Sun Developer Network Services


 
Thread Tools Search this Thread
Operating Systems Solaris Solaris BigAdmin RSS Sun Developer Network Services
# 1  
Old 01-21-2009
Sun Developer Network Services

Sun Developer Services provides how-to help, product support, and on-site consulting for Sun developer products.

More...
Login or Register to Ask a Question

Previous Thread | Next Thread

7 More Discussions You Might Find Interesting

1. Shell Programming and Scripting

Monitor some of network services

Hi I want to write a script for netflow service because my service doesnt send any packet to netflow walker (server). Although the service is started but it does not send any packet to server until i restart the service I want to write a script in order to restart the service... (7 Replies)
Discussion started by: mohsen1366
7 Replies

2. IP Networking

Oracle network services

i have installd oracle 10 on Solaris 10 now i want to access this database from remote machine. -bash-3.00$ tnsping 192.168.92.49 TNS Ping Utility for Solaris: Version 10.2.0.2.0 - Production on 17-DEC-2010 21:06:51 Copyright (c) 1997, 2005, Oracle. All rights reserved. Used... (0 Replies)
Discussion started by: akhaliq22
0 Replies

3. Solaris

sun services tools bundles , help

hi everybody , i installed services tools bundles under solaris OS , but i don't know how to transfer files (that contain reports) to the system where SFT is installed ? and how i can consult a results in SFT server ? (0 Replies)
Discussion started by: lid-j-one
0 Replies

4. HP-UX

how can I get network services

Hi Is there a cmd in hpux 11 to get the network services the network services must display "Listen" like command netstat -an |grep Listen and display the process that is running on a port in HP-Unix at the same time my request can not use lsof -i command,not to install any extral... (2 Replies)
Discussion started by: alert0919
2 Replies

5. UNIX for Dummies Questions & Answers

Search for network services

OK I am a complete newbie to Unix. We have a Sunfire V890 running SUNOS Release 5.9. The Operating Environment is Solaris 9. I have been tasked with determining whether or not specific network and solaris services are enabled or disabled. If the services are enabled I need to disable them. I'm... (12 Replies)
Discussion started by: coachgt1
12 Replies

6. IP Networking

stopping and starting network services

Solaris v5.6 how do you stop and start the network services? (4 Replies)
Discussion started by: Westy564
4 Replies

7. UNIX for Advanced & Expert Users

Long Delay if any with network services

While installing a firewall, I was pinging the interface from SCO 5.0.6 Openserver box, while no response, I hit "DEL" to cancel, but no cancel. Then all of a sudden I get BOO-KOO traffic lights on HUB and Switch.... Then a kernel trap error. System froze... Proceeded with a cold boot. Now I have... (8 Replies)
Discussion started by: nashvillek5
8 Replies
Login or Register to Ask a Question
sckmd(1M)						  System Administration Commands						 sckmd(1M)

NAME
sckmd - Sun Fire High-End system key management daemon SYNOPSIS
/usr/platform/SUNW,Sun-Fire-15000/lib/sckmd DESCRIPTION
sckmd is a server process that resides on a Sun Fire high-end system domain. sckmd maintains the Internet Protocol Security (IPsec) Secu- rity Associations (SAs) needed to secure the communication between the Sun Fire 15K System Controller (SC) and the cvcd(1M) and dcs(1M) daemons running on a Sun Fire 15K domain. See ipsec(7P) for a description of Security Associations. sckmd receives SAs from the SC and provides these SAs to the Security Association Databases (SADBs) using pf_key(7P). sckmd normally starts up at system boot time. Each domain supports only one running sckmd process at a time. FILES
/etc/inet/ipsecinit.conf Configuration file for default system-wide IPsec policies ATTRIBUTES
See attributes(5) for descriptions of the following attributes: +-----------------------------+------------------------------------+ | ATTRIBUTE TYPE | ATTRIBUTE VALUE | +-----------------------------+------------------------------------+ |Architecture |Sun Fire High-End systems | +-----------------------------+------------------------------------+ |Availability |SUNWsckmx.u, SUNWsckmu.u, SUNWsckmr | +-----------------------------+------------------------------------+ SEE ALSO
cvcd(1M), dcs(1M), ipsecconf(1M), ipsecalgs(1M), attributes(5), ipsec(7P), ipsecah(7P), ipsecesp(7P), pf_key(7P) Sun Enterprise 10000 SSP Reference Manual System Management Services (SMS) Reference Manual NOTES
IPsec is used by Sun Fire high-end systems such as a Sun Fire 15K, to secure the communication between the SC, and the cvcd(1M) and dcs(1M) daemons running on a domain. System-wide IPsec policies for these daemons are configured on a domain with ipsecconf(1M). Default policies are defined when the SUNWsckmr package is installed on a Sun Fire high-end system domain at OS install time. Package SUNWsckmr configures default system-wide policies for cvcd(1M) and dcs(1M) by adding the following entries in /etc/inet/ipsecinit.conf: { dport sun-dr ulp tcp } permit { auth_alg md5 } { sport sun-dr ulp tcp } apply { auth_alg md5 sa unique } { dport cvc_hostd ulp tcp } permit { auth_alg md5 } { sport cvc_hostd ulp tcp } apply { auth_alg md5 sa unique } The cvc_hostd service represents cvcd(1M) and the sun-dr service represents dcs(1M) in the preceding entries. These policies conform to the format defined by ipsec(7P) and require and require IPsec AH protection using the HMAC-MD5 algorithm. See ipsecah(7P). System-wide policies for cvcd(1M) and dcs(1M) configured on a domain using ipsecconf(1M) must match the IPsec policies defined for these services on the SC. On an SC, IPsec policies for these services are defined by the SMS key management daemon. Refer to thekmd(1M) man page in the System Management Services (SMS) Reference Manual. IPsec encryption or authentication with encryption can be enabled on the domain using the encr_algs and encr_auth_algs properties, as described in the ipsecconf(1M) manual page. For example, the following ipsecconf(1M) entries require IPsec ESP protection using the Triple- DES encryption algorithm and the HMAC-MD5 authentication algorithm. { dport cvc_hostd ulp tcp } permit { encr_algs 3des encr_auth_algs md5 } { sport cvc_hostd ulp tcp } apply { encr_algs 3des encr_auth_algs md5 sa unique } See ipsecesp(7P) for more information on the IPsec ESP protocol. You can obtain a list of authentication and encryption algorithms and their properties by using the ipsecalgs(1M) command. SunOS 5.10 23 Oct 2003 sckmd(1M)