification  are  permitted provided that the following conditions are met     1  Redistributions of source code must retain the above copyright notice  this list of  conditions and the following disclaimer     2  Redistributions in binary form must reproduce the above copyright notice  this  list of conditions and the following disclaimer in the documentation and or other  materials provided with the distribution     3  All advertising materials mentioning features or use of this software must display  the following acknowledgment   This product includes software developed by the  OpenSSL Project for use in the OpenSSL Toolkit   http   www openssl org       4  The nam
117. g to  display the Test Parameter Options dialog box     These options  which only pertain to nettest  are described in the SunVTS test  reference manual     7  After you have made all selections  select Apply from Within Instance drop down  menu to change the selected instance of vcaN  nettest   or select Apply from  the Across All Instances drop down menu to change all checked instances of  vcaN  nettest      126 Sun Crypto Accelerator 4000 Board Installation and User   s Guide e May 2003    10     11     This action removes the dialog box and returns you to the SunVTS Diagnostic main  window       Select one of the instances of vcaN  nettest   then right click and drag to    display the Test Execution Options dialog box     An alternate method of displaying Test Execution Options dialog box is to select the  Options drop down main menu  then select Test Executions  These options are  generic SunVTS controls that affect all tests  Refer to the SunVTS user   s guide for  detailed information       When you have made all selections  select Apply to remove the dialog box  then    return to the SunVTS Diagnostic main window   Select Start to perform the selected tests     Select Stop to stop all tests     Note     Do not select nettest and netlbtest to be performed simultaneously        Chapter 7 Diagnostics and Troubleshooting 127       128    Using kstat to Determine  Cryptographic Activity    The Sun Crypto Accelerator 4000 board does not contain lights or other indicators to
118. gnostics   Diagnostics on vca0 PASSED           The following is an example of the  F option       vcadiag  F vca0       5  26 b516 83b4 d254 a75   c70d 0544 4de6       82 Sun Crypto Accelerator 4000 Board Installation and User   s Guide   May 2003    The following is an example of the  K option       vcadiag  K vca0  Device  vca0  Key Length  1024 bits       Modulus   b7215a99 8bb0dfe9 389363a0 44dac2b0  20ee8c8b d751437d 4e6a5cdb 76fdcb2a  248edcld 3c76591d dbca5997 f6ee8022  465a4f8c 601d46be 573e   8681 506e5d8d  11d5c095 2d237061 df27b2de c353900f  709a755b c5d79782 95a1180b e17303bb  006c73  7 74469031   Public Exponent   00010001          The following is an example of the  Q option       veadiag  Q   vca0 cb   vca0 cb keystore_name  83097c2b3e35ef5b 1  vca0 ca   vca0 ca keystore_name  83097c2b3e35ef5b 1  kcl2pseudo   vca0 om   vca0 om keystore_name  83097c2b3e35ef5b 1  libkel          The following is an example of the  R option     Key Fingerprint  5f26 b516 83b4 d254 a75f   c70d 0544 4de6    70884161  ad353c0b  e8bb5a6d    240a0db    531092b  aca939ef               vcadiag  R vca0  Resetting device vca0  this may take a minute   Please be patient    Device vca0 reset ok        The following is an example of the  Z option          vceadiag  Z vca0  Zeroizing device vca0  this may take a few minutes   Please be patient    Device vca0 zeroized        Chapter 4 Administering the Sun Crypto Accelerator 4000 Board With the vcaadm and vcadiag Utilities    83    84 Sun Cryp
119. graphic Module  keystore_name       Key Pair File Password            Before requesting a certificate  you should read the overview of the  certificate process  and then go through the detailed steps on creating a  l correct distinguished name which you should enter below  You will also    nanarata tha nranor authorization lattar that vou will nea ta ohtain vaur    ji E aca EETA zi                         FIGURE 5 3 Request a Server Certificate Page of the Sun ONE Web Server 6 0  Administration Server    6  Fill out the form to generate a certificate request  using the following information     a  Select a New Certificate     If you can directly post your certificate request to a web capable certificate  authority or registration authority  select the CA URL link  Otherwise  select CA  Email Address and enter an email address where you would like the certificate  request to be sent     Chapter 5 Configuring Sun ONE Server Software for Use With the Sun Crypto Accelerator 4000 Board 105    b  Select the Cryptographic Module you want to use   Each keystore has its own entry in this pull down menu  Be sure that you select  the correct keystore  Do not select SUNW acceleration only    c  In the Key Pair File Password dialog box  provide the password for the user  that will own the key   This password is the username password  TABLE 5 1      d  Provide the appropriate information for the following requestor information  fields     TABLE 5 4 Requestor Information Fields       Field 
120. h Security Officers 70  Populating a Keystore With Users 71  Listing Users and Security Officers 72  Changing Passwords 72  Enabling or Disabling Users 73  Deleting Users 74  Deleting Security Officers 74  Backing Up the Master Key 74  Locking the Keystore to Prevent Backups 75  Managing Boards With vcaadm 76  Setting the Auto Logout Time 76    xiv Sun Crypto Accelerator 4000 Board Installation and User s Guide     May 2003    Displaying Board Status 77  Loading New Firmware 78  Resetting a Sun Crypto Accelerator 4000 Board 78  Rekeying a Sun Crypto Accelerator 4000 Board 79  Zeroizing a Sun Crypto Accelerator 4000 Board 80  Using the vcaadm diagnostics Command 80  Using vcadiag 81  Configuring Sun ONE Server Software for Use With the Sun Crypto Accelerator  4000 Board 85  Administering Security for Sun ONE Web Servers 85  Concepts and Terminology 86  Tokens and Token Files 87  Token Files 87  Enabling and Disabling Bulk Encryption 88  Configuring Sun ONE Web Servers 89  Passwords 89  Populating a Keystore 90  v To Populate a Keystore 90  Overview for Enabling Sun ONE Web Servers 91  Installing and Configuring Sun ONE Web Server 4 1 92  Installing Sun ONE Web Server 4 1 92  v To Install Sun ONE Web Server 4 1 92  v ToCreate a Trust Database 93  v To Generate a Server Certificate 95  v To Install the Server Certificate 98  Configuring Sun ONE Web Server 4 1 for SSL 99  v To Configure the Sun ONE Web Server 4 1 99    Contents xv    Installing and Configuring Sun ONE Web Server 
121. h name to a backup file where the backup will be stored  This path  name can be placed on the command line or if omitted  vcaadm will prompt you for  the path name     74 Sun Crypto Accelerator 4000 Board Installation and User   s Guide   May 2003    A password must be set for the backup data  This password is used to encrypt the  master key that is in the backup file        vcaadm vcaN hostname  sec_officer  gt  backup  opt SUNWconn vca backups bkup data  Enter a password to protect the data    Confirm password    Backup to  opt SUNWconn vca backups bkup data successful              Caution     You should choose a password that is very difficult to guess when  making backup files because this password protects the master key for your  keystore  You must also remember the password you enter  Without the password   you cannot access the master key backup file  There is no way to retrieve the data  protected by a lost password        Locking the Keystore to Prevent Backups    A site might have a strict security policy that doesn   t allow the master key for a Sun  Crypto Accelerator 4000 board to ever leave the hardware  This can be enforced  using the set lock command     Caution     Once this command is issued  all attempts to back up the master key will  fail  This lock persists even if the master key is rekeyed  The only way to clear this  setting is to zeroize the Sun Crypto Accelerator 4000 board with the zeroize  command  Refer to    Zeroizing a Sun Crypto Accelerator 40
122. h vcaadm    The vcaadm program has a command language that must be used to interact with  the Sun Crypto Accelerator 4000 board  Commands are entered using all or part of a  word  enough to uniquely identify that word from any other possibilities   Entering  sh instead of show would work  but re is ambiguous because it could be reset or  rekey     The following example shows entering commands using entire words     vceaadm vcaN   hostname  sec_officer  gt  show user       User Status  web_admin enabled  Tom enabled                The same information can be obtained in the previous example using partial words  as commands  such as sh us     An ambiguous command produces an explanatory response        vcaadm vcaN   hostname  sec_officer  gt  re  Ambiguous command  re             Chapter 4 Administering the Sun Crypto Accelerator 4000 Board With the vcaadm and vcadiag Utilities 63    Getting Help for Commands    vcaadm has built in help functions  To get help  you must enter a question mark      character following the command you want more help on  If an entire command is  entered and a         exists anywhere on the line  you will get the syntax for the  command  for example        vceaadm vcaN   hostname  sec_officer  gt  create         Sub Command Description  so Create a new security officer  user Create a new user       vceaadm vcaN   hostname  sec_officer  gt  create user    Usage  create user   lt username gt         vcaadm vcaN hostname  sec_officer  gt  set         Su
123. he TxMAC is deferring to traffic on the   network while it is attempting to   transmit a frame  The time base for the   timer is the media byte clock divided by   256     8 bit register indicates the highest Unstable  number of consecutive collisions per  successfully transmitted frame  that  have occurred since this register was  last read  The maximum value that this  register can attain is 255  A maskable  interrupt is generated to the software if  the number of consecutive collisions  per successfully transmitted frame  exceeds 255  This register will be  automatically cleared at 0 after it is  read     Chapter 3 Configuring Driver Parameters 45    TABLE 3 14 TX and RX MAC Counters  Continued     Parameter    Description    Stable or Unstable       tx underrun    rx length err    rx alignment err    EX gt CLCTEeret    rx code violations    rx overflows    rx no buf    rx    no comp wh    rx len mismatch    16 bit loadable counter increments after  a valid frame has been received from  the network     16 bit loadable counter increments after  a frame  whose length is greater than  the value that was programmed in the  Maximum Frame Size Register  has  been received from the network     16 bit loadable counter increments  when an alignment error is detected in  a receive frame  An alignment error is  reported when a receive frame fails the  CRC checking algorithm  AND the  frame contains a noninteger number of  bytes  that is  the frame size in bits  modulo 8 is not equal t
124. hese keys  cannot be recovered unless you have  previously backed up your master key           Proceed with zeroize   Y Yes N No   No   y  All keys zeroized successfully           Using the vcaadm diagnostics Command    Diagnostics can be run from the vcaadm utility in addition to SunVTS  The  diagnostics command in vcaadm covers three major categories in the Sun Crypto  Accelerator 4000 hardware  general hardware  cryptographic subsystem  and  network subsystem  Tests for general hardware cover DRAM  flash memory  the PCI    80 Sun Crypto Accelerator 4000 Board Installation and User   s Guide   May 2003       bus  the DMA controller  and other hardware internals  Tests for the cryptographic  subsystem cover random number generators and cryptographic accelerators  Tests  on the network subsystem cover the vca device     vceaadm vcaN   hostname  sec_officer  gt  diagnostics  Performing diagnostic tests   Done   Diagnostic Results       General Hardware  PASS  Cryptographic Subsystem  PASS    Network Subsystem  PASS             Using vcadiag    The vcadiag program provides a command line interface to the Sun Crypto  Accelerator 4000 board that enables root users to perform administrative tasks  without authenticating as security officer  Command line options determine the  actions that vcadiag performs     To access the vcadiag program easily  place the Sun Crypto Accelerator 4000 tools  directory in your search path  for example             PATH SPATH   opt SUNWconn bin  S exp
125. ields     108 Sun Crypto Accelerator 4000 Board Installation and User   s Guide   May 2003    a Port  Set to the port on which you will be running your SSL enabled web  server  usually this is port 443      a Security  Set to On     b  Select the OK button to apply these changes   In the security field of the Edit Listen Sockets page  there should now be an  Attributes link   3  Select the Attributes link   4  Enter the username password to authenticate to the keystore on the system   5  If you want to change the default set of ciphers  select the cipher suites under the  Ciphers heading     A dialog box is displayed for changing cipher settings  You can select either Cipher  Default settings  SSL2  or SSL3 TLS  Transmission Layer Security   If you select the  Cipher Default  you are not shown the default settings  The other two choices  require you to select the algorithms you want to enable in a pop up dialog box   Refer to your Sun ONE documentation on cipher selection     6  Select the certificate for the keystore followed by  Server   Cert  or the name you  chose if it is different    Only keys that the appropriate keystore user owns appear in the Certificate Name  field  This keystore user is the user that is authenticated with the username password     7  When you have chosen a certificate and confirmed all the security settings  select  the OK button     8  Select the Apply link in the far upper right corner to apply these changes before  you start your server    9  S
126. ificate  request to be sent     Sun Crypto Accelerator 4000 Board Installation and User   s Guide     May 2003    b  Select the Cryptographic Module you want to use   Each keystore has its own entry in this pull down menu  Be sure that you select  the correct keystore  Do not select SUNW acceleration only    c  In the Key Pair File Password dialog box  provide the password for the user  that will own the key   This password is the username password  TABLE 5 1      d  Provide the appropriate information for the following requestor information  fields     TABLE 5 2 Requestor Information Fields       Field Description       Requestor Name Contact information for the requestor    Telephone Number Contact information for the requestor    Common Name Web site Domain that is typed in a visitor   s browser hostname domain  Email Address Contact information for requestor  Organization A value for the organization to be asserted on the certificate    Organizational Unit  Optional  A value for the organizational unit that will be asserted  on the certificate    Locality  Optional  City  county  principality  or country  which is also  asserted on the certificate if provided   State  Optional  The full name of the state   Country The two letter ISO code for the country  for example  the United    States is US        e  Select the OK button to submit the information     7  Use a certificate authority to generate the certificate     a If you choose to post your certificate request to a CA 
127. iguration information  This can only be done  by using the hardware jumper attached to the board        Note     You can use the zeroize command with the vcaadnm utility to remove all  key material from a Sun Crypto Accelerator 4000 board  However  the zeroize  command leaves any updated firmware intact  See    Zeroizing a Sun Crypto  Accelerator 4000 Board    on page 80  Also refer to the vcadiag online manual pages        163    v To Zeroize the Sun Crypto Accelerator 4000  Board With the Hardware Jumper    1  Power off the system     Note     For some systems  you can use dynamic reconfiguration  DR  to remove and  replace the board as necessary for this procedure instead of powering off the system   Refer to the documentation delivered with your system for the correct DR  procedures        n Caution     The board must not receive any electrical power while adjusting the  jumper        2  Remove the computer cover to get access to the jumper located at the top middle  of the board     3  Place the jumper on pins 0 and 1 of the jumper block     Pins 0 and 1 are the pins closest to the bracket and labeled with a    Z     There are four  sets of two pins and the jumper should only be placed on the 0 and 1 pin set as  shown in FIGURE F 1                    Caution     You cannot use the Sun Crypto Accelerator 4000 board with the jumper  on pins 0 and 1    0246   o o o o   1 3154       FIGURE F 1 Sun Crypto Accelerator 4000 Board Jumper Block Pins    164 Sun Crypto Accelerator 
128. in  S export PATH             55    The vcaadm command line syntax is     m vcaadm   H   a vcaadm   y    hhost    p port    dvcaN    f filename   a vcaadm   y    h host    p port    d vcaN    s sec_officer  command       Note     When using the  d attribute  vcaN is the board   s device name where the N  corresponds to the Sun Crypto Accelerator 4000 device instance number     TABLE 4 1 shows the options for the vcaadm utility     TABLE 4 1  vcaadm Options       Option Meaning   H Displays help files for vcaadm commands and exit    d vcaN Connects to the Sun Crypto Accelerator 4000 board that has N as the    driver instance number  For example   d vca1 connects to device   vcal where vca is a string in the board   s device name and 1 is the  instance number of the device  This value defaults to vca0 and must  be in the form of vcaN  where N corresponds to the device instance    number    f filename Interprets one or more commands from filename and exit    h host Connects to the Sun Crypto Accelerator 4000 board on host      The value for host can be a host name or an IP address  and defaults  to the loopback address      p port Connects to the Sun Crypto Accelerator 4000 board on port  The  value for port defaults to 6870     s sec_officer Logs in as a security officer named sec_officer     y Forces a yes answer to any command that would normally    prompt for a confirmation        Note     The name sec_officer is used throughout this user   s guide as an example  security of
129. in your search path  for example       PATH SPATH   opt SUNWconn bin    S export PATH       2  Access the vcaadm utility with the vcaadm command or enter vcaadm  h  hostname to connect vcaadm to a board on a remote host     Refer to    Using vcaadm    on page 55       veaadm  h hostname    3  Populate the board   s keystore with users        These user names are known only within the domain of the Sun Crypto Accelerator  4000 board and do not need to be identical to the UNIX user name that the web  server process is using  Before attempting to create the user  remember that you  must first log in as a vcaadm security officer     90 Sun Crypto Accelerator 4000 Board Installation and User   s Guide   May 2003    4  Create a user with the create user command        vcaadm vcaN hostname  sec_officer  gt  create user username  Initial password   Confirm password        User username created successfully        The username and password created here collectively make the username password  See  TABLE 5 1   You must use this password when authenticating during a web server  startup  This is the keystore password for a single user        Caution     Users must remember this username password  Without this password   users cannot access their keys  There is no way to retrieve a lost password     5  Exit vcaadm     vceaadm vcaN   hostname  sec_officer  gt  exit    Overview for Enabling Sun ONE Web Servers       To enable Sun ONE Web Servers you must complete the following procedures   
130. ing and installing  certificates into the internal cryptographic module     Required when performing vcaadm privileged operations     Required to start the Sun Crypto Accelerator 4000 module when  running in secure mode  This password is also required when  requesting and installing certificates into the internal cryptographic  module  keystore_name   This password consists of the username and  password of a keystore user that was created in vcaadm  The  keystore username and password are separated by a colon            Chapter 5 Configuring Sun ONE Server Software for Use With the Sun Crypto Accelerator 4000 Board    89    Populating a Keystore    Before you can enable the board for use with a Sun ONE Web Server  you must first  initialize the board and populate the board   s keystore with at least one user  The  keystore for the board is created during the initialization process  You can also  initialize Sun Crypto Accelerator 4000 boards to use an existing keystore  Refer to     Initializing the Sun Crypto Accelerator 4000 Board With vcaadm    on page 65        Note     Only one keystore per Sun Crypto Accelerator 4000 board can be configured  and you must configure one keystore per board  You can configure multiple Sun  Crypto Accelerator 4000 boards to collectively work with the same keystore to  provide additional performance and fault tolerance        v To Populate a Keystore    1  If you have not already done so  place the Sun Crypto Accelerator 4000 tools  directory 
131. is file as a template and copy it as follows       cp  etc apache httpd conf example  etc apache httpd conf    2  Replace ServerName with your server name in the httpd conf file        3  Start apsslcfg        opt SUNWconn cryptov2 bin apsslcfg       112 Sun Crypto Accelerator 4000 Board Installation and User   s Guide   May 2003    4  Select 1 to configure your Apache Web Server to use SSL     Sun Crypto Accelerator Apache Installation       This script will install the Sun Crypto Accelerator  cryptographic modules for Apache     Please select what you wish to do        1  Configure Apache for SSL  2  Work with Apache keys    Your selection  0 to quit   1             5  Provide the directory where the Apache binaries exist     On Solaris systems  this is usually  usr apache     Pleas nter the directory where the Apach          binaries and libraries exist   usr apache    usr apache       6  Provide the location of the configuration files for Apache     On Solaris systems  this is usually  etc apache                 Pleas nter the directory where the Apache configuration files exist    etc apache    etc apache          7  Create an RSA keypair for your system     If you choose not to create a keypair  you must go back later and use apsslcfg to    generate keys     Do you wish to create a new RSA keypair and certificate request   Y N      If you answer No to this question  skip to    To Create a Certificate    on page 115     8  Provide the directory for storing the keys     I
132. k prompt  navigate to the device path and type  properties  to display the list of properties           ok ed  pci 8  600000 network 1    ok  properties  assigned addresses    d fru len  d fru off  d fru dev  s fru len  s fru off  s fru dev  compatible  reg    address    bits  max    frame size                         network interface typ  device_type   name  local mac    address  version   2 11 12 02 10 31  phy type  board model   model  fcode rom offset  66mhz    capable  fast    back to back  devsel speed  class    code  interrupts  latency timer  cache line size  max latency  min grant  subsystem id  subsystem vendor id  revision id  device id  vendor id    82000810 00000000 00102000 00000000 00002000  81000814 00000000 00000400 00000000 00000100  82000818 00000000 00200000 00000000 00200000  82000830 00000000 00400000 00000000 00100000   00 00 00 00   00 00 e8 00   eeprom   00 00 08 00   00 00 e0 00   eeprom   70 63 69 38 30 38 36 2c 62 35 35 35 2e 31 30 38   00000800 00000000 00000000 00000000 00000000  02000810 00000000 00000000 00000000 00002000  02000814 00000000 00000000 00000000 00000100  02000818 00000000 00000000 00000000 00200000  02000830 00000000 00000000 00000000 00100000   00 00 00 30   00 00 40 00  thernet   network   network    08 00 20 aa bb cc  Sun PCI Crypto Accelerator 4000 1000Base T FCode    mif   501 6039   SUNW  pci vca  00000000    001  000  001  040  010  040  040  3de8  108e  0002  0b555  08086    COO  O  O   O  Oo           SISO  OOO  DOO     
133. le     The online manual pages for prtconf 1  and driver  conf 4  include additional  details  The next procedure shows an example of setting parameters in a vca conf  file     Variables defined in the previous section apply to known devices in the system  To  set a variable for a Sun Crypto Accelerator 4000 board with the vca conf file  you  must know the following three pieces of information for the device  device name   device parent  and device unit address     v To Set Driver Parameters Using a vca conf File    1  Obtain the hardware path names for the vca devices in the device tree     a  Check the  etc driver_aliases file to identify the name associated with a  particular device          grep vca  etc driver_aliases  vca  pcil0d8e  3de8              In the previous example  the device name associated with the Sun Crypto  Accelerator 4000 software driver  vca  is  pcil08e  3de8        b  Locate the device parent name and device unit address in the   etc path_to_inst file     Refer to the online manual pages for path_to_inst A4           grep vca  etc path_to_inst    pci 8 600000 network 1  0  vca     pci 8 700000 network 1  1  vca              In the previous example  there are three columns of output  device path name   instance number  and software driver name     38 Sun Crypto Accelerator 4000 Board Installation and User   s Guide     May 2003    The device path name in the first line of the previous example is    pci 8 600000 network 1     Device path names are made
134. le  38  driver specific parameters  49  drop parameters  30  DSS  145  dynamic reconfiguration  9    E   early detecting 8 bit vectors  30  early drop parameters  30  editing the network host files  52    172 Sun Crypto Accelerator 4000 Board Installation and User   s Guide   May 2003    enable ipg0  28  enable ipg0 parameter  28  enabling   Apache Web Servers  112   Sun ONE Web Servers  89  enabling Sun ONE Web Servers  91  etc apache default pass  144  etc apache    servername port keytype pass  144  etc hostname vcalN file  53  etc hosts file  53  etc path_to_inst file  38  Ethernet   driver operating statistics  43   driver statistics  44   FCode self test diagnostic  129   link properties  47   MMF  23   PCI properties  51   properties  47   receive counters  50   transmit counters  49   UTP  23  example vca conf file  40    F  factory state  163  failsafe mode  163  FCode self test  129  FIFO occupancy  30  files and directories  installation  17  FIPS 140 2 mode  66  firmware  165  flow control  27  frames  27  keywords  27  forced mode of operation  24  forced mode parameter  28  Frame Based Link Level Flow Control Protocol  27    G    gap parameters  28  Gigabit forced mode parameter  28  Gigabit media independent interface  GMII   47    H    hardware  10   hardware and software requirements  10  hardware zeroize  163   high availability  9   high quality entropy  9   host files  52   hostname  vcaN file  53   hosts file  53   hot plug  9    l  IEEE 802 3x  27  ifcon
135. ll Instances drop down menu to change all checked instances of  vceatest     This action removes the dialog box and returns you to the SunVTS Diagnostic main  window       Select one of the instances of vcatest then right click and drag to display the    Test Execution Options dialog box     An alternate method of displaying Test Execution Options dialog box is to select the  Options drop down main menu  then select Test Executions  These options are  generic SunVTS controls that affect all tests  Refer to the SunVTS user   s guide for  detailed information       When you have made all selections  select Apply to remove the dialog box and    return to the SunVTS Diagnostic main window   Select Start to perform the selected tests     Select Stop to stop all tests     Sun Crypto Accelerator 4000 Board Installation and User   s Guide   May 2003    Test Parameter Options for vcatest    TABLE 7 2 describes the vcatest subtests     TABLE 7 2 vcatest Subtests       Test Name Description   CDMF Tests CDMF bulk encryption    DES Tests DES bulk encryption    3DES Tests 3DES bulk encryption   RSA Tests RSA public and private keys   DSA Tests DSA signature verification   MDS Tests MD5 Message Digest Digital Signature   SHA1 Tests SHA1 Digest Key Creation    RNG Test random number generation    vcatest Command Line Syntax    If you choose to perform vcatest from the command line instead of the CDE  interface  then all arguments must be specified in the command line string     In 32 bit mo
136. location of the PEM encoded X 509 certificate file for  this server     SSLCertificateKeyFile file  Context  Global  virtual host    This directive specifies the location of the PEM encoded private key file for this  server  corresponding to the certificate configured with the  SSLCertificateFile directive     SSLCertificateChainFile file  Context  Global  virtual host    This directive specifies the location of a file containing the PEM encoded  certificates making up the certification path of the server  You can use the  directive to assist clients in verifying the server s certificate when the server s  certificate is not directly signed by an authority that the client recognizes     Appendix B SSL Configuration Directives for Apache Web Servers 147    Certificates in the chain are assumed to be valid for client authentication as well   when client authentication  SSLVerifyClient  is used     8  SSLCACertificateFile file  Context  Global  virtual host    This directive specifies the location of a file containing the concatenation of the  certificates for certification authorities  CAs  used for client authentication     9  SSLCARevocationFile file  Context  Global  virtual host    This directive specifies the location of a file containing the concatenation of the  certificate revocation lists of CAs used for client authentication     10  SSLVerifyClient level  Context  Global  virtual host  directory   htaccess    This directive configures the authentication of clients to 
137. m     ok reset all    4  Type show nets to display the list of devices and enter a selection        You should see a list of devices  similar to the example below  specific to the adapter        ok show nets   a   pci 8 600000 network l   b   pci 8  700000 network 5 1   q  NO SELECTION   Enter Selection  q to quit  a    pci 8 600000 network l has been selected    Type  Y   Control Y   to insert it in the command line   e g  ok nvalias mydev    Y for creating devalias mydev for   pci 8  600000 network   l                                        Note     To perform the following self test with the test command  the Ethernet  port must be connected to a network        5  Perform the self test using the test command   The following tests are performed when the test command is executed     m vca register test  happens only when diag switch  is true   m Internal loopback test  a link up down test    130 Sun Crypto Accelerator 4000 Board Installation and User   s Guide   May 2003    Note     The Sun Crypto Accelerator 4000 UTP adapter self test for a 1000 Mbps  connection is not supported for use with an external loopback cable because the  link clock cannot be reconciled  For this test  the local and remote ports must  reconcile as clock master and clock slave  If an external loopback cable is used  both  the local and remote ports are identical  Hence  the single port cannot be both a clock  master and a clock slave  which causes the PHY link up to always fail  For a Sun  Crypto Ac
138. meOd  zZardoz     cat  etc hostname vca0d  zardoz 11         Create an appropriate entry in the  etc hosts file for each active vca interface     For example          cat  etc hosts         Internet host table       127 0 0 1 localhost  129 144 10 57 zardoz loghost  129 144 11 83 zardoz 1l          Chapter 3 Configuring Driver Parameters 53    54 Sun Crypto Accelerator 4000 Board Installation and User   s Guide   May 2003    CHAPTER 4       Administering the Sun Crypto  Accelerator 4000 Board With the  vcaadm and vcadiag Utilities    This chapter provides an overview of the vcaadm and vcadiag utilities  The  following sections are included        Using vcaadm    on page 55      Logging In and Out With vcaadm    on page 58      Entering Commands With vcaadm    on page 63      Initializing the Sun Crypto Accelerator 4000 Board With vcaadm    on page 65     Managing Keystores With vcaadm    on page 69      Managing Boards With vcaadm    on page 76      Using vcadiag    on page 81       Using vcaadm    The vcaadm program offers a command line interface to the Sun Crypto Accelerator  4000 board  Only users designated as security officers are allowed to use the vcaadm  utility  When you first connect to a Sun Crypto Accelerator 4000 board with vcaadm   you are prompted to create an initial security officer and password     To access the vcaadm program easily  place the Sun Crypto Accelerator 4000 tools  directory in your search path  for example          PATH SPATH   opt SUNWconn b
139. mful interference to radio communications  However  there is no guarantee  that interference will not occur in a particular installation  If this equipment does cause harmful interference to radio or  television reception  which can be determined by turning the equipment off and on  the user is encouraged to try to correct the  interference by one or more of the following measures     e Reorient or relocate the receiving antenna    e Increase the separation between the equipment and receiver    e Connect the equipment into an outlet on a circuit different from that to which the receiver is connected    e Consult the dealer or an experienced radio television technician for help    Shielded Cables  Connections between the workstation and peripherals must be made using shielded cables in order to    maintain compliance with FCC radio frequency emission limits  Networking connections can be made using unshielded  twisted pair  UTP  cables     Modifications  Any modifications made to this device that are not approved by Sun Microsystems  Inc  may void the  authority granted to the user by the FCC to operate this equipment     vii    ICES 003 Class A Notice   Avis NMB 003  Classe A    This Class A digital apparatus complies with Canadian ICES 003     Cet appareil num  rique de la classe A est conforme    la norme NMB 003 du Canada     ICES 003 Class B Notice   Avis NMB 003  Classe B    This Class B digital apparatus complies with Canadian ICES 003     Cet appareil num  rique de la 
140. milar to the examples below  specific to the Sun Crypto  Accelerator 4000 board     ok show devs     chosen    packages    upa 8  480000 SUNW  f  b 0 0   pci 8  600000 network l    pci 8  600000 SUNW  qlc 4   pci 8  600000 SUNW  glc 4 fp 0  0             In the preceding example  the  pci 8  600000 network 1 entry identifies the  device path to the Sun Crypto Accelerator 4000 board  There will be one such line  for each board in the system     132 Sun Crypto Accelerator 4000 Board Installation and User   s Guide   May 2003     properties    To determine whether the Sun Crypto Accelerator 4000 device properties are listed  correctly  from the OBP prompt  type  properties to display the list of properties           ok  properties  assigned addresses    d fru len  d fru off  d fru dev  s fru len  s fru off  s fru dev  compatible  reg    address bits  max frame size  network interface type  device_type   name  local mac address  version   2 11 02 10 31  phy type  board model   model  fcode rom offset  66mhz capable  fast back to back  devsel speed  class code  interrupts  latency timer  cache line size  max latency       min grant  subsystem id  subsystem vendor id  revision id  device id   vendor id    82000810 00000000 00102000 00000000 00002000  81000814 00000000 00000400 00000000 00000100  82000818 00000000 00200000 00000000 00200000  82000830 00000000 00400000 00000000 00100000   00 00 00 00   00 00 e8 00   eeprom   00 00 08 00   00 00 e0 00   eeprom   70 63 69 38 30 38 36 2
141. nd can radiate radio frequency energy  and if it is  not installed and used in accordance with the instruction manual  it may cause harmful interference to radio communications   Operation of this equipment in a residential area is likely to cause harmful interference  in which case the user will be required  to correct the interference at his own expense     Shielded Cables  Connections between the workstation and peripherals must be made using shielded cables to comply with  FCC radio frequency emission limits  Networking connections can be made using unshielded twisted pair  UTP  cables     Modifications  Any modifications made to this device that are not approved by Sun Microsystems  Inc  may void the  authority granted to the user by the FCC to operate this equipment     FCC Class B Notice    This device complies with Part 15 of the FCC Rules  Operation is subject to the following two conditions     1  This device may not cause harmful interference   2  This device must accept any interference received  including interference that may cause undesired operation     Note  This equipment has been tested and found to comply with the limits for a Class B digital device  pursuant to Part 15 of  the FCC Rules  These limits are designed to provide reasonable protection against harmful interference in a residential  installation  This equipment generates  uses and can radiate radio frequency energy and  if not installed and used in  accordance with the instructions  may cause har
142. need to  make sure that you have a key file and a certificate  file in place before enabling SSL for Apache        You can create a new key file and certificate request  by selecting the  Generate a keypair and request a  certificate for Apache  option after choosing    Work with Sun ONE and Apache keys  from the   apsslcfg main menu              4  Select 0 to quit when you finish with apsslcfg     Chapter 6 Configuring Apache Web Servers for Use With the Sun Crypto Accelerator 4000 Board       5  Copy your certificate request with the headers from   etc apache keys base_name certreq pem  where base_name was set in Step 9  of    To Enable the Apache Web Server    on page 112  and hand it off to your  certificate authority     6  Once the certificate is generated  create the certificate file   etc apache keys base_name cert  pem and paste your certificate into it     7  Start the Apache Web Server     This assumes your Apache binary directory is  usr apache bin  If this is not your  binary directory  type in the correct directory        usr apache bin apachectl start    8  Enter your PEM pass phrase when prompted for it        9  Verify the new SSL enabled web server with a browser by going to the following  URL     https    server_name server_port      Note that the default server_port is 443     118 Sun Crypto Accelerator 4000 Board Installation and User   s Guide e May 2003    CHAPTER 7       Diagnostics and Troubleshooting       This chapter describes diagnostic tests and
143. ng  37  pause capability  27  setting  23  37  transmit and receive  27    B   blanking register for alias read  30   blanking values  25  30   building applications  libcrypto a  152  libssl a  152    C    commands    properties  133   driver conf  38   ifconfig  52   kstat  43  51  128   modinfo  18   pkgadd  18   pkginfo  18   prtconf  38   prtdiag  18   setenv auto boot   129   show devs  132   show nets  130   watch net  134   zeroize  163  configuration  network  52  configuring device driver parameters  23  configuring Sun ONE Web Servers  89  configuring the network host files  52  cryptographic activity  128  cryptographic algorithm acceleration  3    cryptographic and Ethernet driver operating  statistics  43   cryptographic driver operating statistics  43   cryptographic driver statistics  43   cryptographic libraries  152   current Ethernet link properties  47   custom applications  151    D  dcatest  122  subtests  123  deleting security officers  74  detecting 8 bit vectors  30  determining cryptographic activity  128  device path names  39  diagnostic support  3  diagnostics tests  121  diag switch  configuration variable  130  Diffie Hellman  145  Digital Signature Standard  145  directories and files  19  hierarchy of  19  displaying board status  77  driver parameters  23  configuring  23  forced mode  24  parameters and settings  24  values and definitions  24  driver statistic values  128  driver statistics  43  44  driver  conf file  38  driver_aliases fi
144. ntain  access control of the server keys within that single keystore     An administrative tool  vcaadm  is used to manage Sun Crypto Accelerator 4000  keystores and users  Refer to    Managing Keystores With vcaadm    on page 69     86 Sun Crypto Accelerator 4000 Board Installation and User   s Guide     May 2003    Tokens and Token Files    Keystores appear to Sun ONE Web Servers as tokens  Token files are a technique for  Sun Crypto Accelerator 4000 administrators to selectively present only specific  tokens to a given application     Example    There are three keystores  engineering  finance  and legal  The following tokens are  presented to the Sun ONE Web Server     m engineering  m finance  m legal    Token Files    To override the default case  a token file must exist  Some applications cannot handle  multiple tokens  Token files are text files that contain one or more token names  one  per line        Note     Token names and keystore names are the same     A Sun ONE Web Server presents only the tokens listed in the token file  The  methods of specifying token files are as follows  in order of precedence         1  The file named by the environment variable SUNW_PKCS11_TOKEN_FILE                Some application software suppresses environment variables  in which case this  approach might not be feasible     2  The file SHOME   SUNWconn_cryptov2 tokens    This file must exist in the home directory of the UNIX user that the Sun ONE Web  Server runs as  The Sun ONE Web 
145. nts  69  security officers  70  self test  129  server certificate  96  105  setenv auto boot   129  setting vca driver parameters  using ndd  33  38  using vca conf  33  38  show devs command  132  show nets command  130  software packages  18  Solaris 8 patches  11  Solaris 9 patches  11  Solaris operating environments  10  specifications  136  137  138  139  140  141  MMF adapter  136  137  138  characteristics  136  environmental specifications  138  interface specifications  138  performance specifications  137  power requirements  137  UTP adapter  138  139  140  141  characteristics  139  connectors  138  environmental specifications  141  interface specifications  141  performance specifications  140  physical dimensions  140  power requirements  140  speed   10  41  100  41  1000  41    auto  41  SSL acceleration  4  SSL algorithms  3  standard Ethernet frame sizes  1  standards and protocols  1  statistic values  128  Sun cryptographic libraries  152  Sun ONE Web Servers  administering  85  configuring  89  creating and populating a keystore  90  enabling  91  passwords  89  Sun ONE Web Server 4 1  configuring  98  creating a trust database  93  generating a server certificate  93  installing  92  installing the server certificate  98  Sun ONE Web Server 6 0  configuring  108  creating a trust database  102  generating a server certificate  104  installing  101  installing a server certificate  107  token files  87  tokens  87  SunVTS  120  121  netlbtest  124  nett
146. o zero      16 bit loadable counter increments  when a receive frame fails the CRC  checking algorithm  AND the frame  contains an integer number of bytes   that is  the frame size in bits modulo 8  is equal to zero      16 bit loadable counter increments  when an Rx_Err indication is generated  by the XCVR over the MII  while a  frame is being received  This indication  is generated by the transceiver when it  detects an invalid code in the received  data stream  A receive code violation is  not counted as an FCS or an Alignment  error     Number of Ethernet frames dropped  due to lack of resources     Number of times the hardware cannot  receive data because there is no more  receive buffer space     Number of times the hardware cannot  post completion entries for received  data           Number of received frames where the  asserted length does not match the  actual frame length     46 Sun Crypto Accelerator 4000 Board Installation and User   s Guide   May 2003    Unstable    Unstable    Unstable    Unstable    Unstable    Unstable    Unstable    Unstable       Unstable    The following Ethernet properties  TABLE 3 15  are derived from the intersection of  device capabilities and the link partner capabilities     TABLE 3 15 describes the current Ethernet link properties     TABLE 3 15 Current Ethernet Link Properties       Parameter  ifspeed  link duplex    link pause    link asmpause    link up       link status    xcvr inuse    Description  1000  100  or 10 Mbps  O half 
147. o_inst file to identify the instance number associated    with a particular device  Refer to the online manual pages for path_to_inst 4        grep vca  etc path_to_inst    pci 8 600000 network 1  0  vca       pci 8 700000 network 1  1  vca        In the previous example  the three Sun Crypto Accelerator 4000 Ethernet instances  are from the installed adapters  The instance numbers are 0 and 1     2  Use the instance number to select the device       ndd  set  dev vcaN    Chapter 3 Configuring Driver Parameters 33    Note     In the examples in this user   s guide  N represents the instance number of the  device        The device remains selected until you change the selection     Noninteractive and Interactive Modes    You can use the ndd utility in two modes       Noninteractive  m Interactive    In noninteractive mode  you invoke the utility to execute a specific command  Once  the command is executed  you exit the utility  In interactive mode  you can use the  utility to get or set more than one parameter value  Refer to the ndd 1M  online  manual page for more information     Using the ndd Utility in Noninteractive Mode  This section describes how to modify and display parameter values        To modify a parameter value  use the  set option     If you invoke the ndd utility with the  set option  the utility passes value  which  must be specified to the named  dev vca driver instance  and assigns it to the  parameter       ndd  set  dev vcaN parameter value    When you ch
148. ommand  This displays the hardware and firmware versions for that board   the MAC address of the network interface  the status  Up versus Down  speed   duplex  and so on   of the network interface  and the keystore name and ID        veaadm vcaN   hostname  sec_officer  gt  show status  Board Status       Hardware Version  1 0   Firmware Version  1 0   Bootstrap Firmware Version  VCA Crypto Accelerator 1 0 March 2003  Current Firmware Version  VCA Crypto Accelerator 1 0 March 2003  MAC Address  00 03 ba 0e 96 aa   Interface information  Link up  1000Mbps  Full Duplex   Keystore Name  keystore_nam   Keystore ID  832aece03e654790   Login Session Timeout  in minutes   10   Password policy security level  HIGH   Number of master key backups  0     Device is in FIPS 140 2 Mode                Determining if the Board is Operating in FIPS 140 2 Mode    If the Sun Crypto Accelerator 4000 board is operating in FIPS 140 2 mode  the show  status command will print the following line       Device is in FIPS 140 2 Mode    If the board is not operating in FIPS 140 2 mode  the show status command will not  print a line specifying FIPS 140 2 mode        You can also use the kstat 1M  utility to determine if the board is operating in FIPS  140 2 mode  The kst at  1M  parameter  vs   mode  returns a value of FIPS if the board  is operating in FIPS 140 2 mode  Refer to    Sun Crypto Accelerator 4000 Cryptographic  and Ethernet Driver Operating Statistics    on page 43 and the online manual page
149. on   PCI clock 33 MHz or 66 MHz   Host interface PCI 2 1 with support for 33 MHz or 66 MHz clock rate and 3 3V or  5V power    PCI bus width 32 bits or 64 bits    Environmental Specifications    TABLE A 6 Environmental Specifications    Condition Operating Specification Storage Specification  Temperature 0   to  55   C   32   to  131   F  40   to  75   C   40   to  167   F  Relative humidity 5 to 85  noncondensing 0 to 95  noncondensing          Sun Crypto Accelerator 4000 UTP  Adapter    This section provides the specifications for the Sun Crypto Accelerator 4000 UTP  adapter     Connectors    FIGURE A 1 shows the connector for the Sun Crypto Accelerator 4000 UTP adapter     138 Sun Crypto Accelerator 4000 Board Installation and User   s Guide   May 2003                Q LINK                         FIGURE A 2 Sun Crypto Accelerator 4000 UTP Adapter Connector    TABLE A 7 lists the characteristics of the Cat 5 connector used by the Sun Crypto  Accelerator 4000 UTP adapter     TABLE A 7  Cat 5 Connector Link Characteristics       Characteristic Description       Operating range Up to 100 meters    Appendix A Specifications 139    Physical Dimensions    TABLE A 8 Physical Dimensions       Dimension Measurement Metric Measurement  Length 12 283 inches 312 00 mm  Width 4 200 inches 106 68 mm       Performance Specifications    TABLE A 9 Performance Specifications          Feature Specification   PCI clock 33 66 MHz max   PCI data burst transfer rate up to 64 byte bursts  PCI dat
150. on the Sun Crypto  Accelerator 4000 board  you simply create an empty file in the   etc opt SUNWconn cryptov2  directory named sslreg  and restart the server  software       touch  etc opt SUNWconn cryptov2 sslreg    To disable the bulk encryption feature  you must delete the sslreg file and restart  the server software       rm  etc opt SUNWconn cryptov2 sslreg    The bulk encryption feature for Apache Web Server software is enabled by default  and cannot be disabled     4 Sun Crypto Accelerator 4000 Board Installation and User   s Guide e May 2003       Hardware Overview    The Sun Crypto Accelerator 4000 hardware is a full size  4 2 inches x 12 283 inches   cryptographic accelerator PCI Gigabit Ethernet adapter that enhances the  performance of IPsec and SSL on Sun servers     IPsec Hardware Acceleration    The Sun Crypto Accelerator 4000 board encrypts and decrypts IPsec packets in  hardware  offloading this high overhead operation from the SPARC    processor  The  cryptographic hardware also supports general asymmetric and symmetric  cryptographic operations for use in other applications and contains a hardware  source of random numbers     Note     No IPsec configuration or tuning is required to use the Sun Crypto  Accelerator 4000 board for IPsec acceleration  You simply install the Sun Crypto  Accelerator 4000 packages and reboot        Once the Sun Crypto Accelerator 4000 board and packages are installed  any existing  IPsec configuration and any future IPsec configu
151. or 4000 board for  use with Apache Web Servers  This chapter includes the following sections     m    Enabling the Board for Apache Web Servers    on page 112  m    Enabling Apache Web Servers    on page 112  m    Creating a Certificate    on page 114       Caution     Do not configure Apache Web Server for use with the Sun Crypto  Accelerator 1000 board and the Sun Crypto Accelerator 4000 at the same time  If  both boards are configured to use the Apache Web Server at the same time  Apache  will not work correctly        If you plan to use the Apache Web Server  you must also install Patch 109234 09   Once the SUNWkc12a package is added  the system will be configured with Apache  Web Server mod_ssl 1 3 26     Note     The bulk encryption feature for Apache Web Server software is enabled by  default and cannot be disabled     111       Enabling the Board for Apache Web  Servers    This section provides an overview of how to enable the Sun Crypto Accelerator 4000  board for use with Apache Web Servers     Enabling Apache Web Servers    Apache Web Server 1 3 26 or later is required for use with the Sun Crypto  Accelerator 4000 board  The following instructions are for the 1 3 26 release of  Apache Web Server  Refer to the Apache Web Server documentation for more  information about using Apache Web Servers     v To Enable the Apache Web Server    1  Create an httpd configuration file     For Solaris systems  the httpd  conf examp1e file is usually in  etc apache  You  can use th
152. or 4000 board to the original keystore  configuration  This section describes how to initialize a board to use an existing  keystore which is stored in a backup file     You must first create a backup file of an existing board configuration before  performing this procedure  Creating and restoring a backup file requires a password  to encrypt and decrypt the data in the backup file  Refer to    Backing Up the Master  Key    on page 74     Chapter 4 Administering the Sun Crypto Accelerator 4000 Board With the vcaadm and vcadiag Utilities 67       v To Initialize the Sun Crypto Accelerator 4000  Board to Use an Existing Keystore    1  Enter vcaadm at a command prompt of the system with the Sun Crypto  Accelerator 4000 board installed or enter vcaadm  h hostname if the system is  remote  and select 2 to restore the board from a backup          veaadm  h hostname   This board is uninitialized    You will now initialize the board  You may  either completely initialize the board and  start with a new keystore or restore the board       using a backup file     1  Initialize the board with a new keystore  2  Initialize the board to use an existing keystore    Your Choice  0 to exit     gt  2          2  Enter the path and password to the backup file     Enter the path to the backup file   tmp board backup       Password for restore file        3  Verify the configuration information        Board restore parameters        Path to backup file   tmp board backup  Keystore name  keystore
153. orse or promote products derived  from this software without prior written permission  For written permission   please contact rse engelschall com     5  Products derived from this software may not be called  mod_ssl  nor may   mod_ssl  appear in their names without prior written permission of Ralf S   Engelschall     6  Redistributions of any form whatsoever must retain the following  acknowledgment   This product includes software developed by  Ralf S  Engelschall  lt rse engelschall com gt  for use in the mod_ssl project   http    www modsslLorg        THIS SOFTWARE IS PROVIDED BY RALF S  ENGELSCHALL    AS IS  AND ANY  EXPRESSED OR IMPLIED WARRANTIES  INCLUDING  BUT NOT LIMITED TO   THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A  PARTICULAR PURPOSE ARE DISCLAIMED  IN NO EVENT SHALL RALF S   ENGELSCHALL OR HIS CONTRIBUTORS BE LIABLE FOR ANY DIRECT   INDIRECT  INCIDENTAL  SPECIAL  EXEMPLARY  OR CONSEQUENTIAL  DAMAGES  INCLUDING  BUT NOT LIMITED TO  PROCUREMENT OF  SUBSTITUTE GOODS OR SERVICES  LOSS OF USE  DATA  OR PROFITS  OR  BUSINESS INTERRUPTION  HOWEVER CAUSED AND ON ANY THEORY OF  LIABILITY  WHETHER IN CONTRACT  STRICT LIABILITY  OR TORT   INCLUDING NEGLIGENCE OR OTHERWISE ARISING IN ANY WAY OUT OF  THE USE OF THIS SOFTWARE  EVEN IF ADVISED OF THE POSSIBILITY OF  SUCH DAMAGE     Appendix D Software Licenses 159    160 Sun Crypto Accelerator 4000 Board Installation and User   s Guide   May 2003    APPENDIX E    Manual Pages       This appendix provides desc
154. ort PATH             The vcadiag command line syntax is     m vcadiag   D  vcaN  m vcadiag   F  vcaN  m vcadiag   K  vcaN  m vcadiag   Q    m vcadiag   R  vcaN  m vcadiag   2  vcaN    Note     When using the   DFKRZ  attributes  vcaN is the board   s device name  where the N corresponds to the Sun Crypto Accelerator 4000 device instance number     Chapter 4 Administering the Sun Crypto Accelerator 4000 Board With the vcaadm and vcadiag Utilities 81    TABLE 4 1 shows the options for the vcadiag utility     TABLE 4 7    vcadiag Options       Option   D vcaN     F vcaN     K vcaN     R vcaN     Z vcaN    Meaning  Performs diagnostics on the Sun Crypto Accelerator 4000 board     Displays the public key fingerprint used by the Sun Crypto  Accelerator 4000 board for securing administration sessions     Displays the public key and the public key fingerprint used by the  Sun Crypto Accelerator 4000 board for securing administration  sessions     Provides information about Sun Crypto Accelerator 4000 devices  and software components  Output is a colon separated list of the  following pieces of information  device  internal function  keystore  name  keystore serial number  and keystore reference count  You can  use this command to determine the association between devices and  keystores     Resets the Sun Crypto Accelerator 4000 board   Zeroizes the Sun Crypto Accelerator 4000 board        The following is an example of the  D option          vcadiag  D vca0  Running vca0 on board dia
155. otocols 144   Available SSL Ciphers 145   SSL Aliases 146   Special Characters to Configure Cipher Preference 147  SSL Verify Client Levels 148  SSL Log Level Values 149  Available SSL Options 150    Sun Crypto Accelerator 4000 Online Manual Pages 161    Tables    xxi    xxii Sun Crypto Accelerator 4000 Board Installation and User   s Guide     May 2003    Preface       The Sun Crypto Accelerator 4000 Board Installation and User   s Guide lists the features   protocols  and interfaces of the Sun    Crypto Accelerator 4000 board and describes  how to install  configure  and manage the board in your system     This book assumes that you are a network administrator with experience  configuring one or more of the following  Solaris    operating environment  Sun  platforms with PCI I O cards  Sun    ONE and Apache Web Servers  IPsec   SunVTS    software  and certification authority acquisitions        How This Book Is Organized    This book is organized as follows     Chapter 1 lists the product features  protocols  and interfaces of the Sun Crypto  Accelerator 4000 board  and describes the hardware and software requirements     Chapter 2 describes how to install and remove the Sun Crypto Accelerator 4000  hardware and software     Chapter 3 defines the Sun Crypto Accelerator 4000 tunable driver parameters and  describes how to configure them with the ndd utility and the vca conf file  This  chapter also describes how to enable autonegotiation or forced mode for link  parameters a
156. page 41     Driver Parameter Values and Definitions    TABLE 3 1 describes the parameters and settings for the vca device driver        TABLE 3 1 vca Driver Parameter  Status  and Descriptions  Parameter Status Description  instance Read and write Device instance    adv autoneg cap  adv 1000fdx cap  adv 1000hdx cap  adv 100fdx cap  adv 100hdx cap    adv 10fdx cap       adv 10hdx cap  adv asmpause cap  adv pause cap  pause on threshold  pause off threshold  link master  enable ipg0d   ipg0d    ipgl    Read and write  Read and write  Read and write  Read and write  Read and write  Read and write  Read and write  Read and write  Read and write  Read and write  Read and write  Read and write  Read and write  Read and write    Read and write    Operational mode parameter   Operational mode parameter  MMF adapter only   Operational mode parameter   Operational mode parameter  UTP adapter only   Operational mode parameter  UTP adapter only   Operational mode parameter  UTP adapter only   Operational mode parameter  UTP adapter only   Flow control parameter   Flow control parameter   Flow control parameter   Flow control parameter   1 Gbps speed forced mode parameter   Enable additional delay before transmitting a packet  Additional delay before transmitting a packet    Interpacket Gap parameter    Sun Crypto Accelerator 4000 Board Installation and User   s Guide     May 2003       TABLE 3 1 vca Driver Parameter  Status  and Descriptions  Continued   Parameter Status Description  ipg
157. patch information     The following patches may be required to run the Sun Crypto Accelerator 4000  board on your system  Solaris updates contain patches to previous releases  Use the  showrev  p command to determine whether the listed patches have already been  installed     You can download the patches from the following web site   http   sunsolve sun com     Install the latest version of the patches  The dash number   01  for example  becomes  higher with each new revision of the patch  If the version on the web site is higher  than that shown in the following tables  it is simply a later version     If the patch you need is not available on SunSolve     contact your local sales or  service representative     Apache Web Server Patch    If you plan to use the Apache Web Server  you must also install Patch 109234 09   Once the SUNWkc12a package is added  the system will be configured with Apache  Web Server mod_ssl 1 3 26     10 Sun Crypto Accelerator 4000 Board Installation and User s Guide     May 2003    Solaris 8 Patches    The following tables list required and recommended Solaris 8 patches to use with  this product  TABLE 1 7 lists and describes required patches     TABLE 1 7 Required Solaris 8 Patches for Sun Crypto Accelerator 4000 Software          Patch ID Description   110383 01 libnvpair   108528 05 KU 05  nvpair support   112438 01  dev random       Solaris 9 Patches    There are currently no required Solaris 9 patches     Chapter 1 Product Overview    11    12 
158. ption Stable or Unstable       cap 10fdx Local interface full duplex capability Stable  0   Not 10 Mbps full duplex capable  1   10 Mbps full duplex capable    cap 10hdx Local interface half duplex capability Stable  0   Not 10 Mbps half duplex capable  1   10 Mbps half duplex capable       cap asm pause Local interface flow control capability Stable  0   Not asymmetric pause capable  1   Asymmetric pause  from the local device   capable  See    Flow Control Parameters    on page 27           cap pause Local interface flow control capability Stable  0   Not Symmetric pause capable  1   Symmetric pause capable  See    Flow Control  Parameters    on page 27     Reporting the Link Partner Capabilities    TABLE 3 17 describes the read only link partner capabilities     TABLE 3 17 Read Only Link Partner Capabilities    Parameter Description Stable or Unstable    lp cap autoneg 0   No autonegotiation Stable  1   Autonegotiation    lp cap 1000fdx 0   No 1000 Mbps full duplex transmission Stable  1   1000 Mbps full duplex    lp cap 1000hdx 0   No 1000 Mbps half duplex transmission Stable  1   1000 Mbps half duplex    lp cap 100fdx 0   No 100 Mbps full duplex transmission Stable  1   100 Mbps full duplex    lp cap 100hdx 0   No 100 Mbps half duplex transmission Stable  1   1000 Mbps half duplex             lp cap 10fdx 0   No 10 Mbps full duplex transmission Stable  1   10 Mbps full duplex    48 Sun Crypto Accelerator 4000 Board Installation and User   s Guide     May 2003    TABLE 3 
159. r Apache  optional    SUNWkc12m Cryptographic Administration Manual Pages  optional   SUNWvcar VCA Crypto Accelerator  Root    SUNWvcau VCA Crypto Accelerator  Usr    SUNWvcaa VCA Administration   SUNWvcafw VCA Firmware   SUNWvcamn VCA Crypto Accelerator Manual Page  optional   SUNWVvcav SunVTS Test of VCA Crypto Accelerator  optional   SUNWkc120 SSL Development Tools and Libraries  optional    S          UNWkcl2i u IPSec Acceleration with KCLv2 Crypto  optional     The required packages must be installed in a specific order and must be installed  before installing any optional packages  Once the required packages are installed   you can install and remove the optional packages in any order     Install the optional SUNWkc12a package only if you plan to use Apache as your web  server     Install the optional SUNWkc12o0 package only if you plan to relink to another   unsupported  version of Apache Web Server     Install the optional SUNWvcav package only if you plan to perform the SunVTS tests   You must have SunVTS 4 4 or later up to 5 x installed to install the SUNWvcav  package        Note     The optional SUNWkc12i u package has the  u extension only on the Sun  Crypto Accelerator 4000 CD  Once this package is installed  the name is changed to  SUNWkc12i  The  u extension of this package on the CD  defines the package as  sun4u architecture specific        Chapter 2 Installing the Sun Crypto Accelerator 4000 Board 17    2  Install the required software packages by typing   
160. r the generation of long term keys  If all the Sun Crypto  Accelerator 4000 boards within a domain or system are removed  long term keys are  generated with lower quality entropy     Load Sharing    The Sun Crypto Accelerator 4000 software distributes load across as many boards as  are installed within the Solaris domain or system  Incoming cryptographic requests  are distributed across the boards based on fixed length work queues  Cryptographic  requests are directed to the first board  and subsequent requests stay directed to the  first board until it is running at full capacity  Once the first board is running at full  capacity  further requests are queued to the first board available that can accept the  request of this type  The queueing mechanism is designed to optimize throughput  by facilitating request coalescing at the board     Chapter 1 Product Overview 9       Hardware and Software Requirements    TABLE 1 6 provides a summary of the hardware and software requirements for the  Sun Crypto Accelerator 4000 adapter     TABLE 1 6 Hardware and Software Requirements       Hardware and Software Requirements    Hardware Sun Fire    V120  V210  V240  280R  V480  V880  4800  4810  6800    12K  15K  Netra    20  lw4   Sun Blade    100  150  1000  2000  Operating Solaris 8 2 02 and future compatible releases  Solaris 9 is required  Environment for IPsec acceleration      Required Patches    Refer to the Sun Crypto Accelerator 4000 Board Release Notes for additional required  
161. rameter is applicable only if the speed parameter is set to 1000 or if  you are using a 1000 Mbps MMF Sun Crypto Accelerator 4000 board  The  value for this parameter must correspond to the value on the link  partner   for example  if the local link has a value of master  the link partner  must have a value of slave  This parameter can be set to master  slave  or  auto  the syntax is as follows   e link clock auto  default   e link clock master    e link clock slave       To establish a proper link  the speed  duplex  and link clock  1000 Mbps only   parameters must be configured correctly between the local link and the link partner   Both link partners must operate in either autonegotiation or forced mode for each of  the speed  duplex  and link clock  1000 Mbps only  parameters  A value of  auto for any of these parameters configures the link to operate in autonegotiation  mode for that parameter  The absence of a parameter at the OBP prompt configures  that parameter to have a default value of auto  A value other than auto configures  the local link to operate in forced mode for that parameter     Chapter 3 Configuring Driver Parameters 41    When the local link is operating in autonegotiation mode for the speed and duplex  parameters at 100 Mbps and below and both full and half duplexes  then the link  partner uses either the 100 Mbps or 10 Mbps speeds with either duplex     When the speed parameter is operating in forced mode  the value must match the  speed value of the
162. ration will use the Sun Crypto  Accelerator 4000 board instead of the core Solaris software  The board handles any  supported IPsec algorithm listed in TABLE 1 1  IPsec algorithms not supported by the  Sun Crypto Accelerator 4000 board will continue to be handled by the core Solaris  encryption software  The configuration of IPsec is documented in the System  Administration Guide of the Solaris System Administrator Collection at  http   docs sun com     Chapter 1 Product Overview 5    Sun Crypto Accelerator 4000 MMF Adapter    The Sun Crypto Accelerator 4000 MMF adapter is a single port Gigabit Ethernet  fiber optics PCI bus card  It operates in 1000 Mbps Ethernet networks only        FIGURE 1 1 Sun Crypto Accelerator 4000 MMF Adapter    LED Displays    See TABLE 1 4     TABLE 1 4 Front Panel Display LEDs for the MMF Adapter    Label Meaning if Lit Color  Fault On when the board is HALTED  fatal error  Red  state or low level hardware initialization  failed     Flashing if an error occurred during the  boot process     Diag On in POST  DIAGNOSTICS  and Green  FAILSAFE  firmware not upgraded  state   Flashing when running DIAGNOSTICS     Operate On in POST  DIAGNOSTICS  and Green  DISABLED  driver not attached  state   Flashing in IDLE  OPERATIONAL  and  FAILSAFE states     6 Sun Crypto Accelerator 4000 Board Installation and User   s Guide e May 2003    TABLE 1 4 Front Panel Display LEDs for the MMF Adapter  Continued     Label Meaning if Lit Color       Init On if the securi
163. rator 1000 for  Use With Apache After I Have Installed the Sun Crypto  Accelerator 4000 Software     Once the SUNWkc12a software package is installed  the system will be configured  with Apache Web Server mod_ssl 1 3 26     If you want to configure Sun Crypto Accelerator 1000 with Apache  you must have  the following patches     To configure the Sun Crypto Accelerator 1000 for use with Apache 1 3 26 on a Solaris  8 system with the SUNWkcl2a package installed  you need the following patches     a For Apache 1 3 26     Patch ID 109234 09 or later    Appendix G Frequently Asked Questions 169    a For Sun Crypto Accelerator 1000 version 1 0 software     Patch ID 112869 02  a For Sun Crypto Accelerator 1000 version 1 1 software     Patch ID 113355 01    To configure the Sun Crypto Accelerator 1000 for use with Apache 1 3 26 on a Solaris  9 system with the SUNWkc12a package installed  you need the following patches     m For Apache 1 3 26     Patch ID 113146 01 or later  m For Sun Crypto Accelerator 1000 version 1 1 software     Patch ID 113355 01    How Do I Self Sign a Certificate for Testing     Refer to the mod_SSL and OpenSSL documentation for this procedure     170 Sun Crypto Accelerator 4000 Board Installation and User   s Guide   May 2003    Index    SYMBOLS  SHOME  vcaadm trustdb  58   properties command  133        u extension  17   etc apache default pass  144   etc apache   servername port keytype pass  144   etc driver_aliases file  38   etc hostname vcaN file  53   et
164. rd           opt SUNWconn bin iplsslcfg             This script prompts you to choose a web server  It installs the Sun Crypto  Accelerator 4000 cryptographic modules for the Sun ONE Web Server  The script  then updates the configuration files to enable the Sun Crypto Accelerator 4000  board     6  Type 1 to configure your Sun ONE Web Server to use SSL and press Return           Sun Crypto Accelerator Sun ONE Installation       This script will install the Sun Crypto Accelerator  cryptographic modules for Sun ONE Products        Please select what you wish to do                    1  Configure Sun ONE Web Server for SSL   2  Configure Sun ONE Application Server for SSL   3  Export Sun ONE Web Server keys to PKCS 12 format   4  Import keys from PKCS 12 format for Sun ONE Web Server  Your selection  0 to quit   1             7  Enter the path of the web server root directory when prompted and press Return        Pleas nter the full path of the web server  root directory   usr netscape server4    usr netscape server4                94 Sun Crypto Accelerator 4000 Board Installation and User   s Guide     May 2003    8  Type y and press Return when prompted  if you want to proceed        This script will update your Sun ONE Web Server installation  in  usr netscape server4 to use the Sun Crypto Accelerator  You will need to restart your admin server after this has  completed    Ok to proceed   Y N   y    Using database directory  usr netscape server4 alias     Module  Sun Crypto A
165. re_name   username   password       3  Set the file ownership of the password file to the UNIX user ID that the web  server runs as  and set the file permissions to be readable only by the owner of the  file       chown web_server_UNIX_user_ID password conf         chmod 400 password conf       How Do I Assign Different MAC Addresses to Multiple  Boards Installed in the Same Server     There are two methods to assign different MAC addresses to multiple boards in a    single server  The first method is at the operating environment level  and the second  is at the OpenBoot PROM  OBP  level     168 Sun Crypto Accelerator 4000 Board Installation and User   s Guide   May 2003    To Assign Different MAC Addresses From a Terminal  Window      Enter the following command          eeprom    local    mac    address     true                Note     With the    local mac address     parameter set to true  all nonintegrated  network interface devices use the local MAC address assigned to the product at the  manufacturing facility          Reboot the system     To Assign Different MAC Addresses From the OpenBoot  PROM Level      Enter the following command at the OBP prompt     ok setenv local mac address  true    Note     With the    local mac address     parameter set to true  all nonintegrated  network interface devices use the local MAC address assigned to the product at the  manufacturing facility             Boot the operating environment     How Can I Configure the Sun Crypto Accele
166. requirements of the Low Voltage Directive 73 23  EEC     EC Type Examination Certificates   EN 60950 2000  3rd Edition  TEC 60950 2000  3rd Edition  Evaluated to all CB Countries  UL 60950  3rd Edition  CSA C22 2 No  60950 00    Supplementary Information    This product was tested and complies with all the requirements for the CE Mark            S   S    Dennis P  Symanski Pamela J Dullaghan   Manager  Compliance Engineering Quality Program Manager   Sun Microsystems  Inc  Sun Microsystems Scotland  Limited  4150 Network Circle  MPK15 102 Springfield  Linlithgow   Santa Clara  CA 95054  USA West Lothian  EH49 7LR   Tel  650 786 3255 Scotland  United Kingdom   Fax  650 786 3723 Tel   44 1 506 672 395    Fax   44 1 506 672 855    Declaration of Conformity  Copper UTP     Compliance Model Number  Venus CU  Product Family Name  Sun Crypto Accelerator 4000   Copper  X4011A     EMC  USA   FCC Class B    This equipment complies with Part 15 of the FCC Rules  Operation is subject to the following two  conditions     1  This equipment may not cause harmful interference    2  This equipment must accept any interference that may cause undesired operation   European Union   This equipment complies with the following requirements of the EMC Directive 89 336 EEC     As Telecommunication Network Equipment  TNE  in both Telecom Centers and Other Than Telecom Centers per  as  applicable      EN300 386 V 1 3 1  09 2001  Required Limits     EN55022 CISPR22 Class B  EN61000 3 2 Pass  EN61000 3 3
167. riptions of the Sun Crypto Accelerator 4000 board  commands and lists the online manual pages for each  The commands in this  appendix are included with the Sun Crypto Accelerator 4000 software     The online manual pages can be viewed with the following command        man  M  opt SUNWconn man page             TABLE E 1 lists and describes the available online manual pages     TABLEE 1 Sun Crypto Accelerator 4000 Online Manual Pages       man page Description    vca 7d  The vca device driver is a leaf driver that provides access control to  the underlying hardware cryptographic accelerator   The vca driver requires the presence of layered software for  applications and kernel clients to access the provided services     vcad 1m  The vcad daemon provides keystore services     vcaadm 1m  vcaadm is the administration program for the Sun Crypto  Accelerator 4000  The vcaadm command is used to manually  manipulate the configuration  account  and keying databases  associated with the Sun Crypto Accelerator 4000 board     vcaadm handles sensitive cryptographic key information     vcadiag 1m  vceadiag is a utility that allows root users to reset Sun Crypto  Accelerator 4000 boards and to zeroize key material  This utility also  allows root users to perform basic diagnostics     kc12 7d  kc12 is a kernel module that provides support for cryptographic  hardware drivers     161    TABLEE 1 Sun Crypto Accelerator 4000 Online Manual Pages  Continued     man page Description       kc12 7d  
168. rop vectors for  when FIFO threshold is greater than 10 240 bytes and  less than 12 288 bytes  Probability of drop can be  programmed on a 12 5 percent granularity  For  example  if bit 24 is set  the first packet out of every  eight will be dropped in this region   Default 0     Chapter 3 Configuring Driver Parameters 31    32    PCI Bus Interface Parameters    These parameters allow you to modify PCI interface features to gain better PCI  interperformance for a given application     TABLE 3 9 PCI Bus Interface Parameters       Parameter    Description       tx dma weight    rx dma weight    infinite burst    disable 64bit    Determines the multiplication factor for granting credit to the  transmit  TX  side during a weighted round robin arbitration  the  values are 0 to 3  Default 0   Zero means no extra weighting  The  other values are power of 2 extra weighting on that traffic  For  example  if tx dma weight   0 and rx dma weight   3  then as  long as RX traffic is continuously arriving  the priority of RX traffic  will be 8 times greater than the priority of TX traffic to access the  PCI     Determines the multiplication factor for granting credit to the RX  side during a weighted round robin arbitration  The values are 0 to  3  Default 0      Allows the infinite burst capability to be used when this parameter  is enabled and the system supports infinite burst  The adapter will  not free the bus until complete packets are transferred across the  bus  The values are 0 or 
169. ruser  start SunVTS           opt SUNWvts bin sunvts             Refer to the SunVTS user   s guide for detailed instructions on starting SunVTS     The following instructions assume that you have started SunVTS using the CDE user  interface     2  On the SunVTS Diagnostic main window  set the System Map to Logical mode     Chapter 7 Diagnostics and Troubleshooting 121    122    10     11     Note     Physical mode is supported  however  this procedure assumes you are using  Logical mode          Disable all tests by clearing their check boxes       Select the check box for Cryptography  then select the plus box for Cryptography    to display all tests in the Cryptography group       Clear check boxes in the Cryptography group that are not named vcatest     a Ifavcatest is displayed  then go to Step 6     a Ifa  vcatest is not displayed  probe the system to find it by selecting Reprobe  system in the Commands drop down menu     Refer to the SunVTS user   s guide for the exact procedure  When the probe completes  and a vcatest is displayed  continue to Step 6       Select one of the instances of vcatest then right click and drag to display the    Test Parameter Options dialog box     These options  which only pertain to the vcatest  are described in    Test Parameter  Options for vcatest    on page 123       After you have made all selections  select Apply from the Within Instance drop     down menu to change the selected instance of vcatest  or select Apply from the  Across A
170. s for the IPG parameters     TABLE 3 6 Read Write Interpacket Gap Parameter Values and Descriptions       Parameter Values Description    Byte time   ipgl 0 to 255 Interpacket gap 1  Default 8   ipg2 0 to 255 Interpacket gap 2  Default 4        By default  the driver sets ipg1 to 8 byte time and ipg2 to 4 byte time  which are  the standard values   Byte time is the time it takes to transmit one byte on the link   with a link speed of 1000 Mbps      If your network has systems that use longer IPG  the sum of ipg1 and ipg2   and if  those machines seem to be slow in accessing the network  increase the values of  ipg1 and ipg2 to match the longer IPGs of other machines     Chapter 3 Configuring Driver Parameters 29    Interrupt Parameters    TABLE 3 7 describes the receive interrupt blanking values     TABLE 3 7 RX Blanking Register for Alias Read       Field Name Values Description       rx intr pkts 0 to 511 Interrupts after this number of packets have arrived  since the last packet was serviced  A value of zero  indicates no packet blanking   Default 3     rx intr time 0 to 524287 Interrupts after 4 5 microseconds  usecs  have elapsed  since the last packet was serviced  A value of zero  indicates no time blanking   Default 3     Random Early Drop Parameters    These parameters provide the ability to drop packets based on the fullness of the  receive FIFO  By default  this feature is disabled  When FIFO occupancy reaches a  specific range  packets are dropped according to the
171. sS   amp  Sun     microsystems    sun    Crypto Accelerator 4000  Board Installation and User   s Guide    Sun Microsystems  Inc    4150 Network Circle   Santa Clara  CA 95054 U S A   650 960 1300    Part No  817 0431 10  May 2003  Revision A    Send comments about this document to  docfeedback sun com    Copyright 2003 Sun Microsystems  Inc   4150 Network Circle  Santa Clara  CA 95054 U S A  All rights reserved     This product or document is distributed under licenses restricting its use  copying  distribution  and decompilation  No part of this product or  document may be reproduced in any form by any means without prior written authorization of Sun and its licensors  if any  Third party  software  including font technology  is copyrighted and licensed from Sun suppliers     Parts of the product may be derived from Berkeley BSD systems  licensed from the University of California  UNIX is a registered trademark in  the U S  and other countries  exclusively licensed through X Open Company  Ltd     Sun  Sun Microsystems  the Sun logo  SunVTS  AnswerBook2  docs sun com  Sun ONE  Sun Enterprise  Sun Enterprise Volume Manager  Sun  Fire  SunSolve  Netra  and Solaris are trademarks  registered trademarks  or service marks of Sun Microsystems  Inc  in the U S  and other  countries  All SPARC trademarks are used under license and are trademarks or registered trademarks of SPARC International  Inc  in the U S   and other countries  Products bearing SPARC trademarks are based upon an
172. ssl_module  usr apache libexec mod_ssl so version number    In the AddModule section  add the following        AddModule mod_ssl c       Note     The correct version number will be displayed for your configuration     116 Sun Crypto Accelerator 4000 Board Installation and User   s Guide   May 2003          3  If you chose not to set up a VirtualHost  you must place the SSLEngine   SSLCertificateFile  and SSLCertificateKeyFile directives in the  httpd conf file  just above the SSLPassPhraseDialog directive     You may need a virtual host directive similar to  what is shown below      lt VirtualHost _default_ 443 gt   SSLEngine on  SSLCertificateFile  etc apache keys base_name cert pem                    lt  VirtualHost gt     You must add the following line after all of your VirtualHost  definitions     SSLPassPhraseDialog exec  opt SUNWconn cryptov2 bin apgetpass       Other SSL related directives and their explanations  can be found in the Sun Crypto Accelerator documentation        Other Apache related directives may need to be configured  in order to start your Apache Web Server  Please refer  to your Apache documentation                  lt Press ENTER to continue gt           SSLCertificateKeyFile  etc apache keys base_name key pem          If you answered no to the question in Step 7 of    To Enable the Apache Web Server     on page 112  you will also be given additional information on how to generate key    material later        Since you did not create keys  you will 
173. ssword for key file  program should print the collected  password to standard output     If multiple key files are present  and have common passwords  then program will  only be executed once  each collected password is tried before running program  again      program is executed with two arguments  the first is the name of the server  in the  form servername port  for example  www  fictional company com  443   Port  443 is the typical port for SSL based web servers   The second argument is the  type of key in the key file  keytype   keytype can be either RSA or DSA     Note     Because this program can be executed during system startup  be sure to  design it to cope with the situation where the console is not a tty device  that is  a  tty 3c  returns false      The supplied program  opt  SUNWconn cryptov2 bin apgetpass can be  used for the program executable  This program automatically prompts for the  password  suppressing the display of the password as it is entered     The supplied sslpassword program also automatically searches for passwords  in files  which can be used to avoid user interaction when the web server starts  up  Passwords for key files are searched for in files named    143     etc apache servername port keytype   pass  If this file is not present  then the file   etc apache default pass is used  These password files contain only the  unencrypted password on a line by itself     Note     Password files should be protected by permissions so that only the UN
174. t  is displayed  continue to Step 6       Select the Intervention Mode button  Select one of the instances of    vcaN  netlbtest   then right click and drag to display the Test Parameter  Options dialog box     These options  which only pertain to net 1btest  are described in the SunVTS test  reference manual       After you have made all selections  select Apply from the Within Instance drop     down menu to change the selected instance of vcaN  net lbtest   or select Apply  from the Across All Instances drop down menu to change all checked instances of  vcaN  netlbtest      This action removes the dialog box and returns you to the SunVTS Diagnostic main  window       Select one of the instances of vcaN  netlbtest  then right click and drag to    display the Test Execution Options dialog box     An alternate method of displaying the Test Execution Options dialog box is to select  the Options drop down main menu  then select Test Executions  These options are  generic SunVTS controls that affect all tests  Refer to the SunVTS user   s guide for  detailed information       When you have made all selections  select Apply to remove the dialog box the    return to the SunVTS Diagnostic main window   Select Start to perform the selected tests     Select Stop to stop all tests     To Perform nettest      As superuser  start SunVTS           opt SUNWvts bin sunvts    Chapter 7 Diagnostics and Troubleshooting 125    Refer to the SunVTS user   s guide for detailed startup instructions
175. t the OpenBoot    PROM interface and how to configure the network  hosts file     Chapter 4 describes how to configure the Sun Crypto Accelerator 4000 board and  manage keystores with the vcaadm and vcadiag utilities     Chapter 5 explains how to configure the Sun Crypto Accelerator 4000 board for  use with Sun ONE Web Servers     Chapter 6 explains how to configure the Sun Crypto Accelerator 4000 board for  use with Apache Web Servers     xxiii    m Chapter 7 describes how to test the Sun Crypto Accelerator 4000 board with the  SunVTS diagnostic application and the onboard FCode self test  This chapter also  provides troubleshooting techniques with OpenBoot PROM commands     m Appendix A lists the specifications for the Sun Crypto Accelerator 4000 board     m Appendix B lists directives for using Sun Crypto Accelerator 4000 software to  configure SSL support for Apache Web Servers     m Appendix C describes the software supplied with the Sun Crypto Accelerator  4000 board and how to build OpenSSL compatible applications to take advantage  of the cryptographic acceleration features of the board     m Appendix D provides software notices and licenses from other software  organizations that govern the use of third party software used with the Sun  Crypto Accelerator 4000 board     m Appendix E provides a description of the Sun Crypto Accelerator 4000 commands  and lists the online manual pages for each command     a Appendix F describes how to zeroize the Sun Crypto Accelerator
176. th name for the server is    usr netscape server4    Accept the default path during the Sun ONE Web Server installation  This document  refers to the default paths  If you decide to install the web server software in a  different location  be sure to note where you installed it        3  Run the setup program     4  Answer the prompts in the installation script     Except for the following prompts  you can accept the default for ease of use    a  Agree to accept the license terms by typing yes    b  Enter a fully qualified hostname domain    c  Enter the Sun ONE Web Server 4 1 Administration Server password twice     d  Press Return when prompted     92 Sun Crypto Accelerator 4000 Board Installation and User   s Guide   May 2003    To Create a Trust Database      Start the Sun ONE Web Server 4 1 Administration Server     Instead of running startconsole as setup requests  start a Sun ONE Web Server  4 1 Administration Server  use the following command           usr netscape server4 https   admserv start  SunONE WebServer Enterprise 4 1SP9 BB1 08 23 2001 05 50  startup  listening to http   hostname domain  port 8888 as root                      The response provides the URL for connecting to your servers       Start the Administration graphical user interface  GUI  by opening up a web  browser and typing        http    hostname domain admin_port             In the authentication dialog box enter the Sun ONE Web Server 4 1 Administration  Server user name and password you select
177. the server   Note that this  is not normally needed for e commerce applications  but has use in other  applications      Values for level are listed and described in TABLE B 5     TABLE B 5 SSL Verify Client Levels       Level Description   none No client certificate is required   optional Client may present a valid certificate   require Client must present a valid certificate  optional_no_ca Client may present a certificate  but it need not be valid       Typically either none or require is used  The default is none     11  SSLVerifyDepth depth  Context  Global  virtual host  directory   htaccess    This directive specifies the maximum certificate chain depth that the server will  allow for client certificates  A value of 0 means that only self signed certificates  are eligible  whereas a value of 1 means that client certificates must be signed by  a CA known directly to the server  through the SSLCACertificateFile    Larger values permit delegation of the CA     12  SSLLog filename  Context  Global  virtual host    148 Sun Crypto Accelerator 4000 Board Installation and User   s Guide   May 2003    This directive specifies a log file where SSL specific information will be logged  If  not specified  default   then no SSL specific information will be logged     13  SSLLogLevel level    Context  Global  virtual host    This directive specifies the verbosity of the information logged in the SSL log file   Values for level are listed and described in TABLE B 6        TABLE B 6 SS
178. to Accelerator 4000 Board Installation and User   s Guide     May 2003    CHAPTER 5       Configuring Sun ONE Server  Software for Use With the Sun  Crypto Accelerator 4000 Board    This chapter explains how to configure the Sun Crypto Accelerator 4000 board for  use with Sun ONE Web Servers  This chapter includes the following sections        Administering Security for Sun ONE Web Servers    on page 85     Configuring Sun ONE Web Servers    on page 89      Installing and Configuring Sun ONE Web Server 4 1    on page 92     Installing and Configuring Sun ONE Web Server 6 0    on page 101       Note     The Sun ONE Web Servers described in this manual were previously named  iPlanet    Web Servers           Administering Security for Sun ONE  Web Servers    This section provides an overview of the security features of the Sun Crypto  Accelerator 4000 board as it is administered with Sun ONE Web Servers        Note     To manage keystores  you must have access to the system administrator  account for your system        85    Concepts and Terminology    Keystores and users must be created for applications that communicate with the Sun  Crypto Accelerator 4000 board through a PKCS 11 interface  such as the Sun ONE  Web Server     Users  within the context of the Sun Crypto Accelerator 4000  are owners of  cryptographic keying material  Each key is owned by a single user  Each user may  own multiple keys  A user may want to own multiple keys to support different  configurations  su
179. to any trademark  service mark  logo or  trade name of Sun or its licensors is granted under this Agreement     3  LIMITED WARRANTY  Sun warrants to you that for a period of ninety  90  days  from the date of purchase  as evidenced by a copy of the receipt  the media on which  Software is furnished  if any  will be free of defects in materials and workmanship  under normal use  Except for the foregoing  Software is provided  AS IS   Your  exclusive remedy and Sun   s entire liability under this limited warranty will be at  Sun   s option to replace Software media or refund the fee paid for Software     4  DISCLAIMER OF WARRANTY  UNLESS SPECIFIED IN THIS AGREEMENT  ALL  EXPRESS OR IMPLIED CONDITIONS  REPRESENTATIONS AND WARRANTIES   INCLUDING ANY IMPLIED WARRANTY OF MERCHANTABILITY  FITNESS FOR  A PARTICULAR PURPOSE OR NON INFRINGEMENT ARE DISCLAIMED   EXCEPT TO THE EXTENT THAT THESE DISCLAIMERS ARE HELD TO BE  LEGALLY INVALID     5  LIMITATION OF LIABILITY  TO THE EXTENT NOT PROHIBITED BY LAW  IN  NO EVENT WILL SUN OR ITS LICENSORS BE LIABLE FOR ANY LOST  REVENUE  PROFIT OR DATA  OR FOR SPECIAL  INDIRECT  CONSEQUENTIAL   INCIDENTAL OR PUNITIVE DAMAGES  HOWEVER CAUSED REGARDLESS OF  THE THEORY OF LIABILITY  ARISING OUT OF OR RELATED TO THE USE OF  OR INABILITY TO USE SOFTWARE  EVEN IF SUN HAS BEEN ADVISED OF THE  POSSIBILITY OF SUCH DAMAGES  In no event will Sun   s liability to you  whether  in contract  tort  including negligence   or otherwise  exceed the amount paid by you
180. ty Officer Password     Confirm Password        3  Create a keystore name  Refer to    Naming Requirements    on page 69      Keystore Name  keystore_name    4  Select FIPS 140 2 mode or non FIPS mode     When in FIPS mode the Sun Crypto Accelerator 4000 board is FIPS 140 2  level 3  compliant  FIPS 140 2 is a federal information processing standard that requires  tamper resistance and a high level of data integrity and security  Refer to the FIPS  140 2 document located at   http   csrc nist gov publications fips fips140 2 fips1402 pdf       Run in FIPS 140 2 mode   Y Yes N No   No   y    66 Sun Crypto Accelerator 4000 Board Installation and User   s Guide   May 2003    Note     Before an essential parameter is changed or deleted  or before a command is  executed that may have drastic consequences  vcaadm prompts you to enter Y  Yes   N  or No to confirm  These values are not case sensitive  the default is No     5  Verify the configuration information        Board initialization parameters        Initial Security Officer Name  sec_officer  Keystore name  keystore_nam  Run in FIPS 140 2 Mode  Yes          Is this correct   Y Yes N No   No   y  Initializing crypto accelerator board             Initializing the Sun Crypto Accelerator 4000 Board  to Use an Existing Keystore    If you are adding multiple boards to a single keystore  you might want to initialize  all of the boards to use the same keystore information  In addition  you might want  to restore a Sun Crypto Accelerat
181. ty officer has initialized the Green  board with vcaadm  See    Initializing the  Sun Crypto Accelerator 4000 Board With  vcaadm    on page 65   Flashing if the ZEROIZE jumper is present     FIPS Mode On when operating in FIPS 140 2 level 3 Green  certified mode  Off when in non FIPS  mode    Link Link up  Green       Sun Crypto Accelerator 4000 UTP Adapter    The Sun Crypto Accelerator 4000 UTP adapter is a single port Gigabit Ethernet  copper based PCI bus card  It can be configured to operate in 10  100  or 1000 Mbps  Ethernet networks        FIGURE 1 2 Sun Crypto Accelerator 4000 UTP Adapter    Chapter 1 Product Overview 7    LED Displays    See TABLE 1 5     TABLE 1 5 Front Panel Display LEDs for the UTP Adapter       Label Meaning if Lit Color  Fault On when the board is HALTED  fatal error  Red  state or low level hardware initialization  failed     Flashing if an error occurred during the  boot process     Diag On in POST  DIAGNOSTICS  and Green  FAILSAFE  firmware not upgraded  state   Flashing when running DIAGNOSTICS     Operate On in POST  DIAGNOSTICS  and Green  DISABLED  driver not attached  state   Flashing in IDLE  OPERATIONAL  and  FAILSAFE states     Init On if the security officer has initialized the   Green  board with vcaadm  See    Initializing the  Sun Crypto Accelerator 4000 Board With  vcaadm    on page 65   Flashing if the ZEROIZE jumper is present     FIPS Mode On when operating in FIPS 140 2 level 3 Green  certified mode  Off when in non FIPS  mode
182. u selected while running setup        Note     If you used the default settings during Sun ONE Web Server setup  enter  admin for the user ID or the Sun ONE Web Server 6 0 Administration Server user  name        3  Select OK   The Sun ONE Web Server 6 0 Administration Server window is displayed     104 Sun Crypto Accelerator 4000 Board Installation and User   s Guide   May 2003    4  To request the server certificate  select the Security tab near the top of Sun ONE  Web Server 6 0 Administration Server window     The Create Trust Database window is displayed     5  Select the Request a Certificate link on the left pane of the Sun ONE Web Server  6 0 Administration Server window            SSS   File Edit View Go Communicator      lt  lt     3  amp  2    s  Back Forward Reload Home Search Netscape Print Security Stop         Bookmarks  amp  GoTo                      iPlanet    Web Server 6 0 ni Server Manager  j Preferences  Logs j Monitor   Virtual Server Class  tava   Legacy Servlets is  Create Database     Request a Certificate haa  Request a Server Certificate  Install Certificate  Change Password    New certificate   Manage Certificates J Certificate renewal   Request VeriSign   Certificate  Install VeriSi  Install CRLICKL 3 Submit to Certificate Authority via   Manage CRL CKL   s    CA Email Address       Mirate Certificate   B CA URL                                                                                  Select the module to use with this certificate     Crypto
183. umeric  underscore  _   dash      and dot       First character Must be alphabetic    Password Requirements    Password requirements vary based on the current set passreq setting  low   med  or high      Chapter 4 Administering the Sun Crypto Accelerator 4000 Board With the vcaadm and vcadiag Utilities 69    Setting the Password Requirements    Use the set passreq command to set the password requirements for the Sun  Crypto Accelerator 4000 board  This command sets the password character  requirements for any password prompted by vcaadm  There are three settings for  password requirements     TABLE 4 5 Password Requirement Settings    Password Setting Requirements       low Does not require any password restrictions  This is the default while  the board is in non FIPS mode     med Requires six characters minimum  one character must be  nonalphabetic  This is the default setting while the board is in FIPS  140 2 mode and is the minimum password requirements allowed in  FIPS 140 2 mode     high Requires eight characters minimum  three characters must be  alphabetic  and one character must be nonalphabetic  This is not a  default setting and must be configured manually     To change the password requirements  enter the set passregq command followed  by low  med  or high  The following commands set the password requirements for a  Sun Crypto Accelerator 4000 board to high        vceaadm vcaN   hostname  sec_officer  gt  set passreq high    vceaadm vcaN   hostname  sec_officer  gt
184. un ONE Web Server  m Apache Web Server    Supported Cryptographic Protocols    The board supports the following protocols   a IPsec for IPv4 and IPv6  including IKE  a SSLv2  SSLv3  TLSv1    The board accelerates the following IPsec functions   m ESP  DES  3DES  Encryption  The board accelerates the following SSL functions     m Secure establishment of a set of cryptographic parameters and secret keys  between a client and a server  m Secure key storage on the board   keys are encrypted if they leave the board    2 Sun Crypto Accelerator 4000 Board Installation and User   s Guide     May 2003    Diagnostic Support    m User executable self test using OpenBoot    PROM  a SunVTS    diagnostic tests    Cryptographic Algorithm Acceleration    The Sun Crypto Accelerator 4000 board accelerates cryptographic algorithms in both  hardware and software  The reason for this complexity is that the cost of accelerating  cryptographic algorithms is not uniform across all algorithms  Some cryptographic  algorithms were designed specifically to be implemented in hardware  others were  designed to be implemented in software  For hardware acceleration  there is the  additional cost of moving data from the user application to the hardware  acceleration device  and moving the results back to the user application  Note that a  few cryptographic algorithms can be performed by highly tuned software as quickly  as they can be performed in dedicated hardware     Supported Cryptographic Algorithms    
185. ur l utilisation dans le Toolkit OpenSSL    http     www openssl org     Ce produit comprend le logiciel cryptographique   crite par Eric Young  eay cryptsoft com   Ce produit  comprend le logiciel d  velopp   par Ralf S  Engelschall  lt rse engelschall com gt  pour l utilisation dans le projet mod_ssl    http    www modssl org       L interface d utilisation graphique OPEN LOOK et Sun    a   t   d  velopp  e par Sun Microsystems  Inc  pour ses utilisateurs et licenci  s  Sun  reconna  t les efforts de pionniers de Xerox pour la recherche et le d  veloppement du concept des interfaces d utilisation visuelle ou graphique  pour l industrie de l informatique  Sun d  tient une licence non exclusive de Xerox sur l interface d utilisation graphique Xerox  cette licence  couvrant   galement les licenci  s de Sun qui mettent en place l interface d utilisation graphique OPEN LOOK et qui en outre se conforment aux  licences   crites de Sun     LA DOCUMENTATION EST FOURNIE    EN L ETAT    ET TOUTES AUTRES CONDITIONS  DECLARATIONS ET GARANTIES EXPRESSES  OU TACITES SONT FORMELLEMENT EXCLUES  DANS LA MESURE AUTORISEE PAR LA LOI APPLICABLE  Y COMPRIS NOTAMMENT  TOUTE GARANTIE IMPLICITE RELATIVE A LA QUALITE MARCHANDE  A L   APTITUDE A UNE UTILISATION PARTICULIERE OU A  L ABSENCE DE CONTREFA  ON     Ory Please ga    amp  Recycle    T   Adobe PostScript    Declaration of Conformity  Fiber MMF     Compliance Model Number  Venus FI  Product Family Name  Sun Crypto Accelerator 4000   Fiber  X40
186. ur system for specific installation instructions     v To Install the Hardware    1  As superuser  follow the instructions that came with your system to shut down  and power off the computer  disconnect the power cord  and remove the computer  cover     2  Locate an unused PCI slot  preferably a 64 bit  66 MHz slot      3  Attach an antistatic wrist strap to your wrist  and attach the other end to a  grounded metal surface     4  Using a Phillips head screwdriver  remove the screw from the PCI slot cover   Save the screw to hold the bracket in Step 5     5  Holding the Sun Crypto Accelerator 4000 board by its edges only  take it out of the  plastic bag and insert it into the PCI slot  and then secure the screw on the rear  bracket     6  Replace the computer cover  reconnect the power cord  and power on the system     7  Verify that the board is properly installed by issuing the show devs command at  the OpenBoot    PROM  OBP  ok prompt     ok show devs     chosen    packages    upa 8  480000 SUNW  f  b 0 0   pci 8  600000 network l    pci 8  600000 SUNW  qlc 4   pci 8  600000 SUNW  qlc 4 fpe 0  0             In the preceding example  the  pci 8 600000 network 1 identifies the device  path to the Sun Crypto Accelerator 4000 board  There will be one such line for each  board in the system     14 Sun Crypto Accelerator 4000 Board Installation and User s Guide     May 2003    To determine whether the Sun Crypto Accelerator 4000 device properties are listed  correctly  from the o
187. ure and display of statistics will be disabled  This property may be used to help  prevent traffic analysis        Using the OpenBoot PROM FCode Self   Test    The following tests are available to help identify problems with the adapter if the  system does not boot     You can invoke the FCode self test diagnostics by using the OpenBoot PROM  OBP   test or test all commands  If you encounter an error while performing  diagnostics  appropriate messages will be displayed  Refer to the OpenBoot Command  Reference Manual for more information on the test and test all commands     The FCode self test exercises most functionality subsection by subsection and  ensures the following     m Connectivity during adapter board installation  m Verification that all components required for a system boot are functional    v Performing the Ethernet FCode Self Test  Diagnostic  To perform the Ethernet diagnostics  you must first bring the system to a stop at the    OBP prompt after issuing a reset  If you do not reset the system  the diagnostic tests  might cause the system to hang     For more information about the OpenBoot commands in this section  refer to the  OpenBoot Command Reference Manual     1  Shut down the system     Use the standard shutdown procedures described in the Solaris Handbook for Sun  Peripherals     2  At the OBP prompt  set the auto boot  configuration variable to false     ok setenv auto boot  false    Chapter 7 Diagnostics and Troubleshooting 129    3  Reset the syste
188. user web_admin  Enter new user password    Confirm password    User web_admin created successfully     vceaadm vcaN   hostname  sec_officer  gt  create user  New user name  Tom   Enter new user password    Confirm password    User Tom created successfully                 Users must use this password when authenticating during a web server startup        Caution     User   s must remember their password  Without the password  the users  cannot access their keys  There is no way to retrieve a lost password     Chapter 4 Administering the Sun Crypto Accelerator 4000 Board With the vcaadm and vcadiag Utilities 71    Note     The user account is logged out if no commands are entered for more than  five minutes  This is a tunable option  see    Setting the Auto Logout Time    on  page 76 for details     Listing Users and Security Officers    To list users or security officers associated with a keystore  enter the show user or  show so commands        vceaadm vcaN   hostname  sec_officer  gt  show user       User Status  web_admin Enabled  Tom Enabled          vceaadm vcaN   hostname  sec_officer  gt  show so  Security Officer       sec_officer  Alice  Bob             Changing Passwords    Only security officer passwords may be changed with vcaadm  and the only  password that security officers can change are their own  Use the set password  command to change security officer passwords        vceaadm vcaN   hostname  sec_officer  gt  set password  Enter new security officer password 
189. which are explained in detail in the next two sections     Install the Sun ONE Web Server  Create a trust database    Request a certificate    Install the certificate    Configure the Sun ONE Web Server     Caution     These procedures must be followed in the order given  Failure to do so  may result in an incorrect configuration     a If you are using Sun ONE Web Server 4 1  go to    Installing and Configuring Sun  ONE Web Server 4 1    on page 92    a If you are using Sun ONE Web Server 6 0  go to    Installing and Configuring Sun  ONE Web Server 6 0    on page 101     Chapter 5 Configuring Sun ONE Server Software for Use With the Sun Crypto Accelerator 4000 Board 91    Installing and Configuring Sun ONE  Web Server 4 1    This section explains how to install and configure Sun ONE Web Server 4 1  This  chapter includes the following sections     a    Installing Sun ONE Web Server 4 1    on page 92  m    Configuring Sun ONE Web Server 4 1 for SSL    on page 99    Installing Sun ONE Web Server 4 1    You must perform these procedures in order  Refer to the Sun ONE Web Server  documentation for more information about using Sun ONE Web Servers     v To Install Sun ONE Web Server 4 1    1  Download the Sun ONE Web Server 4 1 software     You can find the web server software at the following URL   http   www sun com     2  Install the web server     This section includes instructions for one example  you may decide to configure  your Sun ONE Web Server differently  The default pa
190. y in one direction   0 Off  default   1 On    This parameter has two meanings depending on the value of  adv asmpause cap   Default 0     Parameter Value   Parameter Value   Description  adv asmpause cap  adv pause cap   1 1or0 adv pause cap determines which    direction pauses operate on     1 1 Pauses are received but are not  transmitted     Chapter 3 Configuring Driver Parameters 27    TABLE 3 3 Read Write Flow Control Keyword Descriptions       Keyword Description  1 0 Pauses are transmitted but are not  received   0 1 Pauses are sent and received   0 lor0O adv pause cap determines  whether the pause capability is on  or off     pause on threshold Defines the number of 64 byte blocks in the receive  RX  FIFO which causes the    board to generate an XON PAUSE frame     pause off threshold Defines the number of 64 byte blocks in the RX FIFO which causes the board to    generate an XOFF PAUSE frame     Gigabit Forced Mode Parameter    For Gigabit links  this parameter determines the 1ink master  Generally  switches  are enabled as a link master  in which case  this parameter can remain unchanged  If  this is not the case  then the 1ink master parameter can be used to enable the vca  device as a link master     TABLE 3 4 Gigabit Forced Mode Parameter    Parameter Description       link master When set to 1 this parameter enables master operation  assuming  the link partner is a slave   When set to 0 this parameter enables slave operation  assuming the  link partner is a mast
191. ze the board               gt    gt     Removing the Software    If you have created keystores  refer to    Managing Keystores With vcaadm    on  page 69   you must delete the keystore information that the Sun Crypto Accelerator  4000 board is configured with before removing the software  The zeroize  command removes all key material  but does not delete the keystore files which are  stored in the filesystem of the physical host in which the Sun Crypto Accelerator  4000 board is installed  Refer to the    Zeroizing a Sun Crypto Accelerator 4000  Board    on page 80 for details on the zeroize command  To delete the keystore files  stored in the system  become superuser and remove the keystore files  If you have  not yet created any keystores  you can skip this procedure     Caution     You must not delete a keystore that is currently in use or that is shared  by other users and keystores  To free references to keystores  you might have to shut  down the web server and or administration server     Caution     Before removing the Sun Crypto Accelerator 4000 software you must  disable any web servers you have enabled for use with the Sun Crypto Accelerator  4000 board  Failure to do so will leave those web servers nonfunctional        To Remove the Software    As superuser  use the pkgrm command to remove only the software packages you  installed     Caution     Installed packages must be removed in the order shown  Failure to  remove them in this order could result in dependency
    
Download Pdf Manuals
 
 
    
Related Search
    
Related Contents
Giotto 1200 wash manual  HD2x_Manual - Airwolf 3D  CAPSPrAy 125 - Westco Sanitary Fittings  Bedienungsanleitung Operating instructions Notice d'emploi Typ      Origin Storage KB-DNDG7  Hitachi VTUX-6450A VCR User Manual    Copyright © All rights reserved. 
   Failed to retrieve file