Server XSCF Users Guide
Server XSCF Users Guide
Server XSCF Users Guide
M3000/M4000/M5000/M8000/M9000
Servers XSCF User’s Guide
Please
Recycle
Copyright 2007-2009 FUJITSU LIMITED, 1-1, Kamikodanaka 4-chome, Nakahara-ku, Kawasaki-shi, Kanagawa-ken 211-8588, Japon. Tous
droits réservés.
Entrée et revue tecnical fournies par Sun Microsystems, Incl sur des parties de ce matériel.
Sun Microsystems, Inc. et Fujitsu Limited détiennent et contrôlent toutes deux des droits de propriété intellectuelle relatifs aux produits et
technologies décrits dans ce document. De même, ces produits, technologies et ce document sont protégés par des lois sur le copyright, des
brevets, d’autres lois sur la propriété intellectuelle et des traités internationaux. Les droits de propriété intellectuelle de Sun Microsystems, Inc.
et Fujitsu Limited concernant ces produits, ces technologies et ce document comprennent, sans que cette liste soit exhaustive, un ou plusieurs
des brevets déposés aux États-Unis et indiqués à l’adresse http://www.sun.com/patents de même qu’un ou plusieurs brevets ou applications
brevetées supplémentaires aux États-Unis et dans d’autres pays.
Ce document, le produit et les technologies afférents sont exclusivement distribués avec des licences qui en restreignent l’utilisation, la copie,
la distribution et la décompilation. Aucune partie de ce produit, de ces technologies ou de ce document ne peut être reproduite sous quelque
forme que ce soit, par quelque moyen que ce soit, sans l’autorisation écrite préalable de Fujitsu Limited et de Sun Microsystems, Inc., et de leurs
éventuels bailleurs de licence. Ce document, bien qu’il vous ait été fourni, ne vous confère aucun droit et aucune licence, expresses ou tacites,
concernant le produit ou la technologie auxquels il se rapporte. Par ailleurs, il ne contient ni ne représente aucun engagement, de quelque type
que ce soit, de la part de Fujitsu Limited ou de Sun Microsystems, Inc., ou des sociétés affiliées.
Ce document, et le produit et les technologies qu’il décrit, peuvent inclure des droits de propriété intellectuelle de parties tierces protégés par
copyright et/ou cédés sous licence par des fournisseurs à Fujitsu Limited et/ou Sun Microsystems, Inc., y compris des logiciels et des
technologies relatives aux polices de caractères.
Par limites du GPL ou du LGPL, une copie du code source régi par le GPL ou LGPL, comme applicable, est sur demande vers la fin utilsateur
disponible; veuillez contacter Fujitsu Limted ou Sun Microsystems, Inc.
Cette distribution peut comprendre des composants développés par des tierces parties.
Des parties de ce produit pourront être dérivées des systèmes Berkeley BSD licenciés par l’Université de Californie. UNIX est une marque
déposée aux Etats-Unis et dans d’autres pays et licenciée exclusivement par X/Open Company, Ltd.
Sun, Sun Microsystems, le logo Sun, Java, Netra, Solaris, Sun Ray, Answerbook2, docs.sun.com, OpenBoot, et Sun Fire sont des marques de
fabrique ou des marques déposées de Sun Microsystems, Inc., ou ses filiales, aux Etats-Unis et dans d’autres pays.
Fujitsu et le logo Fujitsu sont des marques déposées de Fujitsu Limited.
Toutes les marques SPARC sont utilisées sous licence et sont des marques de fabrique ou des marques déposées de SPARC International, Inc.
aux Etats-Unis et dans d’autres pays. Les produits portant les marques SPARC sont basés sur une architecture développée par Sun
Microsystems, Inc.
SPARC64 est une marques déposée de SPARC International, Inc., utilisée sous le permis par Fujitsu Microelectronics, Inc. et Fujitsu Limited.
L’interface d’utilisation graphique OPEN LOOK et Sun™ a été développée par Sun Microsystems, Inc. pour ses utilisateurs et licenciés. Sun
reconnaît les efforts de pionniers de Xerox pour la recherche et le développement du concept des interfaces d’utilisation visuelle ou graphique
pour l’industrie de l’informatique. Sun détient une license non exclusive de Xerox sur l’interface d’utilisation graphique Xerox, cette licence
couvrant également les licenciés de Sun qui mettent en place l’interface d’utilisation graphique OPEN LOOK et qui, en outre, se conforment
aux licences écrites de Sun.
Droits du gouvernement américain - logiciel commercial. Les utilisateurs du gouvernement américain sont soumis aux contrats de licence
standard de Sun Microsystems, Inc. et de Fujitsu Limited ainsi qu’aux clauses applicables stipulées dans le FAR et ses suppléments.
Avis de non-responsabilité: les seules garanties octroyées par Fujitsu Limited, Sun Microsystems, Inc. ou toute société affiliée de l’une ou l’autre
entité en rapport avec ce document ou tout produit ou toute technologie décrit(e) dans les présentes correspondent aux garanties expressément
stipulées dans le contrat de licence régissant le produit ou la technologie fourni(e). SAUF MENTION CONTRAIRE EXPRESSÉMENT
STIPULÉE DANS CE CONTRAT, FUJITSU LIMITED, SUN MICROSYSTEMS, INC. ET LES SOCIÉTÉS AFFILIÉES REJETTENT TOUTE
REPRÉSENTATION OU TOUTE GARANTIE, QUELLE QU’EN SOIT LA NATURE (EXPRESSE OU IMPLICITE) CONCERNANT CE
PRODUIT, CETTE TECHNOLOGIE OU CE DOCUMENT, LESQUELS SONT FOURNIS EN L’ÉTAT. EN OUTRE, TOUTES LES CONDITIONS,
REPRÉSENTATIONS ET GARANTIES EXPRESSES OU TACITES, Y COMPRIS NOTAMMENT TOUTE GARANTIE IMPLICITE RELATIVE À
LA QUALITÉ MARCHANDE, À L’APTITUDE À UNE UTILISATION PARTICULIÈRE OU À L’ABSENCE DE CONTREFAÇON, SONT
EXCLUES, DANS LA MESURE AUTORISÉE PAR LA LOI APPLICABLE. Sauf mention contraire expressément stipulée dans ce contrat, dans
la mesure autorisée par la loi applicable, en aucun cas Fujitsu Limited, Sun Microsystems, Inc. ou l’une de leurs filiales ne sauraient être tenues
responsables envers une quelconque partie tierce, sous quelque théorie juridique que ce soit, de tout manque à gagner ou de perte de profit,
de problèmes d’utilisation ou de perte de données, ou d’interruptions d’activités, ou de tout dommage indirect, spécial, secondaire ou
consécutif, même si ces entités ont été préalablement informées d’une telle éventualité.
LA DOCUMENTATION EST FOURNIE “EN L’ETAT” ET TOUTES AUTRES CONDITIONS, DECLARATIONS ET GARANTIES EXPRESSES
OU TACITES SONT FORMELLEMENT EXCLUES, DANS LA MESURE AUTORISEE PAR LA LOI APPLICABLE, Y COMPRIS NOTAMMENT
TOUTE GARANTIE IMPLICITE RELATIVE A LA QUALITE MARCHANDE, A L’APTITUDE A UNE UTILISATION PARTICULIERE OU A
L’ABSENCE DE CONTREFACON.
Contents
Preface xvii
v
2.2.3 LDAP Administration 2–39
2.2.4 Time Administration 2–43
2.2.5 SSH/Telnet Administration 2–53
2.2.6 Https Administration 2–59
2.2.7 Audit Administration 2–67
2.2.8 Log Archiving Administration 2–74
2.2.9 SNMP Administration 2–79
2.2.10 Mail Administration 2–91
2.2.11 Domain Configuration 2–94
2.2.12 System Board Configuration 2–122
2.2.13 Domain Mode Configuration 2–125
2.2.14 Locale Administration 2–136
2.2.15 Altitude Administration 2–137
2.2.16 DVD Drive/Tape Drive Unit Administration 2–138
2.2.17 COD Administration 2–141
2.3 Save and Restore XSCF Configuration Information 2–145
Contents vii
5. Overview of the XSCF Shell 5–1
5.1 Overview of the XSCF Command Shell 5–1
5.2 Login to XSCF Shell 5–7
5.2.1 Before Logging In 5–8
5.2.2 Operation From a Terminal Connected to the Serial Port 5–8
5.2.3 Operation for Connecting Via the XSCF-LAN (SSH) 5–9
5.2.4 Operation For Connecting Via the XSCF-LAN (Telnet) 5–11
5.3 View Server Status and Control Commands 5–11
5.4 Server Configuration Information Commands 5–13
5.5 Domain Control and Maintenance Commands 5–14
5.6 View and Archive the XSCF Logs 5–16
5.7 User Management and Security Commands 5–17
5.8 Use the XSCF Other Commands 5–18
5.9 View XSCF Shell Error Messages 5–19
viii SPARC Enterprise Mx000 Servers XSCF User’s Guide • August 2009
8.1.2 Firmware Update Conditions and Environment 8–3
8.1.3 Method of Delivering Firmware 8–4
8.1.4 Method of Checking the Firmware Version 8–4
8.1.5 Three Steps of the Firmware Update 8–5
8.1.6 Features of XSCF Firmware Update 8–6
8.1.7 Firmware Update Types and Timing 8–7
8.1.8 Firmware Update for Redundant XSCF Units 8–8
8.1.9 Ensuring Proper Operation After a Firmware Update 8–8
8.1.10 Firmware Update Procedure 8–9
8.1.11 If an Error Occurs During XSCF Firmware Update 8–20
8.1.12 Frequently Asked Questions 8–20
8.2 Collecting XSCF Logs 8–21
8.2.1 Log Types and Reference Commands 8–21
8.2.2 Method of Collecting the Log Information 8–24
Contents ix
A. Warning and Information Messages A–1
A.1 Message Types A–1
A.2 Messages in Each Function A–3
D. Troubleshooting D–1
D.1 Troubleshooting XSCF and FAQ D–1
D.2 Troubleshooting the Server While XSCF Is Being Used D–7
Index Index–1
FIGURE 1-1 Outline Drawing of the Rear Panel (In the Entry-level Server) 1–4
FIGURE 1-2 Outline Drawing of the XSCF Unit Front Panel (In the Midrange Servers) 1–7
FIGURE 1-3 Outline Drawing of the XSCF Unit Front Panel (In High-End Servers) 1–8
FIGURE 1-5 XSCF-LAN Redundancy (In Entry-level and Midrange Servers) 1–18
FIGURE 1-6 Two XSCF-LANs and Two XSCF Units Configuration (In High-End Servers) 1–19
FIGURE 2-1 Network Interface Required for XSCF Network Configuration (In the High-End Servers) 2–
19
FIGURE 2-2 Domain Component Hardware (In Midrange and High-End Servers) 2–102
FIGURE 2-4 XSB Configuration Diagram (Uni-XSB) (In the Midrange Servers) 2–104
FIGURE 2-5 XSB Configuration Diagram (Quad-XSB) (In the Midrange Servers) 2–105
FIGURE 2-6 XSB Configuration Diagram (Uni-XSB) (In the High-End Servers) 2–106
FIGURE 2-7 XSB Configuration Diagram (Quad-XSB) (In the High-End Servers) 2–107
FIGURE 2-8 XSB Configuration Diagram (Uni-XSB) (In the Entry-Level Server) 2–107
FIGURE 2-9 CPUs on CPU/Memory Board Unit (CMU) and Domain Configuration 2–129
FIGURE 3-1 Operating Modes for Connection to XSCF (In Midrange Servers) 3–2
FIGURE 3-5 Connection of External Internet Using VPN Communication (In High-End Server) 3–15
xi
FIGURE 3-6 Example of LAN Port Connections Made Redundant 3–17
FIGURE 3-7 Example of LAN Port Connections Not Made Redundant 3–18
FIGURE 6-3 Mail Sent for an XSCF Parts Fault That Occurred 6–5
FIGURE 9-3 Example of the Tree Frame and Main Page 9–5
xii SPARC Enterprise Mx000 Servers XSCF User’s Guide • August 2009
Tables
xiii
TABLE 2-14 Log Archiving Administration Terms 2–74
TABLE 2-20 Number of Domains and XSBs for Each System 2–97
TABLE 2-21 PSB, XSB, and LSB Numbers to be Assigned (Decimal) 2–98
TABLE 2-29 Value of Secure Variable and Status of Mode Switch 2–128
TABLE 3-2 XSCF-LAN Port Numbers and Connection Directions for Functions 3–6
TABLE 3-3 DSCP Link Port Numbers and Connection Directions for Functions 3–6
TABLE 4-1 Fan speed levels corresponding to altitude and environmental temperature (Entry-Level
system) 4–4
TABLE 4-2 Fan speed levels corresponding to altitude and environmental temperature (Midrange
system) 4–4
TABLE 4-3 Fan speed levels corresponding to altitude and environmental temperature (Highend
system) 4–4
xiv SPARC Enterprise Mx000 Servers XSCF User’s Guide • August 2009
TABLE 4-5 External I/O Expansion Unit Administration 4–29
Tables xv
TABLE 9-24 Firmware Updating 9–26
xvi SPARC Enterprise Mx000 Servers XSCF User’s Guide • August 2009
Preface
This manual describes the system monitor and control facility, known as eXtended
System Control Facility (XSCF), which is used to control, monitor, operate, and
service SPARC EnterpriseTM series servers and domains. XSCF may also be referred
to as the System Control Facility (SCF). Unless otherwise stated in this manual, the
SPARC Enterprise system is described as “the server” or “the system”.
Before reading this manual, you must have read the SPARC Enterprise M8000/M9000
Servers Overview Guide, the SPARC Enterprise M4000/M5000 Servers Overview
Guide, the SPARC Enterprise M3000 Server Overview Guide, and the SPARC Enterprise
M3000/M4000/M5000/M8000/M9000 Servers Administration Guide.
xvii
Audience
This manual is intended for users, specifically SPARC Enterprise system
management/maintenance administrators. Moreover, the system administrator is
required to have the following knowledge:
■ SolarisTM Operating System (Solaris OS) and UNIX command
■ SPARC Enterprise system and basic knowledge of XSCF
Glossary
For the terms used in the “SPARC Enterprise Mx000 Servers Documentation” on
page xx, refer to the Sun SPARC Enterprise M3000/M4000/M5000/M8000/M9000
Servers Glossary.
xviii SPARC Enterprise Mx000 Servers XSCF User’s Guide • August 2009
■ Chapter 6
Describes the XSCF mail function.
■ Chapter 7
Explains the XSCF SNMP agent function.
■ Chapter 8
Explains how to update firmware and how to collect dump and log data.
■ Chapter 9
Describes how to use the XSCF Web.
■ Appendix A
Explains the error and informational messages output by XSCF during
operation with the console, mail, or SNMP function of this system.
■ Appendix B
Describes the following XSCF log information, which can be viewed on the
XSCF console using XSCF commands.
■ Appendix C
Explains Management Information Base (MIB), which is supported by the
XSCF SNMP agent function.
■ Appendix D
Describes problems that can occur during use of the XSCF console or during
operation of the system and provides solutions for them.
■ Appendix E
Explains the license conditions that apply to using software functions that are
licensed under various public licenses, including: LinuxV4.0, General Public
License (GPL), Lesser Public License (LGPL), and others.
■ Index
Lists key items used in the manual and corresponding page numbers for quick
reference.
Preface xix
SPARC Enterprise Mx000 Servers
Documentation
The manuals listed below are provided for reference.
Book Titles
Note – Product Notes are available on the web site only. Please check for the most
recent update on your product.
Note – The man page can be referenced on the XSCF Shell, and it provides the same
content as the SPARC Enterprise M3000/M4000/M5000/M8000/M9000 Servers XSCF
Reference Manual.
a. The latest information about other documents and SPARC Enterprise series
support are provided on the Web.
http://src.opensolaris.org/source/xref/onnv/onnv-
gate/usr/src/lib/fm/libfmd_snmp/mibs/
Preface xxi
Abbreviated References to Other
Documents
In this manual abbreviated titles may be used when referring to a systems manual.
The following table lists the abbreviations used in this manual.
xxii SPARC Enterprise Mx000 Servers XSCF User’s Guide • August 2009
Models
The model names used in this manual are as follows.
Documentation http://docs.sun.com/
Support http://www.sun.com/support/
Training http://www.sun.com/training/
Preface xxiii
Text Conventions
This manual uses the following fonts and symbols to express specific types of
information.
Prompt Notations
The prompt notations used in this manual are as follows.
XSCF XSCF>
C shell machine-name%
C shell super user machine-name#
Bourne shell and Korn shell $
Bourne shell and Korn shell #
super user
OpenBootTM PROM ok
xxiv SPARC Enterprise Mx000 Servers XSCF User’s Guide • August 2009
Syntax of the Command-Line Interface
(CLI)
The command syntax is described below.
Command syntax
The command syntax is as follows:
■ A variable that requires input of a value must be enclosed in <>.
■ An optional element must be enclosed in [].
■ A group of options for an optional keyword must be enclosed in [] and delimited
by |.
■ A group of options for a mandatory keyword must be enclosed in {} and
delimited by |.
■ The command syntax is shown in a box.
Example:
XSCF> showuser -l
Caution-IMPORTANT- This indicates information that could help the user to use the
product more effectively.
Preface xxv
Software License
Some software functions explained in this manual are licensed under public licenses
(GNU Public License (GPL), GNU Lesser Public License (LGPL), and others). See
Appendix E for information about these licenses.
http://www.sun.com/hwdocs/feedback
Please include the title and part number of your document with your feedback:
xxvi SPARC Enterprise Mx000 Servers XSCF User’s Guide • August 2009
CHAPTER 1
XSCF Overview
This chapter provides an overview of the system monitoring and control facility
(eXtended System Control Facility, or XSCF).
The XSCF is the firmware running on the Service Processor in the server. In the rest
of this chapter, although XSCF firmware programs are called XSCF firmware, or
XSCF, they all have the same meaning. The board with the installed XSCF firmware
is called the XSCFU (also referred to as the "XSCF Unit") or Service Processor.
The XSCF uses different functions to achieve high system availability. The XSCF
firmware is a single centralized point for the management of hardware
configuration, control of hardware monitoring, cooling system (fan units), domain
status monitoring, power on and power off of peripheral devices (Note 2), and error
monitoring. The XSCF centrally controls and monitors the server. The XSCF also has
a partitioning function to configure and control domains, and it has a function to
monitor the server through an Ethernet connection so that the user can control the
server remotely. Another function is to report failure information to the system
administrator and a remote control input/output function.
In the SPARC Enterprise™ M3000 server (the M3000 server; the entry-level server)
and the SPARC Enterprise M4000/M5000 (the M4000/M5000 servers; the midrange
servers), a single XSCF Unit is installed in the server. In the SPARC Enterprise
M8000/M9000 servers (the M8000/M9000 servers; the high-end servers), two XSCF
Units are installed in the server and they are duplicated. Also, in the M3000 server,
1-1
the XSCF Unit is fixed to the Motherboard Unit (MBU). For details of the server
differences, see Section 1.2.1, “Major Differences Among the Server Models” on
page 1-14.
Note – (2) Only the system model with a special interface can power on and off the
peripheral devices. (See Remote Cabinet Interface (RCI) in External Interfaces.)
External Interfaces
The following connectors (ports) and LEDs act as the external interface of the XSCF
Unit. The user, system administrator, and field engineer (FE) can use these ports for
server monitoring and XSCF firmware operations:
■ One Serial port that can be used for the command-line interface (CLI) (Note 1)
■ Two Ethernet ports (XSCF-LAN ports) (10/100BASE-T)
CLI and the browser user interface (BUI) can be used with these ports for server
monitoring and operations. (Note 1)
■ USB port that an FE or a system administrator can use to save and restore
hardware information
■ Two UPS Controller (UPC) ports to connect the entire system with an
Uninterruptible Power Supply Unit (UPS)
A UPS is connected for backup power control purposes in the event of a power
outage. In the M8000/M9000 servers, the UPC interface ports are in the cabinet.
1-2 SPARC Enterprise Mx000 Servers XSCF User’s Guide • August 2009
■ Remote Cabinet Interface (RCI) port to perform power supply interlock by
connecting a system and an I/O device with an RCI device
The RCI is the power and system control interface that interconnects I/O units
with the server, including processors and expansion file units, and performs such
functions as power supply interlock and alarm notification and recognition.
■ Three types of LEDs that indicate the XSCF Unit status: ACTIVE LED, READY
LED, and CHECK LED
In the M3000/M4000/M5000 servers, there are two types of LEDs: READY LED
and CHECK LED.
Note – (1) In this manual, XSCF CLI functions are called “XSCF Shell,” and XSCF
BUI functions are called “XSCF Web”.
Of the rear panel of the M3000 server, this section focuses on the external interface
which has relevance to XSCF Unit. For details about the other units or interfaces of
the rear panel and the mounting location of XSCF Unit, see the SPARC Enterprise
M3000 Server Overview Guide and the SPARC Enterprise M3000 Server Service Manual.
RCI Port
When connecting a peripheral device with an RCI connector to the system, the RCI
port is used for interlocking with a power supply and error monitoring.
Note – To use the RCI function, the server or I/O devices must have a RCI port.
1-4 SPARC Enterprise Mx000 Servers XSCF User’s Guide • August 2009
USB Port
The USB port (type A) is used to connect a USB device. The port is compatible with
USB 1.1. The port can be used by a system administrator or an FE to save and restore
the hardware information. For the USB handling, see Section 2.3, “Save and Restore
XSCF Configuration Information” on page 2-145 and Chapter 8.
READY LED
The READY LED lights up in green. When the power supply is turned on, the
READY LED blinks. This blinking LED state indicates that the XSCF has been
started and is being initialized. When XSCF initialization is completed, the LED
stays lit.
CHECK LED
The CHECK LED lights up in orange. While the XSCF is operating normally, the
LED remains off. If an abnormality occurs in the XSCF Unit, the CHECK LED turns
on. The CHECK LED can set to blink using an XSCF Shell command. This can be
used to identify the XSCF Unit even if there is no failure. For details on the
LED-related commands of the XSCF Shell, see Chapter 5 and the XSCF Reference
Manual.
Note – The Check LED turns on immediately after the server input power is turned
on.
Serial Port
The serial port (RS-232C port) uses an RJ-45 connector. The serial port is used with
the XSCF Shell to configure server settings and display the server status. An
RS-232C serial cross cable is used in the serial port. The connection between the
serial port and a PC requires an RJ-45 / RS-232C conversion cable or a conversion
connector. For details on serial port connections, see Chapter 3 and the Installation
Guide for your server.
ACT LED
Located on each of the XSCF-LAN ports, the ACT LED is a LAN LED that lights up
in green. When the communication state is Link up, the ACT LED lights up. When
the communication state is Link down, the ACT LED light is off. The ACT LED light
is off while data is being sent/received though the associated LAN connection. So,
the ACT LED looks as if it is blinking.
UPC Port
There are two UPC ports. These ports are a connection between the XSCF Unit and
the UPS. The UPC port is used only when a UPS is connected. For details on the
connectors, see the Service Manual for your server.
1-6 SPARC Enterprise Mx000 Servers XSCF User’s Guide • August 2009
FIGURE 1-2 Outline Drawing of the XSCF Unit Front Panel (In the Midrange Servers)
1 2 3 4 5 8 9 10
The RCI port, serial port, USB port, XSCF-LAN ports, Link Speed LED, ACT LED,
UPC ports, CHECK LED, and READY LED shown in FIGURE 1-2 have the same
functions as those of the M3000 server. For descriptions of their functions, see the
explanation of FIGURE 1-1.
1 2
3 4 5 6 7
8 9 10 11
XSCF Unit (Front; in Expansion cabinet)
The Link Speed LED, ACT LED, XSCF-LAN ports, USB port, serial port, RCI port,
READY LED, and CHECK LED shown in FIGURE 1-3 have the same functions as
those of the M3000 server. For descriptions of their functions, see the explanation of
FIGURE 1-1.
1-8 SPARC Enterprise Mx000 Servers XSCF User’s Guide • August 2009
ACTIVE LED
The ACTIVE LED lights up in green. If the XSCF Unit is in a redundant
configuration, the ACTIVE LED indicates the active XSCF Unit.
Connector That Connects the XSCF Unit for the Base Cabinet With the
XSCF Unit for the Expansion Cabinet
The connector for connecting between XSCF Units is used to connect the Base
cabinet to an Expansion cabinet on the M9000 server. Field engineers should connect
this connector.
The basic types of user account privileges controlled by XSCF are listed below. The
server provides the XSCF Shell and XSCF Web, but their privileges depend on the
user privilege (type).
■ System administrator
■ Domain administrator
■ Operator
■ Field engineer
Security
XSCF provides an encryption function using Secure Shell (SSH) or Secure Sockets
Layer (SSL) and an audit function. Any operation error or unauthorized attempt to
access XSCF functionality is recorded in a log. The system administrator can use this
information for troubleshooting system errors and unauthorized login attempts.
The user can power on and off the server by using XSCF as follows:
■ Power on/off the server or a domain
The user can turn on, turn off, or reset the server by using the XSCF Shell
command from a remote terminal, which is connected to XSCF over a LAN or
serial connection. When the user instructs power off, the Solaris OS is
automatically shut down, and then power will be turned off.
1-10 SPARC Enterprise Mx000 Servers XSCF User’s Guide • August 2009
■ Automatically shut down and cancel a power on operation when an error is
detected
If a system abnormality occurs, the Solaris OS is automatically shut down, and
the subsequent power on will not be started. This can minimize damage to the
system.
■ Control power during power failure and power restoration
XSCF performs the following operations when a power failure occurs that causes
the system to turn off:
■ When a power failure occurs:
XSCF performs emergency power off when the power failure occurs. When a UPS
is connected, any running domains may also be shut down automatically. For a
momentary power failure, XSCF may allow the system to continue working
without any shutting down.
■ When power is restored:
The system can be set up such that XSCF automatically turns on the power to the
server, then starts up the domains, relieving the system administrator of extra
work.
For details on operation settings for a power failure, see Section 4.4.10, “Shutdown
Wait Time Administration” on page 4-23.
For details on domain configuration, see the Overview Guide for your server and
Chapter 2. Also, for each term, see Glossary.
Note – In the M3000 server, the domain configuration control function is not
available. The M3000 server consists of a single PSB (Uni-XSB) equipped with one
CPU, and operates with one domain only. Unlike the M4000/M5000/M8000/M9000
servers, the user cannot configure a domain by logically dividing the PSB.
1-12 SPARC Enterprise Mx000 Servers XSCF User’s Guide • August 2009
Capacity on Demand Function
Capacity on Demand is an option to purchase spare processing resources (CPUs) for
your server. The spare resources are provided in the form of one or more CPUs on
COD boards that are installed on your server. When you need the spare processing
resources (CPUs) for the server, XSCF assists the operation to add or delete the
resources. For details on COD, see the COD User’s Guide.
For an overview of the system board and the component, see the Overview Guide and
the Service Manual for your server.
1-14 SPARC Enterprise Mx000 Servers XSCF User’s Guide • August 2009
1.3 Types of Connection to XSCF
This section outlines types of connection to the XSCF.
XSCF enables access to the server over a serial port or from networks connected to
XSCF-LAN. FIGURE 1-4 outlines the connections to the XSCF.
SSH/telnet/
SSH/telnet/
https
https
connection
connection
Terminal
Terminal
Router
Server XSCF-LAN
Ethernet connection
Domain
Domain Connection to the
XSCF
: serial port
User
LAN
Terminal
Note – In the systems with two XSCF Units, the XSCF Unit is in a redundant
configuration, and there are physically twice as many XSCF-LAN ports and serial
ports. Also, in the entry-level server, there is only one domain.
1-16 SPARC Enterprise Mx000 Servers XSCF User’s Guide • August 2009
TABLE 1-2 XSCF-LAN Operation Examples 1
Note – The two XSCF-LAN ports are used for the same purpose (alternate path
configuration). For details on these connections, see Chapter 3.
FIGURE 1-5 and FIGURE 1-6 show the network, which belongs to one or two different
subnets. In FIGURE 1-5 and FIGURE 1-6, the ordinary lines represent subnetwork
connections and the thick lines represent network connections.
FIGURE 1-5 shows configurations with a single mounted XSCF Unit: one where the
LAN is not redundant, and the other with a redundant LAN.
XSCF XSCF
System System
In the configuration examples shown in FIGURE 1-6, the XSCF-LANs are redundant
and the XSCF Unit is in a redundant configuration.
In the configuration with a single XSCF Unit, XSCF-LAN cannot be used by any
XSCF Unit failure even if the XSCF-LANs are redundant (duplicated). If one
subnetwork is faulty, the remaining path can be used (FIGURE 1-6-c). If the active
XSCF Unit is faulty, XSCF initiates failover (FIGURE 1-6-d). Therefore, high network
availability can be achieved.
1-18 SPARC Enterprise Mx000 Servers XSCF User’s Guide • August 2009
FIGURE 1-6 Two XSCF-LANs and Two XSCF Units Configuration (In High-End Servers)
c) A subnet failed
Failure of a path
Active Standby
XSCF XSCF
System
d) XSCF failed
Active Standby
XSCF XSCF
For details on LAN configurations and connections, see Chapter 3. For details on
specifying IP addresses, see Chapter 2.
The domains in the server synchronize their times based on the XSCF Unit clock
when the domains are started. The XSCF Unit clock can be adjusted to the exact time
through a network connection to an external NTP server. In that way, the XSCF Unit
becomes the NTP server and an NTP client.
Note – Alternatively, the domains can synchronize their times through a connection
to an external NTP server. However, there is a possibility that time differences exist
between the XSCF and the domain. If you connect the domain to an external NTP,
connect the high rank NTP server that supplies the time of the same accuracy as the
domain as for XSCF.
For details about NTP server setting, see Chapter 2.
Domain XSCF Unit The domain time is adjusted to the XSCF Unit clock time.
XSCF Unit operates as the NTP server.
External NTP server The domain time is adjusted to the standard time of the external NTP
server.
XSCF No connection The XSCF Unit time is the time in initial system settings or the time
set by the setdate(8) command. For details on the setdate(8)
command, see the XSCF Reference Manual.
External NTP server The XSCF Unit time is adjusted to the standard time of the external
NTP server.
1-20 SPARC Enterprise Mx000 Servers XSCF User’s Guide • August 2009
In the M8000/M9000 servers, a basic cabinet and an expansion cabinet contain one
DVD drive/tape drive unit respectively, and they are assigned to a single operating
domain of each cabinet. The DVD drive/tape drive unit can be used by assigning it
to a specific card port on the I/O unit. To assign a different port, specify the unit by
using the XSCF Shell. For details on this DVD drive/tape drive unit setting, see
Chapter 2.
Note – Do not use the CD_RW/DVD-RW drive unit and the tape drive unit at the
same time.
A set of XSCF Shell commands you can use from a PC or a terminal connected to the
XSCF over an XSCF-LAN Ethernet connection using SSH or telnet. Also, you can
switch to domain console.
A set of XSCF Shell commands you can use from a PC or terminal directly connected
to the XSCF by a serial cable. Also, you can switch to domain console.
3. XSCF Web:
A set of browser user interface (BUI) operations you can use from a web browser
connected to the XSCF over the XSCF-LAN Ethernet.
SNMP manager commands used to monitor the operation of the server's network
functions.
To use these XSCF interfaces, users need to log in to XSCF with an XSCF user
account, and then enter a password. When a user successfully logs into XSCF but the
user leaves the session without any activity for a specified length of time, XSCF
automatically logs the user out. XSCF monitors user operations and keeps a detailed
access record containing the names of users who logged in and login times. For
details on the user privilege required for control of this access record, see
Section 1.4.1, “User Accounts and User Privileges” on page 1-23.
For details on login, see Chapter 5. For details on authentication and Web functions,
see Chapter 9. For details on user account registration and mail function settings, see
Chapter 2.
XSCF-LAN
Functions Contents Serial port Ethernet
1-22 SPARC Enterprise Mx000 Servers XSCF User’s Guide • August 2009
TABLE 1-6 XSCF Functions and Connection Ports (Continued)
XSCF-LAN
Functions Contents Serial port Ethernet
XSCF Web Provides the same functions as the functions of the XSCF Shells, _ S
but provides graphical displays for easier operation.
Mail report Mail notification in the event of a failure enables prompt action _ S
to be taken.
SNMP trap Enables consolidated control for system administration in _ S
report conjunction with SNMP manager.
For the server, the system administrator must consider both a user account that
controls the whole system and a user account that administers each domain. When a
user is registered, the user is assigned a privilege that controls the XSCF operations
available to that user. This is referred to as the user privilege of the registered user
account.
For example, to set up a domain administrator, the user privilege for the domain is
specified. Moreover, you can provide system monitoring privileges, for instance,
without system operation privileges. You can also limit privileges to specific
domains.
TABLE 1-7 lists user privilege names and outlines the user privileges.
domainop@n Reference of the status of any • Can refer to the status of any hardware mounted
part of one entire domain_n in a domain_n.
• Can refer to the status of any part of a domain_n.
• Can refer to the information of all system boards
mounted.
domainmgr@n Power supply operations and • Can power on, power off, and reboot a domain_n.
reference of the status of only • Can refer to the status of any hardware mounted
one domain_n in a domain_n.
• Can refer to the status of any part of a domain_n.
• Can refer to the information of all system boards
mounted.
domainadm@n Control of only one • Can operate all hardware mounted in a domain_n.
domain_n • Can refer to the status of any hardware mounted
in a domain_n.
• Can operate all of a domain.
• Can refer to the status of any part of a domain_n.
• Can refer to the information of all system boards
mounted.
platop Reference of the status of any • Can refer to the status of any part of the entire
part of the entire system server but cannot change it.
platadm Control of the entire system • Can operate all hardware in the system.
• Can configure all XSCF settings except the
useradm and auditadm privilege settings.
• Can add and delete hardware in a domain.
• Can do the power operation of a domain.
• Can refer to the status of any part of the entire
server.
useradm User account control • Can create, delete, invalidate, and validate user
accounts.
• Can change user passwords and password
profiles.
• Can change user privileges.
auditop Reference of the Audit status • Can refer to the XSCF access monitoring status
and monitoring methods.
1-24 SPARC Enterprise Mx000 Servers XSCF User’s Guide • August 2009
TABLE 1-7 User Privilege Names and Descriptions (Continued)
auditadm Audit control (Note) • Can monitor and control XSCF access.
• Can delete an XSCF access monitoring method.
fieldeng Field engineer operations • Allows field engineers to perform the maintenance
tasks or change the server configuration.
none None • When the local privilege for a user is set to none,
that user has no privileges, even if the privileges
for that user are defined in LDAP.
• Setting a user’s privilege to none prevents the
user’s privileges from being looked up in LDAP.
Note – (@n) "@domain number" is added behind the privilege name for the target
domain privilege. (Example: The domainadm for domain ID 1 is domainadm@1).
Also, a user account can have privileges over multiple domains, and not just the
target domain.
For details on user privileges, see the Administration Guide. For details on setting up
user accounts and setting user privileges, see Section 2.2.2, “User Account
Administration” on page 2-31.
Setting Up XSCF
2-1
■ COD Administration (optional) (see the following Note 4)
Note – (1) This document does not provide details on the remote maintenance
service function. For details on making settings and using the remote maintenance
service, refer to the manual describing the remote maintenance service in the
“SPARC Enterprise Mx000 Servers Documentation” on page xx.
Note – (2) Domain configuration is not required in the M3000 server. Some of the
options can be configured. For details, see Section 2.2.11, “Domain Configuration”
on page 2-94.
Note – (3) In the M3000 server, system board cannot be configured. System board
has been configured by default and you cannot change the setting. However, you
can refer to the system board information.
After the XSCF is set up, the settings are automatically saved in XSCF internally and
in the operator panel. Once you have configured the XSCF, it requires no day-to-day
management. However, you can save or restore the XSCF setup configuration
information. For details of saving or restoring XSCF configuration information, see
Section 2.3, “Save and Restore XSCF Configuration Information” on page 2-145.
Each setting items and the step summary are explained in Section 2.1.1, “Setup
Summary by the XSCF Shell” on page 2-3 and Section 2.1.2, “Setup Summary Using
the XSCF Web” on page 2-11. Details on each step in Section 2.1.1, “Setup Summary
by the XSCF Shell” on page 2-3 and Section 2.1.2, “Setup Summary Using the XSCF
Web” on page 2-11 are provided in Section 2.2, “Specifying the XSCF Settings” on
page 2-14.
2-2 SPARC Enterprise Mx000 Servers XSCF User’s Guide • August 2009
2.1.1 Setup Summary by the XSCF Shell
This section describes the step summary of setup using the XSCF Shell. This
procedure contains examples of command usage and setting items. For details on
settings, see the corresponding parts of Section 2.2, “Specifying the XSCF Settings”
on page 2-14.
Note – Establish one-to-one communication between the PC and XSCF during the
initial setup.
d. Press return.
This mode switch operation is done within one minute. When one minute is
passed, the authentication timeout occurs.
■ To begin the configuration, connect the XSCF Shell over a serial connection
using any terminal software. The shell can be used immediately following
connection to the serial port.
■ Log in with the default user account. Follow the instructions to change the
mode switch of the operator panel, and operate the mode switch within one
minute.
When the server is running normally, the mode switch is set to the Locked position.
(This table includes the example of setting items and command used. It is similar
thereafter.)
Note – In preparation for maintenance work, please create an account for a field
engineer (FE) with the privilege of fieldeng during the initial set up.
2-4 SPARC Enterprise Mx000 Servers XSCF User’s Guide • August 2009
4. Set the time.
■ When the system time is updated, the XSCF reset is done and the XSCF session is
disconnected. Please log in again to the XSCF using the new user account.
■ NTP settings (setntp(8)) are done after the Network settings or the Domain
Configuration.
• Select SSH or telnet, and set SSH access control setssh(8), settelnet(8),
from domain.
■ XSCF reset is required to enable SSH, to disable telnet, and to set the SSH access
control from domain. Go to the next step when you reset it later. If you want to
reset XSCF immediately, use the rebootxscf(8) command. After the XSCF reset,
the XSCF session is disconnected. Log in again to the XSCF.
■ You can enable SSH and telnet at the same time. However, the telnet connection is
not a secure connection protocol. We recommend that when you enable SSH that
you disable telnet.
2-6 SPARC Enterprise Mx000 Servers XSCF User’s Guide • August 2009
8. Configure the network.
Type the passphrase you have already set in the case that you would be using
SSH with user key authentication.
2-8 SPARC Enterprise Mx000 Servers XSCF User’s Guide • August 2009
12. Configure the log archiving settings.
15. Make the settings for using the remote maintenance service.
Note – This document does not provide details on the remote maintenance service
functions. For details on making settings and using the remote maintenance service,
refer to the manual describing the remote maintenance service listed in “SPARC
Enterprise Mx000 Servers Documentation” on page xx.
In the M3000 server, the system board cannot be configured. The system board has
been configured by default and you cannot change the settings. However, you can
refer to the system board information.
■ In the M3000 server, you cannot perform operations such as setting the domain
configuration, or adding or deleting the system board. The domain has been
configured by default and cannot be changed. However, you can set the
configuration policy and display the domain information.
■ The Domain Component List (DCL) is definition data for the hardware resources
that constitute a domain. There is one DCL per the logical system board. Each
domain has up to 16 logical system boards. The DCL is used to add a hardware
resource that constitutes a domain and to display resource configuration
information. For details on the DCL, see Section 2.2.11, “Domain Configuration”
on page 2-94, the Administration Guide, and the Dynamic Reconfiguration User’s
Guide.
■ In the configuration policy settings, a degradation range applicable to errors
detected during initial hardware diagnosis can be specified.
The automatic boot setting configures whether to automatically boot the Solaris OS
or to stop in the OpenBoot PROM mode (ok prompt). It is the same operation as to
set true or false in auto-boot?, which is the OpenBoot PROM environmental
variable.
2-10 SPARC Enterprise Mx000 Servers XSCF User’s Guide • August 2009
19. Configure the Locale settings.
Note – Normally, the Altitude Administration is set up by FE. Also, the privilege of
fieldeng is required.
1. Connect to and log in to XSCF (serial). (Same as Step 1 in Section 2.1.1, “Setup
Summary by the XSCF Shell” on page 2-3.)
2. Set the password policy. (Same as Step 2 in Section 2.1.1, “Setup Summary by
the XSCF Shell” on page 2-3.)
4. Set the time. (Same as Step 4 in Section 2.1.1, “Setup Summary by the XSCF
Shell” on page 2-3.)
5. Make the SSH/telnet settings. (Same as Step 5 in Section 2.1.1, “Setup Summary
by the XSCF Shell” on page 2-3.)
6. Confirm the XSCF host public key. (Same as Step 6 in Section 2.1.1, “Setup
Summary by the XSCF Shell” on page 2-3.)
7. Install the user public key. (Same as Step 7 in Section 2.1.1, “Setup Summary by
the XSCF Shell” on page 2-3.)
8. Configure the network. (Same as Step 8 in Section 2.1.1, “Setup Summary by the
XSCF Shell” on page 2-3.)
To enable https, the XSCF reset is required. Reset the XSCF by using the
rebootxscf(8) command. After the XSCF reset, the XSCF session is disconnected.
Log in again to the XSCF.
■ Change to the XSCF-LAN connection when you connect the serial cable.
2-12 SPARC Enterprise Mx000 Servers XSCF User’s Guide • August 2009
■ Specify the host name or the IP address of the XSCF during the network
configuration, in a web browser running on a PC with an XSCF-LAN port used to
establish a connection to the XSCF.
(This screen image is an example and differs from the actual screen display.)
Note – The web browser window for the XSCF Web is called the XSCF Web console.
■ Log in.
(This screen image is an example and differs from the actual screen display.)
Note – When connecting using https, a warning message appears in the web
browser until the certificate is installed.
(This screen image is an example and differs from the actual screen display.)
■ The remaining setting items are the same as those applicable to setup using the
XSCF Web. Referring to the setup flow, proceed to Step 9 and later steps in
Section 2.1.1, “Setup Summary by the XSCF Shell” on page 2-3. For details on the
commands used to make settings, see the corresponding parts of Section 2.2,
“Specifying the XSCF Settings” on page 2-14.
Note – If the XSCF Web is not supported, or you want to set a function that is not
supported on the XSCF Web, use the XSCF Shell to make these settings. For the
support information, see the Product Notes for your server.
1. Each section first uses tables to explain terms, setting items, functions, and XSCF
Shell commands.
2. Each section then provides setting examples. When you set up by using XSCF
Web, see the "Web browser operation" sections. When you set up by using XSCF
Shell, see the "Command operation" sections.
■ For details on individual XSCF Shell commands, options, and privileges, see
the XSCF Reference Manual or the man page.
■ For details on the screen layout, start procedure, and operation of the XSCF
Web, see Chapter 9.
■ For details the connection between a PC and XSCF, the connection to a
terminal, or how to log in to XSCF, see Chapter 3.
2-14 SPARC Enterprise Mx000 Servers XSCF User’s Guide • August 2009
2.2.1 Network Configuration
Network Configuration is used to specify items relating to network interfaces like
XSCF-LANs and Domain-SP Communication Protocol(DSCP), also, routing, and
DNS.
Term Explanation
XSCF network General term for an interface required in XSCF network configuration. Such interfaces
interface include the following:
[First XSCF Unit]
• XSCF-LAN#0 (Active side)
• XSCF-LAN#1 (Active side)
• Inter SCF Network (ISN) (Active side) (If the XSCF Unit is redundant)
[Second XSCF Unit] (If the XSCF Unit is redundant)
• XSCF-LAN#0 (Standby side)
• XSCF-LAN#1 (Standby side)
• ISN (Standby side)
Takeover IP address (If the XSCF Unit is redundant)
• XSCF-LAN#0s
• XSCF-LAN#1s
Domain-SP Communication Protocol (DSCP):
• XSCF side (One IP address is required.)
• Domain side (One IP address is required for each domain, therefore, the IP addresses
for the maximum number of domains are required.)
ISN This network is between two XSCF Units (active and standby). ISN is used for a system
with a redundant XSCF configuration.
Takeover IP address A takeover IP address (virtual IP address) is set between each XSCF#x-LAN#0’s Unique
addresses of two XSCF Units. The XSCF#x-LAN#1s are also the same. Even if the active
XSCF and the standby XSCF are switched, the IP address takeover can be done at each
"LANs".
DSCP This interface protocol is used between XSCF and a domain. DSCP settings are made
with XSCF. The network of the domains and the XSCF connected by DSCP might be
called DSCP links.
Note – Systems with two XSCF Units can only be M8000/M9000 servers.
To complete the network settings, the XSCF reset is required. Reset the XSCF by
using the rebootxscf(8) command. After the XSCF is reset, the XSCF session is
disconnected. Please log in again to the XSCF.
Display network Displays XSCF network interfaces. shownetwork If the XSCF Unit is
Also, displays the following network status: showdscp redundant, the
• Number of bytes of the receive queue connection status of the
buffer. other side is not
displayed.
• Number of bytes of the send queue buffer.
• Local address and port.
• Host address and Socket port number.
Enable/disable Enables or disables an XSCF network interface setnetwork • When the XSCF Unit is
network (see TABLE 2-1). setdscp a redundant model,
Defaults of IP address
IP address Specifies the following IP address of the XSCF
of ISN are the
network interfaces (see TABLE 2-1).
following:
• One or both of the XSCF-LAN ports
XSCF#0:192.168.1.1
• DSCP
XSCF#1:192.168.1.2
• ISN, Takeover IP address (if a redundant
• No default setting has
XSCF Unit is used)
been specified for the
netmask Sets a netmask for an XSCF network interface. other interfaces.
• You can use a single
LAN port for
XSCF-LAN. For
network connection
examples, see
Chapter 3.
• You can remove the
configuration,
XSCF-LAN, Takeover
IP address, and
netmask
Display host Displays a host name and the host name showhostname
name informations.
A Fully Qualified Domain Name (FQDN) can
be displayed
2-16 SPARC Enterprise Mx000 Servers XSCF User’s Guide • August 2009
TABLE 2-2 Network Configuration (Continued)
Host Sets a host name and a domain name for the sethostname No default setting has
name/domain XSCF Unit. been specified.
name FQDN cannot be specified for the host name.
A host name can be specified up to 64
characters.
A domain name can be specified up to 254
characters with the host name included, with
label elements delimited by a "." (period).
A label element can contain alphanumeric
characters (a to z, A to Z, 0 to 9), "-" (hyphen)
and "." (period). Each label element must
always begin with an alphabetic character and
end with an alphanumeric character.
However, you cannot use a "." (period) in a
host name.
Display route Displays the XSCF routing environment as showroute
follows:
Network interface (see TABLE 2-1), Destination
IP address, Gateway, netmask,
Flags.
The meanings of the Flags are as follows:
U : route is up
H : target is a host
G : use gateway
R : reinstate route for dynamic routing
C : cache entry
! : reject route
Add/delete Adds a route to or deletes a route from an setroute The setting of routing
route XSCF network interface. information in each
Specify the following: interface can be set up to
• Network interface eight respectively.
• Destination IP address (Destination)
• Gateway
• netmask
In systems with two XSCF Units, the two XSCF Units are connected by system
internal ports, which are the RS-232C (serial) ports and the LAN ports. Each XSCF
Unit monitors the status of the other one and they exchange system information
through these communication paths. When the system is initially set up, the user
must specify the IP address for internal LAN routes.
FIGURE 2-1 shows the network interface which is required for the XSCF and domain
network configuration.
2-18 SPARC Enterprise Mx000 Servers XSCF User’s Guide • August 2009
FIGURE 2-1 Network Interface Required for XSCF Network Configuration (In the
High-End Servers)
Server
DomainID 0 DomainID 1 DomainID X
10 11 10+X
XSCFU#0 9 9 XSCFU#1
7 8
1 4 2 5
#0 #1 #0 #1
6
Ethernet
1-6; Addresses of XSCF-LAN
Inside LAN
7,8; Addresses of Inter SCF Network(ISN)
9,10,..,10+X; Addresses of DSCP links
Note – You must set XSCF-LAN, ISN, and DSCP to different subnet addresses. If
two XSCF-LAN ports are used, each must be assigned to a different subnet. The ISN
address has been set up with the default value (see TABLE 2-2).
You can use two XSCF-LAN ports in accordance with the network configuration. In
the M3000/M4000/M5000 servers, specify either or both of the following IP
addresses:
■ XSCF-LAN#0 of XSCFU#0 (See "1" in FIGURE 2-1)
■ XSCF-LAN#1 of XSCFU#0 (See "4" in FIGURE 2-1)
Use the same subnet address to specify the LAN ports which share the same number
in each XSCF unit so that you can connect to both of the XSCF in case the XSCF
failover generated.
2-20 SPARC Enterprise Mx000 Servers XSCF User’s Guide • August 2009
To make the IP address redundant, specify the same subnet address to the LAN port
of XSCFU#0 side and to the LAN port of XSCFU#1 side which share the same LAN
port number. Also, The IP address of XSCF-LAN#0 and the IP address of
XSCF-LAN#1 must be specified in different subnet addresses.
When you specify the takeover IP address, in case the XSCF failover occurred, the
control switching between the active side and the standby side performed, and then
the IP address will be taken over. The user who accesses the takeover IP address can
always connect to the active side XSCF, without being aware of the XSCF switching.
Since ISN is a network for the communication between the redundant XSCF Units, it
is necessary to specify the IP address. The ISN address has been set up with the
default value (see TABLE 2-2).
If the IP address of XSCF-LAN conflicts with the default subnet address of ISN, you
must specify the IP address of ISN (see "7" and "8" in FIGURE 2-1). Also, both ISN
addresses must be in the same network subnet. Users cannot access this network.
(See shownetwork(8), setnetwork(8).)
Specify one DSCP IP address in the XSCF-side, and one for each of the domains (See
"9," "10" or later in FIGURE 2-1). By specifying the option, you can specify one DSCP
address which is used in all of the DSCP links. In this case, the IP addresses used by
the XSCF and each domain-specific DSCP link are automatically selected from
within the range of addresses indicated by the DSCP network address.
All DSCP addresses must be in the same network subnet. Since the DSCP is the
network for the communication between domain and XSCF, users can’t access to this
network. When you changed the DSCP address, you must reset XSCF by using the
rebootxscf(8) command before domain start up, in order to maintain the
consistency between XSCF and the domain. After XSCF resetting, the domain restart
is required. (See showdscp(8), setdscp(8).)
Note – An XSCF reset or failover might prevent any of the setting commands
operation from completing. If a reset or failover occurs during the setting operation,
log in to the active XSCF to determine if the operation succeeded. If not, try it again
2-22 SPARC Enterprise Mx000 Servers XSCF User’s Guide • August 2009
<Example 1> Display information on all network interfaces of XSCF.
XSCF> shownetwork -a
DSCP Configuration:
Network: 192.168.244.0
Netmask: 255.255.255.0
Location Address
---------- ---------
XSCF 192.168.244.1
Domain #00 192.168.244.2
Domain #01 192.168.244.3
Domain #02 192.168.244.4
Domain #03 192.168.244.5
Note – The setting values like as IP address, netmask, enabling (up) or disabling
(down) the network interface by setnetwork(8), sethostname(8), setroute(8),
and setnameserver(8) commands are applied by performing the
applynetwork(8) and the rebootxscf(8) commands.
2-24 SPARC Enterprise Mx000 Servers XSCF User’s Guide • August 2009
< Example 1> Specify the entire DSCP network IP address 192.168.2.0
and netmask 255.255.255.0.
XSCF> setdscp -i 192.168.2.0 -m 255.255.255.0
It is necessary to configure DSCP to enable it for the domains. For details about the
Domain Configuration, see Section 2.2.11, “Domain Configuration” on page 2-94.
Setting DSCP addresses can only be done when affected domains are not running.
Use of the -i and -m options to set all DSCP addresses can only be done when no
domains are running. Setting the XSCF address can only be done when no domains
are running, since this would affect the XSCF's communication to running domains.
Setting individual domain addresses can be done only if the specified domain is not
running. When you changed the DSCP address, you must reset XSCF by using the
rebootxscf(8) command before domain start up, in order to maintain the
consistency between XSCF and the domain. After XSCF resetting, the domain restart
is required.
You can specify a network address for use by all of the DSCP links using the -i and
-m options. In this mode of operation, the IP addresses used by the XSCF and each
domain-specific DSCP link are automatically selected from within the range of
addresses indicated by the network address.
If you set a netmask using the -m option, this netmask value shows the mask value
in the XSCF network. A netmask value when you display the DSCP network on the
domain is not the netmask value in the XSCF network. The netmask value for the
domain DSCP address, which is displayed on the domain by using ifconfig(1M),
is a value set according to the setting of the network on the domain side.
XSCF> showhostname -a
xscf#0: scf-hostname0.company.com
xscf#1: scf-hostname1.company.com
2-26 SPARC Enterprise Mx000 Servers XSCF User’s Guide • August 2009
Configuring XSCF Routing
In a redundant XSCF unit configuration, the following are examples of data when
routing is done in each subnet.
<Example>
Note – The method of determining the routing for an XSCF interface depends on
the network environment at the installation site. The network environment for
system operation must have a suitable configuration.
■ Command operation
XSCF> showroute -a
Destination Gateway Netmask Flags Interface
10.12.108.0 * 255.255.255.0 U xscf#0-lan#0
default 10.12.108.1 0.0.0.0 UG xscf#0-lan#0
:
<Example 2> Add routing with the default network for Destination
and Gateway 10.12.108.1 to XSCF-LAN#1 in the XSCFU#0.
XSCF> setroute -c add -n 0.0.0.0 -g 10.12.108.1 xscf#0-lan#1
2-28 SPARC Enterprise Mx000 Servers XSCF User’s Guide • August 2009
Applying the XSCF Network Settings
■ Command operation
XSCF> applynetwork
The following network settings will be applied:
xscf#0 hostname :scf0-hostname
DNS domain name :company.com
nameserver :10.0.0.2
interface :xscf#0-lan#0
status :up
IP address :192.168.1.10
netmask :255.255.255.0
route :-n 192.168.1.0 -m 255.255.255.0 -g 192.168.1.1
interface :xscf#0-lan#1
status :down
IP address :
netmask :
route :
Continue? [y|n] :y
Note – When the XSCF Unit is in redundant configuration, ISN addresses must be
in the same network subnet.
3. Use the rebootxscf(8) command to reset the XSCF and to complete the settings.
XSCF> rebootxscf
The XSCF will be reset. Continue? [y|n] :y
■ At this time, the window session is disconnected, so please reconnect to the XSCF
by using the new network interface and log in again.
Name: scf0-hostname.company.com
Address: 192.168.10.10
XSCF> shownetwork -i
Active Internet connections (without servers)
Proto Recv-Q Send-Q Local Address Foreign Address State
tcp 0 0 xx.xx.xx.xx:telnet xxxx:1617 ESTABLISHE
D
2-30 SPARC Enterprise Mx000 Servers XSCF User’s Guide • August 2009
3. Use the traceroute(8) command to confirm the network path to network
devices.
Term Description
TABLE 2-4 lists setting items and the corresponding shell commands.
Display user Displays user account management showuser The item displayed is
account information. Never, which means
management unlimited.
information
Add/delete Adds or deletes a user account. adduser The maximum length of
user account deleteuser a user account is 31
characters.
Password Sets a user account password. password
• Specify whether to use a specific number
of days or specific date for the account
validity period. Or specify no expiration.
Specify the following for the password:
(Note)
• Maximum number of days in the
password validity period (up to 999999
days)
• Minimum number of days in the
password validity period (0 days)
• Password expiration warning date
(seven days in advance)
• Number of days in which the account
remains unlocked after expiration of the
password (0 days, no limit)
Change user Assigns a user privilege to a user. setprivileges Multiple user privileges
privilege can be assigned to one
user.
Enable/ Enables or disables a user account. enableuser
disable user disableuser
account
Display Displays a password policy. showpassword-po
password policy licy
2-32 SPARC Enterprise Mx000 Servers XSCF User’s Guide • August 2009
TABLE 2-4 User Account Administration (Continued)
Password policy Sets a password policy as described below. setpassword-pol • Once an account is
• Minimum number of days that must icy locked after password
elapse before the password can be expiration, its user
changed (Mindays) must contact the
• Maximum number of days that the system administrator
password is valid (Maxdays) in order to use the
system again.
• Number of days preceding password
expiration, for the first warning (Warn) • A password must
consist of at least six
• Number of days in which the account
characters.
remains unlocked after password
expiration (Inactive) • Inactive is -1, which
means unlimited.
• Number of days a new account will be
valid before expiring and becoming • Expiry is 0, which
disabled. (Expiry) means unlimited.
• Maximum number of retries of (Note 1)
password entry (Retry)
• Maximum number of characters that
must be different in a new
password.(Difok)
• Minimum number of password
characters (Minlen)
• Minimum number of digits contained in
a password (Dcredit)
• Minimum number of uppercase letters
contained in a password (Ucredit)
• Minimum number of lowercase letters
contained in a password (Lcredit)
• Minimum number of symbols contained
in a password (Ocredit)
• Maximum numbers of passwords in the
password history (Remember)
Display lockout Displays lockout settings. showloginlockou
setting t
Enable/disable Enables or disables the lockout function. setloginlockout • The lockout is disabled
lockout function To disable the lockout, specify 0 minutes by default.
for lockout period. To enable lockout, • After three sequential
specify a period other than 0 minutes. login failures, it locks
out the user login for a
specified period of
time.
• Range of the lockout
period is 0 to 1440
minutes.
(Note 2)
Note – (1) If the password policy is set, then the password policy is applied to the
users added after that. When you change the password for another user by using the
user operand, they system password policy is not enforced. When changing another
user’s password, be sure to choose a password that conforms with the system
password policy.
Note – (2) After the login authentication failure, XSCF locks out the user login for a
period of time that specified in the last account lockout setting. On the
M8000/M9000 servers, the account lockout function is enabled in both
active/standby XSCF. When the user login locked out, a message will be saved in
the audit log. The setloginlockout -s 0 will disable the account lockout. When
the account lockout is disabled, a user can attempt to login, and fail, an unlimited
number of times. If a user needs to access their locked account before the lockout
time is complete they must get an administrator to disable the account lockout to
allow them to login and then re-enable the lockout by setting a lockout time. For
more information, see the setloginlockout(8) and showloginlockout(8) man
pages.
Note – The ability to specify and view the lockout period is supported in XCP1080
and later.
2-34 SPARC Enterprise Mx000 Servers XSCF User’s Guide • August 2009
1. Use the showuser(8) command to display all of the user account information.
(See the description of the password policy in TABLE 2-4.)
XSCF> showuser -l
User Name: user001
UID: 101
Status: Enabled
Minimum: 0
Maximum: 99999
Warning: 7
Inactive: -1
Last Change: Jul 11, 2006
Password Expires: Never
Password Inactive: Never
Account Expires: Never
Privileges: platadm
Note – You cannot use the following user account names, as they are reserved for
system use: root, bin, daemon, adm, operator, nobody, sshd, rpc, rpcuser, ldap,
apache, ntp, admin, or default.
<Example 2> Specify 60 days for the validity period, and also
specify that a validity expiration warning be issued 15 days in
advance.
XSCF> password –M 60 –w 15 jsmith
XSCF> showuser -a
User Name: jsmith
Status: Enabled
Minimum: 0
Maximum: 99999
Warning: 7
Inactive: -1
Last Change: Aug 22, 2005
Password Expires: Never
Password Inactive: Never
Account Expires: Never
2-36 SPARC Enterprise Mx000 Servers XSCF User’s Guide • August 2009
XSCF> showuser -p
User Name: jsmith
Privileges: useradm
auditadm
XSCF> showuser -a
XSCF> showpasswordpolicy
Mindays: 0
Maxdays: 90
Warn: 7
Inactive: -1
Expiry: 0
Retry: 5
Difok: 1
Minlen: 8
Dcredit: 0
Ucredit: 0
Lcredit: 0
Ocredit: 0
Remember: 4
XSCF> showpasswordpolicy
Mindays: 0
Maxdays: 60
Warn: 15
Inactive: -1
Expiry: 0
Retry: 3
Difok: 1
Minlen: 8
Dcredit: 2
Ucredit: 0
Lcredit: 0
Ocredit: 0
Remember: 3
XSCF> showloginlockout
The lockout period becomes effective at the next login. When you specifies 0
minutes, if someone login successfully by a user accout at the next time, the lockout
function will be disabled.
2-38 SPARC Enterprise Mx000 Servers XSCF User’s Guide • August 2009
2.2.3 LDAP Administration
LDAP administration is used to specify items relating to LDAP clients. The LDAP
server, bind ID, password, baseDN and so on are set. In the LDAP server, the XSCF
user information is managed.
Note – This section does not cover LDAP configuration and administration. An
administrator who is familiar with LDAP should perform the LDAP design. For
details on adding user information to an account on an LDAP server, see the
Administration Guide.
Term Description
TABLE 2-6 lists setting items and the corresponding shell commands:
2-40 SPARC Enterprise Mx000 Servers XSCF User’s Guide • August 2009
Note – PEM: Abbreviation for Privacy Enhanced Mail. Mail to be sent is encrypted
for increased privacy.
XSCF> showlookup
Privileges lookup: Local only
Authentication lookup: Local and LDAP
XSCF> showlookup
Privileges lookup: Local and LDAP
Authentication lookup: Local and LDAP
XSCF> showldap
Bind Name: Not set
Base Distinguished Name: Not set
LDAP Search Timeout: 0
Bind Password: Not set
LDAP Servers: Not set
CERTS: None
<Example 3> Specify the primary and secondary LDAP servers and port
numbers.
XSCF> setldap -s ldap://onibamboo:389,ldaps://company2.com:636
XSCF> showldap
Bind Name: cn=Directory Manager
Base Distinguished Name: ou=People,dc=users,dc=apl,dc=com,o=isp
LDAP Search Timeout: 60
Bind Password: Set
LDAP Servers: ldap://onibamboo:389 ldaps://company2.com:636
CERTS: None
XSCF> showldap
Bind Name: cn=Directory Manager
Base Distinguished Name: ou=People,dc=users,dc=apl,dc=com,o=isp
LDAP Search Timeout: 60
Bind Password: Set
LDAP Servers: ldap://onibamboo:389 ldaps://company2.com:636
CERTS: None
2-42 SPARC Enterprise Mx000 Servers XSCF User’s Guide • August 2009
3. Use the showldap(8) command to confirm that you have imported the
certificate chain.
XSCF> showldap
Bind Name: cn=Directory Manager
Base Distinguished Name: ou=People,dc=users,dc=apl,dc=com,o=isp
LDAP Search Timeout: 60
Bind Password: Set
LDAP Servers: ldap://onibamboo:389 ldaps://company2.com:636
CERTS: Exists
2. Log in as the user created in the LDAP server. Confirm the registration using
the user’s password.
login: sysadmin
Password:xxxxxxxx
XSCF> showuser
User Name: sysadmin (nonlocal)
UID: 110
Privileges: platadm
Note – The customer should decide the NTP server operating mode. For details on
NTP, see the NTP manuals.
TABLE 2-7 lists the settings and the corresponding shell commands.
2-44 SPARC Enterprise Mx000 Servers XSCF User’s Guide • August 2009
TABLE 2-7 Setting Time and Date
Display time Displays the time zone and Daylight Saving showtimezone
zone Time information.
Time zone Sets the time zone and Daylight Saving settimezone The POSIX standard is
Time. used for the time zone.
• Standard time zone The setting time zone list
• Custom time zone and Daylight Saving can be referred by
Time specifying "-a" option.
For the abbreviations of time zone and the
name of Daylight Saving Time, specify the
alphabets of 3 letters or more. You can
specify it in the format which complies with
RFC2822.
Display Displays the time and date of the XSCF by showdate
system time the local time or the Coordinated Universal
Time (UTC).
Date and Sets a date and time to a local time or UTC. setdate The settings can be enabled
time The specification format is as follows: when all of the domains are
• yyyy.mm.dd-HH:MM:SS powered off.
• mmddHHMMyyyy.SS XSCF reset is done after the
settings.
yyyy: Year, mm: Month, dd: Day of the
month, HH: Hour (24-hour system),
MM: Minute, SS: Second
Display NTP Displays NTP server settings showntp Synchronization is also
server checked.
settings
NTP server Configures an NTP server for XSCF setntp No default setting has been
network. (In this case, XSCF is an NTP specified.
client.) When an NTP server is
Specify the IP address or host name of an registered, the existing
NTP server. setting is deleted and
You can synchronize with up to three NTP overwriting is performed
servers. with the specified NTP
server.
If you specify a host name
for an NTP server, the
server name must be
resolvable by DNS server.
Reset time Resets the time subtraction between the resetdateoffset The settings can be enabled
subtraction XSCF and each domain, which is stored in when all of the domains are
XSCF. powered off.
As a result, the time of each domain will be
set to the same time as the XSCF after
startup.
Display time Displays the time subtraction between the showdateoffset
subtraction XSCF and each domain.
XSCF> showtimezone -c tz
America/Chicago
2. Use the settimezone(8) command to set the system time. The platadm
privilege is required.
The set time zone takes effect after executing the command.
2-46 SPARC Enterprise Mx000 Servers XSCF User’s Guide • August 2009
Specifying a Daylight Saving Time
■ Command operation
Note – After the time settings, XSCF reset is done. At this time, the XSCF session is
disconnected. Please reconnect to the XSCF and log in again. Also, when the
domains are running and if you use XSCF as an NTP server, please perform a
domain reboot or apply the changed time to the domain using the ntpdate(1M)
command.
Note – When replacing the XSCF unit, be sure to note the time set on the
replacement XSCF. If the replacement XSCF time does not match the current time,
set it to the current time. For the replacement XSCF unit, execute the showdate(8)
command to check the time, and reset it using the setdate(8) command.
1. Use the showntp(8) command to display the NTP server for the XSCF network.
2-48 SPARC Enterprise Mx000 Servers XSCF User’s Guide • August 2009
XSCF> showntp -a
server ntp1.example.com prefer
server ntp2.example.com
2. Use the showntp(8) command to check synchronization and display the status.
XSCF> showntp –l
remote refid st t when poll reach delay offset jitter
==============================================================================
*192.168.0.27 192.168.1.56 2 u 27 64 377 12.929 -2.756 1.993
+192.168.0.57 192.168.1.86 2 u 32 64 377 13.030 2.184 94.421
127.127.1.0 LOCAL(0) 5 l 44 64 377 0.000 0.000 0.008
<Example 2> Add the two host names ntp1.red.com and ntp2.blue.com
as NTP servers for XSCF.
XSCF> setntp –c add ntp1.red.com ntp2.blue.com
Please reset the XSCF by rebootxscf to apply the ntp settings.
4. Use the setntp(8) command to delete NTP servers for XSCF network.
Note – When you use the setntp(8) command with the "-c add" or "-c del"
options, execute the rebootxscf(8) command to apply the specified configuration
and reset the XSCF.
XSCF> showntp -a
server ntp1.red.com prefer
server ntp2.blue.com
XSCF> showntp -m
prefer : on
When you use the setntp(8) command to change the prefer, execute the
rebootxscf(8) command to apply the specified configuration and reset the
XSCF.
XSCF> showntp -m
prefer : off
XSCF> showntp -a
server ntp1.red.com
server ntp2.blue.com
1. Use the showntp(8) command to display the stratum value for the XSCF
network.
XSCF> showntp -s
stratum : 5
2-50 SPARC Enterprise Mx000 Servers XSCF User’s Guide • August 2009
2. Use the setntp(8) command to change a stratum value.
When you use the setntp(8) command to specify the stratum value, execute the
rebootxscf(8) command to apply the specified configuration and reset the XSCF.
XSCF> showntp -s
stratum : 7
XSCF> showdate
Mon Jan 23 14:53:00 JST 2006
2. Use the showdateoffset(8) command to confirm the difference the XSCF time
with each domain time.
XSCF> showdateoffset -a
DID Domain Date Offset
00 128 sec
01 0 sec
02 -1024 sec
03 -9999999 sec
XSCF> resetdateoffset
XSCF>
XSCF> poweron -a
DomainIDs to power on:00,01,02,03
Continue? [y|n] :y
00 :Powering on
01 :Powering on
02 :Powering on
03 :Powering on
*Note*
This command only issues the instruction to power-on.
The result of the instruction can be checked by the "showlogs
power".
XSCF>
XSCF> showdateoffset -a
DID Domain Date Offset
00 0 sec
01 0 sec
02 0 sec
03 0 sec
2-52 SPARC Enterprise Mx000 Servers XSCF User’s Guide • August 2009
7. Use the Solaris OS date(1M) command to display the domain time and use the
showdate(8) command to display the XSCF time. Then confirm that the domain
time is the same as the XSCF time.
Term Description
SSH Client
In this system, you can use the following SSH clients.
■ Solaris Secure Shell
■ OpenSSH
■ PuTTY
■ UTF-8 TeraTerm Pro with TTSSH2
TABLE 2-9 lists setting items and the corresponding shell commands.
Display SSH Displays SSH settings. showssh The SSH port number is
setting Information on whether SSH is enabled or 22.
information disabled, SSH access control from domain, the When the user public key
host key, fingerprint, and your user public is displayed with a user
key is displayed. name, the useradm
privilege is required.
Enable/ Enables or disables SSH. setssh The SSH is disabled by
disable SSH default.
SSH access Specifies whether or not to permit SSH access setssh The SSH acccess is
control from from domain via the DSCP. permited by default.
domain Specifies "deny", when you
don't want to login to
XSCF using SSH from
domain via the DSCP.
Host key Generates an SSH2 host key (RSA key and setssh When the SSH is enabled
DSA key). first, the host key is
generated.
Display Displays telnet settings. showtelnet The telnet port number is
telnet setting The displayed telnet settings include 23.
information information indicating whether telnet is
enabled or disabled.
Enable/ Enables or disables telnet. settelnet The telnet is disabled by
disable telnet default.
Display Display the timeout period for automatic showautologout
timeout logout.
timeout After logging in XSCF, if the system is not setautologout The default timeout period
used for a certain period, logout is is 10 minutes. A value
automatically performed. Specify the timeout ranging from 1 to 255 can
period (minutes). Note that no time be specified for the timeout
monitoring is performed while the domain period.
console is the current console.
Install/ Install and uninstall the SSH user public key. setssh When you install/
Uninstall One user can install multiple user public uninstall the user public
user public keys. key, the useradm privilege
key is required.
To enable the SSH, to set the SSH access control from domain, to generate the host
key, and to disable the telnet, the XSCF reset is required. Please reset the XSCF using
by rebootxscf(8) command. After the XSCF reset, the XSCF session is
2-54 SPARC Enterprise Mx000 Servers XSCF User’s Guide • August 2009
disconnected. Please log in again to the XSCF. The SSH or telnet settings are
automatically applied to the standby XSCF Unit for a system with a redundant XSCF
configuration.
In this system, the RW or RO consoles from multiple domains can be used. Only one
RW console can be used for each domain. Use the console(8) command to specify
either the RW console or RO console as a domain console. For details about consoles,
see Chapter 3.
Note – The control function of SSH access from domain by XSCF Shell command is
supported only on M3000/M4000/M5000/M8000/M9000 servers that run certain
versions of XCP firmware (beginning with XCP 1081).
2. Use the setssh(8) command to make the SSH settings or use the settelnet(8)
command to make the telnet settings.
XSCF> rebootxscf
The XSCF will be reset. Continue? [y|n] :y
■ After the XSCF reset, the XSCF session is disconnected. Please log in again to the
XSCF.
XSCF> showssh
SSH status: enabled
SSH DSCP: accept
RSA key:
:
DSA key:
:
2. Use the setssh(8) command to permit or refuse the SSH access to XSCF from
domain via DSCP.
3. To permit and refuse the SSH access, the XSCF reset is required. Use the
rebootxscf(8) command to reset the XSCF.
XSCF> rebootxscf
The XSCF will be reset. Continue? [y|n] :y
■ After the XSCF reset, the XSCF session is disconnected. Please log in again to the
XSCF.
2-56 SPARC Enterprise Mx000 Servers XSCF User’s Guide • August 2009
Specifying an SSH Host Key
■ Command operation
1. Use the showssh(8) command to display the host key and fingerprint.
XSCF> showssh
SSH status: enabled
SSH DSCP: accept
RSA key:
ssh-rsa
AAAAB3NzaC1yc2EAAAABIwAAAIEAt0IG3wfpQnGr51znS9XtzwHcBBb/UU0LN08Si
lUXE6j+avlxdY7AFqBf1wGxLF+Tx5pTa6HuZ8o8yUBbDZVJAAAAFQCfKPxarV+/5q
zK4A43Qaigkqu/6QAAAIBMLQl22G8pwibESrh5JmOhSxpLz
l3P26ksI8qPr+7BxmjLR0k=
Fingerprint:
1024 e4:35:6a:45:b4:f7:e8:ce:b0:b9:82:80:2e:73:33:c4
DSA key:
ssh-dss
AAAAB3NzaC1kc3MAAACBAJSy4GxD7Tk4fxFvyW1D0NUDqZQPY3PuY2IG7QC4BQ1ke
wDnblB8/JEqI+8pnfbWzmOWU37KHL19OEYNAv6v+WZT6RE
lU5Pyb8F16uq96L8QDMswFlICMZgrn+ilJNStr6r8KDJfwOQMmK0eeDFj2mL40NOv
aLQ83+rRwW6Ny/yF1Rgv6PUpUqRLw4VeRb+uOfmPRpe6/kb4z++lO
htpWI9bay6CK0nrFRok+z54ez7BrDFBQVuNZx9PyEFezJG9ziEYVUag/23LIAiLxx
BmW9pqa/WxC21Ja4RQVN3009kmVwAAAIAON1LR/9Jdd7yyG18
+Ue7eBBJHrCA0pkSzvfzzFFj5XUzQBdabh5p5Rwz+1vriawFIZI9j2uhM/3HQdrvY
SVBEdMjaasF9hB6T/uFwP8yqtJf6Y9GdjBAhWuH8F13pX4BtvK
9IeldqCscnOuu0e2rlUoI6GICMr64FL0YYBSwfbwLIz6PSA/yKQe23dwfkSfcwQZN
q/5pThGPi3tob5Qev2KCK2OyED
MCAOvVlMhqHuPNpX+hE19nPdBFGzQ==
Fingerprint:
1024 9e:39:8e:cb:8a:99:ff:b4:45:12:04:2d:39:d3:28:15
3. To generate the host key, the XSCF reset is required. Use the rebootxscf(8)
command to reset the XSCF.
XSCF> rebootxscf
The XSCF will be reset. Continue? [y|n] :y
XSCF> showautologout
30min
2. Generate the user private key and the user public key for a created XSCF user
account with your client software. See the manual for your client software for
procedures to create the user public key and to set the passphrase. We
recommend that the passphrase be set.
3. Use the setssh(8) command with option for installing user public key. Then,
copy and paste the user public key, which was made in Step 2, on the window
display. After pressing the Enter key, press the "Ctrl" and "D" keys to complete
the installation.
2-58 SPARC Enterprise Mx000 Servers XSCF User’s Guide • August 2009
XSCF> setssh -c addpubkey -u efgh
Please input a public key:
ssh-rsa AAAAB3NzaC1yc2EAAAABIwAAAIEAzFh95SohrDgpnN7zFCJCVNy+jaZ
PTjNDxcid/QGbihYDCBttI4151Y0Sv85FJwDpSNHNKoVLMYLjtBmUMPbGgGVB61qs
kSv/FeV44hefNCZMiXGItIIpKP0nBK4XJpCFoFbPXNUHDw1rTD9icD5U/wRFGSRRx
FI+Ub5oLRxN8+A8= [email protected]
<Press “Ctrl” and “D” keys>
XSCF>
4. Use the showssh(8) command to confirm the user public key and its number.
Do the SSH connection by using the user account of XSCF on the client software
when you log in the XSCF Shell next time. Confirm that you can log in to the
XSCF Shell by authentication with the user key.
5. When you uninstall the user public key, use the setssh(8) command with the
number of the user public key.
Term Description
XSCF Web The web browser window of the XSCF Web with an XSCF-LAN connection
console
Caution – IMPORTANT - The self CA is constructed in XSCF. You cannot use the
XSCF’s self CA as an external CA for another system. If no external CA and CA in
intranet exists in your system environment, use the self CA. (See Step b)
CA and Procedures
The following are the settings procedures for each type of CA.
3. Request the issue of the certificate for the CSR to the CA.
5. Enable https.
For Step 1 - Step 5 above, specify each option using the sethttps(8) command.
Also, when using the XSCF Web, select the appropriate items for each setting.
■ When the XSCF Unit is redundant, the https settings are automatically applied to
the standby XSCF Unit.
2-60 SPARC Enterprise Mx000 Servers XSCF User’s Guide • August 2009
b. Using the self CA
4. Enable https.
TABLE 2-11 lists setting items and the corresponding shell commands.
Self Automatically, the self CA is constructed in sethttps Specify the same DN as the
authentication XSCF and the certificate is installed. External authentication at
The following are set. making a web server
• A self CA is constructed certificate.
• A private key is made
• A web server certificate self-signed is made
Display the Displays the following: showhttps The certificate expiration of
certificate • CSR the self-CA is as follows:
• Web server certificate • Server certificate: 10 year
The set value becomes
effective, when the certificate
will be created next time.
To enable the https, an XSCF reset is required. Please reset the XSCF using by
rebootxscf(8) command. After the XSCF reset, the XSCF session is disconnected.
Please log in again to the XSCF. The https settings are automatically applied to the
standby XSCF Unit for a system with a redundant XSCF configuration.
When the expiration date of the web server certificate has passed, or you change the
web server certificate, configure the https settings again.
2-62 SPARC Enterprise Mx000 Servers XSCF User’s Guide • August 2009
<Example> Display the https settings.
XSCF> showhttps
HTTPS status: enabled
Server key: installed in Apr 24 12:34:56 JST 2006
CA key: installed in Apr 24 12:00:34 JST 2006
CA cert: installed in Apr 24 12:00:34 JST 2006
CSR:
-----BEGIN CERTIFICATE REQUEST-----
MIIBwjCCASsCAQAwgYExCzAJBgNVBAYTAmpqMQ4wDAYDVQQIEwVzdGF0ZTERMA8G
A1UEBxMIbG9jYWxpdHkxFTATBgNVBAoTDG9yZ2FuaXphdGlvbjEPMA0GA1UECxMG
b3JnYW5pMQ8wDQYDVQQDEwZjb21tb24xFjAUBgkqhkiG9w0BCQEWB2VlLm1haWww
gZ8wDQYJKoZIhvcNAQEBBQADgY0AMIGJAoGBAJ5D57X/k42LcipTWBWzv2GrxaVM
5GEyx3bdBW8/7WZhnd3uiZ9+ANlvRAuw/YYy7I/pAD+NQJesBcBjuyj9x+IiJl9F
MrI5fR8pOIywVOdbMPCar09rrU45bVeZhTyi+uQOdWLoX/Dhq0fm2BpYuh9WukT5
pTEg+2dABg8UdHmNAgMBAAGgADANBgkqhkiG9w0BAQQFAAOBgQAux1jH3dyB6Xho
PgBuVIakDzIKEPipK9qQfC57YI43uRBGRubu0AHEcLVue5yTu6G5SxHTCq07tV5g
38UHSg5Kqy9QuWHWMri/hxm0kQ4gBpApjNb6F/B+ngBE3j/thGbEuvJb+0wbycvu
5jrhB/ZV9k8X/MbDOxSx/U5nF+Zuyw==
-----END CERTIFICATE REQUEST-----
3. To enable the https, the XSCF reset is required. Use the rebootxscf(8)
command to reset the XSCF.
XSCF> rebootxscf
The XSCF will be reset. Continue? [y|n] :y
■ After the XSCF reset, the XSCF session is disconnected. Please log in again to the
XSCF.
2. Use the sethttps(8) command to create the CSR specifying the distinguished
name (DN). (See the DN description in "External authentication" in TABLE 2-11.)
3. Use the sethttps(8) command to display the CSR. Copy the displayed CSR
(BEGIN to END) and save it in the text file.
XSCF> showhttps
HTTPS status: disabled
Server key: installed in Jul 11 06:33:25 UTC 2006
CA key: installed in Jul 11 06:33:21 UTC 2006
CA cert: installed in Jul 11 06:33:21 UTC 2006
CSR:
-----BEGIN CERTIFICATE REQUEST-----
MIIByzCCATQCAQAwgYoxCzAJBgNVBAYTAkpQMREwDwYDVQQIEwhLYW5hZ2F3YTER
MA8GA1UEBxMIS2F3YXNha2kxEDAOBgNVBAoTB0ZVSklUU1UxDDAKBgNVBAsTA0VQ
:
uni/n3g2/F5Ftnjg+M4HtfzT6VwEhG01FGP4IImqKg==
-----END CERTIFICATE REQUEST-----
4. Send the copied CSR to the CA and request the web server certificate.
5. Perform the sethttps(8) command with option for import. Then copy and
paste the signed web server certificate in the window. Please press Enter and
press the "Ctrl" and "D" keys. Then the importing is completed.
2-64 SPARC Enterprise Mx000 Servers XSCF User’s Guide • August 2009
6. Use the sethttps(8) command to enable https.
XSCF> rebootxscf
The XSCF will be reset. Continue? [y|n] :y
■ After the XSCF reset, the XSCF session is disconnected. Please log in again to the
XSCF.
8. Access the XSCF Web specifying the https form client. In the window, please
check that the security warning dialog is not displayed or confirm whether the
certificate is correct.
2. Use the showhttps(8) command to confirm the generated web server certificate.
XSCF> showhttps
HTTPS status: disabled
Server key: installed in Jul 11 06:33:25 UTC 2006
CA key: installed in Jul 11 06:33:21 UTC 2006
CA cert: installed in Jul 11 06:33:21 UTC 2006
CSR:
-----BEGIN CERTIFICATE REQUEST-----
MIIByzCCATQCAQAwgYoxCzAJBgNVBAYTAkpQMREwDwYDVQQIEwhLYW5hZ2F3YTER
MA8GA1UEBxMIS2F3YXNha2kxEDAOBgNVBAoTB0ZVSklUU1UxDDAKBgNVBAsTA0VQ
:
uni/n3g2/F5Ftnjg+M4HtfzT6VwEhG01FGP4IImqKg==
-----END CERTIFICATE REQUEST-----
XSCF> rebootxscf
The XSCF will be reset. Continue? [y|n] :y
■ After the XSCF reset, the XSCF session is disconnected. Please log in again to the
XSCF.
2-66 SPARC Enterprise Mx000 Servers XSCF User’s Guide • August 2009
2.2.7 Audit Administration
Audit administration is used to specify logging of access details, such as which users
logged in to XSCF, their login times, and the operations that they executed. In the
server, the default access audit setting is enabled. The main audit settings include
the access audit enable/disable setting (see TABLE 2-12) and audit trail management
method (see TABLE 2-12).
1. Audit event data is logged in the form of audit records (see TABLE 2-12).
2. The audit records are stored in order by date in the local audit files of the XSCF
firmware (see TABLE 2-12).
3. The audit files are linked and become an audit trail (see TABLE 2-12).
4. Audit records are thus kept as an audit trail so that the user can refer to the Audit
trail (see viewaudit(8) ).
Term Description
Term Description
Audit trail Set of audit files. The user refers to an audit trail to analyze the information contained
in it.
Audit policy Audit settings. The audit policy mainly defines whether auditing is enabled or
disabled and the management method when audit trail becomes full.
Audit token One field in an audit record. An audit token contains an audit event attribute, such as
"user" or "privilege".
TABLE 2-13 lists the setting items and the corresponding shell commands.
Shell
Item Description Command Remarks
2-68 SPARC Enterprise Mx000 Servers XSCF User’s Guide • August 2009
TABLE 2-13 Audit Administration (Continued)
Shell
Item Description Command Remarks
Note – (1) If audit is disabled, writing to the audit trail is stopped, all requests to the
log file transfer to the log archive function are also stopped. When audit is enabled,
writing restarts. Rebooting the system disables and then enables access auditing.
Also, the local audit file of XSCF have the primary and secondary files. The data is
kept as is even if you perform archiving unless it exceeds the threshold of audit file.
Therefore, the usage of the audit file never becomes 0.
Note – (2) For detail of global policy, see the Administration Guide.
If the audit trail becomes full while count is the specified policy, new audit trail data
is discarded, and the number of times that records are dropped is counted.
If you plan to specify suspend, you need to generate in advance a user account that
has the auditadm privilege specified, and whose audit policy is set to disable.
If an audit trail becomes full when suspend is specified, XSCF will be locked. When
this happens, login using the user account that you set up in advance with audit
policy set to disable, and clear the audit trail space. Then continue with XSCF
operation.
If the audit trail space becomes full when "suspend" is specified, and you haven't
previously set up in advance a user account with audit policy "disable", you will not
be able to clear the audit trail space or perform any other functions. In this case, you
must log in as default user from the console, as described in "Setup Summary by the
XSCF Shell" on page 2-2. Then clear the audit trail space as default user.
Note – (4) Warnings are displayed as console messages and secure email. The
following is an example.
WARNING: audit trail is 91% full
You can clear space by manually transferring the current audit trail files to remote
storage or by deleting them. For details of transferring or deleting, see “Enabling or
Disabling Audit, Transferring a Log File, and Deleting Audit Data”, the
viewaudit(8) man page, or the XSCF Reference Manual. For audit policy details, see
the Administration Guide.
Note – (5) For detail of viewaudit(8) command, see the XSCF Reference Manual.
2-70 SPARC Enterprise Mx000 Servers XSCF User’s Guide • August 2009
Enabling or Disabling Audit, Transferring a Log File, and Deleting
Audit Data
■ Command operation
<Example 1> Disable writing to the audit trail and transfer the log
file.
XSCF> setaudit disable
< Example 4> Delete the log data of the audit trail.
XSCF> setaudit delete
<Example 1> Specify three users, enable the AUDIT and LOGIN groups
for the Audit class, enable SSH login for the Audit event, and
disable the global policy for the users.
XSCF> setaudit –a yyyyy,uuuuu,nnnnn=enabe –c ACS_AUDIT,ACS_LOGIN=
enable –e AEV_LOGIN_SSH=enable –g disable
2-72 SPARC Enterprise Mx000 Servers XSCF User’s Guide • August 2009
XSCF> showaudit all
Auditing: enabled
Audit space used: 13713 (bytes)
Audit space free: 4180591 (bytes)
Records dropped: 0
Policy on full trail: count
User global policy: enabled
Mail: [email protected]
Thresholds: 50% 75% 90%
User policy:
Events:
AEV_AUDIT_START enabled
AEV_AUDIT_STOP enabled
AEV_LOGIN_BUI enabled
AEV_LOGIN_CONSOLE enabled
AEV_LOGIN_SSH enabled
AEV_LOGIN_TELNET enabled
:
XSCF> viewaudit
file,1,2006-06-29 13:42:59.128 +09:00,20060629044259.0000000000.localhost
header,20,1,audit - start,localhost.localdomain,2006-06-29 13:42:59.131 +09:00
header,31,1,login - console,localhost.localdomain,2006-06-29 13:45:03.755
+09:00subject,1,default,normal,console
header,60,1,command - showpasswordpolicy,localhost.localdomain,2006-06-29
13:45:33.653 +09:00
subject,1,default,normal,console
command,showpasswordpolicy
platform access,granted
return,0
:
Note – Logs archived on the log host should be rotated at regular intervals to avoid
loss of log information. For example, logadm(1M) can be used to configure log
rotation on systems that run the Solaris OS.
Term Description
Log archiving Function that saves the log information stored on an XSCF to another
host
Archive host Host to which logs are saved
Archive directory Directory in the archive host to which logs are saved
TABLE 2-15 lists setting items and the corresponding shell commands.
2-74 SPARC Enterprise Mx000 Servers XSCF User’s Guide • August 2009
TABLE 2-15 Log Archiving Administration (Continued)
Password Sets a password used for ssh login to the setarchiving The password is used for
archive host. the ssh login.
Host public Sets a public key used in server authentication setarchiving • To specify a public key,
key for the archive host. use RSA. An MD5 key
The public key is specified in any of the is displayed for a
following ways: fingerprint.
• Not specified • If a public key is set but
• Specifying a key by downloading it from the not used for this
archive host authentication, the
public key is deleted.
• Using text to specify a public key for the
archive host
Capacity Sets limits for the space consumed by archives. setarchiving Specify integer values in
There are two limits, one for each category of units of megabytes for the
logs: capacity in order,
• Audit log beginning with the audit
• Other logs log and then other logs
(Note 1).
The ranges for this setting
are as follows (Note 2):
• Audit log:
0 or unlimited,
500-50000
• Other logs:
500-50000
Note – For the types of logs that can be saved, see Chapter 8.
Note – When you set neither a defined value nor a value outside the specified
range, an error is displayed. In this event, no setting is made and the process is
terminated.
2-76 SPARC Enterprise Mx000 Servers XSCF User’s Guide • August 2009
4. Use the showarchiving(8) command to confirm the settings.
XSCF> showarchiving
*** Archiving Configuration ***
Archiving state ---------- Enabled
Archive host ------------- example.com
Archive directory -------- /var/logs/xx
User name for ssh login -- foo
:
XSCF> showarchiving -v
*** Archiving Configuration ***
Archiving state ---------- Enabled
Archive host ------------- example.com
Archive directory -------- /var/logs/this-xscf/xx
User name for ssh login -- foo
Archive host public key -- Server authentication disabled
Archive host fingerprint - Server authentication disabled
1. Use the showarchiving(8) command to display the amount of space used for
log archiving.
XSCF> showarchiving -v
*** Archiving Configuration ***
Archiving state ---------- Enabled
Archive host ------------- example.com
Archive directory -------- /var/logs/this-xscf/xx
User name for ssh login -- foo
Archive host public key -- Server authentication disabled
Archive host fingerprint - Server authentication disabled
<Example> Specifying capacity limits for the audit log and other
logs
XSCF> setarchiving -l Unlimited,10000
XSCF> showarchiving -v
*** Archiving Configuration ***
Archiving state ---------- Enabled
:
AUDIT LOGS OTHER LOGS
---------- ----------
Archive space limit 10000 MB 10000 MB
Archive space used 3010 MB 2252 MB
Total archiving failures 171 2
Unresolved failures 4 0
2-78 SPARC Enterprise Mx000 Servers XSCF User’s Guide • August 2009
Displaying Log Archiving Error Information
■ Command operation
Term Description
SNMP Abbreviation for Simple Network Management Protocol. This query, command, and
response protocol is used to test and change configuration parameters of LANs and
WANs that are connected to bridges, routers, switches, or other devices via networks.
Currently, SNMPv1, SNMPv2c, and SNMPv3 are available. SNMPv3 has added
encryption and authentication functions, in comparison with SNMPv1 and SNMPv2c.
MIB Abbreviation for Management Information Base. This is the information database used to
manage the SNMP agent function, which responds with MIB information to requests
from the SNMP manager.
USM Abbreviation for User-based Security Model. This user-based security model is defined by
SNMPv3.
Term Description
VACM Abbreviation for View-based Access Control Model. This view-based access control
model is defined by SNMPv3.
Group Users belonging to a VACM model. The group is defined in the access privilege of every
user in the group.
OID Abbreviation for Object Identifier. This is an object identification number. a numerical
address for an object in the MIB definition file, expressed with integers using a dot as the
delimiter.
View Method of referring to the MIB definition file. A view is a subtree of the MIB, which is
(MIB View) defined with OIDs and OID masks. An MIB access control view can be provided to a
group.
2-80 SPARC Enterprise Mx000 Servers XSCF User’s Guide • August 2009
TABLE 2-17 SNMP Administration (Continued)
USM Sets USM management information for the setsnmpusm • SNMPv3 settings.
management following for the SNMP agent: • Specify the password
information • Specifying a user authentication algorithm over 8 characters.
• Sets authentication/encryption passwords
for users
• Changing authentication/encryption
-passwords for users
• Copying a user
• Deleting a user
Display VACM Displays VACM management information showsnmpvacm
management for the SNMP agent
information
VACM Sets VACM management information for the setsnmpvacm • SNMPv3 settings.
management following for the SNMP agent: Making • Any access control view
information access control group and access control view that is provided to a
(MIB view) settings for a user group is a Read-Only
• Adds a user account to an access control view.
group
• Deleting a user from an access control
group
• Creating an MIB access control view
• Deleting an MIB access control view
• Providing an MIB access control view to a
group
• Deleting a group from all MIB access
control views
Note – (1) A user name, authentication password, and encryption password that are
common to both the sending and receiving sides are set for an SNMPv3 user.
Note – (2) If inform is specified, InformRequest is sent using the SNMPv2c agent.
2-82 SPARC Enterprise Mx000 Servers XSCF User’s Guide • August 2009
<Example> Display of the status when no management information has
been set
XSCF> showsnmp
Agent Status: Disabled
Agent port: 161
System Location: Unknown
System Contact: Unknown
System Description: Unknown
:
XSCF> showsnmp
Agent Status: Enabled
Agent port: 161
System Location: MainTower21F
System Contact: [email protected]
System Description: DataBaseServer
:
<Example> Display of the status when settings have been made for
SNMPv1 and SNMPv2c
XSCF> showsnmp
Agent Status: Enabled
Agent Port: 161
System Location: MainTower21F
System Contact: [email protected]
System Description: DataBaseServer
Trap Hosts:
Hostname Port Type Community String Username Auth Protocol
-------- ---- ---- ---------------- -------- --------------
host1 162 v1 public n/a n/a
host2 1162 v2 public n/a n/a
SNMP V1/V2c:
Status: Enabled
Community String: public
2-84 SPARC Enterprise Mx000 Servers XSCF User’s Guide • August 2009
3. Confirm the SNMPv3 trap settings.
XSCF> showsnmp
Agent Status: Enabled
Agent Port: 161
System Location: MainTower21F
System Contact: [email protected]
System Description: DataBaseServer
Trap Hosts:
SNMP V1/V2c:
Status: Enabled
Community String: public
SP MIB
FM MIB
XSCF> showsnmp
2. Use the setsnmp(8) command to disable the trap destination host of the
SNMPv3 target.
3. Use the showsnmp(8) command to confirm that the trap destination host has
been disabled.
XSCF> showsnmp
XSCF> showsnmp
XSCF> showsnmp
XSCF> showsnmp
XSCF> showsnmp
2-86 SPARC Enterprise Mx000 Servers XSCF User’s Guide • August 2009
Disabling Traps to the Target Host of SNMPv1/SNMPv2c
■ Command operation
XSCF> showsnmp
2. Use the setsnmp(8) command to disable the trap destination host of the
SNMPv1 or SNMPv2c target.
3. Use the showsnmp(8) command to confirm the disabling of the target the trap
destination host.
XSCF> showsnmp
XSCF> showsnmp
2. Use the setsnmp(8) command to change the SNMP settings back to the default.
At this time, the SNMP agent becomes disabled.
3. Use the showsnmp(8) command to confirm that the SNMP setting returned to
the default.
XSCF> showsnmp
XSCF> showsnmp
Note – When you changed the SNMP settings back to the default, if the Sun
Management Center (Sun MC) is being used, the SNMP agent information for Sun
MC is also cleared. To set the SNMP agent information for Sun MC again, execute
the setsunmc(8) command with the -s option. For details about the command, see
the XSCF Reference Manual or the man page.
XSCF> showsnmpusm
2-88 SPARC Enterprise Mx000 Servers XSCF User’s Guide • August 2009
2. Use the setsnmpusm(8) command to set USM management information.
XSCF> showsnmpusm
<Example 4> Create an MIB access control view by using an OID mask.
XSCF> setsnmpvacm createview -s .1.3.6.1.2.1 -m fe excl_view
<Example 7> Delete a group from all MIB access control views.
XSCF> setsnmpvacm deleteaccess group1
XSCF> showsnmpvacm
2-90 SPARC Enterprise Mx000 Servers XSCF User’s Guide • August 2009
2.2.10 Mail Administration
The mail report function is used to send an email to the system administrator when
the fault has occurred in the system. This section explains how to set up the XSCF
mail report function.
Note – You should set up the mail configuration so the designated users (platadm,
system administrators, and so on) can receive immediate notification of faults that
occur on the platform or domain.
TABLE 2-18 lists the settings and the corresponding shell commands.
Shell
Item Description Command Remarks
Shell
Item Description Command Remarks
Specifying the Host Name, Port Number, and Reply Address of the
SMTP Server
■ Command operation
XSCF> showsmtp
Mail Server:
Port: 25
Authentication Mechanism: none
Reply address:
2-92 SPARC Enterprise Mx000 Servers XSCF User’s Guide • August 2009
<Example 1> Specifying a host name, port number, reply address and
SMTP authentication
XSCF> setsmtp -s mailserver=192.1.4.5 -s port=25 -s replyaddress=
[email protected] -s auth=smtp-auth -s usr=usr001 -s password=
xxxxxxxx
<Example 2> Specifying a host name, port number, reply address and
POP authentication
XSCF> setsmtp
Mail Server [192.1.4.2]: 192.1.4.5
Port[25]:
Authentication Mechanism [none]:pop
POP Server [192.1.4.2]:
User Name []: usr001
Password []: xxxxxxxx
Reply Address [[email protected]]:
XSCF> showsmtp
Mail Server: 192.1.4.5
Port: 25
Authentication Mechanism : pop
User Name: usr001
Password: ********
Reply Address: [email protected]
1. Set the SMTP server as described in Specifying the Host Name, Port Number,
and Reply Address of the SMTP Server. Use the showemailreport(8) command
to display mail report setting information.
XSCF> showemailreport
E-Mail Reporting: disabled
XSCF> showemailreport
E-Mail Reporting: enabled
Recipient Address: [email protected]
4. Confirm the test mail by checking if an email with the subject "Test Mail" was
received.
For details on whether to divide a PSB into 1 (Not divided) or 4 units, see
Section 2.2.12, “System Board Configuration” on page 2-122.
In the M3000 server, you cannot perform the operations such as setting the domain
configuration, or adding or deleting the system board. Domain has been configured
by default and cannot be changed. However, you can set the configuration policy
and display the domain information.
For an overview of the domain and the system board, see the Overview Guide for
your server. Also, for an overview of the components, see the Service Manual for
your server.
2-94 SPARC Enterprise Mx000 Servers XSCF User’s Guide • August 2009
TABLE 2-19 Domain Configuration Terms
Term Description
Domain When hardware resources in the server are logically divided into one or more units, each
set of divided resources can be used as one system, which is called a domain. A Solaris OS
can operate in each domain.
PSB The PSB is made up of physical components, and can include 1 CMU (CPU/Memory
Board unit) and 1 IOU (I/O unit) or just 1 CMU. In the M4000/M5000 servers, the CMU
is mounted on the MBU. A PSB can also be used as to describe a physical unit for
addition/deletion/exchange of hardware. The PSB can be used in one of two methods,
one complete unit (undivided status) or divided into four subunits. However, in the
M3000 server, the PSB can be used in one complete unit (undivided status) only.
Note - On the M4000/M5000 servers, 1 PSB is 1 CMU. In an M4000 server, a PSB makes
up the entire MBU. In an M5000 server, there are two PSBs on the single Motherboard unit
(one PSB contains CPUs 0 to 3 and the other PSB contains CPUs 4 to 7).
In the M3000 server, a PSB makes up the entire MBU. There is only one PSB, which
contains CPU, I/O, and memory. The PSB cannot be divided into four subunits.
XSB The XSB is made of physical components. In the XSB, the PSB can be either one complete
unit (undivided status) or divided into four subunits. The XSB is a unit used for domain
construction and identification, and can be also used as a logical unit.
LSB A logical unit name assigned to an XSB. Each domain has its own set of LSB assignments.
LSB numbers are used to control how resources such as kernel memory get allocated
within domains.
System board The hardware resources of a PSB or an XSB. A system board is used to describe the
hardware resources for operations such as domain construction and use. In this manual,
the system board refers to the XSB.
Uni-XSB One of the division types for a PSB to be configured. Uni-XSB is a name for when a PSB is
logically only one unit (undivided status). It is a default value setting for the division type
for a PSB. The division type can be changed by using the XSCF command, setupfru(8).
Uni-XSB may be used to describe a PSB division type or status.
Quad-XSB (Note 3) One of the division types for a PSB to be configured. Quad-XSB is a name for when a PSB
is logically divided into four parts. The division type can be changed by using the XSCF
command, setupfru(8). Quad-XSB may be used to describe a PSB division type or status.
Hardware resource Hardware components contained on a system board that configures a domain.
Domain Divides hardware resources in this system into independent software-based units.
Configuration Partitioning is performed with XSCF as follows:
1. XSBs are defined with each consisting of a CMU or MBU and an I/O unit divided by
software. (In M4000/M5000 servers, there will be I/O on only half of the XSBs.)
2. Each XSB is handled as an LSB so that it can configure a domain and be assigned a
number (LSB number). Furthermore, XSCF can define LSB resources in detail.
3. The domain operates with the LSB resources and the LSB number.
Domain ID (DID) ID assigned to a domain.
Term Description
Domain Component This is a list of domain configuration information. The DCL represents the hardware
List (DCL) resource information that is set for each domain and each LSB belonging to a domain. It
can be specified and displayed by setdcl(8) and showdcl(8), respectively.
Memory mirror In this mode, a PSB has two memory units, one mirroring the other. Saving the same data
mode in the separate memory units improves data security.
DIMM (Memory) Memory modules on a system board. For details on DIMMs, see the Service Manual for
your server.
Configuration If an error is detected in a domain in an initial hardware diagnosis, the range of logical
policy (Note 2) resources to be removed can be specified. The policy determines whether to remove
system boards or separate resources. On M3000 servers, the setdcl(8) command can only
be used to set configuration policy.
Omit-I/O option System board (XSB) configuration that prevents a specific domain from logically using
(Note 2) I/O units on a system board. The DR function (Note 1) is enabled with fewer hardware
resources.
(A PCI and LAN driver are prevented from being incorporated into the domain of an
LSB.)
Omit-memory System board (XSB) configuration that prevents a specific domain from logically using
option memory on a system board.
(Note 2)
Floating board A floating board is designated to be moved easily to another domain. In operation with a
(Note 2) kernel and important I/O on the system board in a domain, and to facilitate the DR
operation of the system board, it is necessary to define the system board so that can be
deleted or moved easily.
This definition is called a floating board option. A system board that lowered priority of
the kernel memory loading by enabling the floating board option is called a floating
board.
XSB status The power status and the diagnostic, assignment, and integration conditions of a system
board belonging to a domain are displayed for each XSB. The progress of changes in
conditions can be found by switching the domain configuration. The XSB status
information can be referred to with showdcl(8) and showboards(8). For details on the
XSB status, see TABLE 2-23.
Fault code Indicating that an error occurred in an XSB. For details on the fault codes, see TABLE 2-23.
System board pool The state of system board that does not belong to any domain. A system board that is the
(SP) system board pool state can be added to a domain where a CPU or memory has a high
load. When the added system board becomes unnecessary, the system board can be
returned to the system board pool state.
2-96 SPARC Enterprise Mx000 Servers XSCF User’s Guide • August 2009
Note – (1) DR: Abbreviation for Dynamic Reconfiguration. This function
dynamically adds a system board to a domain or deletes it from a domain. For
details on DR, see the Dynamic Reconfiguration User’s Guide.
Note – (2) Specified or displayed by the DCL. When the system board uses kernel or
I/O, for details of the DR operation and notation, see the Dynamic Reconfiguration
User’s Guide.
Note – (3) Although a CMU with two CPUMs can be configured into Quad-XSB
mode on an M8000/M9000 server, be aware of the following points:
- Only an XSB with at least one valid CPUM and memory can be configured
into a domain.
- Memory within an XSB that does not have a CPUM becomes unavailable.
The result is loss of access to half the installed memory on the CMU.
- You can add DIMMs to a CMU, but you cannot reconfigure memory resident on a
CMU to the valid XSBs to prevent that memory from becoming unavailable.
- The server generates a "configuration error" message for those XSBs that do not
have a CPUM and memory.
For details of components such as CPU/Memory Board unit, I/O unit, and
Motherboard unit, see the Service Manual for your server.
TABLE 2-20 lists the number of domains and XSBs for each system.
Note – Enabling Memory Mirror would require twice the amount of memory of a
domain used for operation. If the system board is a Quad-XSB in the M8000/M9000
servers, Memory Mirror cannot be used.
TABLE 2-21 lists the PSB, XSB, and LSB numbers to be assigned.
The PSB number is same as the CPU/Memory Board unit or I/O unit slot number.
If a PSB has one XSB number, the Uni-XSB configuration is assumed; and if it has
four XSB numbers, the Quad-XSB configuration is assumed.
TABLE 2-22 lists DCL information. The DCL has descriptors that each specify one item
of LSB information. Up to 16 items of LSB information (on the DCL) can be set for
one domain. These items can be displayed and specified by showdcl(8), and
setdcl(8). For details on DCL terms, see TABLE 2-19.
2-98 SPARC Enterprise Mx000 Servers XSCF User’s Guide • August 2009
TABLE 2-22 DCL Information
One domain can use up to 16 LSBs. The user can define the different XSB in each
LSB by using XSCF. Also, multiple domains can assign LSBs to the same XSB. If
multiple domains assign them to the same XSB, however, the domains not using that
XSB are in a state (Unconfigured) that does not allow them to use the XSB until the
domain using it (Assigned or Configured) releases it.
TABLE 2-23 lists the XSB status information. This information can be displayed by the
showboards(8) command.
Item Explanation
2-100 SPARC Enterprise Mx000 Servers XSCF User’s Guide • August 2009
TABLE 2-23 XSB Status Information (Continued)
Item Explanation
System
DomainID X (LSB/XSB)
Domain DomainID X PSB
CMU/MBU
IOU
I/O I/O I/O I/O
device device device device
XSCF
Note – In the entry-level server, the number of domains is one, and the domain
fully uses the resources in the PSB
2-102 SPARC Enterprise Mx000 Servers XSCF User’s Guide • August 2009
FIGURE 2-3 XSCF-Domain Correlation Diagram
XSCF modules
Domain modules
FIGURE 2-4 and FIGURE 2-5 show XSB hardware configuration diagrams in the
midrange servers. The number of hardware resources depends on whether the PSB
type is a Uni-XSB or Quad-XSB. FIGURE 2-4 and FIGURE 2-5 are examples when two
CMUs are mounted on the MBU.
Memory
I/O device
Memory
MBU
XSB#01-0
Memory
Memory
2-104 SPARC Enterprise Mx000 Servers XSCF User’s Guide • August 2009
FIGURE 2-5 XSB Configuration Diagram (Quad-XSB) (In the Midrange Servers)
Memory
XSB#00-0 CPU I/O device
CPU Memory
XSB#00-1 I/O device
Memory
XSB#00-2 CPU
MBU
Memory
XSB#01-0 CPU I/O device
Memory
XSB#01-1 CPU I/O device
XSB#01-2 Memory
CPU
CPU Memory
XSB#01-3
FIGURE 2-6 and FIGURE 2-7 show XSB hardware configuration diagrams in the
high-end servers. The number of hardware resources depends on whether the PSB
type is a Uni-XSB or Quad-XSB.
FIGURE 2-6 shows Uni- XSB hardware configuration diagrams in high-end servers.
Memory XSB#xx-0
I/O device
Memory
I/O device
2-106 SPARC Enterprise Mx000 Servers XSCF User’s Guide • August 2009
FIGURE 2-7 XSB Configuration Diagram (Quad-XSB) (In the High-End Servers)
Memory
XSB#xx-0
I/O device
Memory
XSB#xx-1
I/O device
Memory
XSB#xx-2
I/O device
Memory
XSB#xx-3
I/O device
FIGURE 2-8 XSB Configuration Diagram (Uni-XSB) (In the Entry-Level Server)
In the M3000 server, Step 2 and Step 4 are not required. Perform Step 1, Step 3 and
Step 5, only if you change the domain configuration policy.
1. Log in to XSCF.
2. Make memory mirror mode and Uni/Quad-XSB settings for each PSB. (Note)
(See showfru(8), setupfru(8), and Section 2.2.12, “System Board Configuration”
on page 2-122.)
3. Create the DCL information corresponding to a domain, LSB, and XSB. (See
showdcl(8), setdcl(8).)
4. Assign an XSB to the domain, according to the created DCL information. (See
addboard(8), showboard(8). )
Note – Make these settings only to change the number of XSB divisions and the
mirror mode.
Note – For the procedure for installing, removing, or replacing a system board in
the server, see the Service Manual for your server. Also, for details on using the DR
function, see the Dynamic Reconfiguration User’s Guide.
TABLE 2-24 lists setting items and the corresponding shell commands.
2-108 SPARC Enterprise Mx000 Servers XSCF User’s Guide • August 2009
TABLE 2-24 Domain Configuration
Display XSB Displays the XSB status for the specified showboards
status domain or all domains.
For XSB status information, see TABLE 2-23.
Display Displays one of the following items for the showdomainstatus
domain status current domain status: showdcl
For details of domain status, see TABLE 2-22.
Display Displays the use status of devices and showdevices
resource use resources on an XSB.
state
Display DCL Displays the DCL information for a system showdcl
information board in the specified domain.
DCL Sets DCL information. setdcl "Omit-memory",
Specify configuration for LSB of specified "Omit-I/O", and
domain. "Floating board" are
For details of configuration information, see false by default.
TABLE 2-22.
Add to domain Adds or assigns an XSB to a domain, addboard If the XSB is placed in
according to DCL information. the assign state, a
Specify the following: reboot of the assigned
• Domain ID and number of the added XSB domain or the
addboard(8) command
• assign
with "configure"
Specify one of the following integration specified would
states when the domain is running (the DR configure the board into
function): a running Solaris OS
• configure (configure into Solaris OS) domain (the DR
• assign function).
• reserve (assign (reserve))
Delete from Deletes an XSB from a domain. deleteboard • The XSB is placed in
domain Specify the following: the assigned state
• Number of the deleted XSB when "disconnect" is
performed. At this
• unassign
state, a reboot of the
Specify one of the following states after domain or the
deletion when the domain is running (the addboard(8)
DR operation): command would add
• disconnect (deletion (assigned state)) the XSB again.
• unassign (complete deletion (pool state)) • If the XSB is placed in
• reserve (reserve deletion) the reserve (reserve
deletion) state,
turning off power to
the domain places it
in the pool state.
(These are the DR
functions.)
Move to Moves an XSB from its current domain to moveboard • If the XSB is placed in
domain another domain. the assign state, a
After the XSB is deleted from its domain, the reboot or the
function adds or assigns it to the other addboard(8)
domain. command with
Specify the following: "configure" specified
at the domain of the
• Domain ID and XSB number of the move
move destination
destination
would add the XSB.
• assign
• If the XSB is placed in
Specify one of the following the reserve (reserve
movement/integration states when the movement) state,
domain is running (the DR function): turning off power to
• configure (configure into Solaris OS) the domain places it
• assign (assign the XSB to the move in the pool state.
destination (reserve)) Turning on power to
• reserve (reserve movement) the move destination
adds the XSB.
(These are the DR
functions; see Note.)
Note – For details on using DR functions, see the Dynamic Reconfiguration User’s
Guide.
2-110 SPARC Enterprise Mx000 Servers XSCF User’s Guide • August 2009
Displaying the XSB Status
By referring to the XSB status of a domain, the user obtains information about an
XSB, such as whether its has been assigned and whether it has been recognized by
the Solaris OS. Such information also includes the current process and state of the
XSB and whether it was added or deleted successfully. The procedure for displaying
status information is shown below.
To display the domain partitioning status, see Section 2.2.12, “System Board
Configuration” on page 2-122. In the M3000 server, only the following number is
displayed, domain ID is 00, XSB is 00-0, and LSB is 00.
■ Command operation
<Example 3> Display XSB information about pooled XSBs and domain ID 0.
XSCF> showboards –c sp -d 0
XSB DID(LSB) Assignment Pwr Conn Conf Test Fault
---- -------- ----------- ---- ---- ---- ------- --------
00-0 SP Assigned n n n Passed Normal
2-112 SPARC Enterprise Mx000 Servers XSCF User’s Guide • August 2009
XSCF> showdcl -va
DID LSB XSB System No-Mem No-IO Float Cfg-policy
02 Powered Off System
00 00-0 False False False
01 -
02 -
03 -
04 -
05 -
06 -
07 01-0 False False False
08 01-1 False False False
09 01-2 False False False
10 01-3 False False False
11 -
12 -
13 -
14 -
15 -
2-114 SPARC Enterprise Mx000 Servers XSCF User’s Guide • August 2009
3. Use the addboard(8) command to add an XSB and use the showboards(8)
command to confirm the XSB status.
XSCF> poweron –d 2
DomainIDs to power on:02
Continue? [y|n] :y
02 :Powering on
*Note*
This command only issues the instruction to power-on.
The result of the instruction can be checked by the "showlogs
power".
To switch from the domain console to the XSCF Shell, press the Enter, “#” (default
escape character), and “.” (period) keys.
6. Use the showboards(8) command to confirm the XSB status. (See TABLE 2-23.)
XSCF> showdomainstatus –a
DID Domain Status
00 -
01 -
02 Running
03 -
Note – When adding the system board to the domain using DR functions that
operate the XSB without stopping the domain, see the Dynamic Reconfiguration User’s
Guide.
2-116 SPARC Enterprise Mx000 Servers XSCF User’s Guide • August 2009
Deleting a System Board From a Domain
■ Command operation
CPU:
----
DID XSB id state speed ecache
02 01-0 0 on-line 2376 0
02 01-0 1 on-line 2376 0
02 01-0 2 on-line 2376 0
02 01-0 3 on-line 2376 0
02 01-1 488 on-line 2376 0
02 01-1 489 on-line 2376 0
02 01-1 490 on-line 2376 0
02 01-1 491 on-line 2376 0
02 01-2 40 on-line 2376 0
02 01-2 41 on-line 2376 0
02 01-2 42 on-line 2376 0
02 01-2 43 on-line 2376 0
02 01-3 50 on-line 2376 0
02 01-3 51 on-line 2376 0
02 01-3 52 on-line 2376 0
02 01-3 53 on-line 2376 0
Memory:
-------
board perm base domain target deleted remaining
DID XSB mem MB mem MB address mem MB XSB mem MB mem MB
02 01-0 8192 2048 0x000003c000000000 32768
02 01-1 8192 0 0x0000020000000000 32768
02 01-2 8192 0 0x000001c000000000 32768
02 01-3 8192 0 0x0000018000000000 32768
IO Devices:
----------
DID XSB device resouce usage
02 01-0 sd0 /dev/dsk/c0t0d0s0 mounted filesystem "/"
02 01-0 sd0 /dev/dsk/c0t0d0s1 swap area
02 01-0 sd0 /dev/dsk/c0t0d0s1 dump device (swap)
XSCF> poweroff –d 2
DomainIDs to power off:02
Continue? [y|n] :y
02 :Powering off
*Note*
This command only issues the instruction to power-off.
The result of the instruction can be checked by the
"showlogs power".
2-118 SPARC Enterprise Mx000 Servers XSCF User’s Guide • August 2009
Note – When you delete the system board, please confirm the domain status, the
system board status, the device usage status on the system board, and also the
processes usage that are bound to the CPU or are accessing I/O devices. Then
confirm whether you should be able to delete the system board. Remember that
CPU/Memory Board unit resources also define the I/O resources, so deleting one
resource will affect the other. For details about operating the XSB while the Solaris
OS is running, and for details about DR messages, see the Dynamic Reconfiguration
User’s Guide.
6. Use the showboards(8) command to confirm that the XSB has been deleted
from the domain.
XSCF> showdcl –a
DID LSB XSB Status
02 Powered Off
00 00-0
07 01-0
08 01-1
09 01-2
10 01-3
XSCF> showdcl –a
DID LSB XSB Status
01 Powered Off
00 00-0
01 01-1
02 01-2
03 01-3
------------------------------------------
02 Powered Off
00 00-0
07 01-0
08 01-1
09 01-2
10 01-3
2-120 SPARC Enterprise Mx000 Servers XSCF User’s Guide • August 2009
6. Use the showboards(8) command to discplay the XSB status again.
XSCF> poweron –a
DomainIDs to power on:01,02
Continue? [y|n] :y
01 :Powering on
02 :Powering on
*Note*
This command only issues the instruction to power-on.
The result of the instruction can be checked by the
"showlogs power".
8. Use the showboards(8) command to confirm that the XSB has been added to
domain ID 1.
Note – When moving the system board to the domain by using the DR function that
operates the XSB without stopping the domain, see the Dynamic Reconfiguration
User’s Guide.
Before dividing a PSB into XSBs or changing the memory mirror mode, make sure
that the PSB is not assigned to any domain (system board pool state; unassign).
Term Description
Memory mirror In this mode, a PSB has two memory units, one mirroring the other. Saving the same data in
mode the separate memory units improves data security.
TABLE 2-26 lists the settings and the corresponding shell commands.
Display XSB Displays information on dividing a PSB into XSBs and showfru
division/ memory mirror mode information.
memory
mirror mode
information
XSB division Sets one of the following PSB type: setupfru
• Divide as one unit (not divided) (Uni-XSB).
• Divide as four units (Quad-XSB).
Memory Enables or disables the memory mirroring. Mirroring
mirror mode • Enable (mirroring). is disabled
• Disable (mirroring). by default.
(Note 1)
Add device The device, such as a system board, is added. addfru (Note 2)
2-122 SPARC Enterprise Mx000 Servers XSCF User’s Guide • August 2009
TABLE 2-26 System Board Configuration (Continued)
Delete device The device, such as a system board, is deleted. deletefru (Note 2)
Replace device The device, such as a system board, is replaced. replacefru (Note 2)
Diagnosis Diagnose the system board. testsb
The specified system board must be unconfigured from the
domain or the domain in which the system board is
configured must be powered off.
Note – (1) Memory mirroring requires twice the amount of memory domain used
for operation. If the PSB is a Quad-XSB type in M8000/M9000 servers, memory
mirroring cannot be used. In M4000/M5000 servers, memory mirroring can be used
regardless of whether the system board is a Uni-XSB or Quad-XSB.
Note – (2) The add/delete/replace operations are done by field engineers (FEs). If a
command is performed, the maintenance guidance is displayed. FEs will use the
device check, select, add, and delete operations in the guidance window. For
information about how to handle and operate these devices, see the Service Manual
for your server and any manual written for FEs.
XSCF> showfru –a sb
Device Location XSB Mode Memory Mirror Mode
sb 00 Uni No
sb 01 Uni No
sb 02 Uni No
XSCF> showfru –a sb
Device Location XSB Mode Memory Mirror Mode
sb 00 Quad No
sb 01 Uni No
sb 02 Uni No
XSCF> showfru –a sb
Device Location XSB Mode Memory Mirror Mode
sb 00 Quad No
sb 01 Uni No
sb 02 Uni No
3. Use the showfru(8) command to confirm the setting of memory mirror mode.
XSCF> showfru –a sb
Device Location XSB Mode Memory Mirror Mode
sb 00 Quad Yes
sb 01 Uni No
sb 02 Uni No
2-124 SPARC Enterprise Mx000 Servers XSCF User’s Guide • August 2009
4. Use the testsb(8) command to check the PSB, then check the results by using
the showboards(8) command.
XSCF> testsb 0
Initial diagnosis is about to start. Continue? [y|n] : y
Initial diagnosis is executing.
Initial diagnosis has completed.
XSB Test Fault
---- ------- --------
00-0 Passed Normal
00-1 Passed Normal
00-2 Passed Normal
00-3 Passed Normal
XSCF> showboards -va
XSB R DID(LSB) Assignment Pwr Conn Conf Test Fault COD
---- - -------- ----------- ---- ---- ---- ------- -------- ----
00-0 SP Unavailable n n n Passed Normal n
00-1 SP Unavailable n n n Passed Normal n
00-2 SP Unavailable n n n Passed Normal n
00-3 SP Unavailable n n n Passed Normal n
01-0 SP Unavailable n n n Unknown Normal n
02-0 SP Unavailable n n n Unknown Normal n
You may want to suppress some functions for a domain during system operation or
maintenance. For example, during system maintenance, you may not want to use
automatic boot (enable automatic boot suppression), suppress a break signal from
the console (enable break signal suppression), or suppress a panic during a Host
watchdog reset.
Term Description
Note – When the mode switch on the operator panel is set to Service, the automatic
boot and host watchdog functions are suppressed and the break signal is received,
regardless of the domain mode settings.
2-126 SPARC Enterprise Mx000 Servers XSCF User’s Guide • August 2009
TABLE 2-28 lists setting items and the corresponding shell commands.
TABLE 2-29 shows the status of the mode switch displayed in the prtdiag (1M)
command output which depends on the value of secure variable and the keyposition
of the mode switch on the operator panel.
Value of secure
variable set by Status of mode switch in the
setdomainmode(8) Key position of mode swich prtdig(1M) output
on Service UNLOCK
off UNLOCK
on Locked LOCK
off UNLOCK
For details of the setdomainmode(8) command, see the XSCF Reference Manual.
For details of the prtdiag(1M) command, see the Solaris OS documentation.
2-128 SPARC Enterprise Mx000 Servers XSCF User’s Guide • August 2009
Note – The SPARC64 VII processors are supported only on
M3000/M4000/M5000/M8000/M9000 servers that run certain versions of XCP
firmware (beginning with XCP 1070) and Solaris software. For specific information
about these minimum software and firmware requirements, see the latest version of
the Product Notes (no earlier than the XCP 1070 edition) for your server.
FIGURE 2-9 CPUs on CPU/Memory Board Unit (CMU) and Domain Configuration
To check the CPU operational mode, execute the prtdiag(1M) command on the
Solaris OS. If the domain is in SPARC64 VII Enhanced Mode, the output will display
SPARC64-VII on the System Processor Mode line. If the domain is in SPARC64 VI
Compatible Mode, nothing is displayed on that line.
By default, the Solaris OS automatically sets a domain’s CPU operational mode each
time the domain is booted based on the types of processors it contains. It does this
when the cpumode variable – which can be viewed or changed by using the
setdomainmode(8) command – is set to auto.
You can override the above process by using the setdomainmode(8) command to
change the cpumode from auto to compatible, which forces the Solaris OS to set
the CPU operational mode to SPARC64 VI Compatible Mode on reboot. To do so,
power off the domain, execute the setdomainmode(8) command to change the
cpumode setting from auto to compatible, then reboot the domain.
In an exception to the above rule, you can use the DR addboard(8) command with
its -c reserve or -c assign option to reserve or register a board with one or
more SPARC64 VI processors in a domain running in SPARC64 VII Enhanced Mode.
The next time the domain is powered off then rebooted, it comes up running in
SPARC64 VI Compatible Mode and can accept the the reserved or registered board.
2-130 SPARC Enterprise Mx000 Servers XSCF User’s Guide • August 2009
Note – Change the cpumode from auto to compatible for any domain that has or
is expected to have a mix of processor types. If you leave the domain in auto mode
and all the SPARC64 VI processors later fail, the Solaris OS will see only the
SPARC64 VII processors – because the failed SPARC64 VI processors will have been
degraded –and it will reboot the domain in SPARC64 VII Enhanced Mode. You will
be able to use DR to delete the bad SPARC64 VI boards so you can remove them. But
you will not be able to use DR to add replacement or repaired SPARC64 VI boards
until you change the domain from SPARC64 VII Enhanced Mode to SPARC64 VI
Compatible mode, which requires a reboot.
Note – The -v option and the display for ethernet address is supported in XCP1082
or later.
Enabling or Disabling the Host Watchdog Function and the Break Signal
Suppression
■ Command operation
1. Use the showdomainmode(8) command to display the host watchdog and break
signal suppression setting.
2-132 SPARC Enterprise Mx000 Servers XSCF User’s Guide • August 2009
<Example> Enable Host watchdog and Break signal suppression for domain ID 0.
XSCF> setdomainmode -d 0 -m secure=on
Diagnostic Level :max -> -
Secure Mode :off -> on
Autoboot :on -> -
CPU Mode :auto -> -
The specified modes will be changed.
Continue? [y|n]:y
configured.
Diagnostic Level :max
Secure Mode :on (host watchdog: available Break-signal:non-receive)
Autoboot :on (autoboot:on)
CPU Mode :auto
3. Use the showdomainmode(8) command to confirm the secure mode is on. Also,
to apply the setting to the domain, restart the domain.
XSCF> showdomainmode -d 0
Host-ID :0f010f10
Diagnostic Level :max
Secure Mode :on
Autoboot :on
CPU Mode :auto
2-134 SPARC Enterprise Mx000 Servers XSCF User’s Guide • August 2009
Specifying the CPU Operational Mode
■ Command operation
XSCF> showdomainmode -d 0
Host-ID :0f010f10
Diagnostic Level :max
Secure Mode :on
Autoboot :on
CPU Mode :auto
<Example> Specify SPARC64 VI compatible mode for CPU operational mode of domain
ID 0.
XSCF> setdomainmode -d 0 -m cpumode=compatible
Diagnostic Level :max -> -
Secure Mode :on -> -
Autoboot :on -> -
CPU Mode :auto -> compatible
The specified modes will be changed.
Continue? [y|n]:y
configured.
Diagnostic Level :max
Secure Mode :on (host watchdog: available Break-signal:non-receive)
Autoboot :on (autoboot:on)
CPU Mode :compatible
Note – Restart the domain to apply the settings to the domain. You may set the
initial diagnostic level, enable or disable the host watchdog function, break signal,
automatic boot, and CPU operational mode.
TABLE 2-30 lists setting items and the corresponding shell commands.
Setting Locale
■ Command operation
2-136 SPARC Enterprise Mx000 Servers XSCF User’s Guide • August 2009
2.2.15 Altitude Administration
This section explains the altitude settings. The server changes the system monitoring
due to the altitude of the server. Therefore, the operator must set the altitude during
the initial system setting. This setting is done by FEs.
With the altitude setting, the fan speed level varies by the environmental
temperature. To display the fan speed level for each environmental temperature,
execute the showenvironment(8) command. For the fan speed level corresponding
to the altitude and the environmental temperature, see Section 4.1.1, “Displaying
System Information” on page 4-1.
TABLE 2-31 lists setting items and the corresponding shell commands.
Display settings Display the altitude settings for the server. showaltitude
Altitude Specify the location altitude of the server: setaltitude A negative altitude
A set unit is specified in increments of 100 meters. cannot be set.
The setting of less than 100 meters is rounded up.
Setting Altitude
■ Command operation
XSCF> showaltitude
1000m
Note – A DVD drive unit and tape drive unit needs to be specified only for
M8000/M9000 servers. In an M3000/M4000 server, the MBU#0 on a MBU_A has the
DVD drive unit. In an M5000 server, the MBU#0 on a MBU_B has the DVD drive
unit.
TABLE 2-32 lists terms used in DVD drive/tape drive unit administration.
Term Description
DVD drive unit DVD: digital video disk drive unit. A basic cabinet and an expansion cabinet contain one
DVD drive unit respectively, which is accessed through I/O unit card A (IOUA) mounted in
an I/O unit. The DVD drive unit is connected to a specified I/O unit and is used to a single
domain that use the I/O unit.
In the M8000/M9000 servers, the DVD drive unit can be assigned to the specified IOUA port.
In the M3000/M4000/M5000 servers, the DVD drive is assigned to a specific system board,
but the port cannot be specified.
Tape drive unit A basic cabinet and an expansion cabinet contain one tape drive unit respectively, which is
accessed through IOU card A (IOUA) mounted in an I/O unit. The tape drive unit is
connected to a specified I/O unit and is assigned to a single domain that uses the I/O unit.
In the M8000/M9000 servers, the tape drive unit can be assigned to the specified IOUA port.
In the M3000/M4000/M5000 servers, the tape drive unit is assigned to a specific system
board, but the port cannot be specified.
Note – The DVD drive/tape drive unit cannot be used to back up XSCF
information.
2-138 SPARC Enterprise Mx000 Servers XSCF User’s Guide • August 2009
TABLE 2-33 lists the settings and the corresponding shell commands.
Display DVD Displays the DVD drive/tape drive unit setting cfgdevice
drive/tape information for an IOUA port.
drive unit
setting
information
DVD Sets the target IOUA port for connecting or cfgdevice In the system with
drive/tape disconnecting DVD drive and tape drive units. expansion cabinet,
drive unit (Note) the IOUA port
Specify the following: number is
• Connect/disconnect specified one per
cabinet.
• IOUA port number (I/O unit number - IOUA
number)
I/O unit number: 0-7; basic cabinet
8-15; expansion cabinet
Note – After the drive units are used for a domain (even if domain configuration is
changed and CPU/Memory Board unit or the I/O unit is replaced) the settings of
the IOUA port number are valid.
1. Use the cfgdevice(8) command to display DVD drive/tape drive unit settings.
2. Use the cfgdevice(8) command to change the DVD drive/tape drive unit
settings.
<Example 1> Specify the IOUA port number 0-0 for connecting.
XSCF> cfgdevice –c attach –p 0-0
Are you sure you want to attach the device [y|n] :y
Completed.( Reservation )
<Example 2> Specify the IOUA port number 0-0 for disconnection.
XSCF> cfgdevice –c detach –p 0-0
Are you sure you want to detach the device [y|n] :y
Completed.
3. Use the cfgdevice(8) command to display DVD drive/tape drive unit settings.
Confirm the enabling/disabling the specified IOUA number.
2-140 SPARC Enterprise Mx000 Servers XSCF User’s Guide • August 2009
2.2.17 COD Administration
COD administration is used to set COD license information for storage in the COD
license database.
Note – The COD feature is available only on M8000/M9000 servers and those
M4000/M5000 servers designated as COD models. If you have an M4000/M5000
server that is not a COD model, or an M3000 server, the information in this section
does not apply.
Note – For details on COD license information terms, methods for making settings,
and license acquisition, see the Administration Guide or related COD documentation.
TABLE 2-34 lists the settings and the corresponding shell commands.
Add/delete Adds a license key to or deletes a license key addcodlicense Deleting a license key
license from the COD license database for XSCF deletecodlicense If the number of licenses
(Note 1) firmware. is less than the number
of COD CPUs, no
license key can be
deleted.
Display COD Displays the following COD management showcod
management information.
information • State of license reservation for domains
• Headroom quantity
• This system ID
COD Configures the following COD management setcod
management information.
• Reserve the license for specified domain.
• Change the headroom quantity (Note 2)
Note – (1) A license key must be acquired in advance. To acquire the license, contact
your sales representative.
Note – (2) When the head room is used, it is necessary to buy the license.
XSCF> showcodlicense -v
Description Ver Expiration Count Status
----------- --- ---------- ----- ------
PROC 01 NONE 16 GOOD
01:803a9241:000000001:0301010100:16:00000000:XXXXXXXXXXXXXXXXXXXXXX
2-142 SPARC Enterprise Mx000 Servers XSCF User’s Guide • August 2009
2. Use the showcodusage(8) command to display the use status of COD licenses.
1. Use the addcodlicense(8) command to add a license key that has been
acquired in advance.
XSCF> addcodlicense
01:84000000:104:0301010100:3:00000000:xxxxxxxxxxxxxxxxxxxxxx
XSCF> deletecodlicense
01:84000000:104:0301010100:3:00000000:xxxxxxxxxxxxxxxxxxxxxx
2. Use the setcod(8) to specify the headroom quantity, to specify the licenses
reserved for domains.
XSCF> showcod
Chassis HostID: 80e3e446
PROC RTUs installed: 8
PROC Headroom Quantity: 4
PROC RTUs reserved for domain 0: 3
PROC RTUs reserved for domain 1: 0
PROC RTUs reserved for domain 2: 0
PROC RTUs reserved for domain 3: 0
2-144 SPARC Enterprise Mx000 Servers XSCF User’s Guide • August 2009
2.3 Save and Restore XSCF Configuration
Information
To save/restore the XSCF configuration information, execute the dumpconfig(8)
and the restoreconfig(8) command in the XSCF Shell. When the command is
executed with some options, all XSCF configuration information is saved at the
specified location and is restored from the specified location.
Note – The saving and restoring functions of the XSCF configuration by XSCF Shell
command are supported only on M3000/M4000/M5000/M8000/M9000 servers that
run certain versions of XCP firmware (beginning with XCP 1080). For specific
information about these minimum firmware requirements, see the latest version of
the Product Notes (no earlier than the XCP 1080 edition) for your server.
The XSCF configuration information can be saved in the device and can be restored
using one of the following two methods.
■ The configuration information can be saved and restored when a USB device has
been connected to the USB connector mounted on the XSCF Unit front panel of
the M4000/M5000/M8000/M9000 servers or rear panel of the M3000 server.
■ The configuration data is transmitted through the network with an encryption
protocol.
For details of configuration file and encryption, see the man page or the XSCF
Reference Manual.
1. Connect a USB device to the USB connector mounted on the XSCF Unit panel.
2. Perform the dumpconfig(8) command and specify the local USB device on the
XSCF Unit for the output file (see Note).
3. When the data transfer is complete, disconnect a USB device from the USB
connector.
4. Confirm the identification data in the head of the saved configuration file.
Note – For details on using the dumpconfig(8) command, including how to enable
encryption, see the man page or the XSCF Reference Manual.
2-146 SPARC Enterprise Mx000 Servers XSCF User’s Guide • August 2009
Saving the Configuration Information to a Specified Target Directory
Over a Network
■ Command operation
2. When the data transfer is complete, confirm the identification data in the head
of the saved configuration file.
2. Connect a USB device containing the saved configuration file to the USB
connector mounted on the XSCF Unit panel.
3. Perform the restoreconfig(8) command and specify the local USB device on
the XSCF Unit for the input file (see Note).
4. The identification data of the restored configuration file is displayed; if the data
is correct, then continue the restoration.
5. The XSCF will be reseted. After the data is restored, the XSCF will be halted.
When the restoration is complete, disconnect the USB device from the USB
connector.
Note – For more about encrypted data, see the man page or the XSCF Reference
Manual of the restoreconfig(8) command.
3. When the data transfer is complete, confirm the identification data in the head
of the saved configuration file.
4. The XSCF will be reseted. After the data is restored, the XSCF will be halted.
Turn the input power supply of the server off, then on.
Note – For more about encrypted data, see the man page or the XSCF Reference
Manual of the restoreconfig(8) command.
2-148 SPARC Enterprise Mx000 Servers XSCF User’s Guide • August 2009
CHAPTER 3
This chapter describes how to connect consoles and terminals to XSCF in order to
use the software, and how to connect to the server.
3-1
3.1.1 Terminal Operating Modes for Connection to
XSCF
The FIGURE 3-1 shows the terminal operating modes for connecting to XSCF.
FIGURE 3-1 Operating Modes for Connection to XSCF (In Midrange Servers)
SSH/telnet/
SSH/telnet/
https
https
connection
connection
Terminal
Mail Terminal
Router
notification Server XSCF-LAN
Ethernet connection
Domain
Domain Connection to the
XSCF
: serial port
User
LAN
Terminal
Note – In a system that has one XSCF Unit (M3000/M4000/M5000 servers), the
number of XSCF-LAN ports is two, and the number of serial ports is one. In systems
with two XSCF Units (M8000/M9000 servers), the number of actual XSCF-LAN and
serial ports is twice that of the system with one XSCF Unit.
3-2 SPARC Enterprise Mx000 Servers XSCF User’s Guide • August 2009
3.1.2 Port and Terminal Types Connected to the XSCF
As shown in FIGURE 3-1, two types of ports, serial and Ethernet, can be used for
connecting to the XSCF and the XSCF terminal.
Serial
The XSCF Shell and domain console (OS console) can be used while a terminal is
connected to a serial port.
Ethernet
The XSCF Shell and domain console can be used with SSH or telnet at a terminal
using an Ethernet (referred to as XSCF-LAN, in this document) connection. Also, the
XSCF Web can be used, with the appropriate browser settings. Other functions
which rely on XSCF-LAN (Ethernet) connectivity are the mail notification function,
the SNMP function, the log archiving function, the remote maintenance service
function, time synchronization with an external NTP server, and user authentication
with an LDAP server.
Connect cables to the appropriate connectors, log in to XSCF from the XSCF
terminal, and then perform the console(8) command. After that, you can use the
domain console (see Note below). You can return to the XSCF Shell console by
pressing the "#" (default escape character) and "." (period) keys while holding down
the Enter key. The XSCF functions do not vary according to the port type.
Note that the XSCF Web cannot be used on PCs and workstations that are connected
via serial port.
Note – The function used to switch from the XSCF Shell to the domain console by a
command is called the XSCF console redirection function. In the server, each system
board is serially and directly connected to the XSCF Unit (multipath configuration).
When the user performs the console(8) command, XSCF automatically selects a
path to the valid domain.
TABLE 3-1 lists the types of terminals connected to each port shown in FIGURE 3-1 and
corresponding port numbers.
3-4 SPARC Enterprise Mx000 Servers XSCF User’s Guide • August 2009
TABLE 3-1 Types of Terminals Connected With XSCF (Continued)
Note – A maximum of 20 users can be connected to the XSCF at the same time in
the M3000/M4000/M5000 servers. If 20 users are already connected to the XSCF,
access from the 21st (20 +1) user attempting to establish a connection is denied. In
the M8000/M9000 servers, there is a maximum of 100 users.
Note – In one domain, only one user can use the RW console. While one user is
using the RW console, another user cannot start another RW console in the same
domain. A maximum of 20 consoles can be connected to RW console and RO console
at the same time on the M3000/M4000/M5000 servers.
(Ex. M4000/M5000 servers; domain ID 0 <RW x 1, RO x 17>, domain ID 1 <RW x
1,RO x 1>).
In the M8000/M9000 servers, max is 100 consoles.
Port Number /
Protocol Function Connection Direction
TABLE 3-3 lists the port numbers used for the DSCP Link and the functions. When
you want to strengthen security of domain side, the following each port must be
permitted to pass packets as necessary.
TABLE 3-3 DSCP Link Port Numbers and Connection Directions for Functions
Port Number /
Protocol Function Connection Direction
3-6 SPARC Enterprise Mx000 Servers XSCF User’s Guide • August 2009
1. Confirm that a serial cable is inserted into the serial connector on the front of
the XSCF Unit, and confirm that the PC and workstation to be used are
correctly connected.
Baud rate: 9600 bps, Data length: 8 bit, No parity, STOP bit: 1 bit,
No flow control, Delay: Except for 0
a. Establish a connection via the serial port to use the XSCF Shell terminal.
3-8 SPARC Enterprise Mx000 Servers XSCF User’s Guide • August 2009
c. Confirm that the XSCF Shell prompt (XSCF>) is displayed.
a. If the domain is powered off, use the poweron(8) command for the domain
on the XSCF Shell terminal and turn it on to start the Solaris OS.
b. Follow Step a to Step c in the above “Connecting the XSCF Shell terminal.”
The following is the procedure for connecting to XSCF using SSH via the XSCF-LAN
port.
1. Confirm that a LAN cable is inserted into the XSCF-LAN port connector on the
front of the XSCF Unit, or confirm that the PC and workstation to be used are
correctly connected.
Note – To start up the SSH client, see your SSH manual. For details on login, see
Chapter 5.
a. If the domain is powered off, use the poweron(8) command for the domain
on the XSCF Shell terminal and turn it on to start the Solaris OS.
Note – In this system, you can use SSH to access from domain to XSCF via DSCP.
And you can use the setssh(8) command to disable the SSH access from domain to
XSCF. For details on the SSH access control via DSCP, see Section 2.2.5, “SSH/Telnet
Administration” on page 2-53.
The following is the procedure for connecting to a terminal using telnet via the
XSCF-LAN port.
1. Confirm that the LAN cable is inserted into the XSCF-LAN port connector on
the front of the XSCF Unit, or confirm that the PC and workstation to be used
are correctly connected.
3-10 SPARC Enterprise Mx000 Servers XSCF User’s Guide • August 2009
FIGURE 3-3 Example of Starting the Terminal Emulator
a. If the domain is powered off, use the poweron(8) command for the domain
on the XSCF Shell terminal and turn it on to start the Solaris OS.
b. Follow Step a to Step c in the above "Connecting the XSCF Shell terminal."
1. Perform the console(8) command on the XSCF Shell terminal screen to select
the domain console.
Note – One RW console can be connected in one domain. If a user with platadm or
domainadm user privilege forcibly connects a RW console, the currently connected
RW console is disconnected.
2. To switch from the domain console to the XSCF Shell, press the "#" (default
escape character) and “.” (period) keys while holding down the Enter key.
3. Confirm that the XSCF Shell prompt (XSCF>) is displayed in the terminal.
4. To set a escape character different from the default value, perform the
console(8) command with specifying the option. It is enabled only at the
current session.
Note – For details on types of the escape character, see the man page or the XSCF
Reference Manual.
3-12 SPARC Enterprise Mx000 Servers XSCF User’s Guide • August 2009
■ XSCF Shell
■ XSCF Web
■ SNMP agent function
■ Mail notification function
■ Time synchronization with an external NTP server
■ Authentication function using an LDAP server
■ Log archiving function
SSH/telnet/
SSH/telnet/ https
https connection
connection
Terminal
Terminal
Mail Router
Notification
XSCF-LAN port
Basic cabinet
DomainID m
DomainID n XSCFU Intranet
#0
User
LAN
DomainID x
DomainID y XSCFU
#1
User
LAN
Serial port
When you use the XSCF Shell, you can have high security by using SSH not telnet.
3-14 SPARC Enterprise Mx000 Servers XSCF User’s Guide • August 2009
FIGURE 3-5 shows the connection via an external network.
FIGURE 3-5 Connection of External Internet Using VPN Communication (In High-End
Server)
SSH/telnet/
SSH/telnet/
https
https
Internet connection
connection
Terminal
Terminal
XSCF-LAN port
Basic cabinet
DomainID m
DomainID n XSCFU
: #0
User
LAN
DomainID x
DomainID y XSCFU
: #1
User
LAN Serial port
For security reasons, using Virtual Private Network (VPN) as the external network is
strongly recommended.
3-16 SPARC Enterprise Mx000 Servers XSCF User’s Guide • August 2009
In the example of the configuration shown in FIGURE 3-6, if errors occur in either of
the two LAN ports and its switch hub, its LAN is replaced by the other LAN.
Moreover, if an error occurs in the switch hub, the other LAN can be relied on for
notification.
If an error occurs in the active XSCF Unit in the systems with two XSCF Units, XSCF
generates a failover, then the LAN of the other XSCF Unit can be used.
Fire Wall
LAN
DomainID x Hub
DomainID y XSCFU Fire Wall
: #1 System
User administration port
LAN Serial
Direct attach port
Serial for initial setup
maintenance
3-18 SPARC Enterprise Mx000 Servers XSCF User’s Guide • August 2009
FIGURE 3-7 Example of LAN Port Connections Not Made Redundant
Fire Wall
LAN
DomainID x Hub
DomainID y XSCFU
: #1 System
User administration port
LAN Serial
Direct attach port
Serial for initial setup
maintenance
An FE uses either the other XSCF-LAN port with the other LAN or a maintenance
terminal that is serially and directly connected.
Fire Wall
DomainID x
LAN
DomainID y XSCFU Direct attach port
: #1 for initial setup
User maintenance
LAN Serial
Serial
3-20 SPARC Enterprise Mx000 Servers XSCF User’s Guide • August 2009
CHAPTER 4
To display the configuration and status of a server, use the XSCF Shell.
4-1
XSCF> showhardconf
SPARC Enterprise xxxx;
+ Serial:PP20605005; Operator_Panel_Switch:Locked;
+ Power_Supply_System:Single; SCF-ID:XSCF#0;
+ System_Power:On; System_Phase:Cabinet Power On;
Domain#0 Domain_Status:Powered Off;
XSCF> showdate
Thu Jul 6 14:48:01 UTC 2006
4-2 SPARC Enterprise Mx000 Servers XSCF User’s Guide • August 2009
4. Use the showstatus(8) command to display information on degraded
components in the system.
XSCF> showstatus
* BP_A Status:Degraded;
* DDC_A#0 Status:Faulted;
* PSU#0 Status:Faulted;
XSCF> showenvironment
Temperature:30.70C
Humidity:90.00%
XSCF> showenvironment temp
Temperature:30.70C
CMU#0:43.00C
CPUM#0-CHIP#0:65.00C
CPUM#1-CHIP#0:61.20C
CPUM#2-CHIP#0:64.80C
CPUM#3-CHIP#0:63.60C
CMU#1:45.50C
:
XSCF> showenvironment volt
MBU_B
1.0V Power Supply Group:1.000V
1.8V Power Supply Group:1.910V
CPUM#0-CHIP#0
1.0V Power Supply Group:1.050V
:
TABLE 4-1, TABLE 4-2 and TABLE 4-3 list the fan speed level indicated by using the
showenvironment(8) command, which corresponding to the altitude configured
and the environmental temperature.
TABLE 4-1 Fan speed levels corresponding to altitude and environmental temperature (Entry-Level
system)
TABLE 4-2 Fan speed levels corresponding to altitude and environmental temperature (Midrange system)
TABLE 4-3 Fan speed levels corresponding to altitude and environmental temperature (Highend system)
For the altitude setting, see Section 2.2.15, “Altitude Administration” on page 2-137
4-4 SPARC Enterprise Mx000 Servers XSCF User’s Guide • August 2009
Power consumption and Exhaust air
To display power consumption and exhaust air of a server, use the power
consumption monitoring function and the airflow incdicator. Power consumption
monitoring function and airflow indicator make it possible to routinely confirm the
amount of power consumed on and airflow emitted while the server is up and
running.
For specific information about these minimum software and firmware requirements,
see the latest version of the Product Notes (no earlier than the XCP 1081 edition) for
your server.
Note – Power consumption and airflow values are for reference only. These values
vary depending on factors such as system load.
For details of the showenvironment(8) command, see the the XSCF Reference
Manual and man page. For the installation of server, see the Site Planning Guide for
your server.
Note – The amount of power consumption and exhaust air may not be indicated
correctly in the MIB information, in the showenvironment power,
showenvironment air commands output, and on the XSCF Web in the following
cases; and you should wait for one minute and check the value again.
- During the server powering on or powering off, or for a while after the power-on
or power-off complete
- During the active replacement of power supply unit, or for a while after the active
replacement complete
XSCF> showhardconf
SPARC Enterprise xxxx;
+ Serial:PP20605005; Operator_Panel_Switch:Locked;
+ Power_Supply_System:Single; SCF-ID:XSCF#0;
+ System_Power:On; System_Phase:Cabinet Power On;
Domain#0 Domain_Status:Powered Off;
4-6 SPARC Enterprise Mx000 Servers XSCF User’s Guide • August 2009
Unit number, status, version, serial number, FRU number, and information
on each memory slot. In the M3000/M8000/M9000 servers, there is
information on each memory slot.
The displayed information on each memory slot includes the unit number,
status, code, type and memory capacity.
Note that the type field indicates the size and rank of the DIMM using a
two-character code, as follows:
Note – The External I/O Expansion Unit may be referred to as IOBOX in example
program output and the text in this manual.
Note – For details on domain management, configuration and each command, see
Chapter 2, the XSCF Reference Manual, or the Administration Guide.
4-8 SPARC Enterprise Mx000 Servers XSCF User’s Guide • August 2009
Commands Used to Display Domain Information
Execute the following commands individually, as appropriate. For details of
commands, see Chapter 5.
■ showdcl
■ showboards
■ showdomainstatus
■ version
1. Use the showdcl(8) command to check the domain ID, LSB number,
configuration policy, No memory state (true/false), No IO state (true/false),
floating board state, and degradation information.
3. Use the showboards(8) command to check the XSB number, domain ID, LSB
number, and XSB status.
XSCF> showboards -a
XSB DID(LSB) Assignment Pwr Conn Conf Test Fault
---- -------- ----------- ---- ---- ---- ------- --------
00-0 00(00) Assigned y y y Passed Normal
00-1 00(01) Assigned y y y Passed Normal
00-2 SP Available y n n Passed Normal
00-3 02(00) Unavailable y n n Unknown Normal
To configure domains for a server, use the XSCF Web console or the XSCF Shell
commands.
4-10 SPARC Enterprise Mx000 Servers XSCF User’s Guide • August 2009
Note – In the M3000 server, the domain configuration policy can be changed by
using the setdcl(8) command. However, other domain configurations cannot be
changed.
For details on adding or changing a domain, see Chapter 2 of the XSCF Reference
Manual or the Administration Guide.
For details on using the DR function to change the domain configuration, see the
Dynamic Reconfiguration User’s Guide.
XSCF> showdomainstatus -a
DID Domain Status
00 Running
01 Powered Off
02 Powered Off
03 Powered Off
4-12 SPARC Enterprise Mx000 Servers XSCF User’s Guide • August 2009
XSCF> poweron -a
DomainIDs to power on:00,01,02,03
Continue? [y|n] :y
00 :Not powering on: The power supply has already been turned on.
01 :Powering on
02 :Powering on
03 :Powering on
*Note*
This command only issues the instruction to power-on.
The result of the instruction can be checked by the
"showlogs power".
Note – Only the domains that are able to be powered on are displayed.
XSCF> showdomainstatus -a
DID Domain Status
00 Running
01 Running
02 Running
03 Running
*Note*
This command only issues the instruction to power-off.
The result of the instruction can be checked by the
"showlogs power".
Note – Only the domains that are able to be powered off are displayed.
XSCF> showdomainstatus -a
DID Domain Status
00 Powered Off
01 Running
02 Powered Off
03 Powered Off
4-14 SPARC Enterprise Mx000 Servers XSCF User’s Guide • August 2009
2. Use the poweron(8) command to turn on power to the specified domain.
*Note*
This command only issues the instruction to power-on.
The result of the instruction can be checked by the
"showlogs power".
XSCF> showdomainstatus -a
DID Domain Status
00 Running
01 Running
02 Running
03 Powered Off
*Note*
This command only issues the instruction to power-off.
The result of the instruction can be checked by the
"showlogs power".
*Note*
This command only issues the instruction to power-off.
The result of the instruction can be checked by the
"showlogs power".
■ When Solaris OS of the domain is being booted, the power cannot be turned off.
After Solaris OS booting is completed, execute the poweroff(8) command again.
■ When Solaris OS of the domain is running in single user mode, the power cannot
be turned off using the poweroff(8) command. Execute the shutdown(1M)
command on the domain.
Note that when Solaris OS of the domain is running, domain power-off (shutdown
-i5, or equivalent) is required.
4-16 SPARC Enterprise Mx000 Servers XSCF User’s Guide • August 2009
Also, even if a system abnormality (like a fan or temperature abnormality) is
detected while the Solaris OS is being booted, or the system is running in single user
mode, there may be cases where the power cannot be turned off. (A Solaris OS
shutdown is not executed.) In such cases, immediately perform the procedure above.
XSCF> showdomainstatus -a
DID Domain Status
00 Running
01 Running
02 Running
03 Running
2. Use the reset(8) command to issue a panic instruction to the specified domain.
*Note*
This command only issues the instruction to reset.
The result of the instruction can be checked by the
"showlogs power".
XSCF> showdomainstatus -a
DID Domain Status
00 Running
01 Running
02 Running
03 Running
2. Use the reset(8) command to issue a reset instruction to the specified domain.
*Note*
This command only issues the instruction to reset.
The result of the instruction can be checked by the
"showlogs power".
*Note*
This command only issues the instruction to reset.
The result of the instruction can be checked by the
"showlogs power".
4-18 SPARC Enterprise Mx000 Servers XSCF User’s Guide • August 2009
3. Use the showdomainstatus(8) command to check the power status of the
domain specified to be reset.
XSCF> showdomainstatus -a
DID Domain Status
00 Booting/OpenBoot PROM prompt
01 Running
02 Running
03 Running
Note – When the mode switch on the operator panel is set to "Service" or auto boot
is disabled by the setdomainmode(8) command, automatic boot of the Solaris OS
after the reset instruction is suppressed.
Note – Since the reset(8) command forcibly resets the system, this command may
cause a failure in a hard disk drive or other components. Use this command only for
the purpose of recovery, such as if the Solaris OS hangs, and for other limited
purposes.
XSCF> showdomainstatus -a
DID Domain Status
00 Running
01 Running
02 Running
03 Running
2. Use the sendbreak(8) command to send a Break signal to the specified domain.
XSCF> sendbreak -d 0
Send break signal to DomainID 0?[y|n] :y
Note – To send the break signal to the domain, the domain mode setting is required.
When the mode switch on the operator panel is set to Service, the automatic boot
and host watchdog functions are suppressed and the break signal is received,
regardless of the domain mode settings. For details of the domain mode settings, see
Section 2.2.13, “Domain Mode Configuration” on page 2-125.
XSCF> showpowerupdelay
warmup time : 10 minute(s)
wait time : 20 minute(s)
XSCF> showpowerupdelay
warmup time : 10 minute(s)
wait time : 15 minute(s)
4. Confirm whether the setting time is valid when turning on the server power
supply the next time, by checking the time from when you perform the power
on till when the power supply unit is actually turned on.
4-20 SPARC Enterprise Mx000 Servers XSCF User’s Guide • August 2009
4.4.9 Warm-Up Time Administration
The warm-up time is intended to prevent the power supply unit and the fan from
running until the power supply environments of peripheral units are prepared after
the server starts the power-on processing. Once the warm-up time is set, the
OpenBoot PROM will start after the server power supply is turned on, the power-on
processing starts, and the set warm-up time elapses.
■ Command operation
XSCF> showpowerupdelay
warmup time : 10 minute(s)
wait time : 20 minute(s)
2. Use the setpowerupdelay(8) command to set the warm-up time. Set the
warm-up time from 0 to 255 (min). The default is "0 min."
XSCF> showpowerupdelay
warmup time : 5 minute(s)
wait time : 20 minute(s)
4. When turning on the server power supply the next time, please confirm that it
takes more time than usually by checking the amount of time it takes from the
power on until the time when the first Power On Self Test (POST) start message
is displayed.
Note – Once the air-conditioning time is set, the warm-up time will be valid after
the power is turned on and the air-conditioning time elapses.The air-conditioning
time and the warm-up time are also valid when the power is turned on at the power
recovery after the power failure.
4-22 SPARC Enterprise Mx000 Servers XSCF User’s Guide • August 2009
4.4.10 Shutdown Wait Time Administration
The shutdown wait time administration is a setting to delay the shutdown start by
specifying the shutdown start time when a power failure has occurred in the system
with the UPS.
■ Command operation
XSCF> showshutdowndelay
UPS shutdown wait time : 500 second(s)
2. Use the setshutdowndelay(8) command to set the shutdown wait time. Set
the shutdown wait time from 0 to 9999 (sec). The default is "10 sec."
Note – The ability to enable and disable the dual power feed or display its current
status is available on M3000/M4000/M5000 servers only. However, the dual power
feed mode cannot be used with 100V power on M4000/M5000 servers. When the
optional power cabinet for dual power feed is connected on M8000/M9000 servers,
it automatically configures the dual power feed mode. For details about the setting
the dual power feed, see the Installation Guide for your server.
■ Command operation
XSCF> showdualpowerfeed
Dual power feed is disabled.
3. Confirm the new setting, and if it is correct, turn off the input power and then
turn on to apply the specified configuration. When you enabled the dual power
feed mode, you can apply the configuration by executing the rebootxscf(8)
command.
XSCF> showdualpowerfeed
disable -> enable
NOTE: Dual power feed will be enabled the next time the platform
is powered on.
4. Confirm whether the setting is valid after turning off/on the input power.
XSCF> showdualpowerfeed
Dual power feed is enabled.
4-24 SPARC Enterprise Mx000 Servers XSCF User’s Guide • August 2009
4.5 Identifying the Location of the System
When more than one same type of system is installed in the same area, it may be
difficult to locate the target system. You can easily find target machine, even when it
does not have any faulty components, by using the XSCF Shell showlocator(8)
command and looking for the blinking the CHECK LED on the operator panel.
■ Command operation
1. Use the showlocator(8) command to display the current status of the CHECK
LED.
XSCF> showlocator
Locator LED status: Off
3. Use the showlocator(8) command to display the state of the CHECK LED.
XSCF> showlocator
Locator LED status: Blinking
● Use the showstatus(8) command to display the unit status. An asterisk (*) is
attached to a unit in abnormal status.
<Example 2> The CPU is degraded due to the effect of the crossbar
unit (XBU) being degraded.
XSCF> showstatus
MBU_B Status:Normal;
* CPUM#1-CHIP#1 Status:Deconfigured;
* XBU_B#0 Status:Degraded;
4-26 SPARC Enterprise Mx000 Servers XSCF User’s Guide • August 2009
4.7 Changing the Time
The time of the server is based on the XSCF time. Time can be displayed or set to
local time or UTC. For details on displaying or setting the system time, see
Chapter 2.
The procedure for switching the XSCF Unit status from standby to active is as
follows:
■ Command operation
2. Use the switchscf(8) command to switch the XSCF Unit from standby status
to active status.
Note – If possible, confirm that the ACTIVE LED states changes on the front panels
of both XSCF Units. Execute the switchscf(8) command only on one side (active
side or standby side) of the XSCF Units to automatically switch active/standby
status of the other XSCF Unit.
For specifying an option in the switchscf(8) command, see the XSCF Reference
Manual.
Note – For the hardware configuration of an External I/O Expansion Unit, see the
External I/O Expansion Unit Installation and Service Manual or the Service Manual for
your server. For details and examples of use of commands, see the XSCF Reference
Manual and the ioxadm(8) man page.
TABLE 4-4 lists terms used in External I/O Expansion Unit administration.
Term Description
Host path Device path. A device name and device number are used to represent the
layer location of a component in the component layer structure.
(Example: IOU#1-PCIE#4)
Downlink card A downlink card that is mounted in a PCI slot in an I/O unit of the
path server and connected to an External I/O Expansion Unit. An External
I/O Expansion Unit is connected to one or two downlink cards. A
downlink card path represents the layer location indicating which
downlink card is connected to the External I/O Expansion Unit in the
layer structure. (Example: IOU#1-PCIE#2)
TABLE 4-5 lists setting items and the corresponding shell commands.
4-28 SPARC Enterprise Mx000 Servers XSCF User’s Guide • August 2009
TABLE 4-5 External I/O Expansion Unit Administration
Display list Displays a list of External I/O Expansion ioxadm External I/O Expansion
Units and downlink cards. The following is Unit numbers are set in two
displayed: ways: specifying last four
• Set External I/O Expansion Unit numbers digits of serial numbers
and downlink card paths such as iox@nnnn, and
• Exernal I/O Expansion Units, I/O boards, specifying instance
link cards (Note 1), downlink cards, power numbers such as ioxn.
supply unit types, firmware versions, serial
numbers, part numbers, and states
Display Displays the status of the environment of the ioxadm Also, the preciseness is
environment specified External I/O Expansion Unit or displayed together with the
information downlink card as sensor measurement values. sensor measurement
The following is displayed: values.
• Current (A)
• Voltage (V)
• Fan speed (RPM)
• Temperature (C)
• LED state
Display/set Displays and sets the locator LED state for ioxadm Only one locator LED can
locator LED individual components in the specified be enabled or disabled at a
(Note 2) External I/O Expansion Unit. time in an External I/O
Each locator LED is in one of the following Expansion Unit.
states:
• Blinking
• Lit
• Off
Any of the following locator LED states can be
set:
• Enabled (on)
• Disabled (off)
Power on/off Turns on or off power to the specified I/O ioxadm Even after the power
board or power supply unit. switch is set to off, LEDs
Note: To forcibly disconnect an IO board and fans continue
belonging to a domain, use the -f option. operating as long as they
are supplied with power.
Note – (1) Also called uplink cards. They are mounted on I/O boards.
● Use the ioxadm(8) command to display a list of External I/O Expansion Units
and downlink card paths and to display information for each component.
4-30 SPARC Enterprise Mx000 Servers XSCF User’s Guide • August 2009
Displaying and Setting the Locator LED State of Each Specified
Component in an External I/O Expansion Unit
■ Command operation
● Use the ioxadm(8) command to display or set the locator LED state of the
specified component.
● Use the ioxadm(8) command to display, turn on or off power to the specified
component.
<Example 1> Display the PSU states of an External I/O Expansion Unit and
components.
XSCF> ioxadm -v list IOX@12B4
Location Type FW Ver Serial Num Part Num State
IOX@12B4 IOX 1.0 XCX033 5016937-03 On
IOX@12B4/PS0 A195 - T01056 3001701-03 On
IOX@12B4/PS1 A195 - T01074 3001701-03 On
IOX@12B4/IOB0 PCIX - XX00A3 5016938-04 On
IOX@12B4/IOB0/LINK OP 1.3 XF00X8 5017040-03 On
This chapter describes how to use the XSCF Shell. The chapter also describes how to
use commands and log in with an XSCF user account. It also explains command
errors.
The XSCF commands are effectively used by users who have created user accounts
for the XSCF Shell terminal but cannot use the XSCF Web.
The following XSCF commands can be used from the XSCF Shell prompt (XSCF>)
displayed after login to XSCF.
There are nine user privilege types as described below. For details on setting the user
privilege, see Chapter 2. For details on the operations available with each user
privilege level, see Chapter 1 or the Administration Guide.
■ domainop: The user can refer to all status information in a domain.
■ domainmgr: The user can perform domain power operations.
■ domainadm: The user has domain administrator privilege and can perform every
type of domain operation.
■ platop: The user can refer to all status information in the entire system.
■ platadm: The user has system administrator privilege and can use almost all
XSCF Shell commands
■ useradm: The user can manage user accounts.
5-1
■ auditop: The user can refer to the audit method of the XSCF and the audit
records.
■ auditadm: The user can control the audit to the XSCF.
■ fieldeng: The user can perform the commands for FEs.
TABLE 5-1 outlines the XSCF Shell commands. For details on each command and user
privileges, see the man page or the XSCF Reference Manual.
Command Description
5-2 SPARC Enterprise Mx000 Servers XSCF User’s Guide • August 2009
TABLE 5-1 XSCF Commands (Continued)
Command Description
Command Description
5-4 SPARC Enterprise Mx000 Servers XSCF User’s Guide • August 2009
TABLE 5-1 XSCF Commands (Continued)
Command Description
showfru Displays the specified number of XSB partitions of the system board and the
memory mirror mode that is set.
testsb Diagnoses the system board.
addboard Adds a system board to a domain.
deleteboard Deletes a system board from a domain. Alternatively, it reserves a delete to the
system board. If the deletion is reserved, the deletion is done after Solaris OS reboot.
moveboard Moves a system board to another domain. Alternatively, it reserves a move to the
system board. If the movement is reserved, the deletion is done after Solaris OS
reboot of source domain, and the assignment to the new domain is done.
replacefru Replaces a CPU/Memory Board unit, I/O unit, fan unit, PSU, or XSCF Unit in work
performed according to the applicable guide.
addfru Installs a CPU/Memory Board unit, I/O unit, fan unit, or PSU in work performed
according to the applicable guide.
deletefru Removes a CPU/Memory Board unit or I/O unit in work performed according to
the applicable guide.
setdomainmode Sets a hardware initial diagnostic level (No, standard, maximum).
Enables or disables break signal sending, host watchdog, automatic boot, and sets
CPU operation mode.
showdomainmode Displays the domain host ID, the hardware initial diagnostic level, information of
enabled or disabled status on break signal sending, Host watchdog, automatic boot,
and displays CPU operation mode, ethernet address (mac address).
sendbreak Sends a break signal to the server.
showresult Displays the exit status of the most recently executed command.
setlocale Sets locale.
showlocale Displays locale.
setaltitude Sets altitude.
showaltitude Displays altitude.
cfgdevice Sets the connection destination of the DVD drive unit and tape drive unit. Displays
the setting status information.
addcodlicense Applies the obtained COD license key to the system.
deletecodlicense Deletes the license key applied to the system.
showcodlicense Displays the license keys applied to the system.
showcodusage Displays license usage information.
setcod Configures COD settings.
showcod Displays COD settings.
Command Description
5-6 SPARC Enterprise Mx000 Servers XSCF User’s Guide • August 2009
TABLE 5-1 XSCF Commands (Continued)
Command Description
showlogs Displays an error log, power log, event log, console log, panic log, IPL log,
temperature/humidity log, and monitor message log.
fmadm Monitors or controls the Fault Management Diagnosis Engines (FMDE).
fmdump Dumps the fault event log containing FM diagnosis results.
fmstat Displays the FMDE status.
unlockmaintenance Forcibly release the locked status of the XSCF.
rebootxscf Resets the XSCF.
who Displays users who login to the XSCF.
man Displays the man page of the specified command.
You can see the list of commands by executing man intro.
exit Ends the XSCF Shell.
Note – In this manual, the window of the XSCF Shell terminal is called the XSCF
console.
1. After the terminal is connected to the serial port, press the Enter key on the
terminal.
3. Enter XSCF commands at the shell prompt (XSCF>) that is displayed after login
to XSCF.
login: jsmith
Password: xxxxxxxx
XSCF>
5-8 SPARC Enterprise Mx000 Servers XSCF User’s Guide • August 2009
5.2.3 Operation for Connecting Via the XSCF-LAN
(SSH)
This section describes how to log in to XSCF through an XSCF-LAN (SSH)
connection.
1. Before logging in using SSH, check that the fingerprint is pre-stored. If you did
not save the fingerprint, please connect to the serial port and use showssh(8) to
make a memo of the fingerprint of the host public key.
2. From an SSH client, specify the IP address or host name of XSCF and the port
number, if necessary (default port number 22), and use SSH connection via
XSCF-LAN.
4. The fingerprint of the host public key may be displayed with a request to
confirm its authenticity. If it is authentic, enter "yes" as the response, since the
XSCF is correct with confirming the fingerprint.
5. Enter XSCF commands at the shell prompt (XSCF>) that is displayed after log
in to XSCF.
Note – To set the password for an XSCF user account, use the password(8)
command. The shownetwork(8) command can be used to display XSCF-LAN
setting information and the current network connection status.
When the SSH connection is done using a user key, install the user public key in
XSCF in advance. See Chapter 2 for instructions on how to install the user public
key.
5-10 SPARC Enterprise Mx000 Servers XSCF User’s Guide • August 2009
5.2.4 Operation For Connecting Via the XSCF-LAN
(Telnet)
This section describes how to log in to XSCF via an XSCF-LAN (telnet) connection.
1. Enter the IP address or host name of XSCF and port number 23, and use telnet
via XSCF-LAN.
3. Enter XSCF commands at the shell prompt (XSCF>) that is displayed after you
login to XSCF.
login:jsmith
Password:xxxxxxxx
XSCF>
showenvironment
The showenvironment(8) command displays the values of all sensors in the server.
By finding out the intake temperature, humidity, voltage, and fan rotation speed in
the server, the system administrator can check for errors in the system environment.
showlocator/setlocator
These commands display status information indicated by the LEDs on devices and
the operator panel of the server. Finding out information on device errors is helpful
in component degradation and replacement. Also, the system administrator can use
the commands to identify the target device among many devices.
showconsolepath
The showconsolepath(8) command displays the operating status of the domain
console. By finding out the users of domain consoles, the system administrator can
notify the users before a user performs a server operation or server control.
showdomainstatus
The showdomainstatus(8) command displays the current operating status of a
domain. The system administrator can find out the status of each domain from its
power on time to its operation start time.
5-12 SPARC Enterprise Mx000 Servers XSCF User’s Guide • August 2009
sendbreak
The system administrator can use the sendbreak(8) command to send a break
signal to the Solaris OS.
showhardconf
The showhardconf(8) command lists all the components mounted in the server and
their status information. A problem component is indicated by a mark (*). The
system administrator can check the component configurations and the numbers of
different types of components.
showstatus
The system administrator can use the showstatus(8) command to list degraded
components.
showdevices / cfgdevice
The cfgdevice(8) command displays the domain to which a DVD drive unit or
tape drive unit is assigned. Also, the cfgdevice(8) command can be used only on
M8000/M9000 servers. The showdevices(8) command displays the operating status
of resources installed on a system board (XSB). The system administrator can use
this command to determine the devices to be assigned to a domain and check
whether the DR function can be used to connect or disconnect an XSB.
5-14 SPARC Enterprise Mx000 Servers XSCF User’s Guide • August 2009
console
The console(8) command establishes a connection to the domain console. This
command supports both interactive and read-only connections.
showdcl / setdcl
The showdcl(8) command displays the domain configuration information (DCL)
specified for individual domains or LSBs that compose a domain, and the setdcl(8)
command specifies the configuration. The system administrator refers to and
specifies DCL when adding an XSB to a domain.
showfru / setupfru
The showfru(8) command displays the locations of devices, such as system boards,
mounted in the server and resource partition information, and the setupfru(8)
command specifies these locations and this information. The system administrator
can use the commands for effective use of resources.
showlogs
The showlogs(8) command displays error logs, power logs, event logs, console logs,
panic logs, IPL logs, and temperature/humidity logs. The system administrator can
use the command to check the operating status of the server and the cause of any
error in the system.
showarchiving / setarchiving
The showarchiving(8) and setarchiving(8) commands display and specify,
respectively, the information required for saving XSCF log information to servers.
The system administrator can use these commands to set up automatic, secure
archiving of logs to a specified archive host.
5-16 SPARC Enterprise Mx000 Servers XSCF User’s Guide • August 2009
5.7 User Management and Security
Commands
This section describes the typical XSCF commands for user management and
security management.
■ showuser / adduser / deleteuser / enableuser / disableuser
■ password / setprivilege / showpasswordpolicy / setpasswordpolicy
■ showlookup / setlookup / showldap / setldap
■ showaudit / setaudit / viewaudit
■ showloginlockout / setloginlockout
■ showssh / setssh
showloginlockout / setloginlockout
The showloginlockout(8) and setloginlockout(8) commands display and specify
information on whether to refuse a user login for a certain period of time after
multiple attempts to log in to that user account failed.
showssh / setssh
The showssh(8) and setssh(8) commands can be used to display and specify the
information on whether or not to enable the SSH access when a user logs in to XSCF.
These commands can be used in generating the host key, registering/deleting the
user public key, setting the timeout period of XSCF Shell, and setting whether or not
to permit the SSH access from domain to XSCF via DSCP.
Note – The server provides many other commands. For details on these commands,
see the man page or the XSCF Reference Manual.
exit
The exit(1) command ends the XSCF Shell.
5-18 SPARC Enterprise Mx000 Servers XSCF User’s Guide • August 2009
version
The version(8) command displays the comprehensive firmware version (XCP
version, see Note) of the XSCF firmware and POST/OpenBoot PROM firmware. The
system administrator can display version information when upgrading firmware.
Note – XCP: XSCF Control Package that includes the programs which control the
hardware components making up a computer system.
Message Meaning
Note – The error message depends on the command. Therefore, you will
occasionally see more messages.
Even if a system failure or a serious error that disables reboot occurs, an email
message is guaranteed to be sent.
■ POP authentication facility and SMTP authentication at email sendings are
possible
To prevent illegal Mail Sending, POP Authentication (POP before SMTP) or SMTP
Authentication (SMTP-AUTH) can be done before mail sending is accepted with a
SMTP server.
6-1
FIGURE 6-1 outlines the XSCF mail function.
Authenti
Via SMTP sever
cation
Internet
6-2 SPARC Enterprise Mx000 Servers XSCF User’s Guide • August 2009
Parts Fault Notification
XSCF monitors components (such as CPU modules, fan units, CPU/Memory Board
unit) in the server. XSCF can notify the system administrator by email of any fault
that occurs in these devices.
FIGURE 6-2 shows mail being sent for parts fault notification to the system
administrator.
Fault
notification System
administrator
FAN A fault
occurs
System
The workflow is as described below. Perform each step for setup with the XSCF Shell
command line. For details on setup, see Chapter 2.
1. Log in to XSCF.
6-4 SPARC Enterprise Mx000 Servers XSCF User’s Guide • August 2009
6.3 Contents of Parts Fault Notification
This section explains the contents of the email messages sent for parts faults that
occur.
FIGURE 6-3 shows the contents of mail sent for a parts fault that occurred.
FIGURE 6-3 Mail Sent for an XSCF Parts Fault That Occurred
3. Mail title
The following items are displayed in the mail example of FIGURE 6-3 (No.1 to 3 in the
figure are excluded):
6-6 SPARC Enterprise Mx000 Servers XSCF User’s Guide • August 2009
CHAPTER 7
7-1
FIGURE 7-1 Example of a Network Management Environment
SNMP
SNMP is a protocol for managing networks. The SNMP manager consolidates
management of the operating conditions of terminals and network problems. The
SNMP agent responds with management information from the Management
Information Base (MIB) to requests from the manager. Also, a function called Trap
can be used by the SNMP agent to exchange special information in asynchronous
communication with the manager.
Note – The SNMP agent uses the 161 port and the 162 port for trap by default.
7-2 SPARC Enterprise Mx000 Servers XSCF User’s Guide • August 2009
7.2 MIB Definition File
The SNMP agent responds with management information from the MIB information
to requests from the manager.
Standard MIB
XSCF supports MIB-II (supports SNMPv2c and SNMPv3) and MIB-I (supports
SNMPv1), which are Internet standards, to manage mainly the following
information:
■ Basic XSCF-LAN information (such as, administrator name)
■ XSCF-LAN communication processing information
■ XSCF SNMP agent behavior information
For a list from the standard MIB information supported by XSCF, see Appendix C.
Extended MIB
Other than the standard MIB, two extended MIBs are supported by this system as
follows:
■ The XSCF extension MIB, which has been extended for the XSCF SNMP agent.
■ The Fault Management MIB, which has a format compatible with the Solaris OS.
scfMachineType OBJECT-TYPE
SYNTAX DisplayString
ACCESS read-only
STATUS mandatory
DESCRIPTION "System model name and model type name."
::= { scfInfo 1 }
scfNumberOfCpu OBJECT-TYPE
SYNTAX INTEGER
ACCESS read-only
STATUS mandatory
DESCRIPTION "Number of CPUs"
::= { scfInfo 2 }
scfSysSerial OBJECT-TYPE
SYNTAX DisplayString
ACCESS read-only
STATUS mandatory
DESCRIPTION "System serial number"
::= { scfInfo 3 }
For a list from the extended MIB information supported by XSCF, see Appendix C.
Note – The contents of the MIB definition file are defined using the notations of the
ASN1 standard.
The XSCF extension MIB definition file defines the administration information for
the SNMP manager to monitor the M3000/M4000/M5000/M8000/M9000 servers. To
perform server monitoring, install the XSCF extension MIB definition file to the
SNMP manager. For the method of installation, see the manuals of the SNMP
manager in use. For details on obtaining the XSCF extension MIB definition file and
the Fault Management MIB definition file, see “Preface” on page xvii.
7-4 SPARC Enterprise Mx000 Servers XSCF User’s Guide • August 2009
7.3 About Trap
When an event occurs, the SNMP agent function notifies the SNMP manager of the
event. This function is called a Trap (see FIGURE 7-2). The XSCF Trap covers the
following events:
1. XSCF failover
11. Occurance of unauthorized access to the XSCF SNMP agent (Standard trap)
12. Cold start trap generated at changing in composition of managed object for when
the SNMP agent starts up (Standard trap)
Note – In case 3 above, the target components are those whose fault location and
part number can be identified from among the system components monitored by the
XSCF. Even if the component cannot be identified, a Trap is issued during the XSCF
event notification.
Note – For trap types, see the MIB definition file. For details on obtaining the XSCF
extension MIB definition file and the Fault Management MIB definition file, see
“Preface” on page xvii.
The following shows an example of the SNMP-trap when a part fault has occurred
in the system.
7-6 SPARC Enterprise Mx000 Servers XSCF User’s Guide • August 2009
FIGURE 7-2 is a conceptual diagram of issuance of a Trap.
System
XSCF
Trap issued
XSCF SNMP agent function started
System
XSCF
System
SNMP manager
XSCF
Parts fault
System
XSCF
Faulty part replaced
System
XSCF
Event reports.
The workflow is as described below. Perform each setup step with the setsnmp(8)
command of the XSCF Shell. For details on setup, see Chapter 2.
Starting Transmission
■ Step 1:
For setting items common to the agent protocols of SNMPv1, SNMPv2c, and
SNMPv3, specify the management information listed below.
Note – A user name, authentication password, and encryption password that are
common to both the sending and receiving sides must be set for SNMPv3.
7-8 SPARC Enterprise Mx000 Servers XSCF User’s Guide • August 2009
■ Community name
■ Port number of the trap destination
■ Host name of the trap destination
■ Step 3:
Enable the XSCF SNMP agent function. Enable one or both of the following,
according to the user environment:
■ SNMPv1 and SNMPv2c
■ SNMPv3
Note – All MIB information except the setting items in step 2 is initialized when the
XSCF SNMP agent function is enabled.
[Disabling sending to the target trap destination host for SNMPv1, SNMPv2c]
Set, change, and delete user management information by performing the following
operations individually:
■ Specifying a user authentication algorithm
■ Setting authentication/encryption passwords for users
■ Changing authentication/encryption passwords for users
■ Copying a user
■ Deleting a user
■ Step 2:
Add user accounts in and delete users from access control groups and provide access
control views (MIB views) by performing the following operations individually:
■ Adding a user account to an access control group
■ Deleting a user from an access control group
■ Creating an MIB access control view
■ Deleting an MIB access control view
■ Providing an MIB access control view to a group
■ Deleting a group from all MIB access control views
7-10 SPARC Enterprise Mx000 Servers XSCF User’s Guide • August 2009
CHAPTER 8
This chapter explains how to update the firmware and how to collect log data.
When updating the firmware, the new XCP firmware (see Note) is obtained from a
web site (or from external media such as a CD-ROM disk) and downloaded to an
arbitrary folder on a personal computer or workstation connected to the server. The
firmware update sequence is: 1) XCP import in the system and 2) update.
Note – XCP: Abbreviation for the XSCF Control Package. XCP contains the control
programs that configure a computing system. The XSCF firmware and the OpenBoot
PROM firmware are included in the XCP file. The firmware update functions
provided by XSCF are used to manage XCP.
8-1
FIGURE 8-1 is a conceptual diagram of the firmware update.
URL Or
Server
Flash memories
of CMUs/MBUs
Flash memory
of the XSCF
1
PROM
XCP data DomainID 0
2 PROM
DomainID 1
2 PROM
DomainID 2
PROM
DomainID 3
8-2 SPARC Enterprise Mx000 Servers XSCF User’s Guide • August 2009
Note – The OpenBoot PROM firmware is applied by a domain reboot. In the M3000
server, this function updates the OpenBoot PROM firmware which is in the flash
memory of the single MBU. And the number of domains to be updated is one.
User Interfaces
The following function is used for the firmware update:
■ Firmware update using XSCF Web in a browser
■ XCP Import: Imports firmware to this system.
■ XCP Update: Updates the firmware to flash memory, applies the XSCF
firmware, and the OpenBoot PROM firmware.
■ Version: Displays the firmware version.
Using the XSCF Web console, the user can easily update firmware from a browser.
Also, regular maintenance and emergency firmware updates are supported. For the
method of starting XSCF Web, see Chapter 9.
■ Firmware update using the XSCF Shell
Note – For details on these four commands, see the man pages or the XSCF
Reference Manual.
User Privileges
The firmware update can be performed with either of the following two user
privileges:
■ platadm
Note – To obtain the URL of the Web site, see the description of the firmware
download in “Preface” on page xvii.
8-4 SPARC Enterprise Mx000 Servers XSCF User’s Guide • August 2009
XSCF> version -c xcp
XSCF#0 (Active)
XCP0 (Current) : 1080
XCP1 (Reserve) : 1080
XSCF#1 (Standby)
XCP0 (Current) : 1080
XCP1 (Reserve) : 1080
Note – Because micro release numbers may be updated more often than the
documentation, the micro release number may appear in documents as a variable.
An example might be XCP 108x.
The XSCF and OpenBoot PROM firmwares have different firmware version
numbers. You can use the version(8) command or XSCF Web to display the XCP
version for the system or the version of a firmware program.
Note – The latest XCP information is released on the web site. To obtain the URL of
the web site, contact your sales representative.
1. XCP import
Storing the obtained XCP data in this system is called "XCP import." The system
administrator or a field engineer obtains the XCP data files from the network or
external media (CD-ROM, DVD-ROM, or flash drive), then he or she imports the
data file using an XSCF console from a client (personal computer or workstation)
connected to the server.
Simply importing XCP does not update the firmware that is running. Also, the
XCP file is imported only by the versions number of one generation.
Caution – IMPORTANT – Even if this system is divided into domains, the update
is performed to newly write the OpenBoot PROM firmware to the flash memory on
the XSB of every domain. However, unlike the XSCF firmware, just the download of
this firmware does not update the OpenBoot PROM firmware that is running. To
complete updating the OpenBoot PROM firmware in the target domain, the domain
must be rebooted.
3. Application
Making the firmware written to flash memory in this system actually usable is
called "application."
Note – The number of domains that can be updated (application) is one or more. To
apply the OpenBoot PROM firmware in the target domain, be sure to reboot the
domain for firmware application.
8-6 SPARC Enterprise Mx000 Servers XSCF User’s Guide • August 2009
8.1.7 Firmware Update Types and Timing
The firmware update includes two types: operator's update and automatic update
(automatic matching of versions). In the M3000 server, automatic update is not
available, so the operator’s update is needed.
TABLE 8-1 describes the firmware update types and update times.
Operator's update Imports XCP and updates The system power is off XCP update time
(XCP update) the XSCF firmware and (input power is on and all
OpenBoot PROM firmware domains are stopped), or
on the XSBs belonging to all power to the domains is on.
domains (including pooled Note: The update is
domains). completed at the time of a
This is also referred to as reboot for application in all
"XCP update." domains.
Automatic update • When a CPU/Memory The system power is off • Time of CPU/Memory
(Automatic matching Board unit (Note 1) is (input power is on and all Board unit addition or
of versions) added or replaced, or the domains are stopped), or replacement. Or time of
XSCF Unit is replaced, power to the domains is on. replacement of an XSCF
the firmware version of • In the system with Unit that is configured
Note: In the M3000
each replacement redundant XSCF Units, If redundantly
server, automatic
component is you replace an XSCF Unit • Time of addition, move,
update is not
automatically matched to by using the maintenance or replacement of a
available.
the version of the guidance, the firmware system board by the DR
replaced component. version of the function
(Note 2) replacement XSCF Unit is
However, when a matched to the firmware
component is replaced in version of the replaced
the state of input power off XSCF Unit.
(The cold replacement), the • In CPU/Memory Board
firmware is not updated unit addition or
automatically. replacement, the target
• When the DR function is domain need not be
used to add, move, or rebooted for application
replace a system board of the OpenBoot PROM
(XSB), the firmware firmware. However,
version is automatically when the domain is
matched to the firmware powered off, the number
version in the domain of versions is matched by
that uses the system the startup of the
board. domain.
Note – (2) The replacement of the XSCF Unit and the version matching is performed
by FEs. When both XSCF Units are replaced in the systems with redundant XSCF
Units (the M8000/M9000 servers), or when in the M4000/M5000 servers, or when a
Motherboard unit is replaced (an XSCF Unit is replaced) in the M3000 server, the
firmware version cannot be automatically set to match the version of the replaced
unit. Perform the operator's update for the XCP version.
In a system with redundant XSCF Units, if the system is operating with only the
active XSCF Unit, such as because of a failure, the update of all firmware is
suppressed.
Supported Hardware
When an improvement is made to the hardware such as Motherboard unit,
CPU/Memory Board unit, CPU module or XSCF Unit, the firmware update must be
performed by using the XCP data which supporting the new hardware function.
See the latest version of the Product Notes for your server, for specific information
about minimum softwares and firmware requirements, when new hardware is
supported.
8-8 SPARC Enterprise Mx000 Servers XSCF User’s Guide • August 2009
Note – If data for an older version of XCP is used for the firmware update of a
system that is running, system operation cannot be guaranteed.
Note – Depending on the XCP version and system configuration, firmware update
procedures and requirements might be slightly different. For information about
specific firmware update procedures and requirements, refer to the Product Note
about your server.
Updating XCP From the Obtain the XCP files from the • In the system with a XSCF
Network appropriate web site, and use XSCF to Unit; About 45 minutes
import XCP. Use XSCF Web or the XSCF • In the system with redundant
Shell for the firmware update. XSCF Units; About 120 minutes
Reboot the system for application to all (Excludes the time for component
domains. replacement work)
Note:
If the system has redundant XSCF Units,
the XSCF Units are switched while the
update is in progress.
Updating XCP From External Imports XCP from the CD-ROM disk by • In the system with a XSCF
Media using XSCF. Use the XSCF Web or the Unit; About 45 minutes
(When the XCP file is copied XSCF Shell for the firmware update. • In the system with redundant
onto external media such as a The rest of the task is the same as XSCF Units; About 120 minutes
CD-ROM.) updating XCP from the network. (Excludes the time for component
replacement work)
Confirming That the OpenBoot The firmware update is automatically About 5 minutes
PROM Firmware is Updated performed. (Excludes the time for component
When a CMU/MBU Is Added or Confirm the version of the OpenBoot replacement work)
Replaced PROM firmware in the update target
domain.
This function is available when you are
using the M4000/M5000/M8000/M9000
servers. In the M3000 server, when a
Motherboard unit is replaced, the
operator must match the number of the
firmware versions.
8-10 SPARC Enterprise Mx000 Servers XSCF User’s Guide • August 2009
TABLE 8-2 Firmware Update Tasks (Continued)
Confirming That the XSCF The firmware update is automatically About 5 minutes
Firmware is Updated When an performed by using the maintenance (Excludes the time for component
XSCF Unit Is Replaced (There guidance for FE. replacement work)
Are Redundant XSCF Units) Confirm the version of the updated XCP.
This function is available when you are
using M8000/M9000 servers.
Note: When a component is replaced in
the state of main line switch off (the cold
replacement), the firmware is not
updated automatically. The operator
must match the number of the versions.
Confirming That the XSCF The firmware is not updated • In the system with a XSCF
Firmware Is Updated When the automatically. The operator must match Unit; about 20 minutes
XSCF Unit Is Replaced (in a the number of the firmware versions. • In the system with redundant
System With a Single XSCF Unit This function is available when you are XSCF Units; about 40 minutes
or Both Replacement in a System using M4000/M5000/M8000/M9000 (Excludes the time for component
With Redundant XSCF Units) servers. replacement work)
Confirming That the XSCF The firmware is not updated About 20 minutes
Firmware Is Updated When the automatically. The operator must match (Excludes the time for component
MBU Is Replaced (in the M3000 the number of OpenBoot PROM and replacement work)
server) XSCF firmware versions.
This function is available when you are
using M3000 servers.
1. Download the XCP files from a public site to an arbitrary folder on a personal
computer or workstation connected to the server.
In the public site, there will be the XCP file (the firmware program (tar.gz)), the
MIB definition file, and a document concerning the XCP. There are three types of
firmware program files (tar.gz) as described below:
■ The firmware program for M3000 servers (the file name begins with IKXCP).
■ The firmware program for M4000/M5000 servers (the file name begins with
FFXCP).
■ The firmware program for M8000/M9000 servers (the file name begins with
DCXCP).
When you import the firmware (the XCP importing), choose the appropriate
firmware program for your system.
2. Import XCP.
XSCF> getflashimage -l
Existing versions:
Version Size Date
FFXCP1080.tar.gz 51298982 Thu Jan 15 20:09:09 JST 2009
<Example> Login a remote ftp server specifying the user name and
host name that requires authentication password, then, import the
new 1082 version firmware program (tar.gz).
8-12 SPARC Enterprise Mx000 Servers XSCF User’s Guide • August 2009
c. If complete message, "Download successful: ..." and "MD5: ..." are displayed,
the XCP import has ended. Use the getflashimage(8) command with -l
option to confirm the imported version.
Note – If the XCP firmware version is 1050 or before, and if the “XCP update
enabled during system powered on state” message is displayed, you can update the
firmware.
<Example> Update XCP from an early version, 1080, to the newer 1082 version.
XSCF> flashupdate -c update -m xcp -s 1082
The XSCF will be reset. Continue? [y|n] :y
XCP update is started (XCP version=1082:last version=1080)
OpenBoot PROM update is started (OpenBoot PROM version=02090000)
OpenBoot PROM update has been completed (OpenBoot PROM version=02090000)
XSCF update is started (XSCFU=0,bank=1,XCP version=1082:last version=1080)
XSCF download is started (XSCFU=0,bank=1,XCP version=1082:last
version=1080, Firmware Element ID=00:version=01080001:last version=01080000)
XSCF download has been completed (XSCFU=0,bank=1,XCP version=1082:last
version=1080, Firmware Element ID=00:version=01080001:last version=01080000)
...
XSCF download is started (XSCFU=0,bank=1,XCP version=1082:last
version=1080, Firmware Element ID=07:version=01080004:last version=01080000)
XSCF download has been completed (XSCFU=0,bank=1,XCP version=1082:last
version=1080, Firmware Element ID=07:version=01080004:last version=01080000)
XSCF update has been completed (XSCFU=0,bank=1,XCP version=1082:last
version=1080)
XCP update is started (XCP version=1082:last version=1080)
OpenBoot PROM update is started (OpenBoot PROM version=02090000)
OpenBoot PROM update has been completed (OpenBoot PROM version=02090000)
XSCF update is started (XSCFU=0,bank=0,XCP version=1082:last version=1080)
XSCF download is started (XSCFU=0,bank=0,XCP version=1082:last
version=1080, Firmware Element ID=00:version=01080001:last version=01080000)
XSCF download has been completed (XSCFU=0,bank=0,XCP version=1082:last
version=1080, Firmware Element ID=00:version=01080001:last version=01080000)
...
XSCF download is started (XSCFU=0,bank=0,XCP version=1082:last
version=1080, Firmware Element ID=07:version=01080004:last version=01080000)
XSCF download has been completed (XSCFU=0,bank=0,XCP version=1082:last
version=1080, Firmware Element ID=07:version=01080004:last version=01080000)
XSCF update has been completed (XSCFU=0,bank=0,XCP version=1082:last
version=1080)
XSCF is rebooting to update the reserve bank
8-14 SPARC Enterprise Mx000 Servers XSCF User’s Guide • August 2009
Note – The display might be different according to XCP version and system
configuration.
At this time, the XSCF will reset and the XSCF session will disconnect, so
please connect the XSCF again. Only the application of the XSCF firmware is
completed.
Note – The work described below applies to a system with redundant XSCF Units.
i) Perform the firmware update in order, beginning with the standby side and then
the active side automatically. After the update on the standby side is completed, the
active and standby sides are switched. At this time, the XSCF reset is done and the
XSCF session is disconnected.
iv) When the firmware update completes, the active and the standby states of the
XSCF unit have become the opposite of original state. For instance, if the firmware
update is executed on XSCFU#0, when completing the command, XSCFU#1 would
become the active side. To switch the XSCF, execute the switchscf (8) command.
To confirm the switching between XSCFs, execute the showhardconf (8) command.
<Example>
XSCF> switchscf -t Standby
The XSCF unit switch between the Active and Standby states. Continue? [y|n] :y
d. To confirm that the XSCF firmware update has finished, use the showlogs(8)
command with the monitor option. Confirm no abnormality is found during
the update. If the "XCP update has been completed" message is displayed in
each XSCF Unit, the firmware update has completed.
4. To complete the update of the OpenBoot PROM firmware, restart the domain.
5. Confirm that the version of the system firmware that is running is that of the
firmware applied at the XSCF Shell command line by using the version(8)
command.
2. The login window of the XSCF Web console is displayed. Please enter an XSCF
user account and password.
4. Import XCP.
5. If complete message is displayed, the XCP importing has ended. Perform the
firmware update.
The XSCF firmware is downloaded and applied, and the OpenBoot PROM
firmware is downloaded.
a. Display the XCP update window. (The version of the imported XCP firmware
and the version of the firmware currently running has already displayed in
the screen.)
b. Make a selection for the firmware version check. Confirm whether or not it is
possible to update to the new firmware version.
8-16 SPARC Enterprise Mx000 Servers XSCF User’s Guide • August 2009
Note – In a system with redundant XSCF Units:
i) Perform the firmware update in order, beginning with the standby side and then
the active side automatically. After the update on the standby side is completed, the
active and standby sides are switched. At this time, the XSCF reset is done and the
XSCF session is disconnected.
d. Refer to the Monitor message log to confirm that the XSCF firmware update
has finished.
6. To complete the update of the OpenBoot PROM firmware, restart the domain.
7. Confirm that the version of the system firmware that is running is that of the
firmware applied from the XSCF Web console.
2. Confirm the XCP version in the XCP file (tar.gz) of external media. The latest
XCP information is released on external media or a web site. To obtain the URL
of the web site, see the description of the firmware download in “Preface” on
page xvii.
Note – This function is not available when you are using the M3000 server. When a
MBU is replaced, you must match the number of the firmware versions. See Section ,
“Confirming That the XSCF Firmware Is Updated When the MBU Is Replaced (in the
M3000 server)” on page 8-20
2. Confirm that the firmware version of the target domain agrees with the version
of the XSB firmware allocated to the added or replacement CMU/MBU.
■ Command operation
1. After doing an XSCF Unit replacement task by using the maintenance guidance
for FEs, the version of the XSCF firmware is automatically set to match the
appropriate firmware.
Note – When a component is replaced in the state of input power off (a cold
replacement), the firmware is not updated automatically. The operator must match
the number of versions.
The procedures below explain the firmware update when the replacement of one
XSCF Unit is done. When you replace both XSCF Units, see "Confirming That the
XSCF Firmware Is Updated When the XSCF Unit Is Replaced (in a System With a
Single XSCF Unit or Both Replacement in a System With Redundant XSCF Units)".
■ Command operation
8-18 SPARC Enterprise Mx000 Servers XSCF User’s Guide • August 2009
1. Turn on power to the server after completing XSCF Unit replacement task.
2. If the replacement unit and the replaced unit have different versions, a message
is displayed.
3. Confirm the firmware version by using the version(8) command. If you find
an unmatched version of the replaced XSCF Unit, make the replaced XSCF unit
version match the current system version using the flashupdate(8) command.
Note – The sync option is only used at the active XSCF Unit. When the firmware on
the standby site is applied, the XSCF reset of the standby site is done. Then even if
the XSCF session is disconnected, the active XSCF Unit has no impact on.
1. Repeat Step 1 and Step 2 of the Command operation. Then login to the XSCF on
the XSCF Web.
4. If you find an unmatched version of the replaced XSCF Unit, select the XCP
sync. In the window, match the version of the current firmware.
5. Display the XCP version and XSCF firmware version, and confirm them.
Confirming That the XSCF Firmware Is Updated When the XSCF Unit
Is Replaced (in a System With a Single XSCF Unit or Both Replacement
in a System With Redundant XSCF Units)
1. Turn on power to the server after completing the XSCF Unit replacement task.
2. If the replacement unit and the replaced unit have different versions, a message
is displayed.
2. If the replacement unit and the replaced unit have different versions, a message
is displayed.
3. If the update has been performed, follow the procedure in Updating XCP From
External Media or Updating XCP From the Network to update XCP, and confirm
the version.
Try the firmware update again when an error occurs while updating the XSCF
firmware. The second attempt may succeed where the first failed.
■ Case where the XSCF Unit is redundantly configured (on M8000/M9000 servers)
Error involving a failed write or reset operation on the standby or active side
■ Case where there is one XSCF Unit (on M3000/M4000/M5000 servers)
8-20 SPARC Enterprise Mx000 Servers XSCF User’s Guide • August 2009
Q: In cases with redundant XSCF Units, why are the XSCF Units on the active and
standby sides switched while the update is in progress?
XSCF on the active side has control for updating firmware on the XSCF Unit on
the standby side. When the firmware update of the standby side is completed,
the standby side that has new firmware is switched to the active side. Then, the
firmware on the standby XSCF Unit (formerly the active XSCF Unit) is updated
in turn.
Q: Can the update of the OpenBoot PROM firmware be applied to all domains at
one time?
Yes, it can. By specifying all domains in the poweron(8) command, the new
firmware can be applied simultaneously to all the domains.
Output/Display Destination
Size (Standard Storage Period)
Type Description (Entry Size) Archiving Reference Method
Fault Log for error events, About 200 Domain, XSCF fmdump(8)
management notifications and faults generations (Amount for about 1 month) fmdump(1M)
log (FM log) occurred in server. (Variable-len Archived (Note)
The display form of the log is gth)
interchangeable on the Solaris
OS.
XSCF error log Log for error events, About 200 Domain, XSCF showlogs(8)
notifications and faults generations (Amount for about 1 month) - XSCF Web
occurred in server. (Variable-len Archived
Log information is the same as gth)
the FM log. The display form
of the log is peculiar to the
platform.
System log Log for recording output Domain Solaris OS
Solaris OS messages. If a commands are
failure occurs, an outline of the used to refer to
failure is output. the logs.
Monitor Log for recording messages, 512KB, XSCF showlogs(8)
message log from the XSCF firmware, About 10000 - XSCF Web
reporting abnormalities lines
Note – Archived: Indicates log entries are replicated (backed up) on the archive
host, if log archiving is enabled. The logs displayed by the Solaris OS commands are
not archived.
Other Logs
TABLE 8-4 outlines other logs collected for XSCF log information.
8-22 SPARC Enterprise Mx000 Servers XSCF User’s Guide • August 2009
TABLE 8-4 Other Logs
Standard
Size Storage Period
Type Description (Entry Size) Archiving Reference Method
Power log Log for recording power events of 1920 generations About 1 month showlogs(8)
the main unit (M8000/M9000 Archived - XSCF Web
servers)
720 generations
(M3000/M4000/
M5000 servers)
( x16B )
Event log Log for recording system 4096 generations About 1 month showlogs(8)
operations, operator panel ( x48B ) Archived - XSCF Web
operations, and events reported to
the operating system
Console log Log that is recorded as a console 512KB /domain, Amount for about 1 showlogs(8)
message log if the XSCF console is About 10000 week - XSCF Web
specified as the output destination lines/domain Archived
of the Solaris OS console.
When the input power is turned
off, the log is clear.
Panic log Console log for a panic occurrence 64KB Amount for 1 time showlogs(8)
(About 1200 Archived - XSCF Web
lines)
IPL log Log for the period from power on 32KB/domain, Amount for 1 time showlogs(8)
to completion of Solaris OS startup About 600 Archived - XSCF Web
lines/domain
Audit log Log for XSCF audits 4MB About 1 month viewaudit(8)
Archived - XSCF Web
Temperature Log containing a history of the 16384 About 6 months showlogs(8)
and humidity temperature and humidity of the generations Archived - XSCF Web
history log main unit environment (x16B)
The humidity history is displayed (Every 10
only in the high-end server. minutes)
Note – The table is read in the same way as TABLE 8-3. For examples of logs, see
Appendix B.
To download the log information, execute the snapshot(8) command with some
options in the XSCF Shell. When the command is executed, all XSCF log information
is saved at the specified location.
Note – The download information by using the snapshot(8) command does not
include log archives. The archived logs are stored on the archive host. The log
archives can be accessed by logging in to the archive host.
The log can be saved in the device using one of the following two methods.
■ The configuration information can be saved and restored when a USB device has
been connected to the USB connector mounted on the XSCF Unit front panel of
the M4000/M5000/M8000/M9000 servers or on the rear panel of the M3000
server.
■ The log data is transmitted through the network with an encryption protocol.
Note – The USB device should only be formatted using the FAT32 file system.
Please ask authorized service personnel about the USB capacity and the handling of
USB devices.
Saving the Logs by Connecting the USB Device for Exclusive Use to the
Front Panel of the XSCF Unit
■ Web browser operation
8-24 SPARC Enterprise Mx000 Servers XSCF User’s Guide • August 2009
1. Select the snapshot (Note) menu for saves of the logs menu and display the
saving operation page.
2. Connect a USB device to the USB connector mounted on the XSCF Unit panel.
3. In the window, select the USB device on the XSCF Unit panel.
4. Set the encryption password used for encrypting the output log file.
5. Execute the data transfer. When the data transfer is complete, please contact
authorized service personnel.
■ Command operation
1. Connect a USB device to the USB connector mounted on the XSCF Unit panel.
2. Perform the snapshot(8) command and specify the local USB device on the
XSCF Unit for the output file (see Note).
Note – For details on using the snapshot(8) command, including how to enable
encryption, see the man page or the XSCF Reference Manual.
1. Select the snapshot menu for saving the log menu and display the saving
operation page.
2. In the window, select the download button and specify the target directory.
3. Execute the data transfer. When the data transfer is complete, please contact
authorized service personnel.
■ Command operation
1. Perform the snapshot(8) command using a public key, specifying the target
directory, and specifying the encryption password for the output file.
Caution – IMPORTANT - When the XSCF Unit is the redundant configuration, log
in to the standby side and collect the log in the same way.
File name : The file name is generated automatically at XSCF IP address and the
log taking out time. So, the log file cannot be generated in the file name
of the user specification.
File format : zip
8-26 SPARC Enterprise Mx000 Servers XSCF User’s Guide • August 2009
CHAPTER 9
When a configured user establishes a connection with a web browser to the XSCF
Web from a client terminal and logs in with an XSCF user account, either a tree
index of available pages or another such page is displayed. Select the target page,
such as the device status page. For details on creating the user account, see
Chapter 2.
9-1
TABLE 9-1 XSCF Web Pages
Login page XSCF Web console login page. Log in with an XSCF user account from the login
page.
Masthead frame The page on the upper part of the screen. The masthead frame displays the user
account name specified at login, the connected host name, and so on. When you
log out from the masthead frame, you are returned to the login page.
Menu frame In the page displayed by default after login, there is a frame of the tree navigator
(Tree frame) to select each page.
There are the following three kinds of tree navigators.
- Menu; The menu of various settings, operations, and state displays that are
displayed in the tree.
- Physical; Physical components of the server are displayed in the tree
- Logical; Logical components of each domain are displayed in the tree
Main page A generic name of the detailed page located at the right of the screen. When you
select an item from the menu in the tree frame, the target page is displayed here.
Event frame A page that displays the monitoring message located under the screen.
(Monitor message frame) Frame displaying the entire system events.
As for the monitor message frame, the content of the display is regularly
refreshed. An initial value at refreshing intervals is 60 seconds. You can change
the interval value on the same frame.
Status display Page displaying the status of the entire system and the domain status. The page
display includes the External I/O expansion Unit status.
System/domain operation Page for operations for the entire system and individual domains. When a setting
item is selected by the menu, a target page is displayed. The pages include pages
for power operations, domain configuration management, and DR operations.
XSCF settings Pages for making XSCF operation settings. When a setting item is selected by the
tree frame menu, a target page is displayed.
Utility pages Pages such as firmware update, remote maintenance service, XSCF reset, and
XSCF switch (M8000/M9000 servers only).
Log display Page displaying logs. Error logs, power logs, event logs, console logs, and other
logs are displayed.
Standby side page Page is displayed when you login to standby Unit.
(M8000/M9000 servers only) This page is included for XSCF switch and log collection.
9-2 SPARC Enterprise Mx000 Servers XSCF User’s Guide • August 2009
FIGURE 9-1 shows an example of the Login page.
9-4 SPARC Enterprise Mx000 Servers XSCF User’s Guide • August 2009
FIGURE 9-3 shows an example of the Tree frame and main page.
Note – Screen layouts and displays are provided as image examples, and they may
be changed to improve functionality. The screen displays shown may also depend on
the model and other conditions.
Note – The browser window for the XSCF Web is called the XSCF Web console.
Browser Version
The first firmware to support the newer entry-level server is the XCP 1080 firmware.
For specific information about minimum OS and firmware requirements, see the
latest version of the Product Notes (no earlier than the XCP 1080 edition) for your
server.
2. JavaScript™ enabled
9-6 SPARC Enterprise Mx000 Servers XSCF User’s Guide • August 2009
9.2.4 Specifying the URL
When specifying the URL, specify the IP address configured with XSCF or the XSCF
host name as the root directory.
If Authentication Fails
If login fails, a message indicating that login failed is displayed. Further, event and
audit logs are collected.
9-8 SPARC Enterprise Mx000 Servers XSCF User’s Guide • August 2009
9.4 XSCF Web Pages
This section describes the configuration of pages available with the XSCF Web
console.
Note – Menu items may be changed to improve functionality. The menu displays
shown below may also depend on the model and other conditions.
Page configuration is described below. Each function provides the same results as
those of the corresponding XSCF Shell command. For details on the functions, see
Chapter 2 and Chapter 5.
9-10 SPARC Enterprise Mx000 Servers XSCF User’s Guide • August 2009
Displaying System Status
TABLE 9-3 lists the functions for displaying the status of the entire system. Select
[Status]-[System Status] in the Menu tree.
Function Remarks
Mode switch display Displays the mode switch status of the operator
panel.
This function is equivalent to the
showhardconf(8) command.
System time display This function is equivalent to the showdate(8)
command.
Failure component display This function is equivalent to the showstatus(8)
command.
TABLE 9-4 lists the functions for displaying the status of a domain. Select
[Status]-[Domain Status] in the Menu tree.
Function Remarks
Domain configuration information display Displays the XSB number corresponding to each
LSB number of each domain in the form of a table.
Note - In the M3000 server, this function does not
display the table of the corresponding XSB and
LSB, but displays the detail information which is
displayed with the domain status display function
and the XSB information display function.
Domain status display Configuration policy and domain power status are
displayed. This function is equivalent to the
showdcl(8) command.
XSB information display XSB status is displayed. This function is equivalent
to the showdcl(8), showboards(8), and
showstatus(8) commands.
TABLE 9-5 lists the function for displaying the status of CPU, memory, and I/O
devices in each XSB. Select [Status]-[Device Status] in the Menu tree.
Function Remarks
Note – In the M3000 server, this function displays the device information
corresponding to Domain ID 0 and XSB 00-0.
9-12 SPARC Enterprise Mx000 Servers XSCF User’s Guide • August 2009
System and Domain Operation
TABLE 9-6 lists the function used for the system as a whole and individual domains.
Select [Operation]-[Domain Operation]-[Domain Power] in the Menu tree.
Function Remarks
Note – In the M3000 server, the number of the target domain is one. Domain ID is
fixed to 00.
TABLE 9-7 lists the functions used for specifying each domain mode. Select
[Operation]-[Domain Operation]-[Domain Mode Configuration] in the Menu tree.
Function Remarks
Function Remarks
System board configuration information display Displays the XSB division information, the XSB
number, and the memory mirror information for
each PSB in the form of table.
Note - The M3000 server does not display the
system board configuration, but displays the detail
information in the system board detail display.
System board detail display Displays the PSB and the XSB on the PSB detail
information. This function is equivalent to the
showfru(8), showhardconf(8), and
showboards(8) commands.
XSB division / memory mirroring configuration Divides a PSB into XSBs and sets the memory
mirror mode. This function is equivalent to the
setupfru(8) command.
Note - In the M3000 server, this function is not
available.
9-14 SPARC Enterprise Mx000 Servers XSCF User’s Guide • August 2009
TABLE 9-9 lists the functions for the domain configuration. Select
[Operation]-[Domain Configuration]-[Domain Configuration] in the Menu tree.
Function Remarks
Domain configuration information display (DCL) Displays the DCL information for a system board
in the specified domain, and sets the configuration
policy for the domain.
These functions are equivalent to the
showdcl(8)and setdcl(8) commands.
In the M3000 server, the information for domain ID
0 is displayed and only the configuration policy
can be set.
Configure the DCL information Sets the DCL information. Specify configuration for
the LSB of a specified domain.
This function is equivalent to the setdcl(8)
command. For detail of configuration information,
see TABLE 2-22.
In the M3000 server, this function is not available.
XSB addition, deletion, and movement Specifies the XSB configuration modification to the
domain as below.
• Assign or configure a system board to a domain
• Delete a system board from a domain
• Move a system board form one domain to
another
These functions are equivalent to the addboard(8),
deleteboard(8), and moveboard(8) commands.
Please operate as well as the procedure in
Section 2.2.11, “Domain Configuration” on
page 2-94.
When you use the DR function, also run the
procedure in the Dynamic Reconfiguration User’s
Guide.
In the M3000 server, this function is not available.
Current XSCF network information and status Displays the XSCF network information and status
display, and XSCF network configuration which is running on the server.
This function is equivalent to the shownetwork(8)
and showhostname(8) commands.
Also, this function sets each host name, domain
name, IP address, netmask, and enabling/disabling
of the XSCF network interface.
This function is equivalent to the setnetwork(8)
and sethostname(8) commands.
You can confirm the settings from the [Reserve]
menu.
Route display and configuration Displays the current routing, and configures the
routing.
This function is equivalent to the showroute(8)
and setroute(8) commands.
You can confirm the settings from the [Reserve]
menu.
DNS server display and configuration Displays the current nameserver, and configures
the nameserver.
This function is equivalent to the
shownameserver(8) and setnameserver(8)
commands.
You can confirm the settings from the [Reserve]
menu.
9-16 SPARC Enterprise Mx000 Servers XSCF User’s Guide • August 2009
TABLE 9-10 Network Configuration (2 of 2)
Reserve XSCF network configuration information Displays the XSCF network configuration
display and configuration information.
This function is equivalent to the
applynetwork(8) command.
Also, this function sets each host name, domain
name, IP address, netmask, and enabling/disabling
of the XSCF network interface.
This function is equivalent to the setnetwork(8)
and sethostname(8) commands.
Route configuration information display Displays the route configuration information.
and configuration This function is equivalent to the
applynetwork(8) command.
Also, this function configures the routing.
This function is equivalent to the setroute(8)
command.
DNS server configuration information Displays the nameserver configuration
display and configuration information.
This function is equivalent to the
applynetwork(8) command.
Also, this function configures the nameserver.
This function is equivalent to the
setnameserver(8) command.
Apply network settings Displays and applies the network settings.
This function is equivalent to the
applynetwork(8) command.
After saving the settings, to complete the settings,
XSCF reset is required.
This function is equivalent to the rebootxscf(8)
command.
Note – The [Current] and [Reserve] menus are supported in XCP1090 or later.
Note – The DSCP link address cannot be set and displayed through the XSCF Web.
Set and display the address by using the setdscp(8) and showdscp(8) commands.
Function Remarks
System time display and setting Displays and sets the current system time.
This function is equivalent to the
applynetwork(8) and rebootxscf(8) commands.
After setting, the XSCF is reset
NTP server display and configuration Displays and sets the time zone and Daylight
Saving Time.
These function are equivalent to the showntp(8)
and setntp(8) commands. Reset XSCF to complete
the settings.
TABLE 9-12 lists the functions for setting the SSH/telnet. Select
[Settings]-[SSH/Telnet] in the Menu tree.
Function Remarks
SSH Enabling and disabling Displays and sets the enabling/disabling the SSH.
These function are equivalent to the showssh(8)
and setssh(8) commands.
After enabling SSH, the XSCF reset is required.
Access control from domain to the SSH Specifies whether or not to permit access from
domain to the SSH via the DSCP.
These function are equivalent to the showssh(8)
and setssh(8) commands.
After setting the SSH access control, the XSCF reset
is required.
telnet Enabling and disabling Displays and sets the enabling/disabling of telnet.
These function are equivalent to the
showtelnet(8) and settelnet(8) commands.
After disabling telnet, XSCF reset is required.
Note – The host key generation, the user public key registration/deletion, and the
timeout period setting for XSCF Shell are not supported by XSCF Web. Set these
functions by using XSCF Shell.
9-18 SPARC Enterprise Mx000 Servers XSCF User’s Guide • August 2009
TABLE 9-13 lists the functions for configuring LDAP. Select [Settings]-[LDAP] in the
Menu tree.
Function Remarks
LDAP server display and registration Displays and configures the LDAP server when
XSCF is as an LDAP client.
This function is equivalent to the showldap(8) and
setldap(8) commands.
Certificate display and importation Displays and import an LDAP server certificate.
This function is equivalent to the showldap(8) and
setldap(8) commands.
Note – In the setting of the LDAP server, on XSCF Web, you can enter up to 128
characters. To set 129 characters or more, use XSCF Shell.
TABLE 9-14 lists the functions for configuring XSCF user management. Select
[Settings]-[User Manager] in the Menu tree.
Function Remarks
User accounts list display Displays user accounts information and the state
being registered now. The useradm privilege is
required.
This function is equivalent to the showuser(8)
command.
User accounts addition and deletion Adds and deletes a user account. The useradm
privilege is required.
These functions are equivalent to the adduser(8)
and deleteuser(8) commands.
Enabling/disabling user accounts Enable and disable a user account. The useradm
privilege is required.
These functions are equivalent to the
enableuser(8) and disableuser(8) commands.
User accounts information display and change Displays a user account information and changes
the password, privilege, password policy. The
useradm privilege is required.
These function are equivalent to the password(8),
setprivileges(8), and setpasswordpolicy(8)
commands.
Function Remarks
Your own account information display and Displays information of your own account without
password change the useradm privilege and changes the password.
These functions are equivalent to the showuser(8)
and password(8) commands.
Password policy display and setting Display the current system password policy. And
set the password policy that will be applied now.
These function are equivalent to the
showpasswordpolicy(8) and
setpasswordpolicy(8) commands.
Privileges for remote user account settings Change the privilege for a user account that is
defined in an LDAP repository.
This function is equivalent to the
setprivileges(8) command.
Note – The login lockout function is not supported by XSCF Web. Set the function
by using setloginlockout(8) and showloginlockout(8) commands.
TABLE 9-15 lists the functions for configuring XSCF audit. Select [Settings]-[Audit] in
the Menu tree.
Function Remarks
9-20 SPARC Enterprise Mx000 Servers XSCF User’s Guide • August 2009
TABLE 9-15 Audit Configuration (2 of 2)
Function Remarks
Request the archive and data deletion Request the log archive for the audit trail. Also
delete the audit trail in the secondary partition.
This function is equivalent to the setaudit(8)
command.
Audit policy display and setting Display and specify the policy, such as when an
audit trail becomes full, the local audit file usage
threshold (%) that triggers an alarm when reached,
the destination address for that alarm.
This function is equivalent to the setaudit(8)
command.
Audit event/class display and setting Display the audit events and the audit classes.
Also, Enable and disable the audit events and the
audit classes.
This function is equivalent to the setaudit(8)
command.
TABLE 9-16 lists the functions for configuring XSCF mail. This page provides the
SMTP server settings. Select [Settings]-[SMTP] in the Menu tree.
Function Remarks
SMTP server display and configuration Displays SMTP server setting information. Sets the
host name and the port number of the SMTP
server.
These functions are equivalent to the showamtp(8)
and setsmtp(8) commands.
Authentication server display and configuration When you enable the Authentication, displays and
specifies the authentication mechanism and
authentication server.
These functions are equivalent to the showsmtp(8)
and setsmtp(8) commands.
Reply address server display and setting Displays and specifies the recipient address for
error mail.
These functions are equivalent to the showsmtp(8)
and setsmtp(8) commands.
TABLE 9-17 lists the functions for configuring XSCF mail. This page provides the
email report settings. Select [Settings]-[Email Reporting] in the Menu tree.
Function Remarks
Mail notification function display and Displays and sets the mail report function. Enables
configuration or disables the mail report function, and displays
and specifies the recipient address to be sent to the
system administrator.
These functions are equivalent to the
showemailreport(8) and setemailreport(8)
commands.
9-22 SPARC Enterprise Mx000 Servers XSCF User’s Guide • August 2009
TABLE 9-18 lists the functions for configuring SNMP for XSCF. This page provides the
SNMPv1v2c and SNMPv3 settings. Select [Settings]-[SNMP] in the Menu tree.
Function Remarks
Agent display and configuration Enables and disables the SNMPv1v2c or SNMPv3
agent, sets the system management information,
and selects the MIB module.
This functions is equivalent to the showsnmp(8)
and setsnmp(8) commands.
Notification destination server display and setting Displays and sets the trap host for SNMPv1v2c or
SNMPv3.
This functions is equivalent to the showsnmp(8)
and setsnmp(8) commands
TABLE 9-19 lists the functions for configuring security access for SNMPv3. Select
[Settings]-[SNMP Security] in the Menu tree.
Function Remarks
USM management information display and setting Displays and sets the USM management
information for SNMPv3.
This function is equivalent to the showsnmpusm(8)
and setsnmpusm(8) commands.
For details of the USM management, see
TABLE 2-17.
VACM management information display and Displays and sets the VACM management
setting information for SNMPv3.
This functions is equivalent to the
showsnmpvacm(8) and setsnmpvacm(8)
commands.
For detail of VACM management information, see
TABLE 2-17.
Function Remarks
Log archiving display and configuration Displays and sets the archiving host to save the
XSCF log information, enabling and disabling log
archiving, and the log capacity limits.
These functions are equivalent to the
showlogarchiving(8) and setlogarchiving(8)
commands.
Host public key setting Sets a public key used in server authentication for
the archive host.
This functions is equivalent to the
setlogarchiving(8) command.
TABLE 9-21 lists the functions for configuring COD. Select [Setting]-[Capacity on
Demand] in the Menu tree.
Function Remarks
COD resource use status display and headroom Displays the current use status of COD resources in
configuration a resource, and displays and sets the headroom
quantity in the server.
These functions are equivalent to the
showcodusage(8), showcod(8), and setcod(8)
commands.
COD management information for each domain’s Displays the current use status of COD resources in
display and setting a domain, and displays COD license reservation
infomration and reserves a COD license to a
domain.
These functions are equivalent to the
showcodusage(8), showcod(8), and setcod(8)
commands.
9-24 SPARC Enterprise Mx000 Servers XSCF User’s Guide • August 2009
TABLE 9-21 COD Configuration (2 of 2)
Function Remarks
License information display, and license Displays COD license setting information, and
addition/deletion adds a license key to or deletes a license key from
the COD license database for XSCF.
These functions are equivalent to the
showcodlicense(8), addcodlicense(8), and
deletecodlicense(8) commands.
TABLE 9-22 lists the functions for configuring Sun Management Center agent. Select
[Setting]-[Sun MC] in the Menu tree.
Function Remarks
Sun Management Center Agent Configuration Displays setup information and status of Sun
Management Center agent.
Start or stop the Sun Management Center agent
and make changes to its configuration.
These functions are equivalent to the
showsunmc(8) and setsunmc(8) commands.
TABLE 9-23 lists the functions for configuring the authentication timeout period for
XSCF Web console. Select [Settings]-[Autologout] in the Menu tree.
Function Remarks
Timeout period display and configuration After logging in XSCF, if the system is not used for
a certain period, logout is automatically performed.
Displays and specifies the timeout period in
minutes.
The authentication timeout is 10 minutes by
default. The monitoring interval ranges from 1 to
255 minutes.
Utility
The Pages of Utility include remote maintenance service, firmware update, XSCF
reset, and XSCF switch (M8000/M9000 servers only).
TABLE 9-24 lists the functions for the firmware update. Select [Utility]-[Firmware
Update] in the Menu tree.
Function Remarks
To switch the XSCF, select [Utility]-[Switch Over] in the menu tree. This function is
equivalent to the switchscf(8) command. This function is available in the
M8000/M9000 servers only. On the page which is displayed after you log in to the
standby XSCF Unit, you can perform operations such as XSCF switching and log
collection.
To reset the XSCF, select [Utility]-[Reboot XSCF] in the menu tree. This function is
equivalent to the rebootxcf(8) command.
9-26 SPARC Enterprise Mx000 Servers XSCF User’s Guide • August 2009
Logs
TABLE 9-25 lists the functions for referring and saving each log. Select [Logs] in the
Menu Tree, and select a target log.
Function Remarks
Error log display Display the error log. Also, you can search the logs.
This function is equivalent to the error option of
the showlogs(8) command.
Power log display Display the power log. Also, you can search the
logs. This function is equivalent to the power
option of the showlogs(8) command.
Event log display Display the event log. Also, you can search the
logs. This function is equivalent to the event
option of the showlogs(8) command.
Console log display Display the console log. This function is equivalent
to the console option of the showlogs(8)
command.
Panic log display Display the panic log. This function is equivalent to
the panic option of the showlogs(8) command.
Temperature and humidity history log display Display temperature and humidity history log in
(Environment Log) the server environment. Also, you can search the
logs. This function is equivalent to the env option
of the showlogs(8) command.
The humidity history is displayed only in
M8000/M9000 servers.
IPL message log display Display the IPL message log. This function is
equivalent to the ipl option of the showlogs(8)
command.
Monitor message log display Display the monitor message log. This function is
equivalent to the monitor option of the
showlogs(8) command.
Audit log display Display the audit log. This function is equivalent to
the viewaudit(8) command.
Snapshot (or Data Collector) Collects the log. This function is equivalent to the
snapshot(8) command.
To refer to the information and status of logical components that belong to each
domain, select the target component in the Logical tree. When you select a
component, the logical component information and the state are displayed in the
main page. This information is equivalent to the showboards(8) and
showhardconf(8) commands.
In addition, the state of each component on the Physical tree and the Logical tree can
be updated by pushing the REFRESH button of the XSCF Web Console. If there is a
component with an abnormal status, a mark is added to the component on the tree.
Select the component so marked, and confirm its details.
Also, the message from XSCF Web is almost the same as the error message of the
XSCF Shell command. For typical messages from the XSCF Shell command, see
Chapter 5.
Message Meaning
Note – The error message depends on the XSCF Web item. Therefore, you will
occasionally see more messages.
9-28 SPARC Enterprise Mx000 Servers XSCF User’s Guide • August 2009
APPENDIX A
This appendix explains the XSCF fault and informational messages output during
the operation with the console, mail, or SNMP function of the server.
The Solaris OS outputs this message to the domain console. For instructions on how
to reference syslog messages, see the Solaris OS documentation.
■ FMA message
The FMA message describes the results of a diagnosis automatically generated for
hardware or software faults by the server’s Fault Management Architecture (FMA)
fault management facility. When this message is output to the domain console, the
user can identify the portion corresponding to the notified fault in the server. The
FMA message is retained as log information (in a fault log or error log). The Solaris
fmdump(1M) command or the fmdump(8), or showlogs(8) command of the XSCF
Shell can be used to display the message contents for more detailed investigation.
The user can also confirm the contents by using the specified URL based on the
MSG-ID displayed on the console.
■ IPL message
This message is output during the system startup. The IPL message is output to the
domain console and retained as log information (in an IPL log) in the XSCF. The IPL
log retains the information corresponding to the last single system startup for each
domain. The showlogs(8) command of the XSCF Shell can be used to display the
IPL log.
A-1
■ Panic message
This message is output in case of panic. The panic message is output to the domain
console and retained as log information in the XSCF. The panic log retains the
information corresponding to the last single panic event that occurred. The
showlogs(8) command of XSCF can be used to display the panic log.
■ Console message
The console message is a general term used to describe syslog messages, FMA
messages, panic messages, IPL messages, and other messages output by POST,
OpenBoot PROM, and the Solaris OS. The console messages are output to each
domain console and are retained as log information (in a console log) in the XSCF.
The showlogs(8) command of the XSCF Shell can be used to display the console
log.
Note – Console messages are overwritten, beginning with the oldest message. Even
when the wraparound feature causes a console message to be overwritten, the
system startup message is retained in the IPL log, and in case of panic, the log is
retained in the panic log.
When the XSCF unit is redundant, the console messages retained in the XSCF Unit
on the active side are not copied to the standby side. Accordingly, after the XSCF
Unit is switched, the console messages on the previously active side cannot be
referenced.
■ Monitoring message
The XSCF firmware outputs this message to notify the server fault or status. The
monitoring message is output by using the showmonitorlog(8) command, and
retained as log information (in a monitor message log or XSCF error log) in the
XSCF. The showlogs(8) command of the XSCF Shell can be used to display the
monitoring message and XSCF error log for more detailed investigation. Authorized
service personnel use the DIAGCODE output in the message to acquire detailed
information.
Note – Monitoring messages are overwritten, beginning with the oldest message.
When the XSCF Unit is redundant, monitoring messages output by the XSCF Unit
on the active side are also managed on the standby side. Even after the XSCF Unit is
switched, the monitoring messages on the previously active side can be referenced.
A-2 SPARC Enterprise Mx000 Servers XSCF User’s Guide • August 2009
A.2 Messages in Each Function
This section explains each Solaris OS and XSCF function by which the user can
recognize status notification or fault information in the server, including messages.
IMPACT: The system will not be functioning at the same performance level with
the CHIP removal.
2. Fault information in the FMA message is stored in the log. Therefore, the log
file can be referenced on the domain console. Perform a Solaris OS command
such as the syslog reference command or fmdump(1M) command on the domain
console. For how to identify fault information by using these commands, see
the Solaris OS documentation.
4. To acquire more detailed information, log in to the XSCF and perform the
fmdump(8) or showlogs(8) command to identify the fault information. For
details of these two commands, see Appendix B.
In some cases, the user may recognize the fault by referring to the console messages,
panic messages, IPL messages, or monitoring messages stored in the XSCF log. The
showlogs(8) command of the XSCF Shell with each log option specified can be used
to reference this log information.
Note – For up-to-date URL information, see the web site information about the
messages listed in “Preface” on page xvii.
2. According to the displayed message ID (MSG-ID), the user can access the
specified URL to confirm the information. Authorized service personnel can use
the DIAGCODE output in the message to acquire detailed information.
3. To obtain more detailed information, log in to the XSCF and perform the
fmdump (8) or showlogs(8) command to identify the fault information.
A-4 SPARC Enterprise Mx000 Servers XSCF User’s Guide • August 2009
Recognizing Status Notification or Fault Information in a Monitoring
Message on the XSCF Shell Terminal
1. The user recognizes status notification or fault information in a XSCF
monitoring message output by using showmonitorlog(8) comannd. The
following shows an example of the XSCF monitoring message.
2. To obtain more detailed information, specify the error option and perform the
showlogs(8) command to identify fault information.
3. In the XSCF error log, confirm the contents of entry corresponding to the fault.
(See Appendix B.)
This appendix explains the following XSCF log information that can be referenced
using the XSCF Shell showlogs(8) command on the XSCF console.
The log types that can be referenced by the showlogs(8) command are shown
below. See TABLE 8-3 for an outline of each log, its size, and generation number.
■ XSCF Error Log
■ Power Log
■ Event Log
■ Monitor Message Log
■ Temperature and Humidity History Log
■ Console Log
■ Panic Log
■ IPL Log
The showlogs(8) error option displays fault information in a format specific to the
platform. Conversely, the fmdump command displays fault information in a format
compatible with the Solaris OS. This latter command is provided for users who are
familiar with the Solaris OS. When the log is referenced by these two commands,
there is a difference in display format but little difference in the information. Use
these commands in the following cases:
B-1
■ To check whether a fault occurred if a message is output to the domain console
and XSCF console. (See Appendix A.)
■ To check whether the information is fault information if it was reported to the
previously registered email address.
■ To check whether the information is fault information if TRAP occurred in the
SNMP manager.
(The layout of the command example is subject to change without previous notice
for functional improvement.)
■ Time at which each problem occurred (Occurred). This is indicated in local time.
■ Replacement component (FRU) that is probably faulty. A comma (,) separates two
suspect components displayed. For additional suspect components, an "*"
(asterisk) is displayed after the comma (,). Each component is displayed
B-2 SPARC Enterprise Mx000 Servers XSCF User’s Guide • August 2009
hierarchically in a component mounting path format. Whether more suspect
components are to be displayed depends on the position where the fault was
detected.
The above indicates the following: PSU#1 and PSU#2 were detected as the first and
second suspect components, respectively. It might be necessary to replace the
respective components as circumstances require.
The above indicates the following: PSU#1 and PSU#2 were detected as the first and
second suspect components, respectively, with other components also detected. It
might be necessary to replace the respective components.
The above indicates the following: IOU#0/PCI#3 was detected as the suspect
component, and PCI slot No.3 of I/O unit No.0 is problematic. It might be necessary
to replace the device connected to PCI slot No.3 as circumstances require.
The above indicates the following: CMU#0/MEM#02A was detected as the suspect
component, and memory slot No.02A of CMU 0 is problematic. It may be necessary
to replace memory slot No.02A as circumstances require.
For details of the showlogs(8) command, see the XSCF Reference Manual or the man
page.Use the fmdump(8) command to confirm the XSCF error log in a display format
that is compatible with the Solaris OS.
XSCF> fmdump
TIME UUID MSG-ID
Dec 28 13:01:27.3919 bf36f0ea-9e47-42b5-fc6f-c0d979c4c8f4 FMD-8000-11
Dec 28 13:01:49.3765 3a186292-3402-40ff-b5ae-810601be337d FMD-8000-11
Dec 28 13:02:59.4448 58107381-1985-48a4-b56f-91d8a617ad83 FMD-8000-OW
:
(The layout of the command example is subject to change without previous notice
for functional improvement.)
In the example above, the following items are displayed:
■ Time at which the problem was registered in the log (TIME).
■ Universal Unique Identifier that can be used to uniquely identify the problem in
an optional system set (UUID)
■ Message ID (MSG-ID) that can be used to access the corresponding description of
information at the specified site
B-4 SPARC Enterprise Mx000 Servers XSCF User’s Guide • August 2009
2. Use the message ID for accessing the specified URL to acquire detailed
information corresponding to this problem. For the specified URL, see the site
information about the messages described in the “Preface” on page xvii. The
information that can be referenced for the message ID is the same as that
described in the item of showlogs(8) error.
3. After confirming the problem, repair the fault according to the recommended
processing.
For details of the fmdump(8) command, see the XSCF Reference Manual or the main
page.
<Example 2> Power logs are listed in order of the most-to-least recent by
specifying a start time and end time.
XSCF> showlogs power -t Mar3017:302005 -T Mar3017:492005 -r
Date Event Cause DID Switch
Mar 30 17:45:31 JST 2005 Domain Power Off Operator 00 Locked
Mar 30 17:35:31 JST 2005 System Power On AC Restored -- Locked
(The examples are subject to change without previous notice for functional
improvement.)
Event Meaning
SCF Reset: The XSCF was reset.
Domain Power ON: The domain power supply was turned on.
Domain Power OFF: The domain power supply was turned off.
System Power ON: The power supply of the server common section was turned on.
System Power OFF: The power supply of the server common section was turned off.
XIR: The XIR was reset.
Domain Reset: The domain was reset.
Factor by which the power event was instructed (Cause). The causes and their
meanings are as follows:
Cause Meaning
Self Reset: Self-resetting of the XSCF reset the XSCF.
Power On: Turning on the input power supply reset the XSCF.
System Reset: The detection of an error reset the XSCF.
Panel: Operating a switch on the operator panel caused a power event.
Scheduled: Setting the TOD timer caused a power event.
RCI: The I/O device connected to the RCI caused a power event.
AC Restored: Power recovery turned on the power supply.
Operator: An operator's instruction caused a power event.
Poweron Restart: Retrying power on operation turned on the power supply.
Power Failure: A power interruption cut off the power supply.
SW Request: A Solaris OS instruction caused a power event.
Alarm: The server environment or a hardware fault caused a power event.
Fatal: Fatal caused a power event.
Panic: Panic caused a power event.
B-6 SPARC Enterprise Mx000 Servers XSCF User’s Guide • August 2009
Switch status Meaning
Locked: The mode switch is locked.
Service: The mode switch is in service.
B-8 SPARC Enterprise Mx000 Servers XSCF User’s Guide • August 2009
■ Humidity (Humidity). The humidity is only displayed in the M8000/M9000
servers.
■ Power supply status (ON or OFF) of the server (Power).
B-10 SPARC Enterprise Mx000 Servers XSCF User’s Guide • August 2009
<Example> Display all audit records.
XSCF> viewaudit
file,1,2006-04-26 21:37:25.626
+00:00,20060426213725.0000000000.SCF-4-0
header,20,1,audit - start,0.0.0.0,2006-04-26 21:37:25.660 +00:00
header,43,1,authenticate,0.0.0.0,2006-04-26 22:01:28.902 +00:00
authentication,failure,,unknown user,telnet 27652 0.0.197.33
header,37,1,login - telnet,0.0.0.0,2006-04-26 22:02:26.459 +00:00
subject,1,opl,normal,telnet 50466 10.18.108.4
header,78,1,command - setprivileges,0.0.0.0,2006-04-26
22:02:43.246 +00:00
subject,1,opl,normal,telnet 50466 10.18.108.4
command,setprivileges,opl,useradm
platform access,granted
return,0
In the example above, By default records are displayed in text format, one token
per line, with a comma as the field separator.
The following list displays the Token types and their data (in display order):
■ File Token
Label, version, time, filename
■ Header Token
Label, record byte count, version, event type, machine address, time (event
recorded)
■ Subject Token
Label, audit session ID, UID, mode of operation, terminal type, remote IP
address, remote port
■ Upriv Token
Label, success/failure
■ Udpriv Token
Label, success/failure, privilege name, domain1, ... , domainN
■ Command Token
Label, command name, argument1, ... , argumentN
■ Authentication Token
Label, authentication result, user name, message, terminal type, remote IP
address, remote port
■ Return Token
Label, return value
Note – Some Tokens might not be output according to the environment. Also, it
might be changed because of the function improvement without notice.
B-12 SPARC Enterprise Mx000 Servers XSCF User’s Guide • August 2009
APPENDIX C
XSCF MIB
This appendix explains the XSCF Management Information Base (MIB), which is
supported by the XSCF SNMP agent function.
C-1
TABLE C-1 MIB Object Identifiers (Continued)
C-2 SPARC Enterprise Mx000 Servers XSCF User’s Guide • August 2009
TABLE C-1 MIB Object Identifiers (Continued)
MIB II RFC1213
User-based Security Model (USM) RFC3414
View-based Access Control Model (VACM) RFC3415
SNMPv2-MIB RFC3418
Note – For details of the Fault Management MIB, see the Solaris OS documentation.
The list below explains the group summary of the extension MIB supported by the
XSCF.
1. scfInfo group
This group provides general information pertaining to the XSCF.
2. scfState group
This group provides overall status information known to the XSCF.
3. scfMonitorInfo group
This group provides environmental information for a variety of components
within the system.
4. scfSystemInfo group
This group provides general System information and LED states.
5. scfDomainInfo group
This group provides information specific to all Domains known to the XSCF.
6. scfXsbInfo group
This group provides information specific to all XSBs known to the XSCF.
7. scfLsbInfo group
This group provides information specific to all LSBs.
8. scfBoardInfo group
This group provides information pertaining to specific board components
within a System.
9. scfCpuInfo group
This group provides information for all CPU Modules/Cores within the
System.
C-4 SPARC Enterprise Mx000 Servers XSCF User’s Guide • August 2009
11. scfIoBoxInfo group
This group provides information for the External I/O Expansion Unit (IOBOX)
that is attached to the system and the components which make it up.
The components include I/O boats, Link Cards, and Power Supplies/Fans. For
details about these components, see the Service Manual for your server.
C.4 Trap
Traps are classified as either a standard Trap or an extension Trap. Standard Trap is
provided for each device defined in SNMP as standard. For a description of a
standard Trap, see the general document. In this document, the Trap in cases where
an event native to this system is recognized is called an extension Trap.
Troubleshooting
This chapter describes problems that can occur during use of the XSCF console or
during the operation of the system and provides solutions for them.
D-1
Could Not Connect to XSCF Through the Serial Port
■ Check the connection between the terminal software and the serial port.
■ Check the settings of the terminal software (baud rate is set to 9600 bps, delay is
set to 0, etc.). For information about the settings, see "Connecting to XSCF via the
serial port" in Chapter 3.
D-2 SPARC Enterprise Mx000 Servers XSCF User’s Guide • August 2009
Do Not Know the IP Address of XSCF
■ Use the shownetwork(8) command to check the current network configuration. If
it has not yet been set, ask the network administrator to check the setting.
■ If necessary, use the console on the personal computer that is directly connected
to XSCF through the serial port to log in to the XSCF Shell, and check the XSCF-
LAN settings using the shownetwork(8) command.
The Console of the XSCF Shell or the Domain Console was Suddenly
Disconnected
■ Someone may perform the applynetwork(8) and rebootxscf(8) commands
after the setnetwork(8), setroute(8), sethostname(8), and
setnameserver(8) commands were executed, or the flashupdate(8)
command may have been executed. To use the XSCF, establish another connection
and log in to the system again.
■ Someone may have used the setdate(8) command or the switchscf(8)
command. To use the XSCF, establish another connection and log in to the system
again.
■ If the XSCF Shell is not used during the specified length of time after login, it
automatically terminates itself. This forced termination occurs when the specified
period has elapsed, only if the time monitoring function is enabled and a length
of time is specified for this function in the XSCF settings.
■ When the escape character (Example: "#") set by client and "." (period) keys are
entered, the Solaris Secure Shell or SSH client of OpenSSH is disconnected. If the
setting of escape character is the same in the Solaris Secure Shell/SSH client and
console(8) command, the terminal is disconnected. So, please change the value
of either setting. For more information, see the manual for SSH Client.
Could Not Access the Top Page of the XSCF Web Function
■ Use the showhttps(8) command to check whether the setting for XSCF is
enabled.
■ Check whether the entered URL is correct (e.g., whether the “s” in "https" is
missing).
■ Ask the system administrator to check whether access through the IP address that
is set is permitted.
■ Check whether the SSL/TSL function setting of the web browser is enabled.
Failed in the First Attempt to Access the XSCF Web Function After
Login
■ Check whether Cookies are accepted in the web browser settings.
D-4 SPARC Enterprise Mx000 Servers XSCF User’s Guide • August 2009
Web Pages of the XSCF Web Function are not Displayed Correctly
■ Some versions of web browsers do not display the windows correctly. See
"Supported browsers" in Chapter 9, and update your browser to the latest
version.
Other Problems
Contact the system administrator. If XSCF log data must be collected, use the XSCF
Shell command to collect it. For information about the log collection method, see
Section 8.2, “Collecting XSCF Logs” on page 8-21.
A. If an operating system hang-up event occurs, the first action is to do the following
instead of turning off the main unit power:
1. First, execute the reset(8) command with the panic option from the XSCF
Shell.
2. After doing Step 1, if the Solaris OS dump fails, move to the ok prompt by
executing "Break", or executing the reset(8) command with the xir option from
the XSCF Shell. At this point, execute the "sync" command.
Method 1. Press and hold down the POWER switch on the operator panel of the
main unit for four seconds.
Q. What kind of processing is executed by XSCF from the time that input power to
the main unit is turned on until the operating system starts?
2. XSCF starts.
Q. During normal log in to or log out from XSCF, what kind of messages are
displayed on the terminal?
login: jsmith
Password: xxxxxxxx
XSCF>
login: jsmith
Password: xxxxxxxx
Login incorrect
XSCF> exit
logout
D-6 SPARC Enterprise Mx000 Servers XSCF User’s Guide • August 2009
The following example shows an unsuccessful log out:
XSCF> exit
Not supported in this system.
Note – The above examples vary depending on the client software on the terminal.
Q. What is the relationship between the XSCF error log and error information in the
MIB file?
A. Error information reflected in the MIB file is the latest log data of XSCF.
1. If the server does not respond, set the Mode switch on the operator panel to
Service mode.
b. Enter your user account and password to log in to the XSCF Shell.
c. Otherwise, check the XSCF event logs and server status by using the XSCF
Shell through the serial port.
Use the following commands to check the events that occurred at the time
the problem occurred:
■ showlogs error
■ showlogs event
■ showlogs power
■ showlogs monitor
■ showlogs console
■ fmdump
If you find an error, see Appendix B in this manual for the corrective action.
d. Check the XSCF console log or panic log for the latest messages. A message
may have been output by the operating system after it detected the problem.
In cases involving a panic, use the showlogs(8) command with the panic
option to check the events that occurred at the time the panic occurred. For
information about using the command, see the XSCF Reference Manual.
3. If you cannot find any problem after checking the above points, restart the
system.
4. If you find any problem, see Appendix B and take measures based on the
corrective action that is described, such as using the maintenance guidance of
the XSCF Shell command for replacement of the relevant component.
D-8 SPARC Enterprise Mx000 Servers XSCF User’s Guide • August 2009
APPENDIX E
Some of the software functions explained in this manual are licensed under public
licenses (GNU Public License (GPL), GNU Lesser Public License (LGPL), and
others). This appendix lists these public licenses and conditions.
E-1
GNU GENERAL PUBLIC LICENSE
Version 2, June 1991 a) You must cause the modified files to carry prominent notices stating
that you changed the files and the date of any change.
Copyright (C) 1989, 1991 Free Software Foundation, Inc. 51 Franklin
Street, Fifth Floor, Boston, MA 02110-1301 USA b) You must cause any work that you distribute or publish, that in whole
Everyone is permitted to copy and distribute verbatim copies of this or in part contains or is derived from the Program or any part thereof,
license document, but changing it is not allowed. to be licensed as a whole at no charge to all third parties under the terms
of this License.
Preamble
c) If the modified program normally reads commands interactively when run,
The licenses for most software are designed to take away your freedom you must cause it, when started running for such interactive use in the
to share and change it. By contrast, the GNU General Public License is most ordinary way, to print or display an announcement including an
intended to guarantee your freedom to share and change free software--to appropriate copyright notice and a notice that there is no warranty (or
make sure the software is free for all its users. This General Public else, saying that you provide a warranty) and that users may redistribute
License applies to most of the Free Software Foundation's software and to the program under these conditions, and telling the user how to view a
any other program whose authors commit to using it. (Some other Free copy of this License. (Exception: if the Program itself is interactive
Software Foundation software is covered by the GNU Library General Public but does not normally print such an announcement, your work based on the
License instead.) You can apply it to your programs, too. Program is not required to print an announcement.)
When we speak of free software, we are referring to freedom, notprice. These requirements apply to the modified work as a whole. If identifiable
Our General Public Licenses are designed to make sure that you have the sections of that work are not derived from the Program, and can be
freedom to distribute copies of free software (and charge for this service reasonably considered independent and separate works in themselves, then
if you wish), that you receive source code or can get it if you want it, this License, and its terms, do not apply to those sections when you
that you can change the software or use pieces of it in new free programs; distribute them as separate works. But when you distribute the same
and that you know you can do these things. sections as part of a whole which is a work based on the Program, the
To protect your rights, we need to make restrictions that forbid anyone distribution of the whole must be on the terms of this License, whose
to deny you these rights or to ask you to surrender the rights. These permissions for other licensees extend to the entire whole, and thus to
restrictions translate to certain responsibilities for you if you each and every part regardless of who wrote it.
distribute copies of the software, or if you modify it.
Thus, it is not the intent of this section to claim rights or contest your
For example, if you distribute copies of such a program, whether gratis rights to work written entirely by you; rather, the intent is to exercise
or for a fee, you must give the recipients all the rights that you have. the right to control the distribution of derivative or collective works
You must make sure that they, too, receive or can get the source code. based on the Program.
And you must show them these terms so they know their rights.
In addition, mere aggregation of another work not based on the Program
We protect your rights with two steps: (1) copyright the software, and with the Program (or with a work based on the Program) on a volume of a
(2) offer you this license which gives you legal permission to copy, storage or distribution medium does not bring the other work under the
distribute and/or modify the software. scope of this License.
Also, for each author's protection and ours, we want to make certain 3. You may copy and distribute the Program (or a work based on it, under
that everyone understands that there is no warranty for this free Section 2) in object code or executable form under the terms of Sections
software. If the software is modified by someone else and passed on, we 1 and 2 above provided that you also do one of the following:
want its recipients to know that what they have is not the original, so
that any problems introduced by others will not reflect on the original a) Accompany it with the complete corresponding machine-readable source
authors' reputations. code, which must be distributed under the terms of Sections 1 and 2 above
on a medium customarily used for software interchange; or,
Finally, any free program is threatened constantly by software patents.
We wish to avoid the danger that redistributors of a free program will b) Accompany it with a written offer, valid for at least three years, to
individually obtain patent licenses, in effect making the program give any third party, for a charge no more than your cost of physically
proprietary. To prevent this, we have made it clear that any patent must performing source distribution, a complete machine-readable copy of the
be licensed for everyone's free use or not licensed at all. corresponding source code, to be distributed under the terms of Sections
1 and 2 above on a medium customarily used for software interchange; or,
The precise terms and conditions for copying, distribution and c) Accompany it with the information you received as to the offer to
modification follow. distribute corresponding source code. (This alternative is allowed only
for noncommercial distribution and only if you received the program in
GNU GENERAL PUBLIC LICENSE TERMS AND CONDITIONS FOR COPYING, DISTRIBUTION object code or executable form with such an offer, in accord with
AND MODIFICATION Subsection b above.)
0. This License applies to any program or other work which contains a The source code for a work means the preferred form of the work for making
notice placed by the copyright holder saying it may be distributed under modifications to it. For an executable work, complete source code means
the terms of this General Public License. The "Program", below, refers all the source code for all modules it contains, plus any associated
to any such program or work, and a "work based on the Program" means either interface definition files, plus the scripts used to control compilation
the Program or any derivative work under copyright law: that is to say, a and installation of the executable. However, as a special exception, the
work containing the Program or a portion of it, either verbatim or with source code distributed need not include anything that is normally
modifications and/or translated into another language. (Hereinafter, distributed (in either source or binary form) with the major components
translation is included without limitation inthe term "modification".) (compiler, kernel, and so on) of the operating system on which the
Each licensee is addressed as "you". executable runs, unless that component itself accompanies the executable.
Activities other than copying, distribution and modification are not If distribution of executable or object code is made by offering access
covered by this License; they are outside its scope. The act of running to copy from a designated place, then offering equivalent access to copy
the Program is not restricted, and the output from the Program is covered the source code from the same place counts as distribution of the source
only if its contents constitute a work based on the Program (independent code, even though third parties are not compelled to copy the source along
of having been made by running the Program). Whether that is true depends with the object code.
on what the Program does.
4. You may not copy, modify, sublicense, or distribute the Program except
1. You may copy and distribute verbatim copies of the Program's source as expressly provided under this License. Any attempt otherwise to copy,
code as you receive it, in any medium, provided that you conspicuously and modify, sublicense or distribute the Program is void, and will
appropriately publish on each copy an appropriate copyright notice and automatically terminate your rights under this License. However, parties
disclaimer of warranty; keep intact all the notices that refer to this who have received copies, or rights, from you under this License will not
License and to the absence of any warranty; and give any other recipients have their licenses terminated so long as such parties remain in full
of the Program a copy of this License along with the Program. compliance.
You may charge a fee for the physical act of transferring a copy, and you 5. You are not required to accept this License, since you have not signed
may at your option offer warranty protection in exchange for a fee. it. However, nothing else grants you permission to modify or distribute
the Program or its derivative works. These actions are prohibited by law
2. You may modify your copy or copies of the Program or any portion of if you do not accept this License. Therefore, by modifying or distributing
it, thus forming a work based on the Program, and copy and distribute such the Program (or any work based on the Program), you indicate your
modifications or work under the terms of Section 1 above, provided that acceptance of this License to do so, and all its terms and conditions for
you also meet all of these conditions: copying, distributing or modifying the Program or works based on it.
E-2 Sun SPARC Enterprise M3000/M4000/M5000/M8000/M9000 Servers XSCF User’s Guide • August 2009
END OF TERMS AND CONDITIONS
6. Each time you redistribute the Program (or any work based on the
Program), the recipient automatically receives a license from the original Appendix: How to Apply These Terms to Your New Programs
licensor to copy, distribute or modify the Program subject to these terms
and conditions. You may not impose any further restrictions on the If you develop a new program, and you want it to be of the greatest
recipients' exercise of the rights granted herein. You are not responsible possible use to the public, the best way to achieve this is to make it
for enforcing compliance by third parties to this License. free software which everyone can redistribute and change under these
terms.
7. If, as a consequence of a court judgment or allegation of patent
infringement or for any other reason (not limited to patent issues), To do so, attach the following notices to the program. It is safest to
conditions are imposed on you (whether by court order, agreement or attach them to the start of each source file to most effectively convey
otherwise) that contradict the conditions of this License, they do not the exclusion of warranty; and each file should have at least the
excuse you from the conditions of this License. If you cannot distribute "copyright" line and a pointer to where the full notice is found.
so as to satisfy simultaneously your obligations under this License and
any other pertinent obligations, then as a consequence you may not <one line to give the program's name and a brief idea of what it does.>
distribute the Program at all. For example, if a patent license would not Copyright (C) 19yy <name of author>
permit royalty-free redistribution of the Program by all those who receive
copies directly or indirectly through you, then the only way you could This program is free software; you can redistribute it and/or modify it
satisfy both it and this License would be to refrain entirely from under the terms of the GNU General Public License as published by the Free
distribution of the Program. Software Foundation; either version 2 of the License, or (at your option)
any later version.
If any portion of this section is held invalid or unenforceable under any
particular circumstance, the balance of the section is intended to apply This program is distributed in the hope that it will be useful, but WITHOUT
and the section as a whole is intended to apply in other circumstances. ANY WARRANTY; without even the implied warranty of MERCHANTABILITY or
FITNESS FOR A PARTICULAR PURPOSE. See the GNU General Public License for
It is not the purpose of this section to induce you to infringe any patents more details.
or other property right claims or to contest validity of any such claims;
this section has the sole purpose of protecting the integrity of the free You should have received a copy of the GNU General Public License along
software distribution system, which is implemented by public license with this program; if not, write to the Free Software Foundation, Inc.,
practices. Many people have made generous contributions to the wide range 51 Franklin Street, Fifth Floor, Boston, MA 02110-1301 USA
of software distributed through that system in reliance on consistent
application of that system; it is up to the author/donor to decide if he
or she is willing to distribute software through any other system and a Also add information on how to contact you by electronic and paper mail.
licensee cannot impose that choice.
If the program is interactive, make it output a short notice like this
This section is intended to make thoroughly clear what is believed to be when it starts in an interactive mode:
a consequence of the rest of this License.
Gnomovision version 69, Copyright (C) 19yy name of author Gnomovision
8. If the distribution and/or use of the Program is restricted in certain comes with ABSOLUTELY NO WARRANTY; for details type `show w'.
countries either by patents or by copyrighted interfaces, the original This is free software, and you are welcome to redistribute it under certain
copyright holder who places the Program under this License may add an conditions; type `show c' for details.
explicit geographical distribution limitation excluding those countries,
so that distribution is permitted only in or among countries not thus The hypothetical commands `show w' and `show c' should show the
excluded. In such case, this License incorporates the limitation as if appropriate parts of the General Public License. Of course, the commands
written in the body of this License. you use may be called something other than `show w' and `show c'; they
could even be mouse-clicks or menu items--whatever suits your program.
9. The Free Software Foundation may publish revised and/or new versions
of the General Public License from time to time. Such new versions will You should also get your employer (if you work as a programmer) or your
be similar in spirit to the present version, but may differ in detail to school, if any, to sign a "copyright disclaimer" for the program, if
address new problems or concerns. necessary. Here is a sample; alter the names:
Each version is given a distinguishing version number. If the Program Yoyodyne, Inc., hereby disclaims all copyright interest in the program
specifies a version number of this License which applies to it and "any `Gnomovision' (which makes passes at compilers) written by James Hacker.
later version", you have the option of following the terms and conditions
either of that version or of any later version published by the Free <signature of Ty Coon>, 1 April 1989
Software Foundation. If the Program does not specify a version number of Ty Coon, President of Vice
this License, you may choose any version ever published by the Free
Software Foundation. This General Public License does not permit incorporating your program
into proprietary programs. If your program is a subroutine library, you
10. If you wish to incorporate parts of the Program into other free may consider it more useful to permit linking proprietary applications
programs whose distribution conditions are different, write to the author with the library. If this is what you want to do, use the GNU Library
to ask for permission. For software which is copyrighted by the Free General Public License instead of this License.
Software Foundation, write to the Free Software Foundation; we sometimes
make exceptions for this. Our decision will be guided by the two goals
of preserving the free status of all derivatives of our free software and GNU LESSER GENERAL PUBLIC LICENSE
of promoting the sharing and reuse of software generally. Version 2.1, February 1999
To protect each distributor, we want to make it very clear that there Activities other than copying, distribution and modification are not
is no warranty for the free library. Also, if the library is modified by covered by this License; they are outside its scope. The act of running
someone else and passed on, the recipients should know that what they have a program using the Library is not restricted, and output from such a
is not the original version, so that the original author's reputation will program is covered only if its contents constitute a work based on the
not be affected by problems that might be introduced by others. Library (independent of the use of the Library in a tool for writing it).
Whether that is true depends on what the Library does and what the program
Finally, software patents pose a constant threat to the existence of any that uses the Library does.
free program. We wish to make sure that a company cannot effectively
restrict the users of a free program by obtaining a restrictive license 1. You may copy and distribute verbatim copies of the Library's complete
from a patent holder. Therefore, we insist that any patent license source code as you receive it, in any medium, provided that you
obtained for a version of the library must be consistent with the full conspicuously and appropriately publish on each copy an appropriate
freedom of use specified in this license. copyright notice and disclaimer of warranty; keep intact all the notices
that refer to this License and to the absence of any warranty; and
Most GNU software, including some libraries, is covered by the ordinary distribute a copy of this License along with the Library.
GNU General Public License. This license, the GNU Lesser General Public
License, applies to certain designated libraries, and is quite different You may charge a fee for the physical act of transferring a copy, and
from the ordinary General Public License. We use this license for certain you may at your option offer warranty protection in exchange for a fee.
libraries in order to permit linking those libraries into non-free
programs. 2. You may modify your copy or copies of the Library or any portion of
it, thus forming a work based on the Library, and copy and distribute such
When a program is linked with a library, whether statically or using a modifications or work under the terms of Section 1 above, provided that
shared library, the combination of the two is legally speaking a combined you also meet all of these conditions:
work, a derivative of the original library. The ordinary General Public
License therefore permits such linking only if the entire combination fits a) The modified work must itself be a software library.
its criteria of freedom. The Lesser General Public License permits more
lax criteria for linking other code with the library. b) You must cause the files modified to carry prominent notices
stating that you changed the files and the date of any change.
We call this license the "Lesser" General Public License because it does
Less to protect the user's freedom than the ordinary General Public c) You must cause the whole of the work to be licensed at no
License. It also provides other free software developers Less of an charge to all third parties under the terms of this License.
advantage over competing non-free programs. These disadvantages are the
reason we use the ordinary General Public License for many libraries. d) If a facility in the modified Library refers to a function or a
However, the Lesser license provides advantages in certain special table of data to be supplied by an application program that uses
circumstances. the facility, other than as an argument passed when the facility
is invoked, then you must make a good faith effort to ensure that,
For example, on rare occasions, there may be a special need to encourage in the event an application does not supply such function or
the widest possible use of a certain library, so that it becomes a de- table, the facility still operates, and performs whatever part of
facto standard. To achieve this, non-free programs must be allowed to use its purpose remains meaningful.
the library. A more frequent case is that a free library does the same
job as widely used non-free libraries. In this case, there is little to (For example, a function in a library to compute square roots has
gain by limiting the free library to free software only, so we use the a purpose that is entirely well-defined independent of the
Lesser General Public License. application. Therefore, Subsection 2d requires that any
application-supplied function or table used by this function must
In other cases, permission to use a particular library in non-free be optional: if the application does not supply it, the square
programs enables a greater number of people to use a large body of free root function must still compute square roots.)
software. For example, permission to use the GNU C Library in non-free
programs enables many more people to use the whole GNU operating system, These requirements apply to the modified work as a whole. If identifiable
as well as its variant, the GNU/Linux operating system. sections of that work are not derived from the Library, and can be
reasonably considered independent and separate works in themselves, then
Although the Lesser General Public License is Less protective of the this License, and its terms, do not apply to those sections when you
users' freedom, it does ensure that the user of a program that is linked distribute them as separate works. But when you distribute the same
with the Library has the freedom and the wherewithal to run that program sections as part of a whole which is a work based on the Library, the
using a modified version of the Library. distribution of the whole must be on the terms of this License, whose
permissions for other licensees extend to the entire whole, and thus to
The precise terms and conditions for copying, distribution and each and every part regardless of who wrote
modification follow. Pay close attention to the difference between a it.
"work based on the library" and a "work that uses the library". The former
contains code derived from the library, whereas the latter must be Thus, it is not the intent of this section to claim rights or contest your
combined with the library in order to run. rights to work written entirely by you; rather, the intent is to exercise
the right to control the distribution of derivative or collective works
based on the Library.
GNU LESSER GENERAL PUBLIC LICENSE
TERMS AND CONDITIONS FOR COPYING, DISTRIBUTION AND MODIFICATION In addition, mere aggregation of another work not based on the Library
with the Library (or with a work based on the Library) on a volume of a
storage or distribution medium does not bring the other work under the
scope of this License.
E-4 Sun SPARC Enterprise M3000/M4000/M5000/M8000/M9000 Servers XSCF User’s Guide • August 2009
will operate properly with a modified version of the library, if
3. You may opt to apply the terms of the ordinary GNU General Public the user installs one, as long as the modified version is
License instead of this License to a given copy of the Library. To do interface-compatible with the version that the work was made with.
this, you must alter all the notices that refer to this License, so that
they refer to the ordinary GNU General Public License, version 2, instead c) Accompany the work with a written offer, valid for at
of to this License. (If a newer version than version 2 of the ordinary least three years, to give the same user the materials
GNU General Public License has appeared, then you can specify that version specified in Subsection 6a, above, for a charge no more
instead if you wish.) Do not make any other change in these notices. than the cost of performing this distribution.
Once this change is made in a given copy, it is irreversible for that d) If distribution of the work is made by offering access to copy
copy, so the ordinary GNU General Public License applies to all subsequent from a designated place, offer equivalent access to copy the above
copies and derivative works made from that copy. specified materials from the same place.
This option is useful when you wish to copy part of the code of the e) Verify that the user has already received a copy of these
Library into a program that is not a library. materials or that you have already sent this user a copy.
4. You may copy and distribute the Library (or a portion or derivative For an executable, the required form of the "work that uses the Library"
of it, under Section 2) in object code or executable form under the terms must include any data and utility programs needed for reproducing the
of Sections 1 and 2 above provided that you accompany it with the complete executable from it. However, as a special exception, the materials to be
corresponding machine-readable source code, which must be distributed distributed need not include anything that is normally distributed (in
under the terms of Sections 1 and 2 above on a medium customarily used for either source or binary form) with the major components (compiler, kernel,
software interchange. and so on) of the operating system on which the executable runs, unless
that component itself accompanies the executable.
If distribution of object code is made by offering access to copy from
a designated place, then offering equivalent access to copy the source It may happen that this requirement contradicts the license restrictions
code from the same place satisfies the requirement to distribute the of other proprietary libraries that do not normally accompany the
source code, even though third parties are not compelled to copy the source operating system. Such a contradiction means you cannot use both them and
along with the object code. the Library together in an executable that you distribute.
5. A program that contains no derivative of any portion of the Library, 7. You may place library facilities that are a work based on the Library
but is designed to work with the Library by being compiled or linked with side-by-side in a single library together with other library facilities
it, is called a "work that uses the Library". Such a work, in isolation, not covered by this License, and distribute such a combined library,
is not a derivative work of the Library, and therefore falls outside the provided that the separate distribution of the work based on the Library
scope of this License. and of the other library facilities is otherwise permitted, and provided
that you do these two things:
However, linking a "work that uses the Library" with the Library creates
an executable that is a derivative of the Library (because it contains a) Accompany the combined library with a copy of the same work
portions of the Library), rather than a "work that uses the library". The based on the Library, uncombined with any other library
executable is therefore covered by this License. Section 6 states terms facilities. This must be distributed under the terms of the
for distribution of such executables. Sections above.
When a "work that uses the Library" uses material from a header file b) Give prominent notice with the combined library of the fact
that is part of the Library, the object code for the work may be a that part of it is a work based on the Library, and explaining
derivative work of the Library even though the source code is not. Whether where to find the accompanying uncombined form of the same work.
this is true is especially significant if the work can be linked without
the Library, or if the work is itself a library. The 8. You may not copy, modify, sublicense, link with, or distribute the
threshold for this to be true is not precisely defined by law. Library except as expressly provided under this License. Any attempt
otherwise to copy, modify, sublicense, link with, or distribute the
If such an object file uses only numerical parameters, data structure Library is void, and will automatically terminate your rights under this
layouts and accessors, and small macros and small inline functions (ten License. However, parties who have received copies, or rights, from you
lines or less in length), then the use of the object file is unrestricted, under this License will not have their licenses terminated so long as such
regardless of whether it is legally a derivative work. (Executables parties remain in full compliance.
containing this object code plus portions of the Library will still fall
under Section 6.) 9. You are not required to accept this License, since you have not signed
it. However, nothing else grants you permission to modify or distribute
Otherwise, if the work is a derivative of the Library, you may distribute the Library or its derivative works. These actions are prohibited by law
the object code for the work under the terms of Section 6. Any executables if you do not accept this License. Therefore, by modifying or distributing
containing that work also fall under Section 6, whether or not they are the Library (or any work based on the Library), you indicate your
linked directly with the Library itself. acceptance of this License to do so, and all its terms and conditions for
copying, distributing or modifying the Library or works based on it.
6. As an exception to the Sections above, you may also combine or link
a "work that uses the Library" with the Library to produce a work 10. Each time you redistribute the Library (or any work based on the
containing portions of the Library, and distribute that work under terms Library), the recipient automatically receives a license from the original
of your choice, provided that the terms permit modification of the work licensor to copy, distribute, link with or modify the Library subject to
for the customer's own use and reverse engineering for debugging such these terms and conditions. You may not impose any further restrictions
modifications. on the recipients' exercise of the rights granted herein. You are not
responsible for enforcing compliance by third parties with this License.
You must give prominent notice with each copy of the work that the
Library is used in it and that the Library and its use are covered by this 11. If, as a consequence of a court judgment or allegation of patent
License. You must supply a copy of this License. If the work during infringement or for any other reason (not limited to patent issues),
execution displays copyright notices, you must include the copyright conditions are imposed on you (whether by court order, agreement or
notice for the Library among them, as well as a reference directing the otherwise) that contradict the conditions of this License, they do not
user to the copy of this License. Also, you must do one of these things: excuse you from the conditions of this License. If you cannot distribute
so as to satisfy simultaneously your obligations under this License and
a) Accompany the work with the complete corresponding any other pertinent obligations, then as a consequence you may not
machine-readable source code for the Library including whatever distribute the Library at all. For example, if a patent license would not
changes were used in the work (which must be distributed under permit royalty-free redistribution of the Library by all those who receive
Sections 1 and 2 above); and, if the work is an executable linked copies directly or indirectly through you, then the only way you could
with the Library, with the complete machine-readable "work that satisfy both it and this License would be to refrain entirely from
uses the Library", as object code and/or source code, so that the distribution of the Library.
user can modify the Library and then relink to produce a modified
executable containing the modified Library. (It is understood If any portion of this section is held invalid or unenforceable under any
that the user who changes the contents of definitions files in the particular circumstance, the balance of the section is intended to apply,
Library will not necessarily be able to recompile the application and the section as a whole is intended to apply in other circumstances.
to use the modified definitions.)
It is not the purpose of this section to induce you to infringe any patents
b) Use a suitable shared library mechanism for linking with the or other property right claims or to contest validity of any such claims;
Library. A suitable mechanism is one that (1) uses at run time a this section has the sole purpose of protecting the integrity of the free
copy of the library already present on the user's computer system, software distribution system which is implemented by public license
rather than copying library functions into the executable, and (2) practices. Many people have made generous contributions to the wide range
This section is intended to make thoroughly clear what is believed to be Also add information on how to contact you by electronic and paper mail.
a consequence of the rest of this License.
You should also get your employer (if you work as a programmer) or your
12. If the distribution and/or use of the Library is restricted in school, if any, to sign a "copyright disclaimer" for the library, if
certain countries either by patents or by copyrighted interfaces, the necessary. Here is a sample; alter the names:
original copyright holder who places the Library under this License may
add an explicit geographical distribution limitation excluding those Yoyodyne, Inc., hereby disclaims all copyright interest in the library
countries, so that distribution is permitted only in or among countries `Frob' (a library for tweaking knobs) written by James Random Hacker.
not thus excluded. In such case, this License incorporates the limitation
as if written in the body of this License. <signature of Ty Coon>, 1 April 1990
Ty Coon, President of Vice
13. The Free Software Foundation may publish revised and/or new versions
of the Lesser General Public License from time to time. Such new versions That's all there is to it!
will be similar in spirit to the present version, but may differ in detail -----
to address new problems or concerns. /
* =========================================================
Each version is given a distinguishing version number. If the Library * The Apache Software License, Version 1.1
specifies a version number of this License which applies to it and "any *
later version", you have the option of following the terms and conditions * Copyright (c) 2000-2003 The Apache Software Foundation. All rights
either of that version or of any later version published by the Free * reserved.
Software Foundation. If the Library does not specify a license version *
number, you may choose any version ever published by the Free Software * Redistribution and use in source and binary forms, with or without
Foundation. * modification, are permitted provided that the following conditions
* are met:
14. If you wish to incorporate parts of the Library into other free *
programs whose distribution conditions are incompatible with these, write * 1. Redistributions of source code must retain the above copyright
to the author to ask for permission. For software which is copyrighted * notice, this list of conditions and the following disclaimer.
by the Free Software Foundation, write to the Free Software Foundation; *
we sometimes make exceptions for this. Our decision will be guided by the * 2. Redistributions in binary form must reproduce the above copyright
two goals of preserving the free status of all derivatives of our free * notice, this list of conditions and the following disclaimer in
software and of promoting the sharing and reuse of software generally. * the documentation and/or other materials provided with the
* distribution.
*
NO WARRANTY * 3. The end-user documentation included with the redistribution,
* if any, must include the following acknowledgment:
15. BECAUSE THE LIBRARY IS LICENSED FREE OF CHARGE, THERE IS NO WARRANTY * "This product includes software developed by the
FOR THE LIBRARY, TO THE EXTENT PERMITTED BY APPLICABLE LAW. EXCEPT WHEN * Apache Software Foundation (http://www.apache.org/)."
OTHERWISE STATED IN WRITING THE COPYRIGHT HOLDERS AND/OR OTHER PARTIES * Alternately, this acknowledgment may appear in the software itself,
PROVIDE THE LIBRARY "AS IS" WITHOUT WARRANTY OF ANY KIND, EITHER EXPRESSED * if and wherever such third-party acknowledgments normally appear.
OR IMPLIED, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES OF *
MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE. THE ENTIRE RISK AS * 4. The names "Apache" and "Apache Software Foundation" must
TO THE QUALITY AND PERFORMANCE OF THE LIBRARY IS WITH YOU. SHOULD THE * not be used to endorse or promote products derived from this
LIBRARY PROVE DEFECTIVE, YOU ASSUME THE COST OF ALL NECESSARY SERVICING, * software without prior written permission. For written
REPAIR OR CORRECTION. * permission, please contact [email protected].
*
16. IN NO EVENT UNLESS REQUIRED BY APPLICABLE LAW OR AGREED TO IN WRITING * 5. Products derived from this software may not be called "Apache",
WILL ANY COPYRIGHT HOLDER, OR ANY OTHER PARTY WHO MAY MODIFY AND/OR * nor may "Apache" appear in their name, without prior written
REDISTRIBUTE THE LIBRARY AS PERMITTED ABOVE, BE LIABLE TO YOU FOR DAMAGES, * permission of the Apache Software Foundation.
INCLUDING ANY GENERAL, SPECIAL, INCIDENTAL OR CONSEQUENTIAL DAMAGES *
ARISING OUT OF THE USE OR INABILITY TO USE THE LIBRARY (INCLUDING BUT NOT * THIS SOFTWARE IS PROVIDED ``AS IS'' AND ANY EXPRESSED OR
LIMITED TO LOSS OF DATA OR DATA BEING RENDERED INACCURATE OR LOSSES * IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE
SUSTAINED BY YOU OR THIRD PARTIES OR A FAILURE OF THE LIBRARY TO OPERATE * IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A
WITH ANY OTHER SOFTWARE), EVEN IF SUCH HOLDER OR OTHER PARTY HAS BEEN * PARTICULAR PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE
ADVISED OF THE POSSIBILITY OF SUCH DAMAGES. * APACHE SOFTWARE FOUNDATION OR ITS CONTRIBUTORS BE
* LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL,
END OF TERMS AND CONDITIONS * EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT
* LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES;
How to Apply These Terms to Your New Libraries * LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION)
* HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER
If you develop a new library, and you want it to be of the greatest * IN CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE
possible use to the public, we recommend making it free software that * OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF THIS
everyone can redistribute and change. You can do so by permitting * SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH
redistribution under these terms (or, alternatively, under the terms of * DAMAGE.
the ordinary General Public License). * =========================================================
*
To apply these terms, attach the following notices to the library. It * This software consists of voluntary contributions made by many
is safest to attach them to the start of each source file to most individuals
effectively convey the exclusion of warranty; and each file should have * on behalf of the Apache Software Foundation. For more information on
at least the "copyright" line and a pointer to where the full notice is the
found. * Apache Software Foundation, please see
* <http://www.apache.org/>.
*
<one line to give the library's name and a brief idea of what it does.> * Portions of this software are based upon public domain software
Copyright (C) <year> <name of author> * originally written at the National Center for Supercomputing
Applications,
This library is free software; you can redistribute it and/or * University of Illinois, Urbana-Champaign.
modify it under the terms of the GNU Lesser General Public */
License as published by the Free Software Foundation; either /*
version 2.1 of the License, or (at your option) any later version. * Copyright (c) 1987, 1993, 1994
* The Regents of the University of California. All rights reserved.
This library is distributed in the hope that it will be useful, *
but WITHOUT ANY WARRANTY; without even the implied warranty of * Redistribution and use in source and binary forms, with or without
MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the GNU * modification, are permitted provided that the following conditions
Lesser General Public License for more details. * are met:
* 1. Redistributions of source code must retain the above copyright
E-6 Sun SPARC Enterprise M3000/M4000/M5000/M8000/M9000 Servers XSCF User’s Guide • August 2009
* notice, this list of conditions and the following disclaimer. * Here is the statement of the license:
* 2. Redistributions in binary form must reproduce the above copyright *
* notice, this list of conditions and the following disclaimer in the * This software is provided 'as-is', without any express or implied
* documentation and/or other materials provided with the distribution. warranty.
* 3. All advertising materials mentioning features or use of this software * In no event will the authors be held liable for any damages arising from
* must display the following acknowledgement: * the use of this software.
* This product includes software developed by the University of *
* California, Berkeley and its contributors. * Permission is granted to anyone to use this software for any purpose,
* 4. Neither the name of the University nor the names of its contributors * including commercial applications, and to alter it and redistribute it
* may be used to endorse or promote products derived from this software * freely, subject to the following restrictions:
* without specific prior written permission. *
* * 1. The origin of this software must not be misrepresented; you must not
* THIS SOFTWARE IS PROVIDED BY THE REGENTS AND * claim that you wrote the original software. If you use this software
* CONTRIBUTORS ``AS IS'' AND ANY EXPRESS OR IMPLIED in a
* WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED * product, an acknowledgment in the product documentation would be
* WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A * appreciated but is not required.
* PARTICULAR PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE *
* REGENTS OR CONTRIBUTORS BE LIABLE FOR ANY DIRECT, * 2. Altered source versions must be plainly marked as such, and must not
* INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL be
* DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF * misrepresented as being the original software.
* SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, DATA, OR *
* PROFITS; OR BUSINESS INTERRUPTION) * 3. This notice may not be removed or altered from any source
* HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN distribution.
* CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE */
* OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF THIS
* SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH -----
* DAMAGE. * This is derived from material copyright RSA Data Security, Inc.
/* Copyright (c) 1996 by Internet Software Consortium. * Their notice is reproduced below in its entirety.
* *
* Permission to use, copy, modify, and distribute this software for any * Copyright (C) 1991-2, RSA Data Security, Inc. Created 1991. All rights
* purpose with or without fee is hereby granted, provided that the above * reserved.
* copyright notice and this permission notice appear in all copies. *
* * License to copy and use this software is granted provided that it is
* THE SOFTWARE IS PROVIDED "AS IS" AND INTERNET SOFTWARE identified
* CONSORTIUM DISCLAIMS ALL WARRANTIES WITH REGARD TO THIS * as the "RSA Data Security, Inc. MD4 Message-Digest Algorithm" in all
* SOFTWARE INCLUDING ALL IMPLIED WARRANTIES OF * material mentioning or referencing this software or this function.
* MERCHANTABILITY AND FITNESS. IN NO EVENT SHALL INTERNET *
* SOFTWARE * License is also granted to make and use derivative works provided that
* CONSORTIUM BE LIABLE FOR ANY SPECIAL, DIRECT, INDIRECT, OR such
* CONSEQUENTIAL DAMAGES OR ANY DAMAGES WHATSOEVER * works are identified as "derived from the RSA Data Security, Inc. MD4
* RESULTING FROM LOSS OF USE, DATA OR PROFITS, WHETHER IN AN * Message-Digest Algorithm" in all material mentioning or referencing the
* ACTION OF CONTRACT, NEGLIGENCE OR OTHER TORTIOUS * derived work.
* ACTION, ARISING OUT OF OR IN CONNECTION WITH THE USE OR *
* PERFORMANCE OF THIS SOFTWARE. * RSA Data Security, Inc. makes no representations concerning either the
*/ * merchantability of this software or the suitability of this software
for any
!* This code is based on the UltraSPARC atomics library by Mike Bennett * particular purpose. It is provided "as is" without express or implied
!* The Initial Developer of the Original Code is Mike Bennett, warranty
!* [email protected], Copyright (C) 1999. All Rights Reserved. * of any kind.
!* This code is based on the sparc architecture Manual version 9 *
!* section J.11 (page 333) * These notices must be retained in any copies of any part of this
* documentation and/or software.
* Based on libdl (dlfcn.c/dlfcn.h) which is
* Copyright (c) 1992,1993,1995,1996,1997,1988 /*
* Jens-Uwe Mager, Helios Software GmbH, Hannover, Germany. * The apr_md5_encode() routine uses much code obtained from the FreeBSD
* * 3.0 MD5 crypt() function, which is licenced as follows:
* Not derived from licensed software. * ---------------------------------------------------------------------
* -------
* Permission is granted to freely use, copy, modify, and redistribute * "THE BEER-WARE LICENSE" (Revision 42):
* this software, provided that the author is not construed to be liable * <[email protected]> wrote this file. As long as you retain this notice
* for any results of using the software, alterations are clearly marked you
* as such, and this notice is not modified. * can do whatever you want with this stuff. If we meet some day, and you
think
strnatcmp.c -- Perform 'natural order' comparisons of strings in C. * this stuff is worth it, you can buy me a beer in return. Poul-Henning
Copyright (C) 2000 by Martin Pool <[email protected]> Kamp
* ---------------------------------------------------------------------
This software is provided 'as-is', without any express or implied -------
warranty. In no event will the authors be held liable for any damages */
arising from the use of this software. /*
* apr_ldap_compat.c: LDAP v2/v3 compatibility things
Permission is granted to anyone to use this software for any purpose, *
including commercial applications, and to alter it and redistribute it * Original code from auth_ldap module for Apache v1.3:
freely, subject to the following restrictions: * Copyright 1998, 1999 Enbridge Pipelines Inc.
* Copyright 1999-2001 Dave Carrigan
1. The origin of this software must not be misrepresented; you must not */
claim that you wrote the original software. If you use this software in a
product, an acknowledgment in the product documentation would be /*
appreciated but is not required. * Portions Copyright (c) 1992-1996 Regents of the University of Michigan.
2. Altered source versions must be plainly marked as such, and must not * All rights reserved.
be misrepresented as being the original software. *
3. This notice may not be removed or altered from any source * Redistribution and use in source and binary forms are permitted provided
distribution. * that this notice is preserved and that due credit is given to the
University of
/* * Michigan at Ann Arbor. The name of the University may not be used to
* Copyright (c) 2002-2006 Asim Jalis * endorse or promote products derived from this software without specific
* prior
* This library is released under the zlib/libpng license as described at * written permission. This software is provided ``as is'' without express
* or
* http://www.opensource.org/licenses/zlib-license.html * implied warranty.
* */
----- 3. You may otherwise modify your copy of this Package in any way, provided
Copyright (C) 2004 Internet Systems Consortium, Inc. ("ISC") that you insert a prominent notice in each changed file stating how and
Copyright (C) 1996-2003 Internet Software Consortium. when AND WHY you changed that file, and provided that you do at least ONE
of the following:
Permission to use, copy, modify, and distribute this software for any
purpose with or without fee is hereby granted, provided that the above a) place your modifications in the Public Domain or otherwise make them
copyright notice and this permission notice appear in all copies. Freely Available, such as by posting said modifications to Usenet or an
equivalent medium, or placing the modifications on a major archive site
THE SOFTWARE IS PROVIDED "AS IS" AND ISC DISCLAIMS ALL WARRANTIES WITH such as uunet.uu.net, or by allowing the Copyright Holder to include your
REGARD TO THIS SOFTWARE INCLUDING ALL IMPLIED WARRANTIES OF modifications in the Standard Version of the Package.
MERCHANTABILITY AND FITNESS. IN NO EVENT SHALL ISC BE LIABLE FOR ANY
SPECIAL, DIRECT, INDIRECT, OR CONSEQUENTIAL DAMAGES OR ANY DAMAGES b) use the modified Package only within your corporation or organization.
WHATSOEVER RESULTING FROM LOSS OF USE, DATA OR PROFITS, WHETHER IN AN
ACTION OF CONTRACT, NEGLIGENCE OR OTHER TORTIOUS ACTION, ARISING OUT OF
OR IN CONNECTION WITH THE USE OR PERFORMANCE OF THIS SOFTWARE. c) rename any non-standard executables so the names do not conflict with
standard executables, which must also be provided, and provide separate
documentation for each non-standard executable that clearly documents how
it differs from the Standard Version.
$Id: COPYRIGHT,v 1.6.2.4 2004/03/15 04:44:37 marka Exp $
d) make other distribution arrangements with the Copyright Holder.
Portions Copyright (C) 1996-2001 Nominum, Inc.
4. You may distribute the programs of this Package in object code or
Permission to use, copy, modify, and distribute this software for any executable form, provided that you do at least ONE of the following:
purpose with or without fee is hereby granted, provided that the above
copyright notice and this permission notice appear in all copies. a) distribute a Standard Version of the executables and library files,
THE SOFTWARE IS PROVIDED "AS IS" AND NOMINUM DISCLAIMS ALL WARRANTIES WITH together with instructions (in the manual page or equivalent) on where to
REGARD TO THIS SOFTWARE INCLUDING ALL IMPLIED WARRANTIES OF get the Standard Version.
MERCHANTABILITY AND FITNESS. IN NO EVENT SHALL NOMINUM BE LIABLE FOR ANY
SPECIAL, DIRECT, INDIRECT, OR CONSEQUENTIAL DAMAGES OR ANY DAMAGES b) accompany the distribution with the machine-readable source of the
WHATSOEVER RESULTING FROM LOSS OF USE, DATA OR PROFITS, WHETHER IN AN Package with your modifications.
ACTION OF CONTRACT, NEGLIGENCE OR OTHER TORTIOUS ACTION, ARISING OUT OF
OR IN CONNECTION WITH THE USE OR PERFORMANCE OF THIS SOFTWARE. c) accompany any non-standard executables with their corresponding
Standard Version executables, giving the non-standard executables non-
----- standard names, and clearly documenting the differences in manual pages
(* (or equivalent), together with instructions on where to get the Standard
This document is freely plagiarised from the 'Artistic Licence', Version.
distributed as part of the Perl v4.0 kit by Larry Wall, which is available
from most major archive sites d) make other distribution arrangements with the Copyright Holder.
*)
5. You may charge a reasonable copying fee for any distribution of this
This documents purpose is to state the conditions under which these Package. You may charge any fee you choose for support of this Package.
Packages (See definition below) viz: "Crack", the Unix Password Cracker, YOU MAY NOT CHARGE A FEE FOR THIS PACKAGE ITSELF. However, you may
and "CrackLib", the Unix Password Checking library, which are held in distribute this Package in aggregate with other (possibly commercial)
copyright by Alec David Edward Muffett, may be copied, such that the programs as part of a larger (possibly commercial) software distribution
copyright holder maintains some semblance of artistic control over the provided that YOU DO NOT ADVERTISE this package as a product of your own.
development of the packages, while giving the users of the package the
right to use and distribute the Package in a more-or-less customary 6. The name of the Copyright Holder may not be used to endorse or promote
fashion, plus the right to make reasonable modifications. products derived from this software without specific prior written
permission.
So there.
7. THIS PACKAGE IS PROVIDED "AS IS" AND WITHOUT ANY EXPRESS OR IMPLIED
*********************************************************************** WARRANTIES, INCLUDING, WITHOUT LIMITATION, THE IMPLIED WARRANTIES OF
**** MERCHANTIBILITY AND FITNESS FOR A PARTICULAR PURPOSE.
-----
A "Package" refers to the collection of files distributed by the Copyright /* CMU libsasl
Holder, and derivatives of that collection of files created through * Tim Martin
textual modification, or segments thereof. * Rob Earhart
* Rob Siemborski
"Standard Version" refers to such a Package if it has not been modified, */
or has been modified in accordance with the wishes of the Copyright Holder. /*
* Copyright (c) 1998-2003 Carnegie Mellon University. All rights
"Copyright Holder" is whoever is named in the copyright or copyrights for reserved.
the package. *
* Redistribution and use in source and binary forms, with or without
"You" is you, if you're thinking about copying or distributing this * modification, are permitted provided that the following conditions are
Package. met:
E-8 Sun SPARC Enterprise M3000/M4000/M5000/M8000/M9000 Servers XSCF User’s Guide • August 2009
* 4) Exclusions From License Grant. Nothing in this License shall be deemed
* 1. Redistributions of source code must retain the above copyright to grant any rights to trademarks, copyrights, patents, trade secrets or
notice, this any other intellectual property of Licensor except as expressly stated
* list of conditions and the following disclaimer. herein. No patent license is granted to make, use, sell or offer to sell
* embodiments of any patent claims other than the Licensed Claims defined
* 2. Redistributions in binary form must reproduce the above copyright in Section 2. No right is granted to the trademarks of Licensor even if
* notice, this list of conditions and the following disclaimer in the such marks are included in the Original Work. Nothing in this License shall
* documentation and/or other materials provided with the distribution. be interpreted to prohibit Licensor from licensing under different terms
* from this License any Original Work that Licensor otherwise would have a
* 3. The name "Carnegie Mellon University" must not be used to endorse or right to license.
* promote products derived from this software without prior written
permission. 5) External Deployment. The term "External Deployment" means the use or
* For permission or any other legal details, please contact distribution of the Original Work or Derivative Works in any way such that
the Original Work or Derivative Works may be accessed or used by anyone
* Office of Technology Transfer other than You, whether the Original Work or Derivative Works are
* Carnegie Mellon University distributed to those persons, made available as an application intended
* 5000 Forbes Avenue for use over a computer network, or used to provide services or otherwise
* Pittsburgh, PA 15213-3890 deliver content to anyone other than You. As an express condition for the
* (412) 268-4387, fax: (412) 268-7395 grants of license hereunder, You agree that any External Deployment by You
* [email protected] shall be deemed adistribution and shall be licensed to all under the terms
* of this License, as prescribed in section 1(c) herein.
* 4. Redistributions of any form whatsoever must retain the following
* acknowledgment: 6) Warranty and Disclaimer of Warranty. LICENSOR WARRANTS THAT
* "This product includes software developed by Computing Services at THECOPYRIGHT IN AND TO THE ORIGINAL WORK IS OWNED BY THE LICENSOR OR THAT
* Carnegie Mellon University (http://www.cmu.edu/computing/)." THE ORIGINAL WORK IS DISTRIBUTED BY LICENSOR UNDER A VALID CURRENT LICENSE
* FROM THE COPYRIGHT OWNER. EXCEPT AS EXPRESSLY STATED IN THE IMMEDIATELY
* CARNEGIE MELLON UNIVERSITY DISCLAIMS ALL WARRANTIES WITH PRECEEDING SENTENCE, THE ORIGINAL WORK IS PROVIDED UNDER THIS LICENSE ON
* REGARD TO THIS SOFTWARE, INCLUDING ALL IMPLIED WARRANTIES AN "AS IS" BASIS, WITHOUT WARRANTY, EITHER EXPRESS OR IMPLIED, INCLUDING,
* OF MERCHANTABILITY AND FITNESS, IN NO EVENT SHALL CARNEGIE WITHOUT LIMITATION, THE WARRANTY OF NON-INFRINGEMENT AND WARRANTIES THAT
* MELLON UNIVERSITY BE LIABLE THE ORIGINAL WORK IS MERCHANTABLE OR FIT FOR A PARTICULAR PURPOSE. THE
* FOR ANY SPECIAL, INDIRECT OR CONSEQUENTIAL DAMAGES OR ENTIRE RISK AS TO THE QUALITY OF THE ORIGINAL WORK IS WITH YOU. THIS
* ANY DAMAGES DISCLAIMER OF WARRANTY CONSTITUTES AN ESSENTIAL PART OF THIS LICENSE. NO
* WHATSOEVER RESULTING FROM LOSS OF USE, DATA OR PROFITS, LICENSE TO ORIGINAL WORK IS GRANTED HEREUNDER EXCEPT UNDER THIS
* WHETHER IN DISCLAIMER.
* AN ACTION OF CONTRACT, NEGLIGENCE OR OTHER TORTIOUS
* ACTION, ARISING OUT OF OR IN CONNECTION WITH THE USE OR 7) Limitation of Liability. UNDER NO CIRCUMSTANCES AND UNDER NO LEGAL
* PERFORMANCE OF THIS SOFTWARE. THEORY, WHETHER TORT (INCLUDING NEGLIGENCE), CONTRACT, OR OTHERWISE, SHALL
*/ THE LICENSOR BE LIABLE TO ANY PERSON FOR ANY DIRECT, INDIRECT, SPECIAL,
INCIDENTAL, OR CONSEQUENTIAL DAMAGES OF ANY CHARACTER ARISING AS A RESULT
----- OF THIS LICENSE OR THE USE OF THE ORIGINAL WORK INCLUDING, WITHOUT
The Open Software License LIMITATION, DAMAGES FOR LOSS OF GOODWILL, WORK STOPPAGE, COMPUTER FAILURE
v. 1.0 OR MALFUNCTION, OR ANY AND ALL OTHER COMMERCIAL DAMAGES OR LOSSES, EVEN
IF SUCH PERSON SHALL HAVE BEEN INFORMED OF THE POSSIBILITY OF SUCH DAMAGES.
This Open Software License (the "License") applies to any original work THIS LIMITATION OF LIABILITY SHALL NOT APPLY TO LIABILITY FOR DEATH OR
of authorship (the "Original Work") whose owner (the "Licensor") has PERSONAL INJURY RESULTING FROM SUCH PARTY'S NEGLIGENCE TO THE EXTENT
placed the following notice immediately following the copyright notice for APPLICABLE LAW PROHIBITS SUCH LIMITATION. SOME JURISDICTIONS DO NOT ALLOW
the Original Work: "Licensed under the Open Software License version 1.0" THE EXCLUSION OR LIMITATION OF INCIDENTAL OR CONSEQUENTIAL DAMAGES, SO
THIS EXCLUSION AND LIMITATION MAY NOT APPLY TO YOU.
License Terms
8) Acceptance and Termination. Nothing else but this License (or another
1) Grant of Copyright License. Licensor hereby grants You a world-wide, written agreement between Licensor and You) grants You permission to
royalty-free, non-exclusive, perpetual, non-sublicenseable license to do create Derivative Works based upon the Original Work, and any attempt to
the following: do so except under the terms of this License (or another written agreement
between Licensor and You) is expressly prohibited by U.S. copyright law,
a) to reproduce the Original Work in copies; the equivalent laws of other countries, and by international treaty.
Therefore, by exercising any of the rights granted to You in Sections 1
b) to prepare derivative works ("Derivative Works") based upon the and 2 herein, You indicate Your acceptance of this License and all of its
Original Work; terms and conditions. This license shall terminate immediately and you may
no longer exercise any of the rights granted to You by this License upon
c) to distribute copies of the Original Work and Derivative Works to the Your failure to honor the proviso in Section 1(c) herein.
public, with the proviso that copies of Original Work or Derivative Works
that You distribute shall be licensed under the Open Software License; 9) Mutual Termination for Patent Action. This License shall terminate
automatically and You may no longer exercise any of the rights granted to
d) to perform the Original Work publicly; and You by this License if You file a lawsuit in any court alleging that any
OSI Certified open source software that is licensed under any license
e) to display the Original Work publicly. containing this "Mutual Termination for Patent Action" clause infringes
any patent claims that are essential to use that software.
2) Grant of Patent License. Licensor hereby grants You a world-wide, 10) Jurisdiction, Venue and Governing Law. You agree that any lawsuit
royalty-free, non-exclusive, perpetual, non-sublicenseable license, under arising under or relating to this License shall be maintained in the courts
patent claims owned or controlled by the Licensor that are embodied in the of the jurisdiction wherein the Licensor resides or in which Licensor
Original Work as furnished by the Licensor ("Licensed Claims") to make, conducts its primary business, and under the laws of that jurisdiction
use, sell and offer for sale the Original Work. Licensor hereby grants You excluding its conflict-of-law provisions. The application of the United
a world-wide, royalty-free, non-exclusive, perpetual, non-sublicenseable Nations Convention on Contracts for the International Sale of Goods is
license under the Licensed Claims to make, use, sell and offer for sale expressly excluded. Any use of the Original Work outside the scope of this
Derivative Works. License or after its termination shall be subject to the requirements and
penalties of the U.S. Copyright Act, 17 U.S.C. § 101 et seq., the
3) Grant of Source Code License. The term "Source Code" means the preferred equivalent laws of other countries, and international treaty. This section
form of the Original Work for making modifications to it and all available shall survive the termination of this License.
documentation describing how to access and modify the Original Work.
Licensor hereby agrees to provide a machine-readable copy of the Source 11) Attorneys Fees. In any action to enforce the terms of this License or
Code of the Original Work along with each copy of the Original Work that seeking damages relating thereto, the prevailing party shall be entitled
Licensor distributes. Licensor reserves the right to satisfy this to recover its costs and expenses, including, without limitation,
obligation by placing a machine-readable copy of the Source Code in an reasonable attorneys' fees and costs incurred in connection with such
information repository reasonably calculated to permit inexpensive and action, including any appeal of such action. This section shall survive
convenient access by You for as long as Licensor continues to distribute the termination of this License.
the Original Work, and by publishing the address of that information
repository in a notice immediately
following the copyright notice that applies to the Original Work.
This license is Copyright (C) 2002 Lawrence E. Rosen. All rights reserved. "Contributor" shall mean Licensor and any individual or Legal Entity on
Permission is hereby granted to copy and distribute this license without behalf of whom a Contribution has been received by Licensor and
modification. This license may not be modified without the express written subsequently incorporated within the Work.
permission of its copyright owner.
2. Grant of Copyright License. Subject to the terms and conditions of
----- this License, each Contributor hereby grants to You a perpetual,
Copyright (c) 1998, 1999, 2000 Thai Open Source Software Center Ltd worldwide, non-exclusive, no-charge, royalty-free, irrevocable copyright
and Clark Cooper license to reproduce, prepare Derivative Works of, publicly display,
Copyright (c) 2001, 2002, 2003 Expat maintainers. publicly perform, sublicense, and distribute the Work and such Derivative
Works in Source or Object form.
Permission is hereby granted, free of charge, to any person obtaining a
copy of this software and associated documentation files (the "Software"), 3. Grant of Patent License. Subject to the terms and conditions of this
to deal in the Software without restriction, including without limitation License, each Contributor hereby grants to You a perpetual, worldwide,
the rights to use, copy, modify, merge, publish, distribute, sublicense, non-exclusive, no-charge, royalty-free, irrevocable (except as stated in
and/or sell copies of the Software, and to permit persons to whom the this section) patent license to make, have made, use, offer to sell, sell,
Software is furnished to do so, subject to the following conditions: import, and otherwise transfer the Work, where such license applies only
to those patent claims licensable by such Contributor that are necessarily
The above copyright notice and this permission notice shall be included infringed by their Contribution(s) alone or by combination of their
in all copies or substantial portions of the Software. Contribution(s) with the Work to which such Contribution(s) was submitted.
If You institute patent litigation against any entity (including a cross-
THE SOFTWARE IS PROVIDED "AS IS", WITHOUT WARRANTY OF ANY KIND, EXPRESS claim or counterclaim in a lawsuit) alleging that the Work or a
OR IMPLIED, INCLUDING BUT NOT LIMITED TO THE WARRANTIES OF Contribution incorporated within the Work constitutes direct or
MERCHANTABILITY, FITNESS FOR A PARTICULAR PURPOSE AND NONINFRINGEMENT. IN contributory patent infringement, then any patent licenses granted
NO EVENT SHALL THE AUTHORS OR COPYRIGHT HOLDERS BE LIABLE FOR ANY CLAIM, to You under this License for that Work shall terminate as of the date
DAMAGES OR OTHER LIABILITY, WHETHER IN AN ACTION OF CONTRACT, TORT OR such litigation is filed.
OTHERWISE, ARISING FROM, OUT OF OR IN CONNECTION WITH THE SOFTWARE OR THE
USE OR OTHER DEALINGS IN THE SOFTWARE. 4. Redistribution. You may reproduce and distribute copies of the Work
or Derivative Works thereof in any medium, with or without modifications,
----- and in Source or Object form, provided that You meet the following
Apache License conditions:
Version 2.0, January 2004
http://www.apache.org/licenses/ (a) You must give any other recipients of the Work or Derivative
Works a copy of this License; and
TERMS AND CONDITIONS FOR USE, REPRODUCTION, AND DISTRIBUTION
(b) You must cause any modified files to carry prominent notices
1. Definitions. stating that You changed the files; and
"License" shall mean the terms and conditions for use, reproduction, and (c) You must retain, in the Source form of any Derivative Works
distribution as defined by Sections 1 through 9 of this document. that You distribute, all copyright, patent, trademark, and attribution
notices from the Source form of the Work, excluding those notices that do
"Licensor" shall mean the copyright owner or entity authorized by the not pertain to any part of the Derivative Works; and
copyright owner that is granting the License.
(d) If the Work includes a "NOTICE" text file as part of its
"Legal Entity" shall mean the union of the acting entity and all other distribution, then any Derivative Works that You distribute must include
entities that control, are controlled by, or are under common control with a readable copy of the attribution notices contained within such NOTICE
that entity. For the purposes of this definition, "control" means (i) the file, excluding those notices that do not pertain to any part of the
power, direct or indirect, to cause the direction or management of such Derivative Works, in at least one of the following places: within a NOTICE
entity, whether by contract or otherwise, or (ii) ownership of fifty text file distributed as part of the Derivative Works; within the Source
percent (50%) or more of the outstanding shares, or (iii) beneficial form or documentation, if provided along with the Derivative Works; or,
ownership of such entity. within a display generated by the Derivative Works, if and wherever
such third-party notices normally appear. The contents of the NOTICE file
"You" (or "Your") shall mean an individual or Legal Entity exercising are for informational purposes only and do not modify the License. You may
permissions granted by this License. add Your own attribution notices within Derivative Works that You
distribute, alongside or as an addendum to the NOTICE text from the Work,
"Source" form shall mean the preferred form for making modifications, provided that such additional attribution notices cannot be construed
including but not limited to software source code, documentation source, as modifying the License.
and configuration files.
You may add Your own copyright statement to Your modifications and
"Object" form shall mean any form resulting from mechanical may provide additional or different license terms and conditions for use,
transformation or translation of a Source form, including but not limited reproduction, or distribution of Your modifications, or for any such
to compiled object code, generated documentation, and conversions to other Derivative Works as a whole, provided Your use, reproduction, and
media types. distribution of the Work otherwise complies with the conditions stated in
this License.
"Work" shall mean the work of authorship, whether in Source or Object
form, made available under the License, as indicated by a copyright notice 5. Submission of Contributions. Unless You explicitly state otherwise,
that is included in or attached to the work (an example is provided in the any Contribution intentionally submitted for inclusion in the Work by You
Appendix below). to the Licensor shall be under the terms and conditions of this License,
without any additional terms or conditions. Notwithstanding the above,
"Derivative Works" shall mean any work, whether in Source or Object nothing herein shall supersede or modify the terms of any separate license
form, that is based on (or derived from) the Work and for which the agreement you may have executed with Licensor regarding such
editorial revisions, annotations, elaborations, or other modifications Contributions.
represent, as a whole, an original work of authorship. For the purposes
of this License, Derivative Works shall not include works that remain
separable from, or merely link (or bind by name) to the interfaces of,
the Work and Derivative Works thereof.
E-10 Sun SPARC Enterprise M3000/M4000/M5000/M8000/M9000 Servers XSCF User’s Guide • August 2009
6. Trademarks. This License does not grant permission to use the trade * This software is not subject to any license of the American Telephone
names, trademarks, service marks, or product names of the Licensor, except and
as required for reasonable and customary use in describing the origin of * Telegraph Company or of the Regents of the University of California.
the Work and reproducing the content of the NOTICE file. *
* Permission is granted to anyone to use this software for any purpose
7. Disclaimer of Warranty. Unless required by applicable law or agreed on any
to in writing, Licensor provides the Work (and each Contributor provides * computer system, and to alter it and redistribute it freely, subject
its Contributions) on an "AS IS" BASIS, WITHOUT WARRANTIES OR CONDITIONS to the
OF ANY KIND, either express or implied, including, without limitation, any * following restrictions:
warranties or conditions of TITLE, NON-INFRINGEMENT, MERCHANTABILITY, or *
FITNESS FOR A PARTICULAR PURPOSE. You are solely responsible for * 1. The author is not responsible for the consequences of use of this
determining the appropriateness of using or redistributing the Work and * software, no matter how awful, even if they arise from flaws in it.
assume any risks associated with Your exercise of permissions under this *
License. * 2. The origin of this software must not be misrepresented, either by
explicit
8. Limitation of Liability. In no event and under no legal theory, * claim or by omission. Since few users ever read sources, credits must
whether in tort (including negligence), contract, or otherwise, unless * appear in the documentation.
required by applicable law (such as deliberate and grossly negligent acts) *
or agreed to in writing, shall any Contributor be liable to You for * 3. Altered versions must be plainly marked as such, and must not be
damages, including any direct, indirect, special, incidental, or * misrepresented as being the original software. Since few users ever
consequential damages of any character arising as a result of this License read
or out of the use or inability to use the Work (including but not * sources, credits must appear in the documentation.
limited to damages for loss of goodwill, work stoppage, computer failure *
or malfunction, or any and all other commercial damages or losses), even * 4. This notice may not be removed or altered.
if such Contributor has been advised of the possibility of such damages. * ---------------------------------------------------------------------
----
9. Accepting Warranty or Additional Liability. While redistributing *
the Work or Derivative Works thereof, You may choose to offer, and charge */
a fee for, acceptance of support, warranty, indemnity, or other liability
obligations and/or rights consistent with this License. However, in "macmartinized" polygon code copyright 1992 by Eric Haines,
accepting such obligations, You may act only on Your own behalf and on [email protected]
Your sole responsibility, not on behalf of any other Contributor, and only
if You agree to indemnify, defend, and hold each Contributor harmless for /**********************************************************************
any liability incurred by, or claims asserted against, such Contributor **
by reason of your accepting any such warranty or additional liability. * NCSA HTTPd Server
* Software Development Group
END OF TERMS AND CONDITIONS * National Center for Supercomputing Applications
* University of Illinois at Urbana-Champaign
APPENDIX: How to apply the Apache License to your work. * 605 E. Springfield, Champaign, IL 61820
* [email protected]
To apply the Apache License to your work, attach the following *
boilerplate notice, with the fields enclosed by brackets "[]" replaced * Copyright (C) 1995, Board of Trustees of the University of Illinois
with your own identifying information. (Don't include the brackets!) The *
text should be enclosed in the appropriate comment syntax for the file
format. We also recommend that a file or class name and description of ************************************************************************
purpose be included on the same "printed page" as the copyright notice for *
easier identification within third-party archives. * md5.c: NCSA HTTPd code which uses the md5c.c RSA Code
*
Copyright [yyyy] [name of copyright owner] * Original Code Copyright (C) 1994, Jeff Hostetler, Spyglass, Inc.
* Portions of Content-MD5 code Copyright (C) 1993, 1994 by Carnegie
Licensed under the Apache License, Version 2.0 (the "License"); Mellon
you may not use this file except in compliance with the License. * University (see Copyright below).
You may obtain a copy of the License at * Portions of Content-MD5 code Copyright (C) 1991 Bell Communications
http://www.apache.org/licenses/LICENSE-2.0 * Research, Inc. (Bellcore) (see Copyright below).
* Portions extracted from mpack, John G. Myers - [email protected]
Unless required by applicable law or agreed to in writing, software * Content-MD5 Code contributed by Martin Hamilton ([email protected])
distributed under the License is distributed on an "AS IS" BASIS, WITHOUT *
WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. */
See the License for the specific language governing permissions and
limitations under the License. /* these portions extracted from mpack, John G. Myers - [email protected] */
/* (C) Copyright 1993,1994 by Carnegie Mellon University
* All Rights Reserved.
*
APACHE HTTP SERVER SUBCOMPONENTS: * Permission to use, copy, modify, distribute, and sell this software and
its
The Apache HTTP Server includes a number of subcomponents with separate * documentation for any purpose is hereby granted without fee, provided
copyright notices and license terms. Your use of the source code for the that
these subcomponents is subject to the terms and conditions of the * the above copyright notice appear in all copies and that both that
following licenses. copyright
* notice and this permission notice appear in supporting documentation,
For the mod_mime_magic component: and
* that the name of Carnegie Mellon University not be used in advertising
/* or
* mod_mime_magic: MIME type lookup via file magic numbers * publicity pertaining to distribution of the software without specific,
* Copyright (c) 1996-1997 Cisco Systems, Inc. written
* * prior permission. Carnegie Mellon University makes no representations
* This software was submitted by Cisco Systems to the Apache Group in July * about the suitability of this software for any purpose. It is provided
* 1997. Future revisions and derivatives of this source code must "as is"
* acknowledge Cisco Systems as the original contributor of this module. * without express or implied warranty.
* All other licensing and usage conditions are those of the Apache Group. *
* * CARNEGIE MELLON UNIVERSITY DISCLAIMS ALL WARRANTIES WITH
* Some of this code is derived from the free version of the file command * REGARD TO THIS SOFTWARE, INCLUDING ALL IMPLIED WARRANTIES
* originally posted to comp.sources.unix. Copyright info for that * OF MERCHANTABILITY AND FITNESS, IN NO EVENT SHALL CARNEGIE
program is * MELLON UNIVERSITY BE LIABLE FOR ANY SPECIAL, INDIRECT OR
* included below as required. * CONSEQUENTIAL DAMAGES OR ANY DAMAGES WHATSOEVER
* --------------------------------------------------------------------- * RESULTING FROM LOSS OF USE, DATA OR PROFITS, WHETHER IN
------ * AN ACTION OF CONTRACT, NEGLIGENCE OR OTHER TORTIOUS
* - Copyright (c) Ian F. Darwin, 1987. Written by Ian F. Darwin. * ACTION, ARISING OUT OF OR IN CONNECTION WITH THE USE OR
* * PERFORMANCE OF THIS SOFTWARE.
*/
/*
* This is work is derived from material Copyright RSA Data Security, Inc. 4. If PCRE is embedded in any software that is released under the GNU
* General Purpose Licence (GPL), or Lesser General Purpose Licence (LGPL),
* The RSA copyright statement and Licence for that original material is then the terms of that licence shall supersede any condition above with
* included below. This is followed by the Apache copyright statement and which it is incompatible.
* licence for the modifications made to that material.
*/ The documentation for PCRE, supplied in the "doc" directory, is
distributed under the same terms as the software itself.
*
* This is derived from material copyright RSA Data Security, Inc. End PCRE LICENCE
* Their notice is reproduced below in its entirety.
*
* Copyright (C) 1990-2, RSA Data Security, Inc. Created 1990. All rights /* ZeusBench V1.01
* reserved. ===============
*
* RSA Data Security, Inc. makes no representations concerning either the This program is Copyright (C) Zeus Technology Limited 1996.
* merchantability of this software or the suitability of this software
for any This program may be used and copied freely providing this copyright notice
* particular purpose. It is provided "as is" without express or implied is not removed.
warranty
* of any kind. This software is provided "as is" and any express or implied waranties,
* including but not limited to, the implied warranties of merchantability
* These notices must be retained in any copies of any part of this and fitness for a particular purpose are disclaimed. In no event shall
* documentation and/or software. Zeus Technology Ltd. be liable for any direct, indirect, incidental,
*/ special, exemplary, or consequential damaged (including, but not limited
to, procurement of substitute good or services; loss of use, data, or
# profits; or business interruption) however caused and on theory of
# install - install a program, script, or datafile liability. Whether in contract, strict liability or tort (including
# This comes from X11R5 (mit/util/scripts/install.sh). negligence or otherwise) arising in any way out of the use of this
# software, even if advised of the possibility of such damage.
# Copyright 1991 by the Massachusetts Institute of Technology
# Written by Adam Twiss ([email protected]). March 1996
# Permission to use, copy, modify, distribute, and sell this software and
its Thanks to the following people for their input:
# documentation for any purpose is hereby granted without fee, provided Mike Belshe ([email protected])
that Michael Campanella ([email protected])
# the above copyright notice appear in all copies and that both that
copyright */
# notice and this permission notice appear in supporting documentation, Copyright (c) 1998, 1999, 2000 Thai Open Source Software Center Ltd
and and Clark Cooper
# that the name of M.I.T. not be used in advertising or publicity
pertaining to Permission is hereby granted, free of charge, to any person obtaining a
# distribution of the software without specific, written prior permission. copy of this software and associated documentation files (the "Software"),
M.I.T. to deal in the Software without restriction, including without limitation
# makes no representations about the suitability of this software for any the rights to use, copy, modify, merge, publish, distribute, sublicense,
# purpose. It is provided "as is" without express or implied warranty. and/or sell copies of the Software, and to permit persons to whom the
# Software is furnished to do so, subject to the following conditions:
PCRE LICENCE The above copyright notice and this permission notice shall be included
------------ in all copies or substantial portions of the Software.
PCRE is a library of functions to support regular expressions whose syntax THE SOFTWARE IS PROVIDED "AS IS", WITHOUT WARRANTY OF ANY KIND, EXPRESS
and semantics are as close as possible to those of the Perl 5 language. OR IMPLIED, INCLUDING BUT NOT LIMITED TO THE WARRANTIES OF
MERCHANTABILITY, FITNESS FOR A PARTICULAR PURPOSE AND NONINFRINGEMENT. IN
Written by: Philip Hazel <[email protected]> NO EVENT SHALL THE AUTHORS OR COPYRIGHT HOLDERS BE LIABLE FOR ANY CLAIM,
DAMAGES OR OTHER LIABILITY, WHETHER IN AN ACTION OF CONTRACT, TORT OR
University of Cambridge Computing Service, OTHERWISE, ARISING FROM, OUT OF OR IN CONNECTION WITH THE SOFTWARE OR THE
Cambridge, England. Phone: +44 1223 334714. USE OR OTHER DEALINGS IN THE SOFTWARE.
1. This software is distributed in the hope that it will be useful, but 1. Redistributions of source code must retain any existing copyright
WITHOUT ANY WARRANTY; without even the implied warranty of MERCHANTABILITY notice, and this entire permission notice in its entirety, including the
or FITNESS FOR A PARTICULAR PURPOSE. disclaimer of warranties.
E-12 Sun SPARC Enterprise M3000/M4000/M5000/M8000/M9000 Servers XSCF User’s Guide • August 2009
2. Redistributions in binary form must reproduce all prior and current
copyright notices, this list of conditions, and the following disclaimer ---- Part 2: Networks Associates Technology, Inc copyright notice (BSD) -
in the documentation and/or other materials provided with the ----
distribution.
Copyright (c) 2001-2003, Networks Associates Technology, Inc All rights
3. The name of any author may not be used to endorse or promote products reserved.
derived from this software without their specific prior written
permission. Redistribution and use in source and binary forms, with or without
modification, are permitted provided that the following conditions are
ALTERNATIVELY, this product may be distributed under the terms of the GNU met:
General Public License, in which case the provisions of the GNU GPL are
required INSTEAD OF the above restrictions. (This clause is necessary due * Redistributions of source code must retain the above copyright notice,
to a potential conflict between the GNU GPL and the restrictions contained this list of conditions and the following disclaimer.
in a BSD-style copyright.)
* Redistributions in binary form must reproduce the above copyright
THIS SOFTWARE IS PROVIDED ``AS IS'' AND ANY EXPRESS OR IMPLIEDWARRANTIES, notice, this list of conditions and the following disclaimer in the
INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES OF MERCHANTABILITY documentation and/or other materials provided with the distribution.
AND FITNESS FOR A PARTICULAR PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE
AUTHOR(S) BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, * Neither the name of the Networks Associates Technology, Inc nor the
EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO, names of its contributors may be used to endorse or promote products
PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, DATA, OR derived from this software without specific prior written permission.
PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY OF
LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING
NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF THIS THIS SOFTWARE IS PROVIDED BY THE COPYRIGHT HOLDERS AND CONTRIBUTORS ``AS
SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE. IS'' AND ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO,
THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR
----- PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE COPYRIGHT HOLDERS OR
Redistribution and use in source and binary forms, with or without CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL,
modification, are permitted provided that the following conditions are EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO,
met: PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, DATA, OR
PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY OF
1. Redistributions of source code must retain the above copyright notice, LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING
this list of conditions and the following disclaimer. NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF THIS
2. Redistributions in binary form must reproduce the above copyright SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.
notice, this list of conditions and the following disclaimer in the
documentation and/or other materials provided with the distribution. ---- Part 3: Cambridge Broadband Ltd. copyright notice (BSD) -----
3. The names of the authors may not be used to endorse or promote
products derived from this software without specific prior written Portions of this code are copyright (c) 2001-2003, Cambridge Broadband
permission. Ltd.
All rights reserved.
THIS SOFTWARE IS PROVIDED ``AS IS'' AND WITHOUT ANY EXPRESS OR IMPLIED
WARRANTIES, INCLUDING, WITHOUT LIMITATION, THE IMPLIED WARRANTIES OF Redistribution and use in source and binary forms, with or without
MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE. modification, are permitted provided that the following conditions are
met:
-----
This library (libselinux) is public domain software, i.e. not copyrighted. * Redistributions of source code must retain the above copyright notice,
Warranty Exclusion this list of conditions and the following disclaimer.
* Redistributions in binary form must reproduce the above copyright
------------------ notice, this list of conditions and the following disclaimer in the
You agree that this software is a non-commercially developed program that documentation and/or other materials provided with the distribution.
may contain "bugs" (as that term is used in the industry) and that it may
not function as intended. The software is licensed "as is". NSA makes no, * The name of Cambridge Broadband Ltd. may not be used to endorse or
and hereby expressly disclaims all, warranties, express, implied, promote products derived from this software without specific prior written
statutory, or otherwise with respect to the software, including permission.
noninfringement and the implied warranties of merchantability and fitness
for a particular purpose. THIS SOFTWARE IS PROVIDED BY THE COPYRIGHT HOLDER ``AS IS'' AND ANY EXPRESS
OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED
Limitation of Liability WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE ARE
----------------------- DISCLAIMED. IN NO EVENT SHALL THE COPYRIGHT HOLDER BE LIABLE FOR ANY
In no event will NSA be liable for any damages, including loss of data, DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL
lost profits, cost of cover, or other special, incidental, consequential, DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS
direct or indirect damages arising from the software or the use thereof, OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION)
however caused and on any theory of liability. This limitation will apply HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT
even if NSA has been advised of the possibility of such damage. You LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY
acknowledge that this is a reasonable allocation of risk. OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF
----- SUCH DAMAGE.
---- Part 1: CMU/UCD copyright notice: (BSD like) -----
Copyright 1989, 1991, 1992 by Carnegie Mellon University ---- Part 4: Sun Microsystems, Inc. copyright notice (BSD) -----
Derivative Work - 1996, 1998-2000 Copyright © 2003 Sun Microsystems, Inc., 4150 Network Circle, Santa Clara,
Copyright 1996, 1998-2000 The Regents of the University of California California 95054, U.S.A. All rights reserved.
Permission to use, copy, modify and distribute this software and its This distribution may include materials developed by third parties.
documentation for any purpose and without fee is hereby granted, provided
that the above copyright notice appears in all copies and that both that Sun, Sun Microsystems, the Sun logo and Solaris are trademarks or
copyright notice and this permission notice appear in supporting registered trademarks of Sun Microsystems, Inc. in the U.S. and other
documentation, and that the name of CMU and The Regents of the University countries.
of California not be used in advertising or publicity pertaining to
distribution of the software without specific written permission. Redistribution and use in source and binary forms, with or without
CMU AND THE REGENTS OF THE UNIVERSITY OF CALIFORNIA DISCLAIM ALL modification, are permitted provided that the following conditions are
WARRANTIES WITH REGARD TO THIS SOFTWARE, INCLUDING ALL IMPLIED WARRANTIES met:
OF MERCHANTABILITY AND FITNESS. IN NO EVENT SHALL CMU OR THE REGENTS OF
THE UNIVERSITY OF CALIFORNIA BE LIABLE FOR ANY SPECIAL, INDIRECT OR * Redistributions of source code must retain the above copyright notice,
CONSEQUENTIAL DAMAGES OR ANY DAMAGES WHATSOEVER RESULTING FROM THE LOSS this list of conditions and the following disclaimer.
OF USE, DATA OR PROFITS, WHETHER IN AN ACTION OF CONTRACT, NEGLIGENCE OR
OTHER TORTIOUS ACTION, ARISING OUT OF OR IN CONNECTION WITH THE USE OR
PERFORMANCE OF THIS SOFTWARE.
THIS SOFTWARE IS PROVIDED BY THE COPYRIGHT HOLDERS AND CONTRIBUTORS ``AS The OpenLDAP Foundation may revise this license from time to time. Each
IS'' AND ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, revision is distinguished by a version number. You may use this Software
THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR under terms of this license revision or under the terms of any subsequent
PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE COPYRIGHT HOLDERS OR revision of the license.
CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL,
EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO, THIS SOFTWARE IS PROVIDED BY THE OPENLDAP FOUNDATION AND ITS CONTRIBUTORS
PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, DATA, OR ``AS IS'' AND ANY EXPRESSED OR IMPLIED WARRANTIES, INCLUDING, BUT NOT
PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY OF LIMITED TO, THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A
LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING PARTICULAR PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE OPENLDAP
NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF THIS FOUNDATION, ITS CONTRIBUTORS, OR THE AUTHOR(S) OR OWNER(S) OF THE
SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE. SOFTWARE BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL,
EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO,
---- Part 6: Cisco/BUPTNIC copyright notice (BSD) ----- PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, DATA, OR
Copyright (c) 2004, Cisco, Inc and Information Network PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY OF
Center of Beijing University of Posts and Telecommunications. LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING
All rights reserved. NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF THIS
SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.
Redistribution and use in source and binary forms, with or without
modification, are permitted provided that the following conditions are The names of the authors and copyright holders must not be used in
met: advertising or otherwise to promote the sale, use or other dealing in this
Software without specific, written prior permission. Title to copyright
* Redistributions of source code must retain the above copyright notice, in this Software shall at all times remain with copyright holders.
this list of conditions and the following disclaimer.
OpenLDAP is a registered trademark of the OpenLDAP Foundation.
* Redistributions in binary form must reproduce the above copyright Copyright 1999-2003 The OpenLDAP Foundation, Redwood City,
notice, this list of conditions and the following disclaimer in the California, USA. All Rights Reserved. Permission to copy and distribute
documentation and/or other materials provided with the distribution. verbatim copies of this document is granted.
E-14 Sun SPARC Enterprise M3000/M4000/M5000/M8000/M9000 Servers XSCF User’s Guide • August 2009
[However, none of that term is relevant at this point in time. All *
of these restrictively licenced software components which he talks about * This code is hereby placed in the public domain.
have been removed from OpenSSH, i.e., *
* THIS SOFTWARE IS PROVIDED BY THE AUTHORS ''AS IS'' AND ANY
- RSA is no longer included, found in the OpenSSL library * EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO,
- IDEA is no longer included, its use is deprecated *THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A
- DES is now external, in the OpenSSL library * PARTICULAR PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE
- GMP is no longer used, and instead we call BN code from OpenSSL * AUTHORS OR CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT,
- Zlib is now external, in a library * INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES
- The make-ssh-known-hosts script is no longer included * (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE
- TSS has been removed * GOODS OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS
- MD5 is now external, in the OpenSSL library * INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY,
- RC4 support has been replaced with ARC4 support from OpenSSL * WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING
- Blowfish is now external, in the OpenSSL library * NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF
*THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.
[The licence continues]
Note that any information and cryptographic algorithms used in this * Copyright (c) 1983, 1990, 1992, 1993, 1995
software are publicly available on the Internet and at any major * The Regents of the University of California. All rights reserved.
bookstore, scientific library, and patent office worldwide. More *
information can be found e.g. at "http://www.cs.hut.fi/crypto". * Redistribution and use in source and binary forms, with or without
* modification, are permitted provided that the following conditions are
The legal status of this program is some combination of all these met:
permissions and restrictions. Use only at your own responsibility. You * 1. Redistributions of source code must retain the above copyright
will be responsible for any legal consequences yourself; I am not making notice, this
any claims whether possessing or using this is legal or not in your * list of conditions and the following disclaimer.
country, and I am not taking any responsibility on your behalf. * 2. Redistributions in binary form must reproduce the above copyright
* notice, this list of conditions and the following disclaimer in the
NO WARRANTY * documentation and/or other materials provided with the distribution.
* 3. All advertising materials mentioning features or use of this software
BECAUSE THE PROGRAM IS LICENSED FREE OF CHARGE, THERE IS NO WARRANTY * must display the following acknowledgement:
FOR THE PROGRAM, TO THE EXTENT PERMITTED BY APPLICABLE LAW. EXCEPT WHEN * This product includes software developed by the University of
OTHERWISE STATED IN WRITING THE COPYRIGHT HOLDERS AND/OR OTHER PARTIES California,
PROVIDE THE PROGRAM "AS IS" WITHOUT WARRANTY OF ANY KIND, EITHER EXPRESSED Berkeley and its contributors.
OR IMPLIED, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES OF * 4. Neither the name of the University nor the names of its contributors
MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE. THE ENTIRE RISK AS may
TO THE QUALITY AND PERFORMANCE OF THE PROGRAM IS WITH YOU. SHOULD THE * be used to endorse or promote products derived from this software without
PROGRAM PROVE DEFECTIVE, YOU ASSUME THE COST OF ALL NECESSARY SERVICING, * specific prior written permission.
REPAIR OR CORRECTION. *
* THIS SOFTWARE IS PROVIDED BY THE REGENTS AND
IN NO EVENT UNLESS REQUIRED BY APPLICABLE LAW OR AGREED TO IN WRITING * CONTRIBUTORS ``AS IS'' AND ANY EXPRESS OR IMPLIED
WILL ANY COPYRIGHT HOLDER, OR ANY OTHER PARTY WHO MAY MODIFY AND/OR * WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED
REDISTRIBUTE THE PROGRAM AS PERMITTED ABOVE, BE LIABLE TO YOU FOR DAMAGES, * WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A
INCLUDING ANY GENERAL, SPECIAL, INCIDENTAL OR CONSEQUENTIAL DAMAGES * PARTICULAR PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE
ARISING OUT OF THE USE OR INABILITY TO USE THE PROGRAM (INCLUDING BUT NOT * REGENTS OR CONTRIBUTORS BE LIABLE FOR ANY DIRECT,
LIMITED TO LOSS OF DATA OR DATA BEING RENDERED INACCURATE OR LOSSES * INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL * DAMAGES
SUSTAINED BY YOU OR THIRD PARTIES OR A FAILURE OF THE PROGRAM TO OPERATE (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF
WITH ANY OTHER PROGRAMS), EVEN IF SUCH HOLDER OR OTHER PARTY HAS BEEN * SUBSTITUTE GOODS
ADVISED OF THE POSSIBILITY OF SUCH DAMAGES. * OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS
* INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY OF
The 32-bit CRC implementation in crc32.c is due to Gary S. Brown. * LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT
Comments in the file indicate it may be used for any purpose without * (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY
restrictions: * OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE
* POSSIBILITY OF SUCH DAMAGE.
* COPYRIGHT (C) 1986 Gary S. Brown. You may use this program, or
* code or tables extracted from it, as desired without restriction. * Redistribution and use in source and binary forms, with or without
* modification, are permitted provided that the following conditions are
---- met:
* Cryptographic attack detector for ssh - source code * 1. Redistributions of source code must retain the above copyright
* Copyright (c) 1998 CORE SDI S.A., Buenos Aires, Argentina. notice, this
* * list of conditions and the following disclaimer.
* All rights reserved. Redistribution and use in source and binary forms, * 2. Redistributions in binary form must reproduce the above copyright
with or without modification, are permitted provided that this copyright * notice, this list of conditions and the following disclaimer in the
notice is retained. * documentation and/or other materials provided with the distribution.
* *
* THIS SOFTWARE IS PROVIDED ``AS IS'' AND ANY EXPRESS OR * THIS SOFTWARE IS PROVIDED BY THE AUTHOR ``AS IS'' AND ANY
* IMPLIED WARRANTIES ARE DISCLAIMED. IN NO EVENT SHALL CORE * EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED
* SDI S.A. BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, * TO, THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS
* SPECIAL, EXEMPLARY OR CONSEQUENTIAL DAMAGES RESULTING * FOR A PARTICULAR PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL
* FROM THE USE OR MISUSE OF THIS SOFTWARE. * THE AUTHOR BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL,
* * SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING,
* Ariel Futoransky <[email protected]> * BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR
* <http://www.core-sdi.com> * SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS
* INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY OF
* Copyright 1995, 1996 by David Mazieres <[email protected]>. * LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT
* * (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT * OF THE USE
* Modification and redistribution in source and binary forms is permitted OF THIS SOFTWARE, EVEN IF ADVISED OF THE
* provided that due credit is given to the author and the OpenBSD project * POSSIBILITY OF SUCH DAMAGE.
by
* leaving this copyright notice intact. ----
/* =========================================================
* @version 3.0 (December 2000) * Copyright (c) 1998-2002 The OpenSSL Project. All rights reserved.
* *
* Optimised ANSI C code for the Rijndael cipher (now AES) * Redistribution and use in source and binary forms, with or without
* * modification, are permitted provided that the following conditions are
* @author Vincent Rijmen <[email protected]> met:
* @author Antoon Bosselaers <[email protected]> *
* @author Paulo Barreto <[email protected]> * 1. Redistributions of source code must retain the above copyright
notice, this
* list of conditions and the following disclaimer.
E-16 Sun SPARC Enterprise M3000/M4000/M5000/M8000/M9000 Servers XSCF User’s Guide • August 2009
[C] The Regents of the University of Michigan and Merit Network, Inc. 1992,
---- 1993, 1994, 1995 All Rights Reserved
/*-
* Copyright (c) 1990 The Regents of the University of California. Permission to use, copy, modify, and distribute this software and its
* All rights reserved. documentation for any purpose and without fee is hereby granted, provided
* that the above copyright notice and this permission notice appear in all
* Redistribution and use in source and binary forms, with or without copies of the software and derivative works or modified versions thereof,
* modification, are permitted provided that the following conditions are and that both the copyright notice and this permission and disclaimer
met: notice appear in supporting documentation.
* 1. Redistributions of source code must retain the above copyright
notice, this THIS SOFTWARE IS PROVIDED "AS IS" WITHOUT WARRANTY OF ANY KIND, EITHER
* list of conditions and the following disclaimer. EXPRESS OR IMPLIED, INCLUDING WITHOUT LIMITATION WARRANTIES OF
* 2. Redistributions in binary form must reproduce the above copyright MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE. THE REGENTS OF THE
* notice, this list of conditions and the following disclaimer in the UNIVERSITY OF MICHIGAN AND MERIT NETWORK, INC. DO NOT WARRANT THAT THE
* documentation and/or other materials provided with the distribution. FUNCTIONS CONTAINED IN THE SOFTWARE WILL MEET LICENSEE'S REQUIREMENTS OR
* 3. All advertising materials mentioning features or use of this software THAT OPERATION WILL BE UNINTERRUPTED OR ERROR FREE. The Regents of the
* must display the following acknowledgement: University of Michigan and Merit Network, Inc. shall not be liable for any
* This product includes software developed by the University of special, indirect, incidental or consequential damages with respect to any
* California, Berkeley and its contributors. claim by Licensee or any third party arising from use of the software.
* 4. Neither the name of the University nor the names of its contributors ------------------------------------------------------------------------
may ------
* be used to endorse or promote products derived from this software Copyright (C) 1991-2, RSA Data Security, Inc. Created 1991.
* without specific prior written permission. All rights reserved.
*
* THIS SOFTWARE IS PROVIDED BY THE REGENTS AND License to copy and use this software is granted provided that it is
* CONTRIBUTORS ``AS IS'' AND ANY EXPRESS OR IMPLIED identified as the "RSA Data Security, Inc. MD5 Message-Digest Algorithm"
* WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED in all material mentioning or referencing this software or this function.
* WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A
* PARTICULAR PURPOSE ARE DISCLAIMED. License is also granted to make and use derivative works provided that
* IN NO EVENT SHALL THE REGENTS OR CONTRIBUTORS BE LIABLE such works are identified as "derived from the RSA Data Security, Inc. MD5
* FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR Message-Digest Algorithm" in all material mentioning or referencing the
* CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO, derived work.
* PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF
* USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER RSA Data Security, Inc. makes no representations concerning either the
* CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN merchantability of this software or the suitability of this software for
* CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR any particular purpose. It is provided "as is" without express or implied
* OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF THIS warranty of any kind.
* SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH
* DAMAGE. These notices must be retained in any copies of any part of this
*/ documentation and/or software.
---- ----
Copyright (C) 2002 Roaring Penguin Software Inc. /**********************************************************************
**
Permission to use, copy, modify, and distribute this software for any * Copyright 1995 by Wietse Venema. All rights reserved. Some individual
purpose and without fee is hereby granted, provided that this copyright * files may be covered by other copyrights.
and permission notice appear on all copies and supporting documentation, *
the name of Roaring Penguin Software Inc. not be used in advertising or * This material was originally written and compiled by Wietse Venema at
publicity pertaining to distribution of the programwithout specific prior * Eindhoven University of Technology, The Netherlands, in 1990, 1991,
permission, and notice be given in supporting documentation that copying * 1992, 1993, 1994 and 1995.
and distribution is by permission of Roaring Penguin Software Inc.. *
Roaring Penguin Software Inc. makes no representations about the * Redistribution and use in source and binary forms are permitted provided
suitability of this software for any purpose. It is provided "as is" * that this entire copyright notice is duplicated in all such copies.
without express or implied warranty. *
* This software is provided "as is" and without any expressed or implied
------------------------------------------------------------------------ * warranties, including, without limitation, the implied warranties of
------ * merchantibility and fitness for any particular purpose.
Copyright (C) 1995,1996,1997,1998 Lars Fenneberg <[email protected]> ***********************************************************************
*/
Permission to use, copy, modify, and distribute this software for any
purpose and without fee is hereby granted, provided that this copyright ----
and permission notice appear on all copies and supporting documentation, /*
the name of Lars Fenneberg not be used in advertising or publicity * Copyright (c) 1989 The Regents of the University of California.
pertaining to distribution of the program without specific prior * All rights reserved.
permission, and notice be given in supporting documentation that copying *
and distribution is by permission of Lars Fenneberg. * Redistribution and use in source and binary forms, with or without
* modification, are permitted provided that the following conditions are
Lars Fenneberg makes no representations about the suitability of this met:
software for any purpose. It is provided "as is" without express or * 1. Redistributions of source code must retain the above copyright
implied warranty. notice, this
* list of conditions and the following disclaimer.
------------------------------------------------------------------------ * 2. Redistributions in binary form must reproduce the above copyright
----- * notice, this list of conditions and the following disclaimer in the
Copyright 1992 Livingston Enterprises, Inc. * documentation and/or other materials provided with the distribution.
Livingston Enterprises, Inc. 6920 Koll Center Parkway Pleasanton, CA * 3. All advertising materials mentioning features or use of this software
94566 * must display the following acknowledgement:
* This product includes software developed by the University of
Permission to use, copy, modify, and distribute this software for any California,
purpose and without fee is hereby granted, provided that this copyright * Berkeley and its contributors.
and permission notice appear on all copies and supporting documentation, * 4. Neither the name of the University nor the names of its contributors
the name of Livingston Enterprises, Inc. not be used in advertising or may
publicity pertaining to distribution of the program without specific prior * be used to endorse or promote products derived from this software
permission, and notice be given in supporting documentation that copying * without specific prior written permission.
and distribution is by permission of Livingston Enterprises, Inc. *
* THIS SOFTWARE IS PROVIDED BY THE REGENTS AND
Livingston Enterprises, Inc. makes no representations about the * CONTRIBUTORS ``AS IS'' AND ANY EXPRESS OR IMPLIED
suitability of this software for any purpose. It is provided "as is" * WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED
without express or implied warranty. * WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A
------------------------------------------------------------------------ * PARTICULAR PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE
------ * REGENTS OR CONTRIBUTORS BE LIABLE FOR ANY DIRECT,
Modifications:
Version: 2.1.8.7-current
Copyright 1998-2001 by Rob Braun
Sensor Addition
Version: 2.1.8.9pre14a
E-18 Sun SPARC Enterprise M3000/M4000/M5000/M8000/M9000 Servers XSCF User’s Guide • August 2009
Index
Index-1
CPU operational modes, 2-129 XSCF web, 9-28
cpumode, 2-130 Event log, B-7
cpumode,auto, 2-130 Extended MIB, C-3
cpumode,compatible, 2-130
Creating a web server certificate by constructing the F
self CA, 2-66 Failover, 1-2, 3-17
D H
Daylight saving time, 2-47 Hardware diagnostic level
DCL information, 2-99 changing, 2-131
displaying or specifying, 2-111 Host watchdog function
Deleting a system board from a domain, 2-117 enabling or disabling, 2-132
Displaying or specifying DCL information, 2-111 HTTPS administration, 2-59
Displaying the audit logs, 2-73
Displaying the XSB status, 2-111 I
Dividing a PSB into XSBs, 2-123 Importing a web server certificate by using the
external CA or CA in intranet, 2-63
Domain
assigning or configuring, 2-113 Installing and Uninstalling an ssh user public
control and maintenance, 5-14 key, 2-58
deleting system board, 2-117
moving system board, 2-119 L
Domain configuration, 2-94 LDAP, 2-39
Domain configuration procedure, 2-108 Locale
setting, 2-136
Domain console
and XSCF shell, 3-11 Locale Administration, 2-136
Domain mode configuration, 2-125 Log
audit, B-10
Domain Time
confirm the audit trail, B-10
setting to XSCF time, 2-51
console, B-9
Dual power feed, 4-23
event, B-7
DVD drive/tape drive unit administration, 2-138 humidity, B-8
ipl, B-10
E panic, B-9
Enabling or disabling power, B-5
XSCF network, 2-22 reference, B-7
Enabling or disabling audit, 2-71 reference power logs, B-5
Enabling or disabling ssh/telnet, 2-55 temperature, B-8
Enabling or disabling the automatic boot using the fmdump (8) command to confirm a
function, 2-133 fault, B-4
using the showlogs (8) command to confirm a
Enabling or disabling the Host watchdog function
fault, B-2
and the Break signal suppression, 2-132
XSCF error log, B-1
Enabling or disabling the log archiving, 2-76
Log archiving
Enabling or disabling the mail report function, 2-93 enabling or disabling, 2-76
Enabling/Disabling the SNMP agent, 2-82 Log archiving administration, 2-74
Enabling/disabling the SNMPv1 and v2c, 2-86 Login to XSCF, 2-3, 5-7, 9-7
Error messages
Index-2 SPARC Enterprise Mx000 Servers XSCF User’s Guide • August 2009
M S
Mail administration, 2-91 Security administration, 2-39
Mail report function Security commands, 5-17
enabling or disabling, 2-93 Server
Making XSCF DNS settings, 2-28 configuration, 5-11, 5-13
Management information control, 5-11
USM, 2-88 information commands, 5-11, 5-13
VACM, 2-89 status, 5-11
Memory mirror mode, 2-122 troubleshooting, D-7
Message types, A-1 Server and domain power operations, 4-11
Messages setdomainmode(8), 2-130
in functions, A-3 Setting altitude, 2-137
information, A-1 Setting locale, 2-136
monitoring, A-2 Setting SNMPv3 trap, 2-84
types, A-1 Setting the Domain Time to the XSCF Time, 2-51
warning, A-1
Setting the memory mirror mode for a PSB, 2-124
MIB
Setting the SNMPv1 and v2c trap, 2-86
definition file, 7-3
Setting the XSCF time, 2-47
extended, C-3
object identifiers, C-1 Setting time and date, 2-43
standard, C-3 showlogs command, B-8
Monitoring message, A-2 SMTP server
Moving a system board from one domain to specifying, 2-92
another, 2-119 SNMP
enabling/disabling, 2-86
N SNMP Administration, 2-79
Network SNMP agent
configuration, 2-15 enabling/disabling, 2-82
NTP server SNMP TRAP, 7-5
configuring, 2-48 SNMP trap
setting, 2-86
P SNMPv3 trap
Parts fault notification, 6-5 setting, 2-84
Password policy SPARC64 VI Compatible Mode, 2-129
specifying, 2-37 SPARC64 VII Enhanced Mode, 2-130
Permitting or refusing ssh access to XSCF from a Specifying a Daylight Saving Time, 2-47
Domain via DSCP, 2-56 Specifying a host name for XSCF, 2-26
Power log, B-5 Specifying a password policy, 2-37
Power operations Specifying a time zone, 2-46
server and domain, 4-11 Specifying a user privilege, 2-36
prefer Specifying an ssh host key, 2-57
Specifying or Canceling prefer, 2-50
Specifying or Canceling prefer for NTP Server, 2-50
prtdiag (1M), 2-130
Specifying the audit policy, 2-72
PSB
Specifying the SMTP server, 2-92
dividing into XSBs, 2-123
setting memory mirror mode, 2-124 Specifying the timeout period of ssh/telnet, 2-58
Index-3
SSH displaying, 2-111
specifying host key, 2-57 XSB status information, 2-100
user public key, 2-58 XSCF
SSH access to XSCF from a domain active XSCF, 1-2, 2-15, 3-17, 4-27
permitting or refusing, 2-56 connecting terminals, 3-1
SSH/telnet connecting through ssh, 3-9
enabling or disabling, 2-55 connecting through the serial port, 3-6
specifying timeout period, 2-58 connection types, 3-12
SSH/telnet Administration, 2-53 DNS settings, 2-28
Stratum Value error log, B-1
changing in XSCF, 2-50 event logs, B-7
firmware update, 8-1
System Board Configuration, 2-122
fmdump(8) and faults, B-4
Front panel, 1-6, 1-7
T function messages, A-3
Test Mail, 6-6 log collection, 8-21
Time and date logging in, 9-7
setting, 2-43 login, 2-3, 5-7
Time zone network settings, 2-29
specifying, 2-46 other commands, 5-18
Traps, C-5 port and terminal types, 3-3
Troubleshooting Redundant XSCFs, 1-2
server, D-7 routing, 2-27
XSCF, D-1 SNMP agent, 7-1, 7-8
specifying a host name, 2-26
U standby XSCF, 1-2, 4-27
telnet connection, 3-10
Update the XSCF firmware, 8-1
terminal operating modes, 3-2
User Account
TRAP, 7-5
adding or deleting, 2-34
troubleshooting, D-1
User account administration
XSCF command shell, 5-1
Administration
XSCF commands, 5-2
user account, 2-31
XSCF logs
User management commands, 5-17
view and archive, 5-16
User privilege
XSCF mail
specifying, 2-36
overview, 6-1
USM management information, 2-88
setting up, 6-3
testing, 6-6
V XSCF network
VACM management information, 2-89 enabling or disabling, 2-22
XSCF shell
W and domain console, 3-11
Web server certificate error messages, 5-19
creating, 2-66 XSCF time
importing, 2-63 setting, 2-47
XSCF Web, 9-1
X
XSCF web
XSB status
Index-4 SPARC Enterprise Mx000 Servers XSCF User’s Guide • August 2009
error messages, 9-28
starting, 9-5
XSCF-LAN
firewall, 3-5
function, 3-5
port number, 3-5
serial connection, 3-16
Index-5
Index-6 SPARC Enterprise Mx000 Servers XSCF User’s Guide • August 2009