摘要:
Updates to components of an interface may be carried out from a program executed in an emulated environment. For example, an interface that provides communications for the program in the emulated environment to the host operating system may be updated from the program in the emulated environment. Centralizing updates through the program improves the likelihood that components, such as the interface, have compatible versions with the program executing in the emulated environment. Thus, as the program is updated other components are updated by the program.
摘要:
Systems and methods for establishing a ULAN or a subinterface on a computing system using a single configuration statement are disclosed. Embodiments may include modifying a configuration statement that configures a MC coupled to the computing system to include a new field which indicates if a VLAN should be created on the NIC port. Embodiments may also include receiving a configuration statement that includes the new field. Embodiments may further include creating a VLAN on an Ethernet computer network or a subinterface on an InfiniBand computer network based on the received configuration statement that includes the new field.
摘要:
A computer program product having a computer readable medium tangibly recording computer program logic for managing configurations in a computer system is disclosed. The computer program product includes code to configure network information in a first Operating System (OS) environment, code to pass the network information to a second OS environment, and code to effectuate the network information in the first and second OS environments without rebooting the first and second OS environments.
摘要:
Systems and methods for establishing a VLAN or a subinterface on a computing system using a single configuration statement are disclosed. Embodiments may include modifying a configuration statement that configures a NIC coupled to the computing system to include a new field which indicates if a VLAN should be created on the NIC port. Embodiments may also include receiving a configuration statement that includes the new field. Embodiments may further include creating a VLAN on an Ethernet computer network or a subinterface on an InfiniBand computer network based on the received configuration statement that includes the new field.
摘要:
An IPSec front-end may be configured to encrypt, decrypt and authenticate packets on behalf of a host on an insecure network and a peer on a secure network. For example, the IPSec front-end may receive internet protocol (IP) packets from the host and encrypt the data and format the data as an internet protocol security (IPsec) packet for transmission to the peer. When the peer responds with an IPSec packet, the IPSec front-end may decrypt the data and format the data as an IP packet. The IPSec front-end may be software executing on a Linux server.
摘要:
Data rates in secure data communications may be improved by executing helper applications to assist a computer system in responding to requests for secure data. The computation-intensive calculations may be offloaded to helper applications executing on different central processor units (CPUs). When the helper applications execute on different CPUs, higher data rates are achievable because additional CPU time is available for handling the encryption and decryption processing. A main application receives the initial request for secure data connections and assigns tasks related to the connections to the helper applications.
摘要:
Error information may be made quickly and easily accessible to an administrator by logging communications attempts in the operating system of a server. When the interface processor resides outside of the operating system, the interface processor may provide indications to the operating system of communications attempts. Specifically, the interface processor may provide message packets to the pass-through communications processor of the operating system when SSL/TLS communications attempts fail to establish secure communications sessions. The message packets may include information useful for diagnosing errors in SSL/TLS communication failures such as errors in the creation and management of certificates, certificate trust, private and public keys, and/or cipher suites. The communications logs in the operating system may be reviewed and/or analyzed by an administrator with a log trace analysis application.