This document is protected by copyright and is distributed under licenses restricting its use, copying, distribution, and
decompilation. No part of this document may be reproduced in any form by any means without prior written authorization of
Broadcom Corporation. Documentation is provided as is without warranty of any kind, either express or implied, including
any kind of implied or express warranty of non-infringement or the implied warranties of merchantability or fitness for a
particular purpose.
Broadcom Corporation reserves the right to make changes without further notice to any products or data herein to improve
reliability, function, or design. Information furnished by Broadcom Corporation is believed to be accurate and reliable.
However, Broadcom Corporation does not assume any liability arising out of the application or use of this information, nor
the application or use of any product or circuit described herein, neither does it convey any license under its patent rights or
the rights of others.
Broadcom, the pulse logo, Connecting everything, the Connecting everything logo, NetXtreme, Ethernet@Wirespeed,
LiveLink, and Smart Load Balancing are among the trademarks of Broadcom Corporation and/or its affiliates in the United
States, certain other countries, and/or the EU. Microsoft and Windows are trademarks of Microsoft Corporation. Linux is a
trademark of Linus Torvalds. Intel is a trademark of Intel Corporation. Magic Packet is a trademark of Advanced Micro
Devices, Inc. Red Hat is a trademark of Red Hat, Inc. PCI Express is a trademark of PCI-SIG. Any other trademarks or trade
names mentioned are the property of their respective owners.
Last revised: March 2015
INGSRV170-CDUM100-R
Document INGSRV170-CDUM100-RPage 2
NetXtreme User Guide
Table of Contents
Section 1: Installing the Hardware .................................................................................. 11
Installing the Adapter ................................................................................................................................. 12
Connecting the Network Cables................................................................................................................ 13
Network Link and Activity Indication........................................................................................................ 16
Section 3: Windows Driver and Management Application Installation ........................ 17
Installing the Driver Software .................................................................................................................... 18
Using the Installer..................................................................................................................................18
Using Silent Installation .........................................................................................................................18
Modifying the Driver Software................................................................................................................... 19
Repairing or Reinstalling the Driver Software ......................................................................................... 20
Removing the Device Drivers .................................................................................................................... 20
Viewing or Changing the Properties of the Adapter ...............................................................................21
Setting Power Management Options ........................................................................................................ 21
Configuring the Communication Protocol To Use With BACS4 ............................................................ 22
Using WS-MAN ..................................................................................................................................... 22
WS-MAN Windows Server Configuration.......................................................................................22
WS-MAN Windows Client Installation ............................................................................................29
Using WMI ............................................................................................................................................. 31
Broadcom Corporation
Page 3Document INGSRV170-CDUM100-R
NetXtreme User Guide
Step 1: Set up Namespace Security Using WMI Control............................................................... 31
Step 2: Grant DCOM Remote Launch and Activate Permission.................................................... 31
Special Configuration for WMI on Different Systems..................................................................... 32
Section 4: Linux Driver and Management Application Installation ..............................33
Menu Bar ...............................................................................................................................................52
Configuring Preferences in Windows....................................................................................................... 53
Connecting to a Host..................................................................................................................................54
Managing the Host......................................................................................................................................55
Information Tab: Host Information ......................................................................................................... 55
Managing the Network Adapter................................................................................................................. 57
Viewing Adapter Information .................................................................................................................57
Viewing Driver Information ....................................................................................................................59
Team Types .......................................................................................................................................... 69
Using the Broadcom Teaming Wizard .................................................................................................. 69
Using Expert Mode ............................................................................................................................... 82
Creating a Team ................................................................................................................................... 82
Modifying a Team ................................................................................................................................. 85
Adding a VLAN ..................................................................................................................................... 86
Viewing VLAN Properties and Statistics and Running VLAN Tests ..............................................87
Broadcom Corporation
Page 5Document INGSRV170-CDUM100-R
NetXtreme User Guide
Deleting a VLAN ........................................................................................................................... 87
Configuring LiveLink for a Smart Load Balancing and Failover and SLB (Auto-Fallback Disable)
Installing the Firmware Upgrade Utility .................................................................................................. 164
Windows ..............................................................................................................................................164
Linux ....................................................................................................................................................164
Invoking the Utility....................................................................................................................................166
version .................................................................................................................................................173
Windows ............................................................................................................................................. 182
Linux ................................................................................................................................................... 182
Section 15: Regulatory Information ..............................................................................184
FCC Class B Notice.................................................................................................................................. 184
VCCI Class B Notice ................................................................................................................................ 185
VCCI Class B Statement (Japan) ....................................................................................................... 185
CE Notice .................................................................................................................................................. 185
Canadian Regulatory Information (Canada Only) ................................................................................. 189
Industry Canada, Class B ................................................................................................................... 189
Industry Canada, classe B .................................................................................................................. 189
MIC Notice (Republic of Korea Only)...................................................................................................... 190
B CLASS Device.......................................................................................................................... 190
Broadcom Corporation
Document INGSRV170-CDUM100-RPage 10
NetXtreme User GuideInstalling the Hardware
Section 1: Installing the Hardware
•Safety Precautions
•Preinstallation Checklist
•Installing the Adapter
•Connecting the Network Cables
Note: This section applies only to add-in NIC models of Broadcom NetXtreme Gigabit Ethernet adapters.
Safety Precautions
Caution! The adapter is being installed in a system that operates with voltages that can be lethal. Before you
remove the cover of your system, you must observe the following precautions to protect yourself and to prevent
damage to the system components:
•Remove any metallic objects or jewelry from your hands and wrists.
•Make sure to use only insulated or non-conducting tools.
•Verify that the system is powered OFF and unplugged before you touch internal components.
•Install or remove adapters in a static-free environment. The use of a properly grounded wrist strap or other personal
antistatic devices and an antistatic mat is strongly recommended.
1. Verify that your server is using the latest BIOS.
2. If your system is booted to an operating system, gracefully power down the OS.
3. When system shutdown is complete, turn off the power and unplug the power cord.
4. Holding the adapter card by the edges, remove it from its shipping package and place it on an antistatic surface.
5. Check the adapter for visible signs of damage, particularly on the card edge connector. Never attempt to install any
damaged adapter.
Installing the Adapter
The following instructions apply to installing the Broadcom NetXtreme Gigabit Ethernet adapter (add-in NIC) in most servers.
Refer to the manuals that were supplied with your server for details about performing these tasks on your particular server.
1. Review the Safety Precautions and Preinstallation Checklist. Before installing the adapter, ensure the system power is
OFF and unplugged from the power outlet, and that proper electrical grounding procedures have been followed.
2. Open the system case, and select any empty PCI Express slot.
3. Remove the blank cover-plate from the slot that you selected.
4. Align the adapter connector edge with the connector slot in the system.
5. Applying even pressure at both corners of the card, push the adapter card into the slot until it is firmly seated. When the
adapter is properly seated, the adapter port connectors are aligned with the slot opening, and the adapter faceplate is
flush against the system chassis.
Caution! Do not use excessive force when seating the card as this may damage the system or the adapter. If
you have difficulty seating the adapter, remove it, realign it, and try again.
6. Secure the adapter with the adapter clip or screw.
7. Close the system case and disconnect any personal antistatic devices.
The Broadcom NetXtreme Gigabit Ethernet adapter has one or more RJ-45 connectors used for attaching the system to an
Ethernet copper-wire segment.
Note: The Broadcom NetXtreme Gigabit Ethernet adapter supports Automatic MDI Crossover (MDIX), which
eliminates the need for crossover cables when connecting machines back-to-back. A straight-through Category
5 cable allows the machines to communicate when connected directly together.
1. Select an appropriate cable. Table 1: “10/100/1000BASE-T Cable Specifications” lists the cable requirements for
connecting to 10/100/1000BASE-T ports:
Table 1: 10/100/1000BASE-T Cable Specifications
Port TypeConnectorMediaMaximum Distance
10BASE-TRJ-45Category 3, 4, or 5 UTP100 meters (328 feet)
100/1000BASE-T
1
1000BASE-T signaling requires four twisted pairs of Category 5 balanced cabling, as specified in ISO/IEC 11801:1995
and EIA/TIA-568-A (1995) and tested using procedures defined in TIA/EIA TSB95.
2
Category 5 is the minimum requirement. Category 5e and Category 6 are fully supported.
1
RJ-45
Category 5
2
UTP
100 meters (328 feet)
2. Connect one end of the cable to the adapter.
3. Connect the other end of the cable to an RJ-45 Ethernet network port.
Note: After the cable is properly connected at both ends, the port LEDs on the adapter should be functional. See
Table 1: “10/100/1000BASE-T Cable Specifications,” on page 13
indications
for a description of network link and activity
Document INGSRV170-CDUM100-RConnecting the Network CablesPage 13
NetXtreme User GuideFunctionality and Features
Section 2: Functionality and
Features
•Functional Description
•Features
•Supported Operating Environments
•Network Link and Activity Indication
Functional Description
Broadcom NetXtreme Gigabit Ethernet adapters connect a PCI Express™ compliant system to a Gigabit Ethernet network.
Broadcom NetXtreme Gigabit Ethernet adapters incorporate a technology that transfers data at a maximum rate of 1 gigabit
per second—10 times the rate of Fast Ethernet adapters.
Using the Broadcom teaming software, you can split your network into virtual LANs (VLANs) as well as group multiple
network adapters together into teams to provide network load balancing and fault tolerance functionality. See Teaming and
Broadcom Gigabit Ethernet Teaming Services for detailed information about teaming. See Virtual LANs for a description of
VLANs. See Configuring Teaming for instructions on configuring teaming and creating VLANs on Windows operating
systems.
Features
The following is a list of the Broadcom NetXtreme Gigabit Ethernet adapter features for all supported operating systems:
•Integrated quad 10/100/1000BASE-T and quad 1000BASE-X/SGMII 1.25 Gbaud SerDes transceivers
•Energy Efficient Ethernet™ compliant with IEEE Std 802.3az-2010
•Serial flash and EEPROM NVRAM support; flash auto-configure
•ECC error detection and correction on internal SRAM
•JTAG boundary scan support
Power Management
Wake on LAN (Magic Packet, Wake Up Frame, specific pattern) is supported.
Note: Adapter speed connection when the system is down waiting for a wake-up signal is either 10 Mbps or
100 Mbps, but can return to 1000 Mbps when the system is up and running if connected to a 1000 Mbps capable
switch. Systems intending to use Wake on LAN (WOL) should be connected to a switch capable of both 1000 and
10/100 Mbps speeds.
Adaptive Interrupt Frequency
The adapter driver intelligently adjusts host interrupt frequency based on traffic conditions, to increase overall application
throughput. When traffic is light, the adapter driver interrupts the host for each received packet, minimizing latency. When
traffic is heavy, the adapter issues one host interrupt for multiple, back-to-back incoming packets, preserving host CPU
cycles.
Dual DMA Channels
The PCIe interface on Broadcom NetXtreme Gigabit Ethernet adapters contains two independent DMA channels for
simultaneous read and write operations.
ASIC with Embedded RISC Processor
The core control for Broadcom NetXtreme Gigabit Ethernet adapters resides in a tightly integrated, high-performance ASIC.
The ASIC includes a RISC processor. This functionality provides the flexibility to add new features to the card and adapts it
to future network requirements through software downloads.
Document INGSRV170-CDUM100-RFeaturesPage 15
NetXtreme User GuideFunctionality and Features
Broadcom NetXtreme manageability operations such as DMTF, SMASH, DASH, and NC-SI pass-through run on a highperformance application processor engine (APE), which is a separate from the traditional network processing engine.
Broadcom Advanced Control Suite
Broadcom Advanced Control Suite (BACS), a component of the Broadcom teaming software, is an integrated utility that
provides useful information about each network adapter that is installed in your system. The BACS utility also enables you
to perform detailed tests, diagnostics, and analyses on each adapter, as well as to modify property values and view traffic
statistics for each adapter. BACS is used on Windows operating systems to configure teaming and to add VLANs. See Using
Broadcom Advanced Control Suite for detailed information and instructions.
Supported Operating Environments
The Broadcom NetXtreme Gigabit Ethernet adapter has software support for the following operating systems:
•Microsoft® Windows® (32-bit and 64-bit extended)
•Linux
•VMware
•MS-DOS
•Oracle Solaris
®
(32-bit and 64-bit extended)
Network Link and Activity Indication
For copper-wire Ethernet connections, the state of the network link and activity is indicated by the LEDs on the RJ-45
connector, as described in Table 2: “Network Link and Activity Indicated by RJ-45 Port LEDs,” on page 16. Broadcom
Advanced Control Suite also provides information about the status of the network link and activity (see Viewing Adapter
Information).
Table 2: Network Link and Activity Indicated by RJ-45 Port LEDs
NetXtreme User GuideWindows Driver and Management Application Installation
Section 3: Windows Driver and
Management Application
Installation
•Installing the Driver Software
•Modifying the Driver Software
•Repairing or Reinstalling the Driver Software
•Removing the Device Drivers
•Viewing or Changing the Properties of the Adapter
•Setting Power Management Options
•Configuring the Communication Protocol To Use With BACS4
Document INGSRV170-CDUM100-RPage 17
NetXtreme User GuideWindows Driver and Management Application Installation
Installing the Driver Software
Note: These instructions are based on the assumption that your Broadcom NetXtreme adapter was not factory
installed. If your controller was installed at the factory, the driver software has been installed for you.
When Windows first starts after a hardware device (such as a Broadcom NetXtreme Adapter) has been installed, or after
the existing device driver has been removed, the operating system automatically detects the hardware and prompts you to
install the driver software for that device.
Both a graphical interactive installation mode (see Using the Installer) and a command-line silent mode for unattended
installation (see Using Silent Installation) are available.
Notes:
•Before installing the driver software, verify that the Windows operating system has been upgraded to the
latest version with the latest service pack applied.
•A network device driver must be installed before the Broadcom NetXtreme Gigabit Ethernet adapter can be
used with your Windows operating system. Drivers are located on the installation CD.
•BACS is not supported on the Server Core installation option for Microsoft Windows Server 2008 R2.
Using the Installer
To install the Broadcom NetXtreme drivers
1. When Found New Hardware Wizard opens, click Cancel.
2. Insert the installation CD into the CD-ROM or DVD drive.
3. On the installation CD, open the folder for your operating system, open the DrvInst folder, and then double-click
Setup.exe file to open the InstallShield Wizard.
4. Click Next to continue.
5. After you review the license agreement, click I accept the terms in the license agreement, and then click Next to
continue.
6. Select how you want to install the NetXtreme drivers and then click Next. Click Install.
7. Click Finish to close the wizard.
Using Silent Installation
Refer to the readme.txt file in the installation folder for command line instructions.
Notes:
•All commands are case sensitive.
•For detailed instructions and information about unattended installs, refer to the Silent.txt file in the
Driver_Management_Apps_Installer folder.
Document INGSRV170-CDUM100-RInstalling the Driver SoftwarePage 18
NetXtreme User GuideWindows Driver and Management Application Installation
Note: The REINSTALL switch should only be used if the same installer is already installed on the system. If
upgrading an earlier version of the installer, use setup /s /v/qn as listed above.
Modifying the Driver Software
To modify the driver software
1. In Control Panel, double-click Add or Remove Programs.
2. Click Broadcom Drivers and Management Applications, and then click Change.
3. Click Next to continue.
4. Click Modify, Add, or Remove to change program features. This option does not install drivers for new adapters. For
information on installing drivers for new adapters, see Repairing or Reinstalling the Driver Software.
5. Click Next to continue.
6. Click on an icon to change how a feature is installed.
7. Click Next.
8. Click Install.
9. Click Finish to close the wizard.
10. The installer will determine if a system restart is necessary. Follow the on-screen instructions.
Document INGSRV170-CDUM100-RModifying the Driver SoftwarePage 19
NetXtreme User GuideWindows Driver and Management Application Installation
Repairing or Reinstalling the Driver Software
To repair or reinstall the driver software
1. In Control Panel, double-click Add or Remove Programs.
2. Click Broadcom Drivers and Management Applications, and then click Change.
3. Click Next to continue.
4. Click Repair or Reinstall to repair errors or install drivers for new adapters.
5. Click Next to continue.
6. Click Install.
7. Click Finish to close the wizard.
8. The installer will determine if a system restart is necessary. Follow the on-screen instructions.
Removing the Device Drivers
When removing the device drivers, any management application that is installed is also removed.
Note: Windows Server 2008 and Windows Server 2008 R2 provide the Device Driver Rollback feature to replace
a device driver with one that was previously installed. However, the complex software architecture of the
NetXtreme device may present problems if the rollback feature is used on one of the individual components.
Therefore, we recommend that changes to driver versions be made only through the use of a driver installer.
To remove the device drivers
1. In Control Panel, double-click Add or Remove Programs.
2. Click Broadcom Drivers and Management Applications, and then click Remove. Follow the on-screen prompts.
3. Reboot your system to completely remove the drivers. If you fail to reboot your system, you will not be able to successfully
install the drivers.
Document INGSRV170-CDUM100-RRepairing or Reinstalling the Driver SoftwarePage 20
NetXtreme User GuideWindows Driver and Management Application Installation
Viewing or Changing the Properties of the Adapter
To view or change the properties of the Broadcom network adapter
1. In Control Panel, click Broadcom Control Suite 4.
2. Click the Advanced section of the Configurations tab.
Setting Power Management Options
You can set power management options to allow the operating system to turn off the controller to save power or to allow the
controller to wake up the computer. If the device is busy doing something (servicing a call, for example) however, the
operating system will not shut down the device. The operating system attempts to shut down every possible device only
when the computer attempts to go into hibernation. To have the controller stay on at all times, do not click the Allow the
computer to turn off the device to save power check box.
Note: Power management options are not available on blade servers.
Notes:
•The Power Management tab is available only for servers that support power management.
•To enable Wake on LAN (WOL) when the computer is on standby, click Allow the device to bring thecomputer out of standby box.
•If you select Only allow management stations to bring the computer out of standby, the computer can
be brought out of standby only by Magic Packet.
Caution! Do not select Allow the computer to turn off the device to save power for any adapter that is a
member of a team.
Document INGSRV170-CDUM100-RViewing or Changing the Properties of the AdapterPage 21
NetXtreme User GuideWindows Driver and Management Application Installation
Configuring the Communication Protocol To Use With
BACS4
There are two main components of the BACS4 management application: the provider component and the client software. A
provider is installed on a server, or “managed host”, that contains one or more NICs. The provider collects information on
the NICs and makes it available for retrieval from a management PC on which the client software is installed. The client
software enables viewing information from the providers and configuring the NICs.The BACS client software includes a
graphical user interface (GUI) and a command line interface (CLI).
A communication protocol enables communication between the provider and the client software. Depending on the mix of
operating systems (Linux, Windows, or both) on the clients and managed hosts in your network, you can choose an
appropriate communication protocol to use. See Linux Management Application Installation for a description of the available
communication protocols for each network configuration.
The instructions in this chapter address only the scenario where Windows managed hosts are communicating with
Windows clients. In these scenarios, you can use either the WMI or the WS-MAN (WinRM) communication protocols. When
you use the driver installer described in this chapter to install both the driver and the management applications, the provider
for both WMI and WS-MAN is installed on the managed host. Additionally, the BACS4 utility is installed on the client. The
following sections provide additional configuration steps for the communication protocol you select.
For Linux installations, the driver is installed separately from the management applications. See Linux Driver Software and
Management Application Installation for related instructions.
Using WS-MAN
To use the WS-MAN communication protocol, follow the instructions in the following sections:
•WS-MAN Windows Server Configuration
•WS-MAN Windows Client Installation
WS-MAN Windows Server Configuration
Step 1: Install the WinRM Software Component on Server
On the following operating systems, WinRM 2.0 is preinstalled:
•Windows 7
•Windows 8
•Windows 8.1
•Windows Server 2008 R2
•Windows Server 2012
•Windows 2012 R2
Document INGSRV170-CDUM100-RConfiguring the Communication Protocol To Use With BACS4Page 22
NetXtreme User GuideWindows Driver and Management Application Installation
For Windows Server 2008, install Windows Management Framework Core, which includes WinRM 2.0 and Windows
Powershell 2.0, from the following link:
The Windows firewall must be enabled for WinRM to work properly. For detailed information about firewall configuration, see
Step 7: Additional Server Configuration. After the firewall is configured, open a command prompt and run the following
command to enable the remote management on the Windows server:
winrm quickconfig
You can use the following command to view the configuration information for the service:
winrm get winrm/config
Step 3: Perform User Configuration on the Server
To connect to WinRM, the account must be a member of the local administrators group on the local or remote computer.
The output of the get winrm/config command will be as follows:
To add another user group to the WinRM allowed connect list, you can modify the RootSDDL to include the new user group.
You will need the SSDL ID for the new group. For example, the following command adds the new user group with SDDL ID
S-1-5-21-1866529496-2433358402-1775838904-1021.
winrm set winrm/config/Service @{RootSDDL="O:NSG:BAD:P(A;GA;;;BA)(A;;GA;;;
S-1-5-21-1866529496-2433358402-1775838904-1021)S:P(AU;FA;GA;;
WD)(AU;SA;GWGX;;;WD)"}
Step 4: Perform HTTP Configuration on the Server
To use the BACS GUI, you must configure the HTTP protocol, as follows:
Note: The default HTTP port is 5985 for WinRM 2.0.
1. Click Start (or press the Windows logo key) and select Run.
2. Enter gpedit.msc to open the local Group Policy editor.
3. Under Computer Configuration, open the Administrative Templates folder and then open the Windows
Components folder.
4. Select Windows Remote Management (WinRM).
5. Under Windows Remote Management (WinRM), select WinRm Client.
6. Under WinRM Client, double-click Trusted Hosts.
7. In the TrustedHostsList, enter the host names of the clients. If all clients are trusted then enter an asterisk (*) only.
8. Select WinRM Service.
9. Enable Allow Basic Authentication.
10. Enable Allow unencrypted traffic.
Document INGSRV170-CDUM100-RConfiguring the Communication Protocol To Use With BACS4Page 23
NetXtreme User GuideWindows Driver and Management Application Installation
11. Close the Group Policy wIndow.
12. From the command prompt, run the following command to configure WinRM with default settings:
winrm qc or winrm quickconfig
13. When the tool displays “Make these changes[y/n]?“, enter “y”.
14. Enter one of the following commands to check whether an HTTP listener is created:
winrm enumerate winrm/confg/listener
or
winrm e winrm/config/Listener
15. Enter the following command from the command prompt to test locally.
winrm id
Step 5: Perform HTTPS Configuration on the Server (to use HTTPS rather than HTTP)
This step consists of two distinct processes: generating a self-signed certificate, if certificate does not exist, and importing it
to a Windows server. If one does not already exist, you must configure a self-signed certificate on the Windows server to
enable HTTPS/SSL communication with the BACS GUI on the Windows client. The Windows client also must be configured
with the self-signed certificate. See Perform HTTPS Configuration (if you plan to use HTTPS).
Note: The self-signed certificate can be created on any Windows server. The server does not require BACS to
be installed. The self-signed certificate generated on any Windows server should be copied on the local drive of
client.
1. Click Start (or press the Windows logo key) and select Run.
2. Enter gpedit.msc to open the local Group Policy editor.
3. Under Computer Configuration, open the Administrative Templates folder and then open the Windows
Components folder.
4. Select Windows Remote Management (WinRM).
5. Under Windows Remote Management (WinRM), select WinRm Client.
6. Under WinRM Client, double-click Trusted Hosts.
7. In the TrustedHostsList, enter the host names of the clients. If all clients are trusted then enter an asterisk (*) only.
8. Select WinRM Service.
9. Enable Allow Basic Authentication.
To generate a self-signed certificate for the Windows Server:
Openssl on Windows can be used to generate the self-signed certificate, as follows:
1. Enter the following command to generate a private key:
openssl genrsa -des3 -out server.key 1024
2. You are prompted to enter a passphrase. Be sure to remember the passphrase.
3. Use the following steps to generate a Certificate Signing Request (CSR).
During the generation of the CSR, you are prompted for several pieces of information. When prompted for the “Common
Name”, enter the Windows Server host name or IP address.
Enter the following command (sample responses are shown):
openssl req -new -key server.key -out server.csr
If this command does not work, try the following:
Document INGSRV170-CDUM100-RConfiguring the Communication Protocol To Use With BACS4Page 24
NetXtreme User GuideWindows Driver and Management Application Installation
The openssl.cnf file should be placed in the same directory where openssl is placed. Openssl.cnf is located in the folder
C:\Program Files (x86)\GnuWin32\share.
The following information is requested:
•Country Name (2 letter code) []:US
•State or Province Name (full name) []: California
•Locality Name (e.g., city) []: Irvine
•Organization Name (e.g., company) []: Broadcom Corporation
•Organizational Unit Name (e.g., section) []: Engineering
•Common Name (e.g., YOUR name) []: Enter the host name or IP address of the Windows server. For iPv6, enter the
Common Name in the format [xyxy:xxx:….::xxx], including the brackets [ ].
•(Optional) Email Address []:
Enter the following additional attributes to be sent with your certificate request:
Signature ok
subject=/C=US/ST=California/L=Irvine/O=Broadcom Corporation/OU=Engineering/CN=MGMTAPP-
LAB3/emailAddress=
Getting Private key
6. Enter the following command to verify the generated self-signed certificate.
openssl verify server.crt
The following output displays:
server.crt:/C=US/ST=California/L=Irvine/O=Broadcom Corporation/OU=Engineering/
CN=MGMTAPP- LAB3/emailAddress=
error 18 at 0 depth lookup:self signed certificate
OK
Ignore the error message “error 18 at 0 depth lookup:self signed certificate”. This error indicates that this is a self-signed
certificate.
7. Convert the certificate from “crt” to “pkcs12” format, as follows:
For a Windows server, the certificate should be in pkcs12 format. Enter the following command:
Enter Export Password:
Verifying - Enter Export Password:
Enter the password and be sure to remember it. The password is required when importing the certificate on the Windows
server and client.
Document INGSRV170-CDUM100-RConfiguring the Communication Protocol To Use With BACS4Page 25
NetXtreme User GuideWindows Driver and Management Application Installation
8. Make a copy of the certificate file server.crt and place it on the server where BACS will be installed, so that it can be
imported. If you plan to use a Windows client to connect to the server running BACS, then the certificate also needs to
be transferred (copied and pasted) to the client system.
Note: A separate certificate must be generated for an IPv4 address, IPv6 address, and Hostname.
To install the self-signed certificate on Windows server:
Transfer the file hostname.pfx you generated on the Windows server before you install the certificate:
1. Click Start (or press the Windows logo key) and select Run.
2. Enter MMC and click OK.
3. Click File > Add/Remove Snap-in.
4. Click Add.
5. Select Certificates and click Add.
6. Select Computer account.
7. Click Next and then click Finish.
8. Click Close, then click OK.
9. Open the Certificates (Local Computer) folder and then open the Personal folder.
10. Right-click Certificates, select All Tasks and then click Import.
11. Click Next to begin the Certificate Import Wizard.
12. Browse to select hostname.pfx.
13. When you are prompted for the password for the private key, enter the same password you created in To generate a
self-signed certificate for the Windows Server:.
14. Follow the instructions, select the defaults, and continue.
The certificate is shown as installed on the right side of the window. The name will be the name you specified while
creating a self-signed certificate.
15. Right-click on the certificate and select Properties.
A dialog box displays, as follows:
Document INGSRV170-CDUM100-RConfiguring the Communication Protocol To Use With BACS4Page 26
NetXtreme User GuideWindows Driver and Management Application Installation
16. Ensure that only Server Authentication is enabled, as shown in the figure.
17. Open Trusted Root Certification Authorities and then open Certificates.
18. Follow the instructions from Step 11. to Step 17.
Note: See Perform HTTPS Configuration (if you plan to use HTTPS) for instructions on importing the self-signed
certificate on a client.
Step 6: Configure WinRM HTTPS/SSL on the Server
1. Create WinRM Listener, as follows:
a. Click Start (or press the Windows logo key) and select Run.
b. Enter MMC and click OK.
c. Select the self-signed certificate from the Personal store.
For example, if the certificate is created with a host name, the host name will appear.
d. Double-click the certificate to open it.
e. Click the Details tab.
f. Scroll down and select the Thumbprint field.
g. Select and copy the thumbprint in the Details window so you can insert it in the next step.
h. Return to the command prompt.
i. Enter the following command:
winrm create winrm/config/Listener?Address=*+Transport=
HTTPS @{Hostname="<HostName or IPAddress>";
CertificateThumbprint="<paste from the previous step and remove the spaces>"}
Document INGSRV170-CDUM100-RConfiguring the Communication Protocol To Use With BACS4Page 27
NetXtreme User GuideWindows Driver and Management Application Installation
Notes:
•If the certificate was generated using the host name, enter the host name. If it was generated using the IP
address, enter the IP address. For an IPv6 address, use brackets [ ] around the address.
•If HTTPS is configured in your system, the listener must be deleted before creating a new HTTPS listener.
Use the following command:
Helps to check which service listener are enabled and listening on
which port and IP Address.
Deletes a Listener (in this case deleting a HTTPS listener).
WS-MAN Windows Client Installation
On the Windows client, perform following configuration steps.
1. Perform HTTP Configuration (if you plan to use HTTP)
a. Click Start (or press the Windows logo key) and select Run.
b. Enter gpedit.msc to open the local Group Policy editor.
c. Under Computer Configuration, open the Administrative Templates folder and then open the Windows
Components folder.
d. Select Windows Remote Management (WinRM).
e. Under Windows Remote Management (WinRM), select WinRm Client.
f. Under WinRM Client, double-click Trusted Hosts.
g. In the TrustedHostsList, enter the host names of the clients and click OK. If all clients are trusted then enter “*” only.
h. Select WinRM Service.
i. Enable Allow Basic Authentication and click OK.
j. Run the following command from the command prompt to test the connection:
winrm id -remote:<remote machine Hostname or IP Address>
2. Perform HTTPS Configuration (if you plan to use HTTPS)
After you generate a self-signed certificate, as described in To generate a self-signed certificate for the Windows Server:,
you can import the certificate on the client to facilitate a connection between server and client. Ensure that all steps
mentioned in section To generate a self-signed certificate for the Windows Server: are completed, including copyinghostname.pfx at the location from where client can access it, before you proceed with the following steps.
a. Click Start (or press the Windows logo key) and select Run.
b. Enter MMC and click OK.
c. Click File and select Add/Remove Snap-in.
d. Click Add.
e. Select Certificates and click Add.
f. Select Computer account and click Next.
g. Click Finish.
Document INGSRV170-CDUM100-RConfiguring the Communication Protocol To Use With BACS4Page 29
NetXtreme User GuideWindows Driver and Management Application Installation
h. Click Close and then click OK.
i. Under Certificates (Local Computer), right-click on Trusted Root Certification Authorities, select All Tasks, and
select Import.
j. Click Next to begin the Certificate Import Wizard.
k. Browse to select the .pfx file you generated in To generate a self-signed certificate for the Windows Server:. Change
the selection in the Files of type list to Personal Information Exchange (*.pfxas, *.p12), select the hostname.pfx
file and click Open.
l. Enter the password you assigned to the private key and click Next.
3. Configure WinRM HTTPS/SSL
You can run winrm from a client to retrieve information from the server using WinRM HTTPS connection. Use the
following steps to test the WinRM HTTPS/SSL connection from client:
a. To retrieve the server operating system information, enter the following command.
winrm e wmi/root/cimv2/Win32_OperatingSystem -r:https://yourservername -u:username
-p:password -skipCAcheck
b. To retrieve the server WinRM identity information, enter the following command.
winrm id -r:https://yourservername -u:username -p:password -skipCAcheck
c. To enumerate Windows services on the server, enter the following command.
winrm e wmicimv2/Win32_service -r:https://yourservername -u:username -p:password skipCAcheck
Note: It is important to use -skipCAcheck switch in the winrm command line testing, as the certificate is self-
generated and not imported on the client. Otherwise, the following error message displays: WSManFault.
Document INGSRV170-CDUM100-RConfiguring the Communication Protocol To Use With BACS4Page 30
Loading...
+ 160 hidden pages
You need points to download manuals.
1 point = 1 manual.
You can buy points or you can get point for every manual you upload.