Sun Microsystems, Inc.
4150 Network Circle
Santa Clara, CA 95054 U.S.A.
650-960-1300
Part No. 817-0431-10
May 2003, Revision A
Send comments about this document to: docfeedback@sun.com
Copyright 2003Sun Microsystems,Inc., 4150Network Circle,Santa Clara,CA 95054 U.S.A.All rights reserved.
This product or documentis distributedunder licensesrestricting itsuse, copying,distribution, and decompilation.No partof thisproduct or
Parts ofthe productmay bederived fromBerkeley BSDsystems, licensedfrom theUniversity of California.UNIX isa registeredtrademark in
the U.S.and othercountries, exclusivelylicensed throughX/Open Company, Ltd.
Sun, SunMicrosystems, theSun logo,SunVTS, AnswerBook2,docs.sun.com, SunONE, Sun Enterprise,Sun EnterpriseVolumeManager,Sun
Fire,SunSolve, Netra, andSolaris aretrademarks, registeredtrademarks, orservice marksof SunMicrosystems, Inc.in the U.S. and other
countries. AllSPARCtrademarks areused underlicense andare trademarksor registeredtrademarks ofSPARCInternational, Inc.in the U.S.
and othercountries. Productsbearing SPARC trademarksare basedupon anarchitecture developedby SunMicrosystems, Inc.Netscape isa
trademark orregisteredtrademark of NetscapeCommunications Corporation.This productincludes softwaredeveloped bythe OpenSSL
Projectfor use inthe OpenSSLToolkit(http://www.openssl.org/).This productincludes cryptographicsoftware writtenby EricYoung
(eay@cryptsoft.com).This product includessoftware developedby RalfS. Engelschall<rse@engelschall.com> for usein themod_ssl project
(http://www.modssl.org/).
The OPENLOOK andSun™ GraphicalUser Interfacewas developed bySun Microsystems,Inc. forits usersand licensees. Sun acknowledges
the pioneeringefforts ofXerox inresearchingand developing theconcept ofvisual orgraphical user interfaces for thecomputer industry. Sun
holds anon-exclusive licensefrom Xeroxto theXerox GraphicalUser Interface,which licensealso covers Sun’slicensees whoimplement OPEN
LOOK GUIsand otherwisecomply withSun’s writtenlicense agreements.
DOCUMENTATION IS PROVIDED “AS IS” AND ALL EXPRESS OR IMPLIED CONDITIONS, REPRESENTATIONS AND WARRANTIES,
INCLUDING ANYIMPLIED WARRANTY OFMERCHANTABILITY, FITNESS FORA PARTICULAR PURPOSEOR NON-INFRINGEMENT,
ARE DISCLAIMED, EXCEPT TO THE EXTENT THAT SUCH DISCLAIMERS ARE HELD TO BE LEGALLY INVALID.
Copyright 2003Sun Microsystems,Inc., 4150Network Circle,Santa Clara,CA 95054Etats-Unis. Tousdroits réservés.
Ce produitou documentest distribuéavec deslicences quien restreignentl’utilisation, lacopie, la distribution,et ladécompilation. Aucune
partie dece produitou documentne peutêtre reproduitesous aucuneforme, parquelque moyenque ce soit,sans l’autorisationpréalable et
écrite deSun etde sesbailleurs delicence, s’il yen a.Le logicieldétenu par des tiers, etqui comprendla technologierelative auxpolices de
caractères,est protégépar un copyrightet licenciépar desfournisseurs deSun.
Des partiesde ceproduit pourrontêtre dérivéesdes systèmesBerkeley BSDlicenciés parl’Université de Californie.UNIX estune marque
déposée auxEtats-Unis etdans d’autrespays etlicenciée exclusivementpar X/Open Company,Ltd.
L’interfaced’utilisation graphiqueOPEN LOOKet Sun™a été développéepar SunMicrosystems, Inc.pour sesutilisateurs et licenciés. Sun
reconnaîtles effortsde pionniers deXerox pourla rechercheet ledéveloppement duconcept desinterfaces d’utilisation visuelle ou graphique
pour l’industriede l’informatique.Sun détientune licencenon exclusive deXerox surl’interface d’utilisationgraphique Xerox,cette licence
couvrant égalementles licenciésde Sunqui mettenten place l’interfaced’utilisation graphiqueOPEN LOOKet qui en outre seconforment aux
licences écritesde Sun.
LA DOCUMENTATION EST FOURNIE “EN L’ETAT” ET TOUTES AUTRES CONDITIONS, DECLARATIONS ET GARANTIES EXPRESSES
OU TACITES SONTFORMELLEMENT EXCLUES,DANS LAMESURE AUTORISEEPARLA LOIAPPLICABLE, Y COMPRISNOTAMMENT
TOUTE GARANTIE IMPLICITE RELATIVE A LA QUALITE MARCHANDE, A L’APTITUDE A UNE UTILISATION PARTICULIERE OU A
L’ABSENCE DE CONTREFAÇON.
Please
Recycle
Declaration of Conformity (Fiber MMF)
Compliance Model Number:Venus-FI
Product Family Name:
EMC
USA - FCC Class B
This equipment complies with Part 15 of the FCC Rules. Operation is subject to the following two
conditions:
1) This equipment may not cause harmful interference.
2) This equipment must accept any interference that may cause undesired operation.
European Union
This equipment complies with the following requirements of the EMC Directive 89/336/EEC:
As Telecommunication Network Equipment (TNE) in both Telecom Centers and Other Than Telecom Centers per (as
applicable):
EN300-386 V.1.3.1 (09-2001) Required Limits:
EN55022/CISPR22Class B
EN61000-3-2Pass
EN61000-3-3Pass
EN61000-4-26 kV (Direct), 8 kV (Air)
EN61000-4-33 V/m 80-1000MHz, 10 V/m 800-960 MHz and 1400-2000 MHz
EN61000-4-41 kV AC and DC Power Lines, 0.5 kV Signal Lines,
EN61000-4-52 kV AC Line-Gnd, 1 kV AC Line-Line and Outdoor Signal Lines,
EN61000-4-63 V
EN61000-4-11Pass
Sun Crypto Accelerator 4000 - Fiber (X4012A)
0.5 kV Indoor Signal Lines > 10m.
As information Technology Equipment (ITE) Class B per (as applicable):
EN55022:1998/CISPR22:1997Class B
EN55024:1998 Required Limits:
EN61000-4-24 kV (Direct), 8 kV (Air)
EN61000-4-33 V/m
EN61000-4-41 kV AC Power Lines, 0.5 kV Signal and DC Power Lines
EN61000-4-51 kV AC Line-Line and Outdoor Signal Lines, 2 kV AC Line-Gnd,
0.5 kV DC Power Lines
EN61000-4-63 V
EN61000-4-81 A/m
EN61000-4-11Pass
This equipment complies with the following requirements of the Low Voltage Directive 73/23/EEC:
iii
EC Type Examination Certificates:
EN 60950:2000, 3rd Edition
IEC 60950:2000, 3rd Edition
Evaluated to all CB Countries
UL 60950, 3rd Edition, CSA C22.2 No. 60950-00
Supplementary Information
This product was tested and complies with all the requirements for the CE Mark.
/S//S/
Dennis P. Symanski
Manager, Compliance Engineering
Sun Microsystems, Inc.
4150 Network Circle, MPK15-102
Santa Clara, CA 95054, USA
Tel: 650-786-3255
Fax: 650-786-3723
Pamela J Dullaghan
Quality Program Manager
Sun Microsystems Scotland, Limited
Springfield, Linlithgow
West Lothian, EH49 7LR
Scotland, United Kingdom
Tel: +44 1 506 672 395
Fax: +44 1 506 672 855
Declaration of Conformity (Copper UTP)
Compliance Model Number:Venus-CU
Product Family Name:
Sun Crypto Accelerator 4000 - Copper (X4011A)
EMC
USA - FCC Class B
This equipment complies with Part 15 of the FCC Rules. Operation is subject to the following two
conditions:
1) This equipment may not cause harmful interference.
2) This equipment must accept any interference that may cause undesired operation.
European Union
This equipment complies with the following requirements of the EMC Directive 89/336/EEC:
As Telecommunication Network Equipment (TNE) in both Telecom Centers and Other Than Telecom Centers per (as
applicable):
EN300-386 V.1.3.1 (09-2001) Required Limits:
EN55022/CISPR22Class B
EN61000-3-2Pass
EN61000-3-3Pass
ivSun Crypto Accelerator 4000 Board Installation and User’s Guide • May 2003
EN61000-4-26 kV (Direct), 8 kV (Air)
EN61000-4-33 V/m 80-1000MHz, 10 V/m 800-960 MHz and 1400-2000 MHz
EN61000-4-41 kV AC and DC Power Lines, 0.5 kV Signal Lines,
EN61000-4-52 kV AC Line-Gnd, 1 kV AC Line-Line and Outdoor Signal Lines,
EN61000-4-63 V
EN61000-4-11Pass
As information Technology Equipment (ITE) Class B per (as applicable):
EN55022:1998/CISPR22:1997Class B
EN55024:1998 Required Limits:
EN61000-4-24 kV (Direct), 8 kV (Air)
EN61000-4-33 V/m
EN61000-4-41 kV AC Power Lines, 0.5 kV Signal and DC Power Lines
EN61000-4-51 kV AC Line-Line and Outdoor Signal Lines, 2 kV AC Line-Gnd,
This equipment complies with the following requirements of the Low Voltage Directive 73/23/EEC:
EC Type Examination Certificates:
EN 60950:2000, 3rd Edition
IEC 60950:2000, 3rd Edition
Evaluated to all CB Countries
UL 60950, 3rd Edition, CSA C22.2 No. 60950-00
Supplementary Information
This product was tested and complies with all the requirements for the CE Mark.
/S//S/
Dennis P. Symanski
Manager, Compliance Engineering
Sun Microsystems, Inc.
4150 Network Circle, MPK15-102
Santa Clara, CA 95054, USA
Tel: 650-786-3255
Fax: 650-786-3723
Pamela J Dullaghan
Quality Program Manager
Sun Microsystems Scotland, Limited
Springfield, Linlithgow
West Lothian, EH49 7LR
Scotland, United Kingdom
Tel: +44 1 506 672 395
Fax: +44 1 506 672 855
v
viSun Crypto Accelerator 4000 Board Installation and User’s Guide • May 2003
Regulatory Compliance Statements
Your Sun product is marked to indicate its compliance class:
• Federal Communications Commission (FCC) — USA
• Industry Canada Equipment Standard for Digital Equipment (ICES-003) — Canada
• Voluntary Control Council for Interference (VCCI) — Japan
• Bureau of Standards Metrology and Inspection (BSMI) — Taiwan
Please read the appropriate section that corresponds to the marking on your Sun product before attempting to install the
product.
FCC Class A Notice
This device complies with Part 15 of the FCC Rules. Operation is subject to the following two conditions:
1. This device may not cause harmful interference.
2. This device must accept any interference received, including interference that may cause undesired operation.
Note: This equipment has been tested and found to comply with the limits for a Class A digital device, pursuant to Part 15 of
the FCC Rules. These limits are designed to provide reasonable protection against harmful interference when the equipment
is operated in a commercial environment. This equipment generates, uses, and can radiate radio frequency energy, and if it is
not installed andused in accordance with theinstructionmanual, it may cause harmful interferenceto radio communications.
Operation of thisequipment in a residential areais likely to cause harmful interference,in which case the userwillbe required
to correct the interference at his own expense.
Shielded Cables:Connectionsbetweenthe workstation and peripheralsmustbe made using shieldedcablesto comply with
FCC radio frequency emission limits. Networking connections can be made using unshielded twisted-pair (UTP) cables.
Modifications: Any modifications made to this device that are not approved by Sun Microsystems, Inc. may void the
authority granted to the user by the FCC to operate this equipment.
FCC Class B Notice
This device complies with Part 15 of the FCC Rules. Operation is subject to the following two conditions:
1. This device may not cause harmful interference.
2. This device must accept any interference received, including interference that may cause undesired operation.
Note: This equipment has been tested and found to comply with the limits for a Class B digital device, pursuant to Part 15 of
the FCC Rules. These limits are designed to provide reasonable protection against harmful interference in a residential
installation. This equipment generates, uses and can radiate radio frequency energy and, if not installed and used in
accordance with the instructions, may cause harmful interference to radio communications. However, there is no guarantee
that interference will not occur in a particular installation. If this equipment does cause harmful interference to radio or
television reception,which can be determined byturningthe equipment off andon,the user is encouraged totry to correct the
interference by one or more of the following measures:
• Reorient or relocate the receiving antenna.
• Increase the separation between the equipment and receiver.
• Connect the equipment into an outlet on a circuit different from that to which the receiver is connected.
• Consult the dealer or an experienced radio/television technician for help.
Shielded Cables: Connections between the workstation and peripherals must be made using shielded cables in order to
maintain compliance with FCC radio frequency emission limits. Networking connections can be made using unshielded
twisted pair (UTP) cables.
Modifications: Any modifications made to this device that are not approved by Sun Microsystems, Inc. may void the
authority granted to the user by the FCC to operate this equipment.
vii
ICES-003 Class A Notice - Avis NMB-003, Classe A
This Class A digital apparatus complies with Canadian ICES-003.
Cet appareil numérique de la classe A est conforme à la norme NMB-003 du Canada.
ICES-003 Class B Notice - Avis NMB-003, Classe B
This Class B digital apparatus complies with Canadian ICES-003.
Cet appareil numérique de la classe B est conforme à la norme NMB-003 du Canada.
viiiSun Crypto Accelerator 4000 Board Installation and User’s Guide • May 2003
BSMI Class A Notice
The following statement is applicable to products shipped to Taiwan and marked as Class A on the product compliance
label.
ix
xSun Crypto Accelerator 4000 Board Installation and User’s Guide • May 2003
IPsec Hardware Acceleration 5
Sun Crypto Accelerator 4000 MMF Adapter6
LED Displays6
Sun Crypto Accelerator 4000 UTP Adapter7
LED Displays8
Dynamic Reconfiguration and High Availability9
Load Sharing9
Hardware and Software Requirements10
xi
Required Patches10
Apache Web Server Patch10
Solaris 8 Patches11
Solaris 9 Patches11
2.Installing the Sun Crypto Accelerator 4000 Board13
Handling the Board13
Installing the Board14
▼To Install the Hardware14
Installing the Sun Crypto Accelerator 4000 Software16
▼To Install the Software16
Installing the Optional Packages18
Directories and Files19
Removing the Software21
▼To Remove the Software21
3.Configuring Driver Parameters23
Sun Crypto Accelerator 4000 Ethernet Device Driver (vca) Parameters23
Driver Parameter Values and Definitions24
Advertised Link Parameters25
Flow Control Parameters27
Gigabit Forced Mode Parameter28
Interpacket Gap Parameters28
Interrupt Parameters30
Random Early Drop Parameters30
PCI Bus Interface Parameters32
Setting vca Driver Parameters33
Setting Parameters Using the ndd Utility33
▼To Specify Device Instances for the ndd Utility33
xiiSun Crypto Accelerator 4000 Board Installation and User’s Guide • May 2003
Noninteractive and Interactive Modes34
Setting Autonegotiation or Forced Mode36
▼To Disable Autonegotiation Mode37
Setting Parameters Using the vca.conf File38
▼To Set Driver Parameters Using a vca.conf File38
Setting Parameters for All Sun Crypto Accelerator 4000 vca Devices
With the vca.conf File39
▼To Set Parameters for All Sun Crypto Accelerator 4000 vca Devices
With the vca.conf File40
Example vca.conf File40
Enabling Autonegotiation or Forced Mode for Link Parameters With the
OpenBoot PROM41
Sun Crypto Accelerator 4000 Cryptographic and Ethernet Driver Operating
Statistics43
Cryptographic Driver Statistics43
Ethernet Driver Statistics44
Reporting the Link Partner Capabilities48
▼To Check Link Partner Settings51
Network Configuration52
Configuring the Network Host Files52
4.Administering the Sun Crypto Accelerator 4000 Board With the vcaadm and
vcadiag Utilities55
Logging In to a New Board59
Logging In to a Board With a Changed Remote Access Key60
vcaadm Prompt61
Logging Out of a Board With vcaadm61
Entering Commands With vcaadm63
Getting Help for Commands64
Quitting the vcaadm Program in Interactive Mode65
Initializing the Sun Crypto Accelerator 4000 Board With vcaadm65
▼To Initialize the Sun Crypto Accelerator 4000 Board With a New
Keystore66
Initializing the Sun Crypto Accelerator 4000 Board to Use an Existing
Keystore67
▼To Initialize the Sun Crypto Accelerator 4000 Board to Use an Existing
Keystore68
Managing Keystores With vcaadm69
Naming Requirements69
Password Requirements 69
Setting the Password Requirements 70
Populating a Keystore With Security Officers70
Populating a Keystore With Users71
Listing Users and Security Officers 72
Changing Passwords72
Enabling or Disabling Users73
Deleting Users74
Deleting Security Officers 74
Backing Up the Master Key74
Locking the Keystore to Prevent Backups 75
Managing Boards With vcaadm76
Setting the Auto-Logout Time 76
xivSun Crypto Accelerator 4000 Board Installation and User’s Guide • May 2003
Displaying Board Status77
Loading New Firmware78
Resetting a Sun Crypto Accelerator 4000 Board78
Rekeying a Sun Crypto Accelerator 4000 Board79
Zeroizing a Sun Crypto Accelerator 4000 Board 80
Using the vcaadm diagnostics Command80
Using vcadiag81
5.Configuring Sun ONE Server Software for Use WiththeSunCryptoAccelerator
4000 Board85
Administering Security for Sun ONE Web Servers85
Concepts and Terminology86
Tokens and Token Files 87
Token Files87
Enabling and Disabling Bulk Encryption88
Configuring Sun ONE Web Servers89
Passwords89
Populating a Keystore90
▼To Populate a Keystore90
Overview for Enabling Sun ONE Web Servers91
Installing and Configuring Sun ONE Web Server 4.192
Installing Sun ONE Web Server 4.192
▼To Install Sun ONE Web Server 4.1 92
▼To Create a Trust Database93
▼To Generate a Server Certificate95
▼To Install the Server Certificate98
Configuring Sun ONE Web Server 4.1 for SSL99
▼To Configure the Sun ONE Web Server 4.199
Contentsxv
Installing and Configuring Sun ONE Web Server 6.0101
Installing Sun ONE Web Server 6.0101
▼To Install Sun ONE Web Server 6.0 101
▼To Create a Trust Database102
▼To Generate a Server Certificate104
▼To Install the Server Certificate107
Configuring Sun ONE Web Server 6.0 for SSL108
▼To Configure the Sun ONE Web Server 6.0108
6.Configuring Apache Web Servers for Use With the Sun Crypto Accelerator 4000
Board111
Enabling the Board for Apache Web Servers112
Enabling Apache Web Servers112
▼To Enable the Apache Web Server 112
Creating a Certificate 114
▼To Create a Certificate115
7.Diagnostics and Troubleshooting119
SunVTS Diagnostic Software119
Installing SunVTS netlbtest and nettest Support for the vca
Driver120
Using SunVTS Software to Perform vcatest, nettest, and
netlbtest121
▼To Perform vcatest121
Test Parameter Options for vcatest123
vcatest Command-Line Syntax123
▼To Perform netlbtest124
▼To Perform nettest125
Using kstat to Determine Cryptographic Activity128
Using the OpenBoot PROM FCode Self-Test129
xviSun Crypto Accelerator 4000 Board Installation and User’s Guide • May 2003
▼Performing the Ethernet FCode Self-Test Diagnostic129
Troubleshooting the Sun Crypto Accelerator 4000 Board132
xxiiSun Crypto Accelerator 4000 Board Installation and User’s Guide • May 2003
Preface
The Sun Crypto Accelerator 4000 Board Installation and User’s Guide lists the features,
protocols, and interfaces of the Sun™ Crypto Accelerator 4000 board and describes
how to install, configure, and manage the board in your system.
This book assumes that you are a network administrator with experience
configuring one or more of the following: Solaris™ operating environment, Sun
platforms with PCI I/O cards, Sun™ ONE and Apache Web Servers, IPsec,
SunVTS™ software, and certification authority acquisitions.
How This Book Is Organized
This book is organized as follows:
■ Chapter 1 lists the product features, protocols, and interfaces of the Sun Crypto
Accelerator 4000 board, and describes the hardware and software requirements.
■ Chapter 2 describes how to install and remove the Sun Crypto Accelerator 4000
hardware and software.
■ Chapter 3 defines the Sun Crypto Accelerator 4000 tunable driver parameters and
describes how to configure them with the ndd utility and the vca.conf file. This
chapter also describes how to enable autonegotiation or forced mode for link
parameters at the OpenBoot™ PROM interface and how to configure the network
hosts file.
■ Chapter 4 describes how to configure the Sun Crypto Accelerator 4000 board and
manage keystores with the vcaadm and vcadiag utilities.
■ Chapter 5 explains how to configure the Sun Crypto Accelerator 4000 board for
use with Sun ONE Web Servers.
■ Chapter 6 explains how to configure the Sun Crypto Accelerator 4000 board for
use with Apache Web Servers.
xxiii
■ Chapter 7 describes how to test the Sun Crypto Accelerator 4000 board with the
SunVTS diagnostic application and the onboard FCode self-test. This chapter also
provides troubleshooting techniques with OpenBoot PROM commands.
■ Appendix A lists the specifications for the Sun Crypto Accelerator 4000 board.
■ Appendix B lists directives for using Sun Crypto Accelerator 4000 software to
configure SSL support for Apache Web Servers.
■ Appendix C describes the software supplied with the Sun Crypto Accelerator
4000 board and how to build OpenSSL-compatible applications to take advantage
of the cryptographic acceleration features of the board.
■ Appendix D provides software notices and licenses from other software
organizations that govern the use of third-party software used with the Sun
Crypto Accelerator 4000 board.
■ Appendix E provides a description of the Sun Crypto Accelerator 4000 commands
and lists the online manual pages for each command.
■ Appendix F describes how to zeroize the Sun Crypto Accelerator 4000 board to
the factory state which is the failsafe mode for the board.
■ Appendix G provides answers to frequently asked questions.
Using UNIX Commands
This document does not contain information on basic UNIX®commands and
procedures such as shutting down the system, booting the system, and configuring
devices.
See one or more of the following for this information:
■ Solaris Hardware Platform Guide
■ Online documentation for the Solaris operating environment available at:
http://docs.sun.com
■ Other software documentation that you received with your system
xxiv Sun Crypto Accelerator 4000 Board Installation and User’s Guide • May 2003
Typographic Conventions
TypefaceMeaningExamples
AaBbCc123The names of commands, files,
and directories; on-screen
computer output
AaBbCc123
AaBbCc123Book titles, new words or terms,
What you type, when
contrasted with on-screen
computer output
words to be emphasized
Edit your .login file.
Use ls -a to list all files.
% You have mail.
% su
Password:
Read Chapter 6 in the User’s Guide.
These are called class options.
You must be superuser to do this.
Command-line variable; replace
with a real name or value
To delete a file, type rm filename.
Shell Prompts
ShellPrompt
C shellmachine_name%
C shell superusermachine_name#
Bourne shell and Korn shell$
Bourne shell and Korn shell superuser#
Prefacexxv
Accessing Sun Documentation Online
You can view, print, or purchase a broad selection of Sun documentation, including
localized versions, at:
http://www.sun.com/documentation
Sun Welcomes Your Comments
Sun is interested in improving its documentation and welcomes your comments and
suggestions. You can email your comments to Sun at:
docfeedback@sun.com
Please include the part number (817-0431-10) of your document in the subject line of
your email.
xxvi Sun Crypto Accelerator 4000 Board Installation and User’s Guide • May 2003
CHAPTER
1
Product Overview
This chapter provides an overview of the Sun Crypto Accelerator 4000 board, and
contains the following sections:
■ “Product Features” on page 1
■ “Hardware Overview” on page 5
■ “Hardware and Software Requirements” on page 10
Product Features
The Sun Crypto Accelerator 4000 board is a Gigabit Ethernet-based network
interface card that supports cryptographic hardware acceleration for IPsec and SSL
(both symmetric and asymmetric) on Sun servers. In addition to operating as a
standard Gigabit Ethernet network interface card for unencrypted network traffic,
the board contains cryptographic hardware to support a higher throughput for
encrypted IPsec traffic than the standard software solution.
Key Protocols and Interfaces
The Sun Crypto Accelerator 4000 board is interoperable with existing Ethernet
equipment assuming standard Ethernet minimum and maximum frame size (64 to
1518 bytes), frame format, and compliance with the following standards and
protocols:
■ Full-size PCI 33/66 Mhz, 32/64-bit
■ IEEE 802.3 CSMA/CD (Ethernet)
■ IEEE 802.2 Logical Link Control
■ SNMP (limited MIB)
■ Full- and half-duplex Gigabit Ethernet interface (IEEE 802.z)
■ Universal dual voltage signaling (3.3V and 5V)
1
Key Features
■ Gigabit Ethernet with either copper or fiber interface
■ Accelerates IPsec and SSL cryptographic functions
■ Session establishment rate: up to 4300 operations per second
■ Bulk encryption rate: up to 800 Mbps
■ Provides up to 2048-bit RSA encryption
■ Delivers up to 10 times faster 3DES bulk data encryption
■ Provides tamper-proof, centralized security key and certificate administration for
Sun ONE Web Server for increased security and simplified key management
■ Designed for FIPS 140-2 Level 3 certification
■ Low CPU utilization—frees up server system resource and bandwidth
■ Secure private key storage and management
■ Dynamic reconfiguration (DR) and redundancy/failover support on Sun’s
midframe and high-end servers
■ Load balancing for RX packets among multiple CPUs
■ Full flow control support (IEEE 802.3x)
The Sun Crypto Accelerator 4000 boards are designed to comply with the security
requirements for cryptographic modules as documented in the Federal Information
Processing Standard (FIPS) 140-2, Level 3.
Supported Applications
■ Solaris 8 and 9 operating environments (IPsec VPN)
■ Sun ONE Web Server
■ Apache Web Server
Supported Cryptographic Protocols
The board supports the following protocols:
■ IPsec for IPv4 and IPv6, including IKE
■ SSLv2, SSLv3, TLSv1
The board accelerates the following IPsec functions:
■ ESP (DES, 3DES) Encryption
The board accelerates the following SSL functions:
■ Secure establishment of a set of cryptographic parameters and secret keys
between a client and a server
■ Secure key storage on the board—keys are encrypted if they leave the board
2Sun Crypto Accelerator 4000 Board Installation and User’s Guide • May 2003
Diagnostic Support
■ User-executable self-test using OpenBoot™ PROM
■ SunVTS™ diagnostic tests
Cryptographic Algorithm Acceleration
The Sun Crypto Accelerator 4000 board accelerates cryptographic algorithms in both
hardware and software. The reason for this complexity is that the cost of accelerating
cryptographic algorithms is not uniform across all algorithms. Some cryptographic
algorithms were designed specifically to be implemented in hardware, others were
designed to be implemented in software. For hardware acceleration, there is the
additional cost of moving data from the user application to the hardware
acceleration device, and moving the results back to the user application. Note that a
few cryptographic algorithms can be performed by highly tuned software as quickly
as they can be performed in dedicated hardware.
Supported Cryptographic Algorithms
The Sun Crypto Accelerator 4000 driver (vca) examines each cryptographic request
and determines the best location for the acceleration (host processor or Sun Crypto
Accelerator 4000), to achieve maximum throughput. Load distribution is based on
the cryptographic algorithm, the current job load, and the data size.
Sun Crypto Accelerator 4000 board accelerates the following IPsec algorithms.
TABLE1-1IPsec Cryptographic Algorithms
TypeAlgorithm
SymmetricDES, 3DES
The Sun Crypto Accelerator 4000 board accelerates the following SSL algorithms.
TABLE1-2SSL Cryptographic Algorithms
TypeAlgorithm
SymmetricDES, 3DES, ARCFOUR
AsymmetricDiffie-Hellman (Apache only) and RSA (up to 2048 bit key), DSA
HashMD5, SHA1
Chapter 1 Product Overview3
SSL Acceleration
TABLE 1-3 shows which SSL accelerated algorithms may be off-loaded to hardware
and which software algorithms are provided for Sun ONE and Apache Web Servers.
The Sun Crypto Accelerator 4000 bulk encryption feature for Sun ONE server
software is disabled by default. You must manually enable this feature by creating a
file and restarting the Sun ONE server software.
To enable Sun ONE server software to use bulk encryption on the Sun Crypto
Accelerator 4000 board, you simply create an empty file in the
/etc/opt/SUNWconn/cryptov2/ directory named sslreg, and restart the server
software.
# touch /etc/opt/SUNWconn/cryptov2/sslreg
To disable the bulk encryption feature, you must delete the sslreg file and restart
the server software.
# rm /etc/opt/SUNWconn/cryptov2/sslreg
The bulk encryption feature for Apache Web Server software is enabled by default
and cannot be disabled.
4Sun Crypto Accelerator 4000 Board Installation and User’s Guide • May 2003
Hardware Overview
The Sun Crypto Accelerator 4000 hardware is a full size (4.2 inches x 12.283 inches)
cryptographic accelerator PCI Gigabit Ethernet adapter that enhances the
performance of IPsec and SSL on Sun servers.
IPsec Hardware Acceleration
The Sun Crypto Accelerator 4000 board encrypts and decrypts IPsec packets in
hardware, offloading this high-overhead operation from the SPARC™ processor. The
cryptographic hardware also supports general asymmetric and symmetric
cryptographic operations for use in other applications and contains a hardware
source of random numbers.
Note – No IPsec configuration or tuning is required to use the Sun Crypto
Accelerator 4000 board for IPsec acceleration. You simply install the Sun Crypto
Accelerator 4000 packages and reboot.
Once the Sun Crypto Accelerator 4000 board and packages are installed, any existing
IPsec configuration and any future IPsec configuration will use the Sun Crypto
Accelerator 4000 board instead of the core Solaris software. The board handles any
supported IPsec algorithm listed in
Sun Crypto Accelerator 4000 board will continue to be handled by the core Solaris
encryption software. The configuration of IPsec is documented in the SystemAdministration Guide of the Solaris System Administrator Collection at
http://docs.sun.com.
TABLE 1-1. IPsec algorithms not supported by the
Chapter 1 Product Overview5
Sun Crypto Accelerator 4000 MMF Adapter
The Sun Crypto Accelerator 4000 MMF adapter is a single-port Gigabit Ethernet
fiber optics PCI bus card. It operates in 1000 Mbps Ethernet networks only.
FIGURE 1-1 Sun Crypto Accelerator 4000 MMF Adapter
LED Displays
See TABLE 1-4.
TABLE1-4Front Panel Display LEDs for the MMF Adapter
LabelMeaning if LitColor
FaultOn when the board is HALTED (fatal error)
state or low level hardware initialization
failed.
Flashing if an error occurred during the
boot process.
DiagOn in POST, DIAGNOSTICS, and
FAILSAFE (firmware not upgraded) state.
Flashing when running DIAGNOSTICS.
OperateOn in POST, DIAGNOSTICS, and
DISABLED (driver not attached) state.
Flashing in IDLE, OPERATIONAL, and
FAILSAFE states.
6Sun Crypto Accelerator 4000 Board Installation and User’s Guide • May 2003
Red
Green
Green
TABLE1-4Front Panel Display LEDs for the MMF Adapter (Continued)
LabelMeaning if LitColor
InitOn if the security officer has initialized the
board with vcaadm. See “Initializing the
Sun Crypto Accelerator 4000 Board With
vcaadm” on page 65.
Flashing if the ZEROIZE jumper is present.
FIPS ModeOn when operating in FIPS 140-2 level 3
certified mode. Off when in non-FIPS
mode.
LinkLink up.Green
Green
Green
Sun Crypto Accelerator 4000 UTP Adapter
The Sun Crypto Accelerator 4000 UTP adapter is a single-port Gigabit Ethernet
copper-based PCI bus card. It can be configured to operate in 10, 100, or 1000 Mbps
Ethernet networks.
FIGURE 1-2 Sun Crypto Accelerator 4000 UTP Adapter
Chapter 1 Product Overview7
LED Displays
See TABLE 1-5.
TABLE1-5Front Panel Display LEDs for the UTP Adapter
LabelMeaning if LitColor
FaultOn when the board is HALTED (fatal error)
state or low level hardware initialization
failed.
Flashing if an error occurred during the
boot process.
DiagOn in POST, DIAGNOSTICS, and
FAILSAFE (firmware not upgraded) state.
Flashing when running DIAGNOSTICS.
OperateOn in POST, DIAGNOSTICS, and
DISABLED (driver not attached) state.
Flashing in IDLE, OPERATIONAL, and
FAILSAFE states.
InitOn if the security officer has initialized the
board with vcaadm. See “Initializing the
Sun Crypto Accelerator 4000 Board With
vcaadm” on page 65.
Flashing if the ZEROIZE jumper is present.
FIPS ModeOn when operating in FIPS 140-2 level 3
certified mode. Off when in non-FIPS
mode.
1000Indicates Gigabit Ethernet.Green
Activity (no label)Link is transmitting or receiving.Amber
Link (no label)Link up.Green
Red
Green
Green
Green
Green
Note – The service pack numbers (SP9 or SP1) are implied whenever Sun ONE Web
Server 4.1 or 6.0 is mentioned.
8Sun Crypto Accelerator 4000 Board Installation and User’s Guide • May 2003
Dynamic Reconfiguration and High Availability
The Sun Crypto Accelerator 4000 hardware and associated software provides the
capability to work effectively on Sun platforms supporting Dynamic Reconfiguration
(DR) and hot-plugging. During a DR or hot-plug operation, the Sun Crypto
Accelerator 4000 software layer automatically detects the addition or removal of a
board and adjusts the scheduling algorithms to accommodate the change in
hardware resources.
For High Availability (HA) configurations, multiple Sun Crypto Accelerator 4000
boards can be installed within a system or domain to insure that hardware
acceleration is continuously available. In the unlikely event of a Sun Crypto
Accelerator 4000 hardware failure, the software layer detects the failure and removes
the failed board from the list of available hardware cryptographic accelerators. Sun
Crypto Accelerator 4000 adjusts the scheduling algorithms to accommodate the
reduction in hardware resources. Subsequent cryptographic requests are scheduled
to the remaining boards.
Note that the Sun Crypto Accelerator 4000 hardware provides a source for highquality entropy for the generation of long-term keys. If all the Sun Crypto
Accelerator 4000 boards within a domain or system are removed, long-term keys are
generated with lower-quality entropy.
Load Sharing
The Sun Crypto Accelerator 4000 software distributes load across as many boards as
are installed within the Solaris domain or system. Incoming cryptographic requests
are distributed across the boards based on fixed-length work queues. Cryptographic
requests are directed to the first board, and subsequent requests stay directed to the
first board until it is running at full capacity. Once the first board is running at full
capacity, further requests are queued to the first board available that can accept the
request of this type. The queueing mechanism is designed to optimize throughput
by facilitating request coalescing at the board.
Chapter 1 Product Overview9
Hardware and Software Requirements
TABLE 1-6 provides a summary of the hardware and software requirements for the
Refer to the Sun Crypto Accelerator 4000 Board Release Notes for additional required
patch information.
The following patches may be required to run the Sun Crypto Accelerator 4000
board on your system. Solaris updates contain patches to previous releases. Use the
showrev -p command to determine whether the listed patches have already been
installed.
Solaris 8 2/02 and future compatible releases (Solaris 9 is required
for IPsec acceleration.)
You can download the patches from the following web site:
http://sunsolve.sun.com.
Install the latest version of the patches. The dash number (-01, for example) becomes
higher with each new revision of the patch. If the version on the web site is higher
than that shown in the following tables, it is simply a later version.
If the patch you need is not available on SunSolve
service representative.
Apache Web Server Patch
If you plan to use the Apache Web Server, you must also install Patch 109234-09.
Once the SUNWkcl2a package is added, the system will be configured with Apache
Web Server mod_ssl 1.3.26.
10Sun Crypto Accelerator 4000 Board Installation and User’s Guide • May 2003
SM
, contact your local sales or
Solaris 8 Patches
The following tables list required and recommended Solaris 8 patches to use with
this product.
TABLE1-7Required Solaris 8 Patches for Sun Crypto Accelerator 4000 Software
There are currently no required Solaris 9 patches.
Chapter 1 Product Overview11
12Sun Crypto Accelerator 4000 Board Installation and User’s Guide • May 2003
CHAPTER
2
Installing the Sun Crypto
Accelerator 4000 Board
This chapter describes how to install the Sun Crypto Accelerator 4000 hardware and
software. This chapter includes the following sections:
■ “Handling the Board” on page 13
■ “Installing the Board” on page 14
■ “Installing the Sun Crypto Accelerator 4000 Software” on page 16
■ “Directories and Files” on page 19
■ “Removing the Software” on page 21
Handling the Board
Each board is packed in a special antistatic bag to protect it during shipping and
storage. To avoid damaging the static-sensitive components on the board, reduce
any static electricity on your body before touching the board by using one of the
following methods:
■ Touch the metal frame of the computer.
■ Attach an antistatic wrist strap to your wrist and to a grounded metal surface.
Caution – To avoid damaging the sensitive components on the board, wear an
antistatic wrist strap when handling the board, hold the board by its edges only, and
always place the board on an antistatic surface (such as the plastic bag it came in).
13
Installing the Board
Installing the Sun Crypto Accelerator 4000 board involves inserting the board into
the system and loading the software tools. The hardware installation instructions
include only general steps for installing the board. Refer to the documentation that
came with your system for specific installation instructions.
▼ To Install the Hardware
1. As superuser, follow the instructions that came with your system to shut down
and power off the computer, disconnect the power cord, and remove the computer
cover.
2. Locate an unused PCI slot (preferably a 64 bit, 66 MHz slot).
3. Attach an antistatic wrist strap to your wrist, and attach the other end to a
grounded metal surface.
4. Using a Phillips-head screwdriver, remove the screw from the PCI slot cover.
Save the screw to hold the bracket in Step 5.
5. Holding the Sun Crypto Accelerator 4000 board by its edges only, take it out of the
plastic bag and insert it into the PCI slot, and then secure the screw on the rear
bracket.
6. Replace the computer cover, reconnect the power cord, and power on the system.
7. Verify that the board is properly installed by issuing the show-devs command at
the OpenBoot™ PROM (OBP) ok prompt:
ok show-devs
.
/chosen
/packages
/upa@8,480000/SUNW,ffb@0,0
/pci@8,600000/network@1
/pci@8,600000/SUNW,qlc@4
/pci@8,600000/SUNW,qlc@4/fp@0,0
.
In the preceding example, the /pci@8,600000/network@1 identifies the device
path to the Sun Crypto Accelerator 4000 board. There will be one such line for each
board in the system.
14Sun Crypto Accelerator 4000 Board Installation and User’s Guide • May 2003
To determine whether the Sun Crypto Accelerator 4000 device properties are listed
correctly: from the ok prompt, navigate to the device path and type .properties
to display the list of properties.
Chapter 2 Installing the Sun Crypto Accelerator 4000 Board15
Installing the Sun Crypto Accelerator
4000 Software
The Sun Crypto Accelerator 4000 software is included on the Sun Crypto Accelerator
4000 CD. You may need to download patches from the SunSolve web site. See
“Required Patches” on page 10 for more information.
▼ To Install the Software
1. Insert the Sun Crypto Accelerator 4000 CD into a CD-ROM drive that is connected
to your system.
■ If your system is running Sun Enterprise Volume Manager™, it should
automatically mount the CD-ROM to the /cdrom/cdrom0 directory.
■ If your system is not running Sun Enterprise Volume Manager, mount the CD-
ROM as follows:
# mount -F hsfs -o ro /dev/dsk/c0t6d0s2 /cdrom
16Sun Crypto Accelerator 4000 Board Installation and User’s Guide • May 2003
You see the following files and directories in the /cdrom/cdrom0 directory.
PackagesContains the Sun Crypto Accelerator 4000 software packages:
SUNWkcl2rCryptography Kernel Components
SUNWkcl2uCryptographic Administration Utility and Libraries
SUNWkcl2aSSL Support for Apache (optional)
SUNWkcl2mCryptographic Administration Manual Pages (optional)
SUNWvcarVCA Crypto Accelerator (Root)
SUNWvcauVCA Crypto Accelerator (Usr)
SUNWvcaaVCA Administration
SUNWvcafwVCA Firmware
SUNWvcamnVCA Crypto Accelerator Manual Page (optional)
SUNWvcavSunVTS Test of VCA Crypto Accelerator (optional)
SUNWkcl2oSSL Development Tools and Libraries (optional)
SUNWkcl2i.uIPSec Acceleration with KCLv2 Crypto (optional)
The required packages must be installed in a specific order and must be installed
before installing any optional packages. Once the required packages are installed,
you can install and remove the optional packages in any order.
Install the optional SUNWkcl2a package only if you plan to use Apache as your web
server.
Install the optional SUNWkcl2o package only if you plan to relink to another
(unsupported) version of Apache Web Server.
Install the optional SUNWvcav package only if you plan to perform the SunVTS tests.
You must have SunVTS 4.4 or later up to 5.x installed to install the SUNWvcav
package.
Note – The optional SUNWkcl2i.u package has the .u extension only on the Sun
Crypto Accelerator 4000 CD. Once this package is installed, the name is changed to
SUNWkcl2i. The .u extension of this package on the CD, defines the package as
sun4u architecture-specific.
Chapter 2 Installing the Sun Crypto Accelerator 4000 Board17
2. Install the required software packages by typing:
To install only the optional packages that provide the SSL support for Apache Web
Server and the cryptographic administration utility and libraries, type the following:
# cd /cdrom/cdrom0/Packages
# pkgadd -d . SUNWkcl2a SUNWkcl2m
18Sun Crypto Accelerator 4000 Board Installation and User’s Guide • May 2003
To install all of the optional software packages, type the following:
FIGURE 2-1 shows the hierarchy of these directories and files.
Keystore data (encrypted)
Utilities
Support libraries
Administrative commands
Chapter 2 Installing the Sun Crypto Accelerator 4000 Board19
/
/bin
Application
executables
/etc
/opt
/SUNWconn
/vca
/keydata
Encrypted
keys
/include
Development
support
FIGURE 2-1 Sun Crypto Accelerator 4000 Directories and Files
/lib
Application
libraries
/man
Manual
pages
/opt
/SUNWconn
/cryptov2
/sbin
Daemon
executables
/ssl
Apache
configuration
support
Note – Once you have installed the hardware and software of the board, you need
to initialize the board with configuration and keystore information. Refer to
“Initializing the Sun Crypto Accelerator 4000 Board With vcaadm” on page 65 for
information on how to initialize the board.
20Sun Crypto Accelerator 4000 Board Installation and User’s Guide • May 2003
Removing the Software
If you have created keystores (refer to “Managing Keystores With vcaadm” on
page 69), you must delete the keystore information that the Sun Crypto Accelerator
4000 board is configured with before removing the software. The zeroize
command removes all key material, but does not delete the keystore files which are
stored in the filesystem of the physical host in which the Sun Crypto Accelerator
4000 board is installed. Refer to the “Zeroizing a Sun Crypto Accelerator 4000
Board” on page 80 for details on the zeroize command. To delete the keystore files
stored in the system, become superuser and remove the keystore files. If you have
not yet created any keystores, you can skip this procedure.
Caution – You must not delete a keystore that is currently in use or that is shared
by other users and keystores. To free references to keystores, you might have to shut
down the web server and/or administration server.
Caution – Before removing the Sun Crypto Accelerator 4000 software you must
disable any web servers you have enabled for use with the Sun Crypto Accelerator
4000 board. Failure to do so will leave those web servers nonfunctional.
▼ To Remove the Software
● As superuser, use the pkgrm command to remove only the software packages you
installed.
Caution – Installed packages must be removed in the order shown. Failure to
remove them in this order could result in dependency warnings and leave kernel
modules loaded.
If you installed all the packages, you would remove them as follows:
Chapter 2 Installing the Sun Crypto Accelerator 4000 Board21
Note – After installing or removing the SunVTS test (SUNWvcav) for the Sun Crypto
Accelerator 4000 board, if SunVTS is already running it might be necessary to
reprobe the system to update the available tests. See your SunVTS documentation
for more information.
22Sun Crypto Accelerator 4000 Board Installation and User’s Guide • May 2003
CHAPTER
3
Configuring Driver Parameters
This chapter describes how to configure the vca device driver parameters used by
both the Sun Crypto Accelerator 4000 UTP and MMF Ethernet adapters. This chapter
contains the following sections:
■ “Enabling Autonegotiation or Forced Mode for Link Parameters With the
OpenBoot PROM” on page 41
■ “Sun Crypto Accelerator 4000 Cryptographic and Ethernet Driver Operating
Statistics” on page 43
■ “Network Configuration” on page 52
Sun Crypto Accelerator 4000 Ethernet
Device Driver (vca) Parameters
The vca device driver controls the Sun Crypto Accelerator 4000 UTP and MMF
Ethernet devices. The vca driver is attached to the UNIX pci name property
pci108e,3de8 for the Sun Crypto Accelerator 4000 (108e is the vendor ID and
3de8 is the PCI device ID).
You can manually configure the vca device driver parameters to customize each Sun
Crypto Accelerator 4000 device in your system. This section provides an overview of
the capabilities of the Sun Crypto Accelerator 4000 Ethernet device used in the
board, lists the available vca device driver parameters, and describes how to
configure these parameters.
The Sun Crypto Accelerator 4000 Ethernet UTP and MMF PCI adapters are capable
of the operating speeds and modes listed in “Setting Autonegotiation or Forced
Mode” on page 36. By default, the vca device operates in autonegotiation mode
23
with the remote end of the link (link partner) to select a common mode of operation
for the speed, duplex, and link-clock parameters. The link-clock parameter
is applicable only if the board is operating at a 1000 Mbps. The vca device can also
be configured to operate in forced mode for each of these parameters.
Caution – To establish a proper link, both link partners must operate in either
autonegotiation or forced mode for each of the speed, duplex, and link-clock
(1000 Mbps only) parameters. If both link partners are not operating in the same
mode for each of these parameters, network errors will occur. See “Enabling
Autonegotiation or Forced Mode for Link Parameters With the OpenBoot PROM” on
page 41.
Driver Parameter Values and Definitions
TABLE 3-1 describes the parameters and settings for the vca device driver.
TABLE3-1vca Driver Parameter, Status, and Descriptions
ParameterStatusDescription
instanceRead and writeDevice instance
adv-autoneg-capRead and writeOperational mode parameter
adv-1000fdx-capRead and writeOperational mode parameter (MMF adapter only)
adv-1000hdx-capRead and writeOperational mode parameter
adv-100fdx-capRead and writeOperational mode parameter (UTP adapter only)
adv-100hdx-capRead and writeOperational mode parameter (UTP adapter only)
adv-10fdx-capRead and writeOperational mode parameter (UTP adapter only)
adv-10hdx-capRead and writeOperational mode parameter (UTP adapter only)
adv-asmpause-capRead and writeFlow control parameter
adv-pause-capRead and writeFlow control parameter
pause-on-thresholdRead and writeFlow control parameter
pause-off-thresholdRead and writeFlow control parameter
link-masterRead and write1 Gbps speed forced mode parameter
enable-ipg0Read and writeEnable additional delay before transmitting a packet
ipg0Read and writeAdditional delay before transmitting a packet
ipg1Read and writeInterpacket Gap parameter
24Sun Crypto Accelerator 4000 Board Installation and User’s Guide • May 2003
TABLE3-1vca Driver Parameter, Status, and Descriptions (Continued)
ParameterStatusDescription
ipg2Read and writeInterpacket Gap parameter
rx-intr-pktsRead and writeReceive interrupt blanking values
rx-intr-timeRead and writeReceive interrupt blanking values
red-dv4to6kRead and writeRandom early detection and packet drop vectors
red-dv6to8kRead and writeRandom early detection and packet drop vectors
red-dv8to10kRead and writeRandom early detection and packet drop vectors
red-dv10to12kRead and writeRandom early detection and packet drop vectors
tx-dma-weightRead and writePCI Interface parameter
rx-dma-weightRead and writePCI Interface parameter
infinit-burstRead and writePCI Interface parameter
disable-64bitRead and writePCI Interface parameter
Advertised Link Parameters
The following parameters determine the transmit and receive speed and duplex
link parameters to be advertised by the vca driver to its link partner.
describes the operational mode parameters and their default values.
TABLE 3-2
Note – If a parameter’s initial setting is 0, it cannot be changed. If you try to change
an initial setting of 0, it will revert back to 0. By default, these parameters are set to
the capabilities of the vca device.
Chapter 3 Configuring Driver Parameters25
The Sun Crypto Accelerator 4000 UTP adapter advertised link parameters are
different from those of the Sun Crypto Accelerator 4000 MMF adapter as shown in
TABLE 3-2.
TABLE3-2Operational Mode Parameters
ParameterDescription
The following parameter is for both the Sun Crypto Accelerator 4000 UTP and MMF adapters.
adv-autoneg-capLocal interface capability advertised by the hardware
0 = Forced mode
1 = Autonegotiation (default)
The following parameter is for the Sun Crypto Accelerator 4000 MMF adapter only.
adv-1000fdx-capLocal interface capability advertised by the hardware
26Sun Crypto Accelerator 4000 Board Installation and User’s Guide • May 2003
If all of the previous parameters are set to 1, autonegotiation will use the highest
speed possible. If all of the previous parameters are set to 0, you will receive the
following error message:
NOTICE: Last setting will leave vca0 with no link capabilities.
WARNING: vca0: Restoring previous setting.
Note – In the previous example, vca0 is the Sun Crypto Accelerator 4000 board
device name where the string, vca, is used for every Sun Crypto Accelerator 4000
board. This string is always immediately followed by the device instance number of
the board. Hence, the device instance number of the vca0 board is 0.
Flow Control Parameters
The vca device is capable of sourcing (transmitting) and terminating (receiving)
pause frames conforming to the IEEE 802.3x Frame Based Link Level Flow Control
Protocol. In response to received flow control frames, the vca device is capable of
reducing its transmit rate. Alternately, the vca device is capable of sourcing flow
control frames, requesting the link partner to reduce its transmit rate if the link
partner supports this feature. By default, the driver advertises both transmit and
receive pause capability during autonegotiation.
TABLE 3-3 provides flow control keywords and describes their function.
TABLE3-3Read-Write Flow Control Keyword Descriptions
KeywordDescription
adv-asmpause-capBoth the MMF and UTP adapters support asymmetric pause; hence, the vca
device can pause only in one direction.
0=Off (default)
1=On
adv-pause-capThis parameter has two meanings depending on the value of
adv-asmpause-cap. (Default=0)
Parameter Value+Parameter Value =
adv-asmpause-cap=adv-pause-cap=
11or0adv-pause-cap determines which
11Pauses are received but are not
Description
direction pauses operate on.
transmitted.
Chapter 3 Configuring Driver Parameters27
TABLE3-3Read-Write Flow Control Keyword Descriptions
KeywordDescription
10Pauses are transmitted but are not
received.
01Pauses are sent and received.
01or0adv-pause-cap determines
whether the pause capability is on
or off.
pause-on-thresholdDefines the number of 64 byte blocks in the receive (RX) FIFO which causes the
board to generate an XON-PAUSE frame.
pause-off-thresholdDefines the number of 64 byte blocks in the RX FIFO which causes the board to
generate an XOFF-PAUSE frame.
Gigabit Forced Mode Parameter
For Gigabit links, this parameter determines the link-master. Generally, switches
are enabled as a link master; in which case, this parameter can remain unchanged. If
this is not the case, then the link-master parameter can be used to enable the vca
device as a link master.
TABLE3-4Gigabit Forced Mode Parameter
ParameterDescription
link-masterWhen set to 1 this parameter enables master operation, assuming
the link partner is a slave.
When set to 0 this parameter enables slave operation, assuming the
link partner is a master. (default)
Interpacket Gap Parameters
The vca device supports a programmable mode called enable-ipg0.
Before transmitting a packet with enable-ipg0 enabled (default), the vca device
adds an additional time delay. This delay, set by the ipg0 parameter, is in addition
to the delay set by the ipg1 and ipg2 parameters. The additional ipg0 delay
reduces collisions.
If enable-ipg0 is disabled, the value of ipg0 is ignored and no additional delay is
set. Only the delays set by ipg1 and ipg2 will be used. Disable enable-ipg0 if
other systems keep sending a large number of continuous packets. Systems that
28Sun Crypto Accelerator 4000 Board Installation and User’s Guide • May 2003
have enable-ipg0 enabled might not have enough time on the network. You can
add the additional delay by setting the ipg0 parameter from 0 to 255, which is the
media byte time delay.
TABLE3-5Parameters Defining enable-ipg0 and ipg0
ParameterValuesDescription
enable-ipg00
ipg00 to 255The additional time delay (or gap) before
TABLE 3-5 defines the enable-ipg0 and ipg0 parameters.
enable-ipg0 enable
1
enable-ipg0 disable (Default=1)
transmitting a packet (after receiving the
packet) (Default=8)
The vca device supports the programmable interpacket gap parameters (IPG) ipg1
and ipg2. The total IPG is the sum of ipg1 and ipg2. The total IPG is 0.096
microseconds for the link speed of 1000 Mbps.
TABLE 3-6 lists the default values and allowable values for the IPG parameters.
TABLE3-6Read-Write Interpacket Gap Parameter Values and Descriptions
ParameterValues
(Byte-time)
ipg10 to 255Interpacket gap 1 (Default=8)
ipg20 to 255Interpacket gap 2 (Default=4)
Description
By default, the driver sets ipg1 to 8-byte time and ipg2 to 4-byte time, which are
the standard values. (Byte time is the time it takes to transmit one byte on the link,
with a link speed of 1000 Mbps.)
If your network has systems that use longer IPG (the sum of ipg1 and ipg2), and if
those machines seem to be slow in accessing the network, increase the values of
ipg1 and ipg2 to match the longer IPGs of other machines.
Chapter 3 Configuring Driver Parameters29
Interrupt Parameters
TABLE 3-7 describes the receive interrupt blanking values.
TABLE3-7RX Blanking Register for Alias Read
Field NameValuesDescription
rx-intr-pkts0 to 511Interrupts after this number of packets have arrived
since the last packet was serviced. A value of zero
indicates no packet blanking. (Default=3)
rx-intr-time0 to 524287Interrupts after 4.5 microseconds (usecs) have elapsed
since the last packet was serviced. A value of zero
indicates no time blanking. (Default=3)
Random Early Drop Parameters
These parameters provide the ability to drop packets based on the fullness of the
receive FIFO. By default, this feature is disabled. When FIFO occupancy reaches a
specific range, packets are dropped according to the preset probability. The
probability should increase when the FIFO level increases. Control packets are never
dropped and are not counted in the statistics.
TABLE3-8RX Random Early Detecting 8-Bit Vectors
Field NameValuesDescription
red-dv4to6k0 to 255Random early detection and packet drop vectors for
when FIFO threshold is greater than 4096 bytes and less
than 6,144 bytes. Probability of drop can be
programmed on a 12.5 percent granularity. For
example, if bit 0 is set, the first packet out of every
eight will be dropped in this region. (Default=0)
30Sun Crypto Accelerator 4000 Board Installation and User’s Guide • May 2003
TABLE3-8RX Random Early Detecting 8-Bit Vectors (Continued)
Field NameValuesDescription
red-dv6to8k0 to 255Random early detection and packet drop vectors for
when FIFO threshold is greater than 6,144 bytes and
less than 8,192 bytes. Probability of drop can be
programmed on a 12.5 percent granularity. For
example, if bit 8 is set, the first packet out of every
eight will be dropped in this region. (Default=0)
red-dv8to10k0 to 255Random early detection and packet drop vectors for
when FIFO threshold is greater than 8,192 bytes and
less than 10,240 bytes. Probability of drop can be
programmed on a 12.5 percent granularity. For
example, if bit 16 is set, the first packet out of every
eight will be dropped in this region. (Default=0)
red-dv10to12k0 to 255Random early detection and packet drop vectors for
when FIFO threshold is greater than 10,240 bytes and
less than 12,288 bytes. Probability of drop can be
programmed on a 12.5 percent granularity. For
example, if bit 24 is set, the first packet out of every
eight will be dropped in this region. (Default=0)
Chapter 3 Configuring Driver Parameters31
PCI Bus Interface Parameters
These parameters allow you to modify PCI interface features to gain better PCI
interperformance for a given application.
TABLE3-9PCI Bus Interface Parameters
ParameterDescription
tx-dma-weightDetermines the multiplication factor for granting credit to the
transmit (TX) side during a weighted round robin arbitration; the
values are 0 to 3 (Default=0). Zero means no extra weighting. The
other values are power of 2 extra weighting on that traffic. For
example, if tx-dma-weight = 0 and rx-dma-weight = 3, then as
long as RX traffic is continuously arriving, the priority of RX traffic
will be 8 times greater than the priority of TX traffic to access the
PCI.
rx-dma-weightDetermines the multiplication factor for granting credit to the RX
side during a weighted round robin arbitration. The values are 0 to
3 (Default=0).
infinite-burstAllows the infinite burst capability to be used when this parameter
is enabled and the system supports infinite burst. The adapter will
not free the bus until complete packets are transferred across the
bus. The values are 0 or 1 (Default=0).
disable-64bitSwitches off 64-bit capability of the adapter.
®
Note: for UltraSPARC
set to 1 by default. For UltraSPARC II based platforms, the default is
0. The values are 0 or 1 (Default=0, which enables 64-bit capability).
32Sun Crypto Accelerator 4000 Board Installation and User’s Guide • May 2003
III based platforms, this parameter may be
Setting vca Driver Parameters
You can set the vca device driver parameters in two ways:
■ Using the ndd utility
■ Using the vca.conf file
If you use the ndd utility, the parameters are valid only until you reboot the system.
This method is good for testing parameter settings.
To set parameters so they remain in effect after you reboot the system, create a
/kernel/drv/vca.conf file and add parameter values to this file when you need
to set a particular parameter for a device in the system. See “To Set Driver
Parameters Using a vca.conf File” on page 38 for details.
Setting Parameters Using the ndd Utility
Use the ndd utility to configure parameters that are valid until you reboot the
system.
The following sections describe how you can use the vca driver and the ndd utility
to modify (with the -set option) or display (without the -set option) the
parameters for each vca device.
▼ To Specify Device Instances for the ndd Utility
Before you use the ndd utility to get or set a parameter for a vca device, you must
specify the device instance for the utility.
1. Check the /etc/path_to_inst file to identify the instance number associated
with a particular device. Refer to the online manual pages for path_to_inst(4).
In the previous example, the three Sun Crypto Accelerator 4000 Ethernet instances
are from the installed adapters. The instance numbers are 0 and 1.
2. Use the instance number to select the device.
# ndd -set /dev/vcaN
Chapter 3 Configuring Driver Parameters33
Note – In the examples in this user’s guide, N represents the instance number of the
device.
The device remains selected until you change the selection.
Noninteractive and Interactive Modes
You can use the ndd utility in two modes:
■ Noninteractive
■ Interactive
In noninteractive mode, you invoke the utility to execute a specific command. Once
the command is executed, you exit the utility. In interactive mode, you can use the
utility to get or set more than one parameter value. Refer to the ndd(1M) online
manual page for more information.
Using the ndd Utility in Noninteractive Mode
This section describes how to modify and display parameter values.
● To modify a parameter value, use the -set option.
If you invoke the ndd utility with the -set option, the utility passes value, which
must be specified to the named /dev/vca driver instance, and assigns it to the
parameter:
# ndd -set /dev/vcaN parameter value
When you change any adv parameter, a message similar to the following appears:
- link up 1000 Mbps half duplex
● To display the value of a parameter, specify the parameter name and omit the
value.
When you omit the -set option, a query operation is assumed and the utility
queries the named driver instance, retrieves the value associated with the specified
parameter, and prints it:
# ndd /dev/vcaN parameter
34Sun Crypto Accelerator 4000 Board Installation and User’s Guide • May 2003
Using the ndd Utility in Interactive Mode
● To modify a parameter value in interactive mode, specify ndd /dev/vca,as
shown below.
The ndd utility then prompts you for the name of the parameter:
# ndd /dev/vcaN
name to get/set? (Enter the parameter name or ? to view all
parameters)
After typing the parameter name, the ndd utility prompts you for the parameter
value (see
TABLE 3-1 through TABLE 3-9).
Chapter 3 Configuring Driver Parameters35
● To list all the parameters supported by the vca driver, type ndd /dev/vca.
TABLE 3-1 through TABLE 3-9 for parameter descriptions.)
(See
# ndd /dev/vca
name to get/set ? ?
? (read only)
instance (read and write)
adv-autoneg-cap (read and write)
adv-1000fdx-cap (read and write)
adv-1000hdx-cap (read and write)
adv-100fdx-cap (read and write)
adv-100hdx-cap (read and write)
adv-10fdx-cap (read and write)
adv-10hdx-cap (read and write)
adv-asmpause-cap (read and write)
adv-pause-cap (read and write)
pause-on-threshold (read and write)
pause-off-threshold (read and write)
link-master (read and write)
enable-ipg0 (read and write)
ipg0 (read and write)
ipg1 (read and write)
ipg2 (read and write)
rx-intr-pkts (read and write)
rx-intr-time (read and write)
red-p4k-to-6k (read and write)
red-p6k-to-8k (read and write)
red-p8k-to-10k (read and write)
red-p10k-to-12k (read and write)
tx-dma-weight (read and write)
rx-dma-weight (read and write)
infinite-burst (read and write)
disable-64bit (read and write)
name to get/set ?
#
Setting Autonegotiation or Forced Mode
The following link parameters can be set to operate in either autonegotiation or
forced mode:
■ speed
■ duplex
■ link-clock
36Sun Crypto Accelerator 4000 Board Installation and User’s Guide • May 2003
By default, autonegotiation mode is enabled for these link parameters. When either
of these parameters are in autonegotiation mode, the vca device communicates with
the link partner to negotiate a compatible value and flow control capability. When a
value other than auto is set for either of these parameters, no negotiation occurs
and the link parameter is configured in forced mode. In forced mode, the value for
the speed parameter must match between link partners. See “Enabling
Autonegotiation or Forced Mode for Link Parameters With the OpenBoot PROM” on
page 41.
▼ To Disable Autonegotiation Mode
If your network equipment does not support autonegotiation, or if you want to force
your network speed, duplex,orlink-clock parameters, you can disable the
autonegotiation mode on the vca device.
1. Set the following driver parameters to the values that are described in the
documentation delivered with your link partner device (for example, a switch):
■ adv-1000fdx-cap
■ adv-1000hdx-cap
■ adv-100fdx-cap
■ adv-100hdx-cap
■ adv-10fdx-cap
■ adv-10hdx-cap
■ adv-asmpause-cap
■ adv-pause-cap
TABLE 3-2 for the descriptions and possible values of these parameters.
See
2. Set the adv-autoneg-cap parameter to 0.
# ndd -set /dev/vcaN adv-autoneg-cap 0
When you change any ndd link parameter, a message similar to the following
appears:
link up 1000 Mbps half duplex
Note – If you disable autonegotiation, you must enable the speed, duplex, and
link-clock (1000 Mbps only) parameters to operate in forced mode. For
instructions, see “Enabling Autonegotiation or Forced Mode for Link Parameters
With the OpenBoot PROM” on page 41.
Chapter 3 Configuring Driver Parameters37
Setting Parameters Using the vca.conf File
You can also specify the driver parameter properties by adding entries to the
vca.conf file in the /kernel/drv directory. The parameter names are the same
names listed in “Driver Parameter Values and Definitions” on page 24.
Caution – Do not remove any of the default entries in the
/kernel/drv/vca.conf file.
The online manual pages for prtconf(1) and driver.conf(4) include additional
details. The next procedure shows an example of setting parameters in a vca.conf
file.
Variables defined in the previous section apply to known devices in the system. To
set a variable for a Sun Crypto Accelerator 4000 board with the vca.conf file, you
must know the following three pieces of information for the device: device name,
device parent, and device unit address.
▼ To Set Driver Parameters Using a vca.conf File
1. Obtain the hardware path names for the vca devices in the device tree.
a. Check the /etc/driver_aliases file to identify the name associated with a
particular device.
# grep vca /etc/driver_aliases
vca "pci108e,3de8"
In the previous example, the device name associated with the Sun Crypto
Accelerator 4000 software driver ( vca)is”pci108e,3de8”.
b. Locate the device parent name and device unit address in the
/etc/path_to_inst file.
Refer to the online manual pages for path_to_inst(4).
In the previous example, there are three columns of output: device path name,
instance number, and software driver name.
38Sun Crypto Accelerator 4000 Board Installation and User’s Guide • May 2003
The device path name in the first line of the previous example is
”/pci@8,600000/network@1”. Device path names are made up of three parts:
device parent name, device node name, and device unit address. See
TABLE3-10 Device Path Name
Entire Device Path NameParent Name PortionNode Name PortionUnit Address Portion
To identify a PCI device unambiguously in the vca.conf file, use the entire device
path name (parent name, node name, and the unit address) for the device. Refer to
the pci(4) online manual page for more information about the PCI device
specification.
2. Set the parameters for the above devices in the /kernel/drv/vca.conf file.
In the following entry, the adv-autoneg-cap parameter is disabled for a particular
Sun Crypto Accelerator 4000 Ethernet device.
4. Save and close all files and programs, and exit the windowing system.
5. Shut down and reboot the system.
Setting Parameters for All Sun Crypto Accelerator 4000 vca
Devices With the vca.conf File
If you omit the device path name (parent name, node name, and the unit address),
the variable is set for all instances of all Sun Crypto Accelerator 4000 Ethernet
devices.
Chapter 3 Configuring Driver Parameters39
▼ To Set Parameters for All Sun Crypto Accelerator 4000 vca
Devices With the vca.conf File
1. Add a line in the vca.conf file to change the value of a parameter for all
instances by entering parameter=value;.
The following example sets the adv-autoneg-cap parameter to 1 for all instances
of all Sun Crypto Accelerator 4000 Ethernet devices:
adv-autoneg-cap
=1;
Example vca.conf File
The following is an example vca.conf file:
#
# Copyright 2002 Sun Microsystems, Inc. All rights reserved.
# Use is subject to license terms.
#
#ident "@(#)vca.conf 1.2 02/06/26 SMI"
#
# Use the new Solaris 9 properties to ensure that the driver is attached
# on boot, to get us to register with KCL2. This also prevents us from
# being unloaded by the cleanup modunload -i 0.
#
ddi-forceattach=1 ddi-no-autodetach=1;
name="pci108e,3de8" parent="/pci@8,700000" unit-address="1" adv-autoneg-cap=0;
adv-autoneg-cap=1;
40Sun Crypto Accelerator 4000 Board Installation and User’s Guide • May 2003
Enabling Autonegotiation or Forced
Mode for Link Parameters With the
OpenBoot PROM
The following parameters can be configured to operate in autonegotiation or forced
mode at the OpenBoot PROM (OBP) interface:
TABLE3-11 Local Link Network Device Parameters
ParameterDescription
speedThis parameter can be set to auto, 1000, 100,or10; the syntax is as follows:
• speed=auto (default)
• speed=1000
• speed=100
• speed=10
duplexThis parameter can be set to auto, full,orhalf; the syntax is as follows:
• duplex=auto (default)
• duplex=full
• duplex=half
link-clockThis parameter is applicable only if the speed parameter is set to 1000 or if
you are using a 1000 Mbps MMF Sun Crypto Accelerator 4000 board. The
value for this parameter must correspond to the value on the link
partner—for example, if the local link has a value of master, the link partner
must have a value of slave. This parameter can be set to master, slave,or
auto; the syntax is as follows:
• link-clock=auto (default)
• link-clock=master
• link-clock=slave
To establish a proper link, the speed, duplex, and link-clock (1000 Mbps only)
parameters must be configured correctly between the local link and the link partner.
Both link partners must operate in either autonegotiation or forced mode for each of
the speed, duplex, and link-clock (1000 Mbps only) parameters. A value of
auto for any of these parameters configures the link to operate in autonegotiation
mode for that parameter. The absence of a parameter at the OBP prompt configures
that parameter to have a default value of auto. A value other than auto configures
the local link to operate in forced mode for that parameter.
Chapter 3 Configuring Driver Parameters41
When the local link is operating in autonegotiation mode for the speed and duplex
parameters at 100 Mbps and below and both full and half duplexes, then the link
partner uses either the 100 Mbps or 10 Mbps speeds with either duplex.
When the speed parameter is operating in forced mode, the value must match the
speed value of the link-partner. If the duplex parameter does not match between
the local link and the link partner, the link may come up; however, traffic collisions
will occur.
When the local link speed parameter is set to autonegotiation and the link partner
speed parameter is set to forced, the link may come up depending on whether the
speed value can be negotiated between the local link and the link partner. The
interface in autonegotiation mode will always try to establish a link (if there is a
speed match) at half duplex by default. Because one of the two interfaces is not in
autonegotiation mode, the interface in autonegotiation mode detects only the speed
parameter; the duplex parameter is not detected. This method is called paralleldetection.
Caution – The establishment of a link with a duplex conflict always leads to traffic
collisions.
For a local link parameter to operate in forced mode, the parameter must have a
value other than auto. For example, to establish a forced mode link at 100 Mbps
with half duplex, type the following at the OBP prompt:
ok boot net:speed=100,duplex=half
Note – In the examples in this section, net is an alias for the default, integrated
network interface device path. You can configure other network devices by
specifying a device path instead of using net.
To establish a forced mode link at 1000 Mbps with half duplex that is a clock master,
type the following command at the OBP prompt:
ok boot net:speed=1000,duplex=half,link-clock=master
Note – The link-clock parameter must have a value that corresponds to the
link-clock value of the link partner. For example, if the link-clock value on thelocal link is set to master, the link-clock value on the link partner must be set to
slave.
42Sun Crypto Accelerator 4000 Board Installation and User’s Guide • May 2003
To establish a forced mode for a speed of 10 Mbps and an autonegotiation mode for
duplex, type the following at the OBP prompt:
ok boot net:speed=10,duplex=auto
You could also type the following at the OBP prompt to establish the same local link
parameters as the previous example:
ok boot net:speed=10
Refer to the IEEE 802.3 documentation for further details.
Sun Crypto Accelerator 4000
Cryptographic and Ethernet Driver
Operating Statistics
This section describes the statistics presented by the kstat(1M) command.
Cryptographic Driver Statistics
TABLE 3-12 describes the cryptographic driver statistics.
TABLE3-12 Cryptographic Driver Statistics
ParameterDescriptionStable or Unstable
vs-modeThe values are FIPS, standard,orunitialized.
FIPS indicates that the board is in FIPS mode.
standard indicates that the board is in not in
FIPS mode. unitialized indicates that the board
is not initialized.
vs-statusThe values are ready, faulted,orfailsafe.
ready indicates that the board is operating
normally. faulted indicates that the board not
operating. failsafe indicates failsafe mode
which is the original factory state of the board.
Chapter 3 Configuring Driver Parameters43
Stable
Stable
Ethernet Driver Statistics
TABLE 3-13 describes the Ethernet driver statistics.
TABLE3-13 Ethernet Driver Statistics
ParameterDescriptionStable or Unstable
ipacketsNumber of inbound packets.Stable
ipackets6464-bit version of ipackets.Stable
ierrorsTotal packets received that could not be processed
because they contained errors (long).
opacketsTotal packets requested to be transmitted on the
interface.
opackets64Total packets requested to be transmitted on the
interface (64-bit).
oerrorsTotal packets that were not successfully
transmitted because of errors (long).
rbytesTotal bytes successfully received on the interface.Stable
rbytes64Total bytes successfully received on the interface
(64-bit).
obytesTotal bytes requested to be transmitted on the
interface.
obytes64Total bytes requested to be transmitted on the
interface (64-bit).
multircvMulticast packets successfully received, including
group and functional addresses (long).
multixmtMulticast packets requested to be transmitted,
including group and functional addresses (long).
brdcstrcvBroadcast packets successfully received (long).Stable
brdcstxmtBroadcast packets requested to be transmitted
(long).
norcvbufTimes a valid incoming packet was known to have
been discarded because no buffer could be
allocated for receive (long).
noxmtbufPackets discarded on output because transmit
buffer was busy, or no buffer could be allocated for
transmit (long).
Stable
Stable
Stable
Stable
Stable
Stable
Stable
Stable
Stable
Stable
Stable
Stable
44Sun Crypto Accelerator 4000 Board Installation and User’s Guide • May 2003
TABLE 3-14 describes the transmit and receive MAC counters.
TABLE3-14 TX and RX MAC Counters
ParameterDescriptionStable or Unstable
tx-collisions16-bit loadable counter increments for
Stable
every frame transmission attempt that
resulted in a collision.
tx-first-collisions16-bit loadable counter increments for
Unstable
every frame transmission that
experienced a collision on the first
attempt, but was successfully
transmitted on the second attempt.
tx-excessive-collisions16-bit loadable counter increments for
Unstable
every frame transmission that has
exceeded the Attempts Limit.
tx-late-collisions16-bit loadable counter increments for
Unstable
every frame transmission that has
experienced a collision. It indicates the
number of frames that the TxMAC has
dropped due to collisions that occurred
after it has transmitted at least the
Minimum Frame Size number of bytes.
Usually this is an indication that there
is at least one station on the network
that violates the maximum allowed
span of the network.
tx-defer-timer16-bit loadable timer increments when
Unstable
the TxMAC is deferring to traffic on the
network while it is attempting to
transmit a frame. The time base for the
timer is the media byte clock divided by
256.
tx-peak-attempts8-bit register indicates the highest
Unstable
number of consecutive collisions per
successfully transmitted frame, that
have occurred since this register was
last read. The maximum value that this
register can attain is 255. A maskable
interrupt is generated to the software if
the number of consecutive collisions
per successfully transmitted frame
exceeds 255. This register will be
automatically cleared at 0 after it is
read.
Chapter 3 Configuring Driver Parameters45
TABLE3-14 TX and RX MAC Counters (Continued)
ParameterDescriptionStable or Unstable
tx-underrun16-bit loadable counter increments after
Unstable
a valid frame has been received from
the network.
rx-length-err16-bit loadable counter increments after
Unstable
a frame, whose length is greater than
the value that was programmed in the
Maximum Frame Size Register, has
been received from the network.
Unstable
when an alignment error is detected in
a receive frame. An alignment error is
reported when a receive frame fails the
CRC checking algorithm, AND the
frame contains a noninteger number of
bytes (that is, the frame size in bits
modulo 8 is not equal to zero).
rx-crc-err16-bit loadable counter increments
Unstable
when a receive frame fails the CRC
checking algorithm, AND the frame
contains an integer number of bytes
(that is, the frame size in bits modulo 8
is equal to zero).
Unstable
when an Rx_Err indication is generated
by the XCVR over the MII, while a
frame is being received. This indication
is generated by the transceiver when it
detects an invalid code in the received
data stream. A receive code violation is
not counted as an FCS or an Alignment
error.
rx-overflowsNumber of Ethernet frames dropped
Unstable
due to lack of resources.
rx-no-bufNumber of times the hardware cannot
Unstable
receive data because there is no more
receive buffer space.
rx-no-comp-wbNumber of times the hardware cannot
Unstable
post completion entries for received
data.
rx-len-mismatchNumber of received frames where the
Unstable
asserted length does not match the
actual frame length.
46Sun Crypto Accelerator 4000 Board Installation and User’s Guide • May 2003
The following Ethernet properties ( TABLE 3-15) are derived from the intersection of
device capabilities and the link partner capabilities.
TABLE 3-15 describes the current Ethernet link properties.
TABLE3-15 Current Ethernet Link Properties
ParameterDescriptionStable or Unstable
ifspeed1000, 100, or 10 MbpsStable
link-duplex0=half, 1=fullStable
link-pauseCurrent pause setting for the link, see “Flow Control
Stable
Parameters” on page 27
link-asmpauseCurrent pause setting for the link, see “Flow Control
Stable
Parameters” on page 27
link-up1=up, 0=downStable
link-status1=up, 0=downStable
xcvr-inuseType of transceiver in use: 1=internal MII,
Stable
2=external MII, 3=external PCS
TABLE 3-16 describes the read-only Media Independent Interface (MII) capabilities.
These parameters define the capabilities of the hardware. The Gigabit Media
Independent Interface (GMII) supports all of the following capabilities.
cap-asm-pauseLocal interface flow control capability
0 = Not asymmetric pause capable
1 = Asymmetric pause (from the local device)
capable (See “Flow Control Parameters” on page 27)
cap-pauseLocal interface flow control capability
0 = Not Symmetric pause capable
1 = Symmetric pause capable (See “Flow Control
Parameters” on page 27)
Stable
Stable
Stable
Stable
Reporting the Link Partner Capabilities
TABLE 3-17 describes the read-only link partner capabilities.
TABLE3-17 Read-Only Link Partner Capabilities
ParameterDescriptionStable or Unstable
lp-cap-autoneg0 = No autonegotiation
1 = Autonegotiation
lp-cap-1000fdx0 = No 1000 Mbps full-duplex transmission
1 = 1000 Mbps full-duplex
lp-cap-1000hdx0 = No 1000 Mbps half-duplex transmission
1 = 1000 Mbps half-duplex
lp-cap-100fdx0 = No 100 Mbps full-duplex transmission
1 = 100 Mbps full-duplex
lp-cap-100hdx0 = No 100 Mbps half-duplex transmission
1 = 1000 Mbps half-duplex
lp-cap-10fdx0 = No 10 Mbps full-duplex transmission
1 = 10 Mbps full-duplex
48Sun Crypto Accelerator 4000 Board Installation and User’s Guide • May 2003
Stable
Stable
Stable
Stable
Stable
Stable
TABLE3-17 Read-Only Link Partner Capabilities (Continued)
ParameterDescriptionStable or Unstable
lp-cap-10hdx0 = No 10 Mbps half-duplex transmission
Stable
1 = 10 Mbps half-duplex
lp-cap-asm-pause0 = Not asymmetric pause capable
Stable
1 = Asymmetric pause towards link partner
capability (See “Flow Control Parameters” on
page 27)
lp-cap-pause0 = Not symmetric pause capable
Stable
1 = Symmetric pause capable (See “Flow
Control Parameters” on page 27)
If the link partner is not capable of autonegotiation (when lp-cap-autoneg is 0),
the remaining information described in
TABLE 3-17 is not relevant and the parameter
value is 0.
If the link partner is capable of autonegotiation (when lp-cap-autoneg is 1), then
the speed and mode information is displayed when you use autonegotiation and the
link partner capabilities.
TABLE 3-18 describes the driver-specific parameters.
TABLE3-18 Driver-Specific Parameters
ParameterDescriptionStable or Unstable
lb-modeCopy of the loopback mode the device is in, if
Unstable
any.
promiscWhen enabled, the device is in promiscuous
Unstable
mode. When disabled, the device is not in
promiscuous mode.
Ethernet Transmit Counters
tx-wsrvCount of the number of times the transmit ring
Unstable
is full.
tx-msgdup-failAttempt to duplicate packet failure.Unstable
tx-allocb-failAttempt to allocate memory failure.Unstable
tx-queue0Number of packets queued for transmission on
Unstable
the first hardware transmit queue.
tx-queue1Number of packets queued for transmission on
Unstable
the second hardware transmit queue.
tx-queue2Number of packets queued for transmission on
Unstable
the third hardware transmit queue.
Chapter 3 Configuring Driver Parameters49
TABLE3-18 Driver-Specific Parameters (Continued)
ParameterDescriptionStable or Unstable
tx-queue3Number of packets queued for transmission on
Unstable
the fourth hardware transmit queue.
Ethernet Receive Counters
rx-hdr-pktsNumber of packets received that were less
Unstable
than 256 bytes.
rx-mtu-pktsNumber of packets received that were greater
Unstable
than 256 bytes and less than 1514 bytes.
rx-split-pktsNumber of packets that were split across two
Unstable
pages.
rx-nocanputNumber of packets dropped due to failures on
Unstable
delivery to the IP stack.
rx-msgdup-failNumber of packets that could not be
Unstable
duplicated.
rx-allocb-failNumber of block allocation failures.Unstable
rx-new-pagesNumber of pages that got replaced during
Unstable
reception.
rx-new-hdr-pagesNumber of pages that were filled with packets
Unstable
less than 256 bytes that got replaced during
reception.
rx-new-mtu-pagesNumber of pages that were filled with packets
Unstable
greater than 256 bytes and less than 1514 that
got replaced during reception.
rx-new-nxt-pagesNumber of pages that contained packets that
Unstable
were split across pages that got replaced
during reception.
rx-page-alloc-failNumber of page allocation failures.Unstable
rx-mtu-dropsNumber of times a whole page of packets
Unstable
greater than 256 bytes and less than 1514 was
dropped because the driver was unable to map
a new one to replace it.
rx-hdr-dropsNumber of times a whole page of packets less
Unstable
than 256 bytes was dropped because the driver
was unable to map a new one to replace it.
rx-nxt-dropsNumber of times a page with a split packet
Unstable
was dropped because the driver was unable to
map a new one to replace it.
50Sun Crypto Accelerator 4000 Board Installation and User’s Guide • May 2003
TABLE3-18 Driver-Specific Parameters (Continued)
ParameterDescriptionStable or Unstable
rx-rel-flowNumber of times the driver was told to release
a flow.
Ethernet PCI Properties
rev-idRevision ID of the Sun Crypto Accelerator
4000 Ethernet device useful for recognition of
device being used in the field.
pci-errSum of all PCI errors.Unstable
pci-rta-errNumber of target aborts received.Unstable
pci-rma-errNumber of master aborts received.Unstable
pci-parity-errNumber of PCI parity errors detected.Unstable
pci-drto-errNumber of times the delayed transaction retry
Note – In the previous example, N is the instance number of the vca device. This
number should reflect the instance number of the board for which you are running
the kstat command.
Chapter 3 Configuring Driver Parameters51
Network Configuration
This section describes how to edit the network host files after the adapter has been
installed on your system.
Configuring the Network Host Files
After installing the driver software, you must create a hostname.vcaN file for the
adapter ’s Ethernet interface. Note that in the file name hostname.vca
corresponds to the instance number of the vca interface you plan to use. You must
also create both an IP address and a host name for its Ethernet interface in the
/etc/hosts file.
1. Locate the correct vca interfaces and instance numbers in the
/etc/path_to_inst file.
Refer to the online manual pages for path_to_inst(4).
2. Use the ifconfig(1M) command to set up the adapter ’s vca interface.
Use the ifconfig command to assign an IP address to the network interface. Type
the following at the command line, replacing ip_address with the adapter’s IP
address:
N, N
# ifconfig vcaN plumb ip_address up
Note – In the examples in this section, N specifies the instance number of the
device.
Refer to the ifconfig(1M) online manual page and the Solaris documentation for
more information.
■ If you want a setup that will remain the same after you reboot, create an
/etc/hostname.vca
vca interface you plan to use.
52Sun Crypto Accelerator 4000 Board Installation and User’s Guide • May 2003
N file, where N corresponds to the instance number of the
To use the vca interface of the example shown in Step 1, create an
/etc/hostname.vcaN file, where N corresponds to the instance number of the
device which is 0 in this example. If the instance number were 1, the file name
would be /etc/hostname.vca1.
■ Do not create an /etc/hostname.vcaN file for a Sun Crypto Accelerator 4000
interface you plan to leave unused.
■ The /etc/hostname.vcaN file must contain the host name for the appropriate
vca interface.
■ The host name must have an IP address and must be listed in the /etc/hosts
file.
■ The host name must be different from any other host name of any other interface,
for example: /etc/hostname.vca0 and /etc/hostname.vca1 cannot share the
same host name.
The following example shows the /etc/hostname.vca
N file required for a system
named zardoz that has a Sun Crypto Accelerator 4000 board (zardoz-11).
3. Create an appropriate entry in the /etc/hosts file for each active vca interface.
For example:
# cat /etc/hosts
#
# Internet host table
#
127.0.0.1 localhost
129.144.10.57 zardoz loghost
129.144.11.83 zardoz-11
Chapter 3 Configuring Driver Parameters53
54Sun Crypto Accelerator 4000 Board Installation and User’s Guide • May 2003
CHAPTER
4
Administering the Sun Crypto
Accelerator 4000 Board With the
vcaadm and vcadiag Utilities
This chapter provides an overview of the vcaadm and vcadiag utilities. The
following sections are included:
■ “Using vcaadm” on page 55
■ “Logging In and Out With vcaadm” on page 58
■ “Entering Commands With vcaadm” on page 63
■ “Initializing the Sun Crypto Accelerator 4000 Board With vcaadm” on page 65
■ “Managing Keystores With vcaadm” on page 69
■ “Managing Boards With vcaadm” on page 76
■ “Using vcadiag” on page 81
Using vcaadm
The vcaadm program offers a command-line interface to the Sun Crypto Accelerator
4000 board. Only users designated as security officers are allowed to use the vcaadm
utility. When you first connect to a Sun Crypto Accelerator 4000 board with vcaadm,
you are prompted to create an initial security officer and password.
To access the vcaadm program easily, place the Sun Crypto Accelerator 4000 tools
directory in your search path, for example:
corresponds to the Sun Crypto Accelerator 4000 device instance number.
TABLE 4-1 shows the options for the vcaadm utility.
TABLE4-1vcaadm Options
OptionMeaning
-HDisplays help files for vcaadm commands and exit.
vcaNConnects to the Sun Crypto Accelerator 4000 board that has N as the
-d
driver instance number. For example, -d vca1 connects to device
vca1 where vca is a string in the board’s device name and 1 is the
instance number of the device. This value defaults to vca0 and must
be in the form of vcaN, where N corresponds to the device instance
number.
-f filenameInterprets one or more commands from filename and exit.
-h hostConnects to the Sun Crypto Accelerator 4000 board on host
The value for host can be a host name or an IP address, and defaults
to the loopback address.
-p portConnects to the Sun Crypto Accelerator 4000 board on port. The
value for port defaults to 6870.
-s sec_officerLogs in as a security officer named sec_officer.
-yForces a yes answer to any command that would normally
prompt for a confirmation.
.
Note – The name sec_officer is used throughout this user’s guide as an example
security officer name.
Modes of Operation
vcaadm can run in one of three modes. These modes differ mainly in how
commands are passed into vcaadm. The three modes are Single-Command mode,
File mode, and Interactive mode.
56Sun Crypto Accelerator 4000 Board Installation and User’s Guide • May 2003
Note – To use vcaadm, you must authenticate as security officer. How often you
need to authenticate as security officer is determined by which operating mode you
are using.
Single-Command Mode
In Single-Command mode, you must authenticate as security officer for every
command. Once the command is executed, you are logged out of vcaadm.
When entering commands in Single-Command mode, you specify the command to
be run after all the command-line switches are specified. For example, in SingleCommand mode, the following command would show all the users in a given
keystore and return the user to the command shell prompt.
$ vcaadm show user
Security Officer Name: sec_officer
Security Officer Password:
The following command performs a login as the security officer, sec_officer, and
creates the user web_admin in the keystore.
$ vcaadm -s sec_officer create user web_admin
Security Officer Password:
Enter new user password:
Confirm password:
User web_admin created successfully.
Note – The first password is for the security officer, followed by the password and
confirmation for the new user web_admin.
All output from Single-Command mode goes to the standard output stream. This
output can be redirected using standard UNIX shell-based methods.
File Mode
In File mode, you must authenticate as security officer for every file you run. You are
logged out of vcaadm after the commands in the command file are executed.
Chapter 4 Administering the Sun Crypto Accelerator 4000 Board With the vcaadm and vcadiag Utilities57
To enter commands in File mode, you specify a file from which vcaadm reads one or
more commands. The file must be ASCII text, consisting of one command per line.
Begin each comment with a pound sign (#) character. If the File mode option is set,
vcaadm ignores any command-line arguments after the last option. The following
example runs the commands in the deluser.scr file and answers all prompts in
the affirmative:
$ vcaadm -f deluser.scr -y
Interactive Mode
In Interactive mode, you must authenticate as security officer every time you
connect to a board. This is the default operating mode for vcaadm. To logout of
vcaadm in Interactive mode, use the logout command. Refer to “Logging In and
Out With vcaadm” on page 58.
Interactive mode presents the user with an interface similar to ftp(1), where
commands can be entered one at a time. The -y option is not supported in
interactive mode.
Logging In and Out With vcaadm
When you use vcaadm from the command-line and specify host, port, and device
using the -h, -p, and -d attributes respectively, you are immediately prompted to
log in as security officer if a successful network connection was made.
The vcaadm program establishes an encrypted network connection (channel)
between the vcaadm application and the Sun Crypto Accelerator 4000 firmware
running on a specific board.
During setup of the encrypted channel, boards identify themselves by their
hardware Ethernet address and an RSA public key. A trust database
($HOME/.vcaadm/trustdb) is created the first time vcaadm connects to a board.
This file contains all of the boards that are currently trusted by the security officer.
58Sun Crypto Accelerator 4000 Board Installation and User’s Guide • May 2003
Logging In to a Board With vcaadm
If the security officer connects to a new board, vcaadm will notify the security officer
and prompt the following options:
1. Abort the connection
2. Trust the connection one time only (no changes to trust
database)
3. Trust this board forever (adds the hardware ethernet address
and RSA public key to the trust database).
If the security officer connects to a board that has a remote access key that has been
changed, vcaadm will notify the security officer and prompt the following three
options:
1. Abort the connection
2. Trust the connection one time only (no changes to trust
database)
3. Replace the old public key bound to this hardware ethernet
address with the new public key.
Logging In to a New Board
Note – The remaining examples in this chapter were created with the Interactive
mode of vcaadm.
Chapter 4 Administering the Sun Crypto Accelerator 4000 Board With the vcaadm and vcadiag Utilities59
When connecting to a new board, vcaadm must create a new entry in the trust
database. The following is an example of logging in to a new board.
# vcaadm -h hostname
Warning: MAC ID and Public Key Not Found
----------------------------------------------------The MAC ID and public key presented by this board were
not found in your trust database.
MAC ID: 08:00:20:EE:EE:EE
Key Fingerprint: 29FC-7A54-4014-442F-7FD9-5FEA-8411-CFB4
----------------------------------------------------Please select an action:
1. Abort this connection
2. Trust the board for this session only.
3. Trust the board for all future sessions.
Your Choice -->
Logging In to a Board With a Changed Remote Access Key
When connecting to a board that has a changed remote access key, vcaadm must
change the entry corresponding to the board in the trust database. The following is
an example of logging in to a board with a changed remote access key.
# vcaadm -h hostname
Warning: Public Key Conflict
----------------------------------------------------The public key presented by the board you are connecting
to is different than the public key that is trusted for
this MAC ID.
MAC ID: 08:00:20:EE:EE:EE
New Key Fingerprint: 29FC-7A54-4014-442F-7FD9-5FEA-8411-CFB4
Trusted Key Fingerprint: A508-38D1-FED8-8103-7ACC-0D19-C9C9-11F2
----------------------------------------------------Please select an action:
1. Abort this connection
2. Trust the board for this session only.
3. Replace the current trusted key with the new key.
Your Choice -->
60Sun Crypto Accelerator 4000 Board Installation and User’s Guide • May 2003
vcaadm Prompt
The vcaadm prompt in Interactive mode is displayed as follows:
vcaadm{vcaN@hostname, sec_officer}> command
The following table describes the vcaadm prompt variables:
TABLE4-2vcaadm Prompt Variable Definitions
Prompt VariableDefinition
vcaNvca is a string that represents the Sun Crypto Accelerator 4000
board. N is the device instance number (unit address) that is in the
device path name of the board. Refer to “To Set Driver Parameters
Using a vca.conf File” on page 38 for details on retrieving this
number for a device.
hostnameThe name of the host for which the Sun Crypto Accelerator 4000
board is physically connected. hostname may be replaced with the
physical host’s IP address.
sec_officerThe name of the security officer that is currently logged in to the
board.
Logging Out of a Board With vcaadm
If you are working in Interactive mode, you may want to disconnect from one board
and connect to another board without completely exiting vcaadm. To disconnect
from a board and logout, but remain in Interactive mode, use the logout command:
Chapter 4 Administering the Sun Crypto Accelerator 4000 Board With the vcaadm and vcadiag Utilities61
In the previous example, notice the vcaadm> prompt no longer displays the device
instance number, hostname, or security officer name. To log in to another device,
type the connect command with the following optional parameters.
TABLE4-3connect Command Optional Parameters
ParameterMeaning
dev vcaNConnect to the Sun Crypto Accelerator 4000 board with the driver
instance number of N. For example -d vca1 connects to the device
vca1; this defaults to device vca0.
host hostnameConnect to the Sun Crypto Accelerator 4000 board on hostname
(defaults to the loopback address). hostname may be replaced with
the physical host’s IP address.
port portConnect to the Sun Crypto Accelerator 4000 board on port port
vcaadm will not let you issue the connect command if you are already connected
to a Sun Crypto Accelerator 4000 board. You must first logout and then issue the
connect command.
Each new connection will cause vcaadm and the target Sun Crypto Accelerator 4000
firmware to renegotiate new session keys to protect the administrative data that is
sent.
62Sun Crypto Accelerator 4000 Board Installation and User’s Guide • May 2003
Entering Commands With vcaadm
The vcaadm program has a command language that must be used to interact with
the Sun Crypto Accelerator 4000 board. Commands are entered using all or part of a
word (enough to uniquely identify that word from any other possibilities). Entering
sh instead of show would work, but re is ambiguous because it could be reset or
rekey.
The following example shows entering commands using entire words:
vcaadm{vcaN@hostname, sec_officer}> show user
User Status
The same information can be obtained in the previous example using partial words
as commands, such as sh us.
An ambiguous command produces an explanatory response:
vcaadm{vcaN@hostname, sec_officer}> re
Ambiguous command: re
Chapter 4 Administering the Sun Crypto Accelerator 4000 Board With the vcaadm and vcadiag Utilities63
Getting Help for Commands
vcaadm has built-in help functions. To get help, you must enter a question mark (?)
character following the command you want more help on. If an entire command is
entered and a “?” exists anywhere on the line, you will get the syntax for the
command, for example:
----------------------------------------------------so Create a new security officer
user Create a new user
vcaadm{vcaN@hostname, sec_officer}> create user ?
Usage: create user [<username>]
vcaadm{vcaN@hostname, sec_officer}> set ?
Sub-Command Description
----------------------------------------------------passreq Set password requirements
password Change an existing security officer password
timeout Set the auto-logout time
You can also enter a question mark at the vcaadm prompt to see a list of all of the
vcaadm commands and their description, for example:
----------------------------------------------------backup Backup master key
connectBegin admin session with firmware
create Create users and accounts
delete Delete users and accounts
diagnostics Run diagnostic tests
disable Disable a user
enable Enable a user
exit Exit vcaadm
loadfw Load new firmware
logout Logout current session
quit Exit vcaadm
rekey Generate new system keys
reset Reset the hardware
set Set operating parameters
show Show system settings
zeroize Delete all keys and reset board
64Sun Crypto Accelerator 4000 Board Installation and User’s Guide • May 2003
When not in vcaadm Interactive mode, the “?” character could be interpreted by the
shell in which you are working. In this case, be sure to use the command shell
escape character before the question mark.
Quitting the vcaadm Program in Interactive Mode
Two commands allow you to exit from vcaadm: quit and exit. The Ctrl-D key
sequence also exits from vcaadm.
Initializing the Sun Crypto Accelerator
4000 Board With vcaadm
The first step in configuring a Sun Crypto Accelerator 4000 board is to initialize it.
When you initialize a board it is necessary to create a keystore, refer to “Concepts
and Terminology” on page 86. You can either initialize the Sun Crypto Accelerator
4000 board with a new keystore or use a backup file to initialize the board to use an
existing keystore.
When you first connect to a Sun Crypto Accelerator 4000 board with vcaadm, you
are prompted to initialize the board with a new keystore or initialize the board to
use an existing keystore which is stored in a backup file. vcaadm prompts you for all
of the required information for either type of board initialization.
Chapter 4 Administering the Sun Crypto Accelerator 4000 Board With the vcaadm and vcadiag Utilities65
▼ To Initialize the Sun Crypto Accelerator 4000
Board With a New Keystore
1. Enter vcaadm at a command prompt of the system with the Sun Crypto
Accelerator 4000 board installed or enter vcaadm -h hostname if the system is
remote, and select 1 to initialize the board:
# vcaadm -h hostname
This board is uninitialized.
You will now initialize the board. You may
either completely initialize the board and
start with a new keystore or restore the board
using a backup file.
1. Initialize the board with a new keystore
2. Initialize the board to use an existing keystore
Your Choice (0 to exit) --> 1
2. Create an initial security officer name and password (Refer to “Naming
Requirements” on page 69):
3. Create a keystore name (Refer to “Naming Requirements” on page 69):
Keystore Name: keystore_name
4. Select FIPS 140-2 mode or non-FIPS mode.
When in FIPS mode the Sun Crypto Accelerator 4000 board is FIPS 140-2, level 3
compliant. FIPS 140-2 is a federal information processing standard that requires
tamper-resistance and a high level of data integrity and security. Refer to the FIPS
140-2 document located at:
66Sun Crypto Accelerator 4000 Board Installation and User’s Guide • May 2003
Note – Before an essential parameter is changed or deleted, or before a command is
executed that may have drastic consequences, vcaadm prompts you to enter Y, Yes,
N,orNo to confirm. These values are not case sensitive; the default is No.
5. Verify the configuration information:
Board initialization parameters:
----------------------------------------------------Initial Security Officer Name: sec_officer
Keystore name: keystore_name
Run in FIPS 140-2 Mode: Yes
Is this correct? (Y/Yes/N/No) [No]: y
Initializing crypto accelerator board...
Initializing the Sun Crypto Accelerator 4000 Board
to Use an Existing Keystore
If you are adding multiple boards to a single keystore, you might want to initialize
all of the boards to use the same keystore information. In addition, you might want
to restore a Sun Crypto Accelerator 4000 board to the original keystore
configuration. This section describes how to initialize a board to use an existing
keystore which is stored in a backup file.
You must first create a backup file of an existing board configuration before
performing this procedure. Creating and restoring a backup file requires a password
to encrypt and decrypt the data in the backup file. Refer to “Backing Up the Master
Key” on page 74.
Chapter 4 Administering the Sun Crypto Accelerator 4000 Board With the vcaadm and vcadiag Utilities67
▼ To Initialize the Sun Crypto Accelerator 4000
Board to Use an Existing Keystore
1. Enter vcaadm at a command prompt of the system with the Sun Crypto
Accelerator 4000 board installed or enter vcaadm -h hostname if the system is
remote, and select 2 to restore the board from a backup:
# vcaadm -h hostname
This board is uninitialized.
You will now initialize the board. You may
either completely initialize the board and
start with a new keystore or restore the board
using a backup file.
1. Initialize the board with a new keystore
2. Initialize the board to use an existing keystore
Your Choice (0 to exit) --> 2
2. Enter the path and password to the backup file:
Enter the path to the backup file: /tmp/board-backup
Password for restore file:
3. Verify the configuration information:
Board restore parameters:
----------------------------------------------------Path to backup file: /tmp/board-backup
Keystore name: keystore_name
Is this correct? (Y/Yes/N/No) [No]: y
Restoring data to crypto accelerator board...
68Sun Crypto Accelerator 4000 Board Installation and User’s Guide • May 2003
Managing Keystores With vcaadm
A keystore is a repository for key material. Associated with a keystore are security
officers and users. Keystores not only provide storage, but a means for key objects to
be owned by user accounts. This enables keys to be hidden from applications that do
not authenticate as the owner. Keystores have three components:
■ Key objects – Long-term keys that are stored for applications such as the Sun
ONE Web Server.
■ User accounts – These accounts provide applications a means to authenticate and
access specific keys.
■ Security officer accounts – These accounts provide access to key management
functions through vcaadm.
Note – A single Sun Crypto Accelerator 4000 board must have exactly one keystore.
Multiple Sun Crypto Accelerator 4000 boards can be configured to collectively work
with the same keystore to provide additional performance and fault-tolerance.
Naming Requirements
Security officer names, user names, and keystore names must meet the following
requirements:
TABLE4-4Security Officer Name, User Name, and Keystore Name Requirements
Name RequirementDescription
Minimum lengthAt least one character
Maximum length63 characters for user names and 32 characters for keystore names
Valid charactersAlphanumeric, underscore (_), dash (-), and dot (.)
First characterMust be alphabetic
Password Requirements
Password requirements vary based on the current set passreq setting (low,med,orhigh).
Chapter 4 Administering the Sun Crypto Accelerator 4000 Board With the vcaadm and vcadiag Utilities69
Setting the Password Requirements
Use the set passreq command to set the password requirements for the Sun
Crypto Accelerator 4000 board. This command sets the password character
requirements for any password prompted by vcaadm. There are three settings for
password requirements:
TABLE4-5Password Requirement Settings
Password SettingRequirements
lowDoes not require any password restrictions. This is the default while
the board is in non-FIPS mode.
medRequires six characters minimum, one character must be
nonalphabetic. This is the default setting while the board is in FIPS
140-2 mode and is the minimum password requirements allowed in
FIPS 140-2 mode.
highRequires eight characters minimum, three characters must be
alphabetic, and one character must be nonalphabetic. This is not a
default setting and must be configured manually.
To change the password requirements, enter the set passreq command followed
by low, med,orhigh. The following commands set the password requirements for a
Sun Crypto Accelerator 4000 board to high:
vcaadm{vcaN@hostname, sec_officer}> set passreq high
vcaadm{vcaN@hostname, sec_officer}> set passreq
Password security level (low/med/high): high
Populating a Keystore With Security Officers
There may be more than one security officer for a keystore. Security officer names
are known only within the domain of the Sun Crypto Accelerator 4000 board and do
not need to be identical to any user name on the host system.
70Sun Crypto Accelerator 4000 Board Installation and User’s Guide • May 2003
When creating a security officer, the name is an optional parameter on the command
line. If the security officer name is omitted, vcaadm will prompt you for the name.
(See “Naming Requirements” on page 69.)
vcaadm{vcaN@hostname, sec_officer}> create so Alice
Enter new security officer password:
Confirm password:
Security Officer Alice created successfully.
vcaadm{vcaN@hostname, sec_officer}> create so
New security officer name: Bob
Enter new security officer password:
Confirm password:
Security Officer Bob created successfully.
Populating a Keystore With Users
These user names are known only within the domain of the Sun Crypto Accelerator
4000 board and do not need to be identical to the UNIX user name that the web
server process actually runs as.
When creating a user, the user name is an optional parameter on the command line.
If the user name is omitted, vcaadm will prompt you for the user name. (See
“Naming Requirements” on page 69.)
vcaadm{vcaN@hostname, sec_officer}> create user web_admin
Enter new user password:
Confirm password:
User web_admin created successfully.
vcaadm{vcaN@hostname, sec_officer}> create user
New user name: Tom
Enter new user password:
Confirm password:
User Tom created successfully.
Users must use this password when authenticating during a web server startup.
Caution – User’s must remember their password. Without the password, the users
cannot access their keys. There is no way to retrieve a lost password.
Chapter 4 Administering the Sun Crypto Accelerator 4000 Board With the vcaadm and vcadiag Utilities71
Note – The user account is logged out if no commands are entered for more than
five minutes. This is a tunable option; see “Setting the Auto-Logout Time” on
page 76 for details.
Listing Users and Security Officers
To list users or security officers associated with a keystore, enter the show user or
show so commands.
vcaadm{vcaN@hostname, sec_officer}> show user
User Status
----------------------------------------------------web_admin Enabled
Tom Enabled
Only security officer passwords may be changed with vcaadm, and the only
password that security officers can change are their own. Use the set password
command to change security officer passwords.
vcaadm{vcaN@hostname, sec_officer}> set password
Enter new security officer password:
Confirm password:
Security Officer password has been set.
User passwords may be changed through the PKCS#11 interface with the Sun ONE
Web Server modutil utility. Refer to the Sun ONE Web Server documentation for
modutil for details.
72Sun Crypto Accelerator 4000 Board Installation and User’s Guide • May 2003
Enabling or Disabling Users
Note – Security officers cannot be disabled. Once a security officer is created, it is
enabled until it is deleted.
By default each user is created in the enabled state. Users may be disabled. Disabled
users cannot access their key material with the PKCS#11 interface. Enabling a
disabled user will restore access to all of that user ’s key material.
When enabling or disabling a user, the user name is an optional parameter on the
command line. If the user name is omitted, vcaadm will prompt you for the user
name. To disable a user account, enter the disable user command.
vcaadm{vcaN@hostname, sec_officer}> disable user Tom
User Tom disabled.
vcaadm{vcaN@hostname, sec_officer}> disable user
User name: web_admin
User web_admin disabled.
To enable an account, enter the enable user command.
vcaadm{vcaN@hostname, sec_officer}> enable user Tom
User Tom enabled.
vcaadm{vcaN@hostname, sec_officer}> enable user
User name: web_admin
User web_admin enabled.
Chapter 4 Administering the Sun Crypto Accelerator 4000 Board With the vcaadm and vcadiag Utilities73
Deleting Users
Issue the delete user command and specify the user to be deleted. When deleting
a user, the user name is an optional parameter on the command line. If the user
name is omitted, vcaadm will prompt you for the user name.
vcaadm{vcaN@hostname, sec_officer}> delete user web_admin
Delete user web_admin? (Y/Yes/N/No) [No]: y
User web_admin deleted successfully.
vcaadm{vcaN@hostname, sec_officer}> delete user
User name: Tom
Delete user Tom? (Y/Yes/N/No) [No]: y
User Tom deleted successfully.
Deleting Security Officers
Issue the delete so command and specify the security officer to be deleted. When
deleting a security officer, the security officer name is an optional parameter on the
command line. If the security officer name is omitted, vcaadm will prompt you for
the security officer name.
vcaadm{vcaN@hostname, sec_officer}> delete so Bob
Delete Security Officer Bob? (Y/Yes/N/No) [No]: y
Security Officer Bob deleted.
vcaadm{vcaN@hostname, sec_officer}> delete so
Security Officer name: Alice
Delete Security Officer Alice? (Y/Yes/N/No) [No]: y
Security Officer Alice deleted.
Backing Up the Master Key
Keystores are stored on the disk and encrypted in a master key. This master key is
stored in the Sun Crypto Accelerator 4000 firmware and can be backed up by a
security officer.
To back up the master key, use the backup command. The backup command
requires a path name to a backup file where the backup will be stored. This path
name can be placed on the command line or if omitted, vcaadm will prompt you for
the path name.
74Sun Crypto Accelerator 4000 Board Installation and User’s Guide • May 2003
Loading...
+ hidden pages
You need points to download manuals.
1 point = 1 manual.
You can buy points or you can get point for every manual you upload.