Sponsored Content
Full Discussion: PCI slot info on V480/V490
Operating Systems Solaris PCI slot info on V480/V490 Post 302215357 by reborg on Wednesday 16th of July 2008 06:35:23 AM
Old 07-16-2008
You can find the deviced id to device mappings in the followinf sun document:

Sun Fire[TM] V480/Sun Fire[TM] V490 Server PCI Bus Subsystem: requirements & configuration
 

9 More Discussions You Might Find Interesting

1. UNIX for Advanced & Expert Users

device - > slot

Hi all.. I have a Sun Ultra 450 with a lot of drives and scsi controllers installed and i have one bad internal disk.. How can "map" ex /dev/dsk/c3t2d0s0 to a slot in the internal cabinet? Any good ideas? I dont want to remove the wrong disk :) thanks in advance.. (3 Replies)
Discussion started by: s93366
3 Replies

2. UNIX for Dummies Questions & Answers

bad pci slot?

Hi, im having a problem installing my pci wireless card. Im using knoppix, but my problem is with the mobo i think. im using an older laptop, toshiba satellite 2540 and when i plug in the card i get lights on sometimes. this means its getting power right. so then to install the card into the... (0 Replies)
Discussion started by: jestra
0 Replies

3. UNIX for Advanced & Expert Users

V480 w/ Solaris 9 boot problem

Our V480 w/ Solaris 9 would not boot properly. After recreating the LUNs on our StorEdge A1000, and then performing a reboot, the machine just keep cycling through the boot process. No error messages, it keeps trying to reboot over and over again. Any ideas? We managed to do a stop+a and... (6 Replies)
Discussion started by: xnightcrawl
6 Replies

4. Solaris

Telnet issue E5500/V480

Our old E5500 was just turned off (planned :rolleyes: ) and the application was moved to a V480. Now if I login to the V480 and try to sudo to root my connection hangs, and I can not telnet to the E5500 after it was powered on again. I get "connection refused". Telnet to this machine was... (5 Replies)
Discussion started by: kjbaumann
5 Replies

5. Solaris

Wipe a Sunfire V480

Hi Guys I'm new here in these forums and also in Sun Solaris/Sun hardware related things. I have some really basic questions about the way to go for "wipe" a Sun Solaris system. I have to sell a used Sunfire v480 and I wan't to wipe the old sytem before selling it. But I'm not sure if I... (6 Replies)
Discussion started by: slowatsch
6 Replies

6. Solaris

Solaris 8 on v480 & v490

Hello, Can any kind soul please answer this? I want to boot a SunFire v490 with a dvd image we use to boot v480's. Is this possible? Are there caveats to doing this? Thanks muchly, mgb (1 Reply)
Discussion started by: mgb
1 Replies

7. Solaris

Q:x4270_m2 reconfigure PCI card to slot 5?

Hello all, I have a problem with my x4270_m2 server. I have a GBE lan built into the back of my server and I have a QGE pci card in slot 2 to be used as a redundant. My server is not picking up the QGE lan card in slot2. From investigation of the /etc/path_to_inst, which shows: #grep e1000... (2 Replies)
Discussion started by: kerrygold
2 Replies

8. Programming

How to register ISR for PCI slot???

how to register callback function in unix?? (0 Replies)
Discussion started by: powyama
0 Replies

9. UNIX for Advanced & Expert Users

how to register ISR for PCI slot???

:wall::wall::wall:how to register ISR for PCI slot using callback registery (in c programing) i am using fedora 10 os.:wall::wall::wall::wall::wall: (0 Replies)
Discussion started by: powyama
0 Replies
sckmd(1M)						  System Administration Commands						 sckmd(1M)

NAME
sckmd - Sun Fire High-End system key management daemon SYNOPSIS
/usr/platform/SUNW,Sun-Fire-15000/lib/sckmd DESCRIPTION
sckmd is a server process that resides on a Sun Fire high-end system domain. sckmd maintains the Internet Protocol Security (IPsec) Secu- rity Associations (SAs) needed to secure the communication between the Sun Fire 15K System Controller (SC) and the cvcd(1M) and dcs(1M) daemons running on a Sun Fire 15K domain. See ipsec(7P) for a description of Security Associations. sckmd receives SAs from the SC and provides these SAs to the Security Association Databases (SADBs) using pf_key(7P). sckmd normally starts up at system boot time. Each domain supports only one running sckmd process at a time. FILES
/etc/inet/ipsecinit.conf Configuration file for default system-wide IPsec policies ATTRIBUTES
See attributes(5) for descriptions of the following attributes: +-----------------------------+------------------------------------+ | ATTRIBUTE TYPE | ATTRIBUTE VALUE | +-----------------------------+------------------------------------+ |Architecture |Sun Fire High-End systems | +-----------------------------+------------------------------------+ |Availability |SUNWsckmx.u, SUNWsckmu.u, SUNWsckmr | +-----------------------------+------------------------------------+ SEE ALSO
cvcd(1M), dcs(1M), ipsecconf(1M), ipsecalgs(1M), attributes(5), ipsec(7P), ipsecah(7P), ipsecesp(7P), pf_key(7P) Sun Enterprise 10000 SSP Reference Manual System Management Services (SMS) Reference Manual NOTES
IPsec is used by Sun Fire high-end systems such as a Sun Fire 15K, to secure the communication between the SC, and the cvcd(1M) and dcs(1M) daemons running on a domain. System-wide IPsec policies for these daemons are configured on a domain with ipsecconf(1M). Default policies are defined when the SUNWsckmr package is installed on a Sun Fire high-end system domain at OS install time. Package SUNWsckmr configures default system-wide policies for cvcd(1M) and dcs(1M) by adding the following entries in /etc/inet/ipsecinit.conf: { dport sun-dr ulp tcp } permit { auth_alg md5 } { sport sun-dr ulp tcp } apply { auth_alg md5 sa unique } { dport cvc_hostd ulp tcp } permit { auth_alg md5 } { sport cvc_hostd ulp tcp } apply { auth_alg md5 sa unique } The cvc_hostd service represents cvcd(1M) and the sun-dr service represents dcs(1M) in the preceding entries. These policies conform to the format defined by ipsec(7P) and require and require IPsec AH protection using the HMAC-MD5 algorithm. See ipsecah(7P). System-wide policies for cvcd(1M) and dcs(1M) configured on a domain using ipsecconf(1M) must match the IPsec policies defined for these services on the SC. On an SC, IPsec policies for these services are defined by the SMS key management daemon. Refer to thekmd(1M) man page in the System Management Services (SMS) Reference Manual. IPsec encryption or authentication with encryption can be enabled on the domain using the encr_algs and encr_auth_algs properties, as described in the ipsecconf(1M) manual page. For example, the following ipsecconf(1M) entries require IPsec ESP protection using the Triple- DES encryption algorithm and the HMAC-MD5 authentication algorithm. { dport cvc_hostd ulp tcp } permit { encr_algs 3des encr_auth_algs md5 } { sport cvc_hostd ulp tcp } apply { encr_algs 3des encr_auth_algs md5 sa unique } See ipsecesp(7P) for more information on the IPsec ESP protocol. You can obtain a list of authentication and encryption algorithms and their properties by using the ipsecalgs(1M) command. SunOS 5.10 23 Oct 2003 sckmd(1M)
All times are GMT -4. The time now is 09:02 PM.
Unix & Linux Forums Content Copyright 1993-2022. All Rights Reserved.
Privacy Policy