HP StorageWorks Enterprise File Services WAN Accelerator 2.
Legal and notice information © Copyright 2005 Hewlett-Packard Development Company, L.P. © Copyright 2003–2005 Riverbed Technology, Inc. Hewlett-Packard Company makes no warranty of any kind with regard to this material, including, but not limited to, the implied warranties of merchantability and fitness for a particular purpose. Hewlett-Packard shall not be liable for errors contained herein or for incidental or consequential damages in connection with the furnishing, performance, or use of this material.
Introduction CONTENTS Contents ........................................................................................................... 5 About This Guide............................................................................... Types of Users.............................................................................. Organization of This Guide ....................................................... Document Conventions ..............................................................
Checking Your Inventory ............................................................... 25 Preparing Your Site for Installation .............................................. 25 Required Tools and Equipment ..................................................... 26 Required Configuration Information............................................ 26 Mounting the HP EFS WAN Accelerator to a Rack.................... 27 HP ProLiant DL320-510, DL320-1010, and DL320-2010 Hardware ......................................
Two-Port Copper Gig-E Bypass Card .................................... 56 Two-Port Fiber Gig-E Bypass Card......................................... 57 EFS N4c WAN Accelerator 4-port NIC .................................. 57 Appendix B HP EFS WAN Accelerator Ports ................................................ 59 Commonly Optimized Ports .......................................................... 59 Interactive Ports Automatically Forwarded by the HP EFS WAN Accelerator ...................................
4 CONTENTS
In This Introduction INTRODUCTION Introduction Welcome to the HP StorageWorks Enterprise File Services WAN Accelerator Installation and Configuration Guide. Read this introduction for an overview of the information provided in this guide and for an understanding of the documentation conventions used throughout.
Organization of This Guide The HP StorageWorks Enterprise File Services WAN Accelerator Installation and Configuration Guide includes the following chapters: Chapter 1, “Overview of the HP EFS WAN Accelerator,” introduces the HP EFS WAN Accelerator. Chapter 2, “Installing and Configuring the HP EFS WAN Accelerator,” describes how to install and configure the HP EFS WAN Accelerator. Chapter 3, “Recovering from a Disaster,” describes how to use the Quick Restore CD.
Document Conventions This manual uses the following standard set of typographical conventions to introduce new terms, illustrate screen displays, describe command syntax, and so forth. Meaning italics Within text, new terms and emphasized words appear in italics.
Ethernet Network Compatibility The HP EFS WAN Accelerator supports the following types of Ethernet networks: Fast Ethernet IEEE 802.3u 100 BaseTX Gigabit Ethernet over Copper and Fiber IEEE 802.3ab 1000 Base-T The NIC1 (primary) port in the HP EFS WAN Accelerator is 10/100/1000 Mbps auto-sensing. In-path HP EFS WAN Accelerator appliance ports are Fast Ethernet, autosensing or Gigabit Ethernet (depending on your order).
Additional Resources This section describes the following resources that supplement the information in this guide: Online Documentation Release notes Related HP documentation Related technical reference books INTRODUCTION Related HP Documentation You can access the complete document set for the HP EFS WAN Accelerator from the documentation set CD-ROM: HP Enterprise File Services WAN Accelerator Management Console User Guide describes how to manage and administer an HP EFS WAN Accelerator
Related Reading To learn more about network administration, consult the following books: Microsoft Windows 2000 Server Administrator’s Companion by Charlie Russell and Sharon Crawford (Microsoft Press, January 2000) Common Internet File System (CIFS) Technical Reference by the Storage Networking Industry Association (Storage Networking Industry Association, 2002) TCP/IP Illustrated, Volume I, The Protocols by W. R.
Never push objects of any kind through openings in the equipment. Dangerous voltages can be present. Conductive foreign objects could produce a short circuit and cause fire, electric shock, or damage to your equipment. The HP ProLiant DL380-3010 and DL380-5010 can weigh up to 60 pounds (27.22 kg), and the HP ProLiant DL320-510, DL320-1010, and DL320-2010 can weigh up to 37 pounds (16.78 kg). Lift the HP EFS WAN Accelerator using both hands and with your knees bent.
Applicable error messages Operating system type and revision level Detailed, specific questions HP Storage Web Site The HP web site has the latest information on this product, as well as the latest drivers. Access the storage site at: http://www.hp.com/country/us/eng/ prodserv/storage.html. From this web site, select the appropriate product or solution.
In This Chapter Overview of the HP EFS WAN Accelerator This chapter provides an overview of the HP EFS WAN Accelerator. This chapter includes the following sections: “Overview of the HP EFS WAN Accelerator” next “New Features” on page 15 “Upgrading from Version 1.2 to Version 2.1” on page 17 Overview of the HP EFS WAN Accelerator The HP EFS WAN Accelerator uses Scalable Data Referencing (SDR) and Transaction Prediction (TP) to optimize throughput and save bandwidth in Wide Area Networks (WANs).
Bypass Mode Data Transfer. The HP EFS RCU efficiently transfers data from a client to a specified target directory on a server across the WAN. The HP EFS RCU eliminates extra round-trips caused by Common Internet File System (CIFS), reducing that amount of time it takes to transfer data across the WAN. Auto-discovery. Auto-discovery is the process by which the HP EFS WAN Accelerator automatically intercepts and optimizes traffic on all Internet Protocol (IP) addresses and ports.
If there is a serious problem with the HP EFS WAN Accelerator, it goes into bypass mode to prevent a single point of failure. If the HP EFS WAN Accelerator is in bypass mode, you are notified in the following ways: The Intercept/Bypass status light on the bypass interface is triggered. For detailed information about bypass card status lights, see Appendix A, “Status Lights, Technical Specifications, and Regulatory Information.
16 Serial Cascading. Serial Cascading enables multi-site deployments where server end-points are located at intermediate sites and connections between the client and the server pass through intermediate HP EFS WAN Accelerators to reach their final destination. HP EFS WAN Accelerators direct client-side auto-discovery packets to the correct endpoint. Port Labeling. You can assign a port label to a set of ports when you define configuration rules in the HP EFS WAN Accelerator.
Neural Framing. Neural Framing enables the HP EFS WAN Accelerator to select the optimal packet framing boundaries for SDR. SDR encoding provides the best optimization results when the largest buffer is available before a flush is performed. Optimization Policies. Setting an optimization policy allows you more flexibility in applying optimization techniques.
The following upgrade instructions assume that you have a network of 10 HP EFS WAN Accelerators. In this example, you upgrade part of your network, then upgrade the remaining HP EFS WAN Accelerators. To upgrade from 1.2 to 2.1 1. Connect to the Management Console on each HP EFS WAN Accelerator. 2. Install the 2.1 image in the Setup: Software Upgrade page. 3. Save the current configuration in the Setup: Configuration Manager page. 4. Reboot the HP EFS WAN Accelerator in the Setup: Reboot Appliance page. 5.
8. On HP EFS WAN Accelerator-3, at the system prompt, enter the following set of commands: (config) # sport peer version min (config) # sport peer version max (config) # sport peer version min (config) # sport peer version max (config) # write memory (config) # restart Run the 2.1 software for a period of time to ensure stability.
4. On HP EFS WAN Accelerator-4, at the system prompt, enter the following set of commands: SH4 SH4 SH4 6 SH4 6 SH4 6 SH4 6 SH4 6 SH4 6 SH4 SH4 (config) # sport peer 0.0.0.0 version min 5 (config) # sport peer 0.0.0.
6. On HP EFS WAN Accelerator-1, at the system prompt, enter the following set of commands: > enable # configure terminal (config) # no sport peer 0.0.0.0 version min (config) # no sport peer 0.0.0.
8. On HP EFS WAN Accelerator-3, at the system prompt, enter the following set of commands: SH3 SH3 SH3 SH3 SH3 min SH3 max SH3 min SH3 max SH3 min SH3 max SH3 SH3 > enable # configure terminal (config) # no sport peer 0.0.0.0 version min (config) # no sport peer 0.0.0.
In This Chapter Installing and Configuring the HP EFS WAN Accelerator This chapter describes how to install and configure the HP EFS WAN Accelerator.
Choosing a Network Deployment Before you begin the installation and configuration process, select a network deployment: Physical In-Path. In a physical in-path deployment, the HP EFS WAN Accelerator is physically in the direct path between clients and servers. The clients and servers continue to see client and server Internet Protocol (IP) addresses. Physical in-path configurations are suitable for any location where the total bandwidth is within the limits of the installed HP EFS WAN Accelerator.
Figure 2-3. Out-of-Path Deployment Servers LAN Switch HP EFS WAN Accelerator Router Router Switch HP EFS WAN Accelerator Checking Your Inventory Your shipping carton contains the following items: The HP EFS WAN Accelerator—the HP ProLiant DL320-510, DL320-1010, DL320-2010, DL380-3010, or DL380-5010 (depending on your order) One CAT-5E straight-through cable One CAT-5E crossover cable One RS-232 serial null modem cable One or two rack mount power cables (depending on your order).
A standard electronic environment where the ambient temperature is between 10º C and 35º C (50º F and 95º F) and the relative humidity is between 10% and 90% (non-condensing). For detailed information, see Appendix A, “Status Lights, Technical Specifications, and Regulatory Information.” Ethernet connections available within the standard Ethernet limit. Space on a two or four post 19-inch rack. A clean power source dedicated to computer devices and other electronic equipment.
NOTE: The HP EFS WAN Accelerator automatically negotiates duplex settings. If one end of the link is set to auto-negotiate and the other end of the link is not set to autonegotiate, the duplex settings default to half-duplex. This duplex mismatch passes traffic, but it causes late collisions and results in degraded optimization. To achieve maximum optimization set the devices to 100 or full. Mounting the HP EFS WAN Accelerator to a Rack Refer to the instructions that came with your rack kit.
Item Description 7 iLO management port 8 Serial connector 9 Mouse connector 10 Keyboard connector 11 Video connector 12 USB connectors HP ProLiant DL380-3010 and DL380-5010 Hardware Figure 2-5. HP ProLiant DL380-3010 and DL380-5010 Hardware 1 2 3 13 4 5 12 11 6 10 9 7 8 Table 0-2. HP ProLiant DL380-3010 and DL380-5010 Hardware Explanation Item Description 1 PCI-X expansion slot 3.
Description 12 Video connector 13 VHDCI SCSI connector (port 1) * x8 PCI Express cards are supported and will run at x4 speeds. NOTE: Each PCI-X expansion slot could contain one of the following bypass cards: Two-port Copper Gig-E bypass card Two-port Fiber Gig-E bypass card HP EFS N4c WAN Accelerator 4-port NIC Only one type of card is allowed in the system, and only one each of the twoport copper Gig-E bypass card and two-port fiber Gig-E bypass card is allowed in the system.
WARNING: Ensure that the HP EFS WAN Accelerator is properly grounded. See the HP ProLiant DL320 Generation 3 Server User Guide or the HP ProLiant DL380 Generation 4 Server Reference and Troubleshooting Guide for more information on grounding. To power on the HP ProLiant DL320-510, DL320-1010, and DL320-2010 1. Plug the AC power cord into the HP EFS WAN Accelerator (Figure 2-4 on page 27, item 3). 2. Plug the AC power cord into an uninterrupted AC power source . 3.
Connecting to the HP EFS WAN Accelerator To connect to the HP StorageWorks Enterprise File Services WAN Accelerator 1. Plug the serial cable into the Console port on the HP EFS WAN Accelerator. For the HP ProLiant DL320-510, DL320-1010, and DL320-2010, refer to refer to Figure 2-4 on page 27, item 8. For the HP ProLiant DL380-3010 and DL380-5010, refer to Figure 2-5 on page 28, item 4. TIP: You can also connect to the HP EFS WAN Accelerator using a cross-over cable.
For the HP ProLiant DL380-3010 and DL380-5010, refer to Figure 4-2 on page 55. NOTE: For Bypass card status lights, see “Bypass Card Status Lights” on page 56 After you have established connection, configure the HP EFS WAN Accelerator using the configuration wizard: For in-path configurations, see “Configuring In-Path HP EFS WAN Accelerators,” next For out-of-path configurations, see “Configuring Out-of-Path HP EFS WAN Accelerators” on page 39.
To configure the HP EFS WAN Accelerator 1. To start the configuration wizard, enter yes at the system prompt. For example: Configuration wizard. Do you want to use the wizard for initial configuration? yes 2. To configure the host name for the HP EFS WAN Accelerator, enter the host name at the system prompt. For example: Step 1: Hostname? minna 3.
9. To assign a new password to the administrator user (admin), type a password at the system prompt. For example: Step 8: Admin password? xxxyyy HP strongly recommends that you change the default password at this time. The password must be minimum of 6 characters. The default administrator password is password. 10. If you have already configured another HP EFS WAN Accelerator, you are given the option to copy your configuration settings to this appliance.
18. To set the in-path, LAN duplex speed, type a value at the system prompt. Make sure this value matches the settings on your router or switch. The default value is auto. For example: 19. To set the in-path, WAN interface speed, type a value at the system prompt. Make sure this value matches the settings on your router or switch. The default value is auto. For example: Step 18: Set the in-path:WAN interface speed? [auto] 100 20. To set the in-path, WAN duplex speed, type a value at the system prompt.
Connecting the HP EFS WAN Accelerator to Your Network To connect the HP EFS WAN Accelerator to your network You use CAT-5E straight-through and cross-over cables to connect to your network in an in-path configuration. Make sure you use the correct cables to establish your network connections: Straight-through cables. Use straight-through cables to connect the NIC1 (Primary) and LAN ports on the HP EFS WAN Accelerator to the LAN switch. Cross-over cable.
Verifying Your Connections 1. Verify that you can connect to the HP EFS WAN Accelerator CLI using one of the following devices: An ASCII terminal or emulator that can connect to the serial console. It must have the following settings: 9600 baud, 8 bits, no parity, 1 stop bit, vt100, and no flow control. A computer with a Secure Shell (ssh) client that is connected to the HP EFS WAN Accelerator NIC1 (Primary) port. 2. At the system prompt, enter the following command: ssh admin@host.
protocol://host.domain protocol is http or https. Hypertext Transport Protocol Secure (HTTPS) uses the Secure Sockets Layer (SSL) protocol to ensure a secure environment. If you use HTTPS, to connect you are prompted to inspect and verify the SSL key. host is the host name you assigned to the HP EFS WAN Accelerator during initial configuration. If your DNS server maps that IP address to a name, you can specify the DNS name. domain is the full domain name for the HP EFS WAN Accelerator.
Verifying Your Configuration Perform the following tasks to verify that you have properly configured the HP EFS WAN Accelerator. To verify your speed and duplex settings 1. In the Management Console, click Logging to display the Logging: View System Logs page. 2. Check for duplex and speed errors in the system logs (for example, crc and frame errors). 3. Click Reports to display the Reports: Bandwidth Optimization page. 4.
Configuring the Server-Side HP EFS WAN Accelerator To configure the server-side HP EFS WAN Accelerator Use the configuration wizard to configure an out-of-path HP EFS WAN Accelerator. In an out-of-path configuration, the client-side HP EFS WAN Accelerator is configured as an in-path device and the server-side HP EFS WAN Accelerator is configured as an out-of-path device. 1. To start the configuration wizard, enter yes at the system prompt. For example: Configuration wizard.
8. To configure the domain name for the system, enter the domain name at the system prompt. For example: Step 7: Domain name? mydomain.com 9. To assign a new password to the administrator user (admin), type a password at the system prompt. For example: Step 8: Admin password? xxxyyy HP strongly recommends that you change the default password at this time. The password must be minimum of 6 characters. The default administrator password is password. 10.
The system confirms your settings. You have entered the following information: 1. 2. 3. 4. 5. 6. 7. 8. 9. 10. 11. 12. 13: Hostname: minna Use DHCP: no Primary IP address: 10.0.0.74 Netmask: 255.255.0.0 Default gateway: 10.0.0.1 Primary DNS server: 10.0.0.2 Domain name: mydomain.
In an out-of-path configuration, you configure the client-side, HP EFS WAN Accelerator in the same way as an in-path configuration. For optimization to occur, you must define a fixed-target rule on the client-side HP EFS WAN Accelerator that points to the out-of-path, server-side HP EFS WAN Accelerator. You can define fixed-target rules using the Management Console or the CLI.
The IP address must be the Primary Port IP address on the target HP EFS WAN Accelerator. The default port is 7810. 6. If you have a backup, out-of-path, HP EFS WAN Accelerator in your system (that is, failover support), type the IP address and port for the backup appliance in the Backup IP and Port text boxes. Use the following format: 0.0.0.0/0. The default port is 7810. 7. Click Add Rule to apply the rule to the running configuration. 8.
You can disable SMB signing using one of the following approaches: “Enabling the Secure-CIFS Feature,” next “Disabling SMB Signing Using Active Directory” on page 46 Enabling the Secure-CIFS Feature The Secure-CIFS feature enables you to automatically disable SMB signing using a CLI command or the Management Console. By default, the Secure-CIFS feature is disabled.
To enable Secure-CIFS 1. Connect to the CLI. For detailed information, see the HP Enterprise File Services WAN Accelerator Command-Line Interface Reference Manual. 2. Enter configuration mode. At the system prompt enter the following set of commands: minna> enable minna # configure terminal minna (config) # 3. At the system prompt, enter the following command: minna (config)# protocol cifs secure-sig-opt enable IMPORTANT: Your changes only apply to new connections.
The following table lists the revised SMB registry parameters that ensure full optimization (that is, bandwidth and latency optimization) using the HP EFS WAN Accelerator.
To disable SMB signing on Windows 2003 Domain Controllers, member servers, and clients 1. Open Active Directory Users and Computers on the Domain Controller. 2. Right-click Domain Controllers and select Properties. 3. Click the Group Policy tab. 4. Click Default Domain Controllers Policy and select Edit. 5. Click Default Domain Controllers Policy/Computer Configuration/ Windows Settings/Security Settings/Local Policies/Security Options. 6.
CHAPTER 3 If the HP EFS WAN Accelerator sustains hardware failures, you can use the Quick Restore CD you received with your product to restore your appliance storage configuration and disk image to the original factory settings. This chapter explains the recovery procedure. NOTE: Cached data and configuration changes you made to the system are not recovered. Recovery Procedure 1. Insert the Quick Restore DVD in the HP EFS WAN Accelerator or HP EFS WAN Accelerator Manager DVD-ROM drive. 2.
50 3 RECOVERING FROM A DISASTER
In This Chapter 4 - REPLACING HP EFS WAN ACCELERATOR COMPONENTS CHAPTER 4 Replacing HP EFS WAN Accelerator Components The HP ProLiant DL320-510, DL320-1010, DL320-2010, DL380-3010, and DL380-5010 contain replaceable fans, disk drives, and power supply units.
52 4 - REPLACING HP EFS WAN ACCELERATOR COMPONENTS
Status Lights, Technical Specifications, and Regulatory Information In This Appendix This appendix explains the HP EFS WAN Accelerator and Bypass Card status lights. Technical specifications and regulatory information are contained in the documentation for your product.
Item Description Status 2 Internal health LED Green = System health is normal. Amber = System is degraded. To identify the component in a degraded state, refer to system board LEDs (on page 14). Red = System critical. To identify the component in a critical state, refer to system board LEDs (on page 14). Off = System health is normal (when in standby mode). 3 NIC 1 link/activity LED Green = Network link exists. Flashing green = Network link and activity exist. Off = No link to network exists.
Figure 4-2. HP ProLiant DL380-3010 and DL380-5010 Front Panel LEDs and Buttons Table 1-2. HP ProLiant DL380-3010 and DL380-5010: Front Panel LEDs and Buttons Explanation Item Description Status 1 Internal health LED Green = Normal Amber = System degraded. Refer to system board LEDs to identify component in degraded state. Red = System critical.
Bypass Card Status Lights The HP EFS WAN Accelerator is equipped with one of the following types of bypass interfaces (depending on your order): Two-Port Copper Gig-E Bypass Card Two-Port Copper Gig-E Bypass Card Two-Port Fiber Gig-E Bypass Card EFS N4c WAN Accelerator 4-port NIC The following section describes the Two-Port Copper Gigabit Ethernet (Gig-E) Bypass Card status lights. Figure 4-3.
The following section describes the Two-Port Fiber Gigabit Ethernet (Gig-E) bypass card status lights. L AN WAN and 104.11 21CFR 1040.10 product Complies with Class 1 laser Figure 4-4.
The status lights for each column are explained below: 58 Light Description Linkact (Link and Activity) Solid green indicates a physical Ethernet link is established. Flashing green indicates data transfer is occurring. 100 Solid green indicates the link is connected at 100 Mbps speed. 1000 Solid green indicates the link is connected at 1000 Mbps speed. 100 and 1000 When both lights are solid green, the card is in bypass mode.
In This Appendix HP EFS WAN Accelerator Ports This appendix describes the HP EFS WAN Accelerator default, secure, and interactive ports. It contains the following sections: “Default Ports,” next “Commonly Optimized Ports” on page 59 “Interactive Ports Automatically Forwarded by the HP EFS WAN Accelerator” on page 60 “Secure Ports Automatically Forwarded by the HP EFS WAN Accelerator” on page 61 Default Ports The HP EFS WAN Accelerator uses the following default ports.
Although these ports can vary according to your requirements, the following ports are commonly specified for in-path and out-of-path configurations: 80 135 139 445 7830 Interactive Ports Automatically Forwarded by the HP EFS WAN Accelerator A default in-path rule with the port label Interactive is automatically created in your system. This in-path rule automatically passes through traffic on interactive ports (for example, Telnet, TCP ECHO, remote logging, and shell).
Secure Ports Automatically Forwarded by the HP EFS WAN Accelerator For detailed information about how to disable this in-path rule in the Management Console, see the HP Enterprise File Services WAN Accelerator Management Console User Guide. The following table lists the common secure ports that are automatically forwarded by the HP EFS WAN Accelerator.
The following table contains the uncommon ports automatically forwarded by the HP EFS WAN Accelerator.
Port Description sdo-ssh 3897/tcp Simple Distributed Objects over SSH iss-mgmt-ssl 3995/tcp ISS Management Svcs SSL suucp 4031/tcp UUCP over SSL wsm-server-ssl 5007/tcp wsm server ssl sip-tls 5061/tcp SIP-TLS imqtunnels 7674/tcp iMQ SSL tunnel davsrcs 9802/tcp WebDAV Source TLS/SSL intrepid-ssl 11751/tcp Intrepid SSL rets-ssl 12109/tcp RETS over SSL HP STORAGEWORKS EFS WAN ACCELERATOR INSTALLATION AND CONFIGURATION GUIDE B - HP EFS WAN ACCELERATOR PORTS Type 63
64 B - HP EFS WAN ACCELERATOR PORTS
C - SOFTWARE LICENSES APPENDIX C Software Licenses In This Appendix This appendix lists the copyrights and licenses for the software used in the development of the HP EFS WAN Accelerator software. It also contains the copyright and license agreement for certain free libraries used in the development of the HP EFS WAN Accelerator software. Apache Copyright (c) 2000-2003 The Apache Software Foundation. All rights reserved.
Original Code Copyright (C) 1994, Jeff Hostetler, Spyglass, Inc. Portions of Content-MD5 code Copyright (C) 1993, 1994 by Carnegie Mellon University (see Copyright below). Portions of Content-MD5 code Copyright (C) 1991 Bell Communications Research, Inc. (Bellcore) (see Copyright below). Portions extracted from mpack, John G. Myers - jgm+@cmu.edu Content-MD5 Code contributed by Martin Hamilton (martin@net.lut.ac.uk) Portions (C) Copyright 1993,1994 by Carnegie Mellon University. All rights reserved.
Redistributions in binary form must reproduce the above copyright notice, this list of conditions and the following disclaimer in the documentation and/or other materials provided with the distribution. THIS SOFTWARE IS PROVIDED ``AS IS'' AND ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE ARE DISCLAIMED.
THIS SOFTWARE IS PROVIDED ``AS IS'' AND ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE ARE DISCLAIMED.
Libtecla Copyright (c) 2000, 2001 by Martin C. Shepherd. All rights reserved.
License is also granted to make and use derivative works provided that such works are identified as “derived from the RSA Data Security, Inc. MD5 Message-Digest Algorithm” in all material mentioning or referencing the derived work. RSA Data Security, Inc. makes no representations concerning either the merchantability of this software or the suitability of this software for any particular purpose. It is provided “as is” without express or implied warranty of any kind.
The name of the author may not be used to endorse or promote products derived from this software without specific prior written permission. OpenSSH Portions Copyright (c) 1995 Tatu Ylonen (ylo@cs.hut.fi), Espoo, Finland. All rights reserved. Portions Copyright (c) 1999 Niels Provos. All rights reserved. Portions Copyright (c) 2000, 2001, 2002 Markus Friedl. All rights reserved. Portions Copyright (c) 1995,1999 Theo de Raadt. All rights reserved. Portions Copyright (c) 1999 Dug Song. All rights reserved.
Redistributions in binary form must reproduce the above copyright notice, this list of conditions and the following disclaimer in the documentation and/or other materials provided with the distribution. The name of the author may not be used to endorse or promote products derived from this software without specific prior written permission.
Redistributions of source code must retain the above copyright notice, this list of conditions and the following disclaimer. The name of the author may not be used to endorse or promote products derived from this software without specific prior written permission. THIS SOFTWARE IS PROVIDED ``AS IS'' AND ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE ARE DISCLAIMED.
For example, if you distribute copies of such a program, whether gratis or for a fee, you must give the recipients all the rights that you have. You must make sure that they, too, receive or can get the source code. And you must show them these terms so they know their rights. We protect your rights with two steps: (1) copyright the software, and (2) offer you this license which gives you legal permission to copy, distribute and/or modify the software.
b) You must cause any work that you distribute or publish, that in whole or in part contains or is derived from the Program or any part thereof, to be licensed as a whole at no charge to all third parties under the terms of this License. These requirements apply to the modified work as a whole.
If distribution of executable or object code is made by offering access to copy from a designated place, then offering equivalent access to copy the source code from the same place counts as distribution of the source code, even though third parties are not compelled to copy the source along with the object code. 4. You may not copy, modify, sublicense, or distribute the Program except as expressly provided under this License.
9. The Free Software Foundation may publish revised and/or new versions of the General Public License from time to time. Such new versions will be similar in spirit to the present version, but may differ in detail to address new problems or concerns. 10. If you wish to incorporate parts of the Program into other free programs whose distribution conditions are different, write to the author to ask for permission.
[This is the first released version of the Lesser GPL. It also counts as the successor of the GNU Library Public License, version 2, hence the version number 2.1.] Preamble The licenses for most software are designed to take away your freedom to share and change it. By contrast, the GNU General Public Licenses are intended to guarantee your freedom to share and change free software--to make sure the software is free for all its users.
We call this license the “Lesser” General Public License because it does Less to protect the user's freedom than the ordinary General Public License. It also provides other free software developers Less of an advantage over competing non-free programs. These disadvantages are the reason we use the ordinary General Public License for many libraries. However, the Lesser license provides advantages in certain special circumstances.
Activities other than copying, distribution and modification are not covered by this License; they are outside its scope. The act of running a program using the Library is not restricted, and output from such a program is covered only if its contents constitute a work based on the Library (independent of the use of the Library in a tool for writing it). Whether that is true depends on what the Library does and what the program that uses the Library does. 1.
Once this change is made in a given copy, it is irreversible for that copy, so the ordinary GNU General Public License applies to all subsequent copies and derivative works made from that copy. This option is useful when you wish to copy part of the code of the Library into a program that is not a library. 4.
You must give prominent notice with each copy of the work that the Library is used in it and that the Library and its use are covered by this License. You must supply a copy of this License. If the work during execution displays copyright notices, you must include the copyright notice for the Library among them, as well as a reference directing the user to the copy of this License.
9. You are not required to accept this License, since you have not signed it. However, nothing else grants you permission to modify or distribute the Library or its derivative works. These actions are prohibited by law if you do not accept this License. Therefore, by modifying or distributing the Library (or any work based on the Library), you indicate your acceptance of this License to do so, and all its terms and conditions for copying, distributing or modifying the Library or works based on it. 10.
Each version is given a distinguishing version number. If the Library specifies a version number of this License which applies to it and “any later version”, you have the option of following the terms and conditions either of that version or of any later version published by the Free Software Foundation. If the Library does not specify a license version number, you may choose any version ever published by the Free Software Foundation. 14.
GLOSSARY Glossary ARP. Address Resolution Protocol. An IP protocol used to obtain a node's physical address. Bandwidth. The upper limit on the amount of data, typically in kilobits per second (kbps), that can pass through a network connection. Greater bandwidth indicates faster data transfer capability. Bit. A Binary digit. The smallest unit of information handled by a computer; either 1 or 0 in the binary number system. Blade.
FDDI. Fiber Distributed Data Interface. A set of American National Standards Institute (ANSI) protocols for sending digital data over fiber optic cable. FDDI networks are token-passing networks, and support data rates of up to 100 Mbps (100 million bits) per second. FDDI networks are typically used as backbones for Wide-Area Networks (WANs). Filer. An appliance that attaches to a computer network and is used for data storage. Gateway.
Interface. The point at which a connection is made between two elements, systems, or devices so that they can communicate with one another. Internet. The collection of networks tied together to provide a global network that use the TCP/IP suite of protocols. IP address. In IP version 4 (IPv4), a 32-bit address assigned to hosts using the IP protocol. Also called an Internet address. IPsec. Internet Protocol Security Protocol. A set of protocols to support secure exchange of packets at the IP layer.
NIS. Network Information Services. A naming service from that allows resources to be easily added, deleted or relocated. OSPF. Open Shortest Path First. An interior gateway routing protocol developed for IP networks based on the shortest path first or link-state algorithm. Routers use link-state algorithms to send routing information to all nodes in an internetwork by calculating the shortest path to each node based on a topography of the Internet constructed by each node.
A Authentication and encryption, overview of 17 Auto-discovery rules, overview of 14 Automatic data store synchronization, overview of 17 B Bypass card support, overview of 16 Bypass mode, overview of 14 C CIFS performance, overview of 16 Configuration, verifying 39 Connecting the power 29 Connecting to the EFS WAN Accelerator 31 Connecting to your network 36 Connection pooling, overview of 17 Connections, verifying 37 Contacting HP 11 D Data transfer, overview of 14 Default ports 59 Disaster recovery 49 E
Q Quick Restore CD 49 R Rack guidelines 11 Rack, mounting 27 Recovering from disaster 49 Related reading 10 Required configuration information 26 Restoring the system 49 S Safety guidelines 10 Scalable Data Referencing, overview of 13 Scheduling jobs, overview of 17 Secure ports, automatically forwarded 61 Serial cascading, overview of 16 Serial clustering, overview of 15 Server-side appliance, configuring 40 SNMP Enterprise MIB overview of 17 T Throughput performance statistics, overview of 17 Tools and eq