Abstract:
A method for secure boot includes, in a processor, retrieving from a memory device a firmware boot code for bootstrapping a firmware of the processor. The firmware boot code is authenticated using an authentication key. In response to failing to authenticate the firmware boot code using the authentication key, an attempt is made to authenticate a recovery firmware code, which has reduced functionality relative to the firmware boot code, using a recovery key. Upon successfully authenticating the recovery firmware code using the recovery key, the firmware boot code is restored from a host, the restored firmware boot code is authenticated by executing the recovery firmware code, and the firmware is bootstrapped using the authenticated firmware boot code.
Abstract:
A host computer is linked to a network interface controller having a plurality of network ports connectable to a data network. The network interface controller has an embedded central processing unit, a host interface linked to the host central processing unit, a sideband interface and a baseboard management controller linked to the network interface controller via the sideband interface. The baseboard management controller connects to a management network via the management network port. The embedded central processing unit in the network interface controller is linked to a datacenter manager via the management network port of the baseboard management controller, enabling the datacenter manager to instruct the embedded central processing unit to control data flows in the network interface controller between the host interface and the data network.
Abstract:
Computerized methods and systems are disclosed for configuring a network controller (NC). These methods and systems recognize, via a network device, e.g., hardware, software, processors, storage media, memory, a predetermined command from a management controller (MC). The network device responds to the predetermined command by configuring the NC with a message type associated with an event, and controlling enablement of a message associated with the message type using a selectable enable bit as defined in the predetermined command.
Abstract:
A network adapter includes one or more network ports, multiple bus interfaces, and a processor. The one or more network ports are configured to communicate with a communication network. The multiple bus interfaces are configured to communicate with multiple respective Central Processing Units (CPUs) that support a management protocol and belong to a multi-CPU device, and with a Baseboard Management Controller (BMC). The processor is configured to, in response to a request to enumerate the bus interfaces that support the management protocol, report support of the management protocol over only a single bus interface, selected from among the multiple bus interfaces connecting the network adapter to the multi-CPU device, and exchange management packets over the communication network between the BMC and a remote management computer, wherein the management packets manage the entire multi-CPU device but traverse only the single selected bus interface.
Abstract:
Peripheral apparatus for use with a host computer includes an add-on device, which includes a first network port coupled to one end of a packet communication link and add-on logic, which is configured to receive and transmit packets containing data over the packet communication link and to perform computational operations on the data. A network interface controller (NIC) includes a host bus interface, configured for connection to the host bus of the host computer and a second network port, coupled to the other end of the packet communication link. Packet processing logic in the NIC is coupled between the host bus interface and the second network port, and is configured to translate between the packets transmitted and received over the packet communication link and transactions executed on the host bus so as to provide access between the add-on device and the resources of the host computer.
Abstract:
A method for management of a host computer that includes a management controller configured to carry out, independently of the host CPU, host management instructions contained in management packets compliant with a first data link protocol. The method includes receiving the management packets from a first network operating in accordance with the first data link protocol. The management packets are encapsulated in data packets compliant with a second data link protocol, different from the first data link protocol. The data packets are transmitted to a second network, operating in accordance with the second data link protocol. The transmitted data packets are received from the second network in a network interface controller (NIC), which is installed in the host computer and connected to the second network. The NIC decapsulates the management packets from the received data packets and passes the decapsulated management packets via a sideband connection to the management controller.
Abstract:
A method in a network node that includes a network adapter, a Baseboard Management Controller (BMC) and a host, includes connecting to a switch in a communication network using first and second ports of the network adapter, as member ports of a Link Aggregation Group (LAG). Management and data packets are simultaneously exchanged over the communication network via the LAG member ports, so that the management packets are exchanged between the BMC and a control server, and the data packets between the host and a remote node.
Abstract:
A network adapter includes one or more ports and circuitry. The one or more ports are configured to connect to a communication network. The circuitry is coupled to a network node that includes multiple hosts, and is configured to exchange management packets between a control server and a Baseboard Management Controller (BMC) that runs at least first and second BMC instances that share a single MAC address and are associated respectively with first and second hosts, and to exchange, over the communication network via the one or more ports, data packets between the hosts and one or more remote nodes.
Abstract:
A method in a network node that includes a network adapter, a Baseboard Management Controller (BMC) and a host, includes connecting to a switch in a communication network using first and second ports of the network adapter, as member ports of a Link Aggregation Group (LAG). Management and data packets are simultaneously exchanged over the communication network via the LAG member ports, so that the management packets are exchanged between the BMC and a control server, and the data packets between the host and a remote node.
Abstract:
A computing device includes a non-volatile memory (NVM) interface and a processor. The NVM interface is to communicate with an NVM. The processor is to store in the NVM at least a Type-Length-Value (TLV) record including one or more encrypted fields and one or more non-encrypted fields, the non-encrypted fields including at least a validity indicator of the TLV record, to read the TLV record from the NVM, and to invalidate the TLV record by modifying the validity indicator stored in the non-encrypted fields, without decryption of any of the encrypted fields.