Advanced Secure Gateway Proxy Admin
Advanced Secure Gateway Proxy Admin
6.6.x
i
Advanced Secure Gateway 6.6.x Proxy Administration Guide
Contact Information
Americas:
Blue Coat Systems Inc.
384 Santa Trinita Avenue
Sunnyvale, CA 94085
http://www.bluecoat.com/contact/customer-support
http://www.bluecoat.com
For concerns or feedback about the documentation:
[email protected]
ii
© 2016 Blue Coat Systems, Inc. All rights reserved. BLUE COAT, PROXYSG, PACKETSHAPER, CACHEFLOW,
INTELLIGENCECENTER, CACHEOS, CACHEPULSE, CROSSBEAM, K9, DRTR, MACH5, PACKETWISE, POLICYCENTER,
PROXYAV, PROXYCLIENT, SGOS, WEBPULSE, SOLERA NETWORKS, DEEPSEE, DS APPLIANCE, SEE EVERYTHING. KNOW
EVERYTHING., SECURITY EMPOWERS BUSINESS, BLUETOUCH, the Blue Coat shield, K9, and Solera Networks logos and other
Blue Coat logos are registered trademarks or trademarks of Blue Coat Systems, Inc. or its affiliates in the U.S. and certain other
countries. This list may not be complete, and the absence of a trademark from this list does not mean it is not a trademark of Blue
Coat or that Blue Coat has stopped using the trademark. All other trademarks mentioned in this document owned by third parties
are the property of their respective owners. This document is for informational purposes only.
BLUE COAT MAKES NO WARRANTIES, EXPRESS, IMPLIED, OR STATUTORY, AS TO THE INFORMATION IN THIS
DOCUMENT. BLUE COAT PRODUCTS, TECHNICAL SERVICES, AND ANY OTHER TECHNICAL DATA REFERENCED IN THIS
DOCUMENT ARE SUBJECT TO U.S. EXPORT CONTROL AND SANCTIONS LAWS, REGULATIONS AND REQUIREMENTS,
AND MAY BE SUBJECT TO EXPORT OR IMPORT REGULATIONS IN OTHER COUNTRIES. YOU AGREE TO COMPLY STRICTLY
WITH THESE LAWS, REGULATIONS AND REQUIREMENTS, AND ACKNOWLEDGE THAT YOU HAVE THE RESPONSIBILITY
TO OBTAIN ANY LICENSES, PERMITS OR OTHER APPROVALS THAT MAY BE REQUIRED IN ORDER TO EXPORT,
RE-EXPORT, TRANSFER IN COUNTRY OR IMPORT AFTER DELIVERY TO YOU.
iii
Advanced Secure Gateway 6.6.x Proxy Administration Guide
iv
Contents
Chapter 1: Introduction
Document Conventions ................................................................................................................... 22
Notes and Warnings......................................................................................................................... 23
About Procedures ............................................................................................................................. 24
Chapter 3: Licensing
License Types.............................................................................................................................. 57
Licensing Terms ......................................................................................................................... 57
License Expiration...................................................................................................................... 58
Locating the System Serial Number ........................................................................................ 59
MACH5 or Secure Web Gateway Obtaining a BlueTouch Online Account .................... 59
Registering and Licensing Blue Coat Appliance and Software........................................... 60
Installing a License on a Registered System........................................................................... 60
Manually Installing the License ............................................................................................... 61
Enabling Automatic License Updates ........................................................................................... 64
Viewing the Current License Status............................................................................................... 65
1
Chapter 5: Backing Up the Configuration
Archiving Quick Reference Table .................................................................................................. 81
Creating a Transferable Archive..................................................................................................... 91
Creating and Uploading an Archive to a Remote Server ......................................................... 101
2
Specifying an Issuer Keyring and CCL Lists for SSL Interception ................................... 234
Using Client Consent Certificates.......................................................................................... 234
Downloading an Issuer Certificate ........................................................................................ 235
Warn Users When Accessing Websites with Untrusted Certificates ...................................... 238
Presenting Untrusted Certificates to a Browser .................................................................. 238
Set the Behavior when Encountering Untrusted Certificates ............................................ 238
Viewing SSL History Statistics...................................................................................................... 245
Unintercepted SSL Data .......................................................................................................... 245
Unintercepted SSL Clients ...................................................................................................... 246
Unintercepted SSL Bytes ......................................................................................................... 246
Configuring STunnel...................................................................................................................... 248
Viewing STunnel Results............................................................................................................... 250
Application Mix........................................................................................................................ 252
Viewing Session Statistics ....................................................................................................... 252
Viewing Protocol Details ........................................................................................................ 253
Access Logging......................................................................................................................... 253
Viewing Encrypted Tap Results ............................................................................................ 256
Working with the SafeNet Java HSM .......................................................................................... 257
Before You Begin ...................................................................................................................... 257
Add an HSM ............................................................................................................................. 258
Add an HSM Keyring.............................................................................................................. 258
Add an HSM Keygroup .......................................................................................................... 259
Write HSM Policy ........................................................................................................................... 260
3
Chapter 12: Managing the Domain Name Service (DNS) Proxy
Chapter 16: Using the Advanced Secure Gateway Appliance in an IPv6 Environment
Using the Advanced Secure Gateway Appliance in an ISATAP Network............................ 327
IPv6 Support on the Advanced Secure Gateway....................................................................... 330
Configuring an ADN for an IPv6 Environment......................................................................... 340
Optimizing ISATAP Traffic........................................................................................................... 341
Configuring IPv6 Global Settings................................................................................................. 342
4
Considerations Before Configuring WebPulse Services..................................................... 367
Enabling a Content Filter Provider .............................................................................................. 373
Specifying a Blue Coat Data Source ...................................................................................... 374
Downloading the Content Filter Database ................................................................................. 375
About Database Updates ........................................................................................................ 375
Downloading a Content Filter Database .............................................................................. 376
Viewing the Status of a Database Download....................................................................... 377
Expiry Date for the Database.................................................................................................. 378
Viewing the Available Categories or Testing the Category for a URL ............................ 378
Testing the Application and Operation for a URL.............................................................. 378
Disabling Dynamic Categorization ....................................................................................... 380
Specifying a Custom Time Period to Update Blue Coat WebFilter.................................. 381
Configuring Dynamic Categorization Requests for HTTP/HTTPS (CLI only).............. 385
Verify Subscribed Bundles...................................................................................................... 387
Configure Intelligence Services.............................................................................................. 387
Download a New Version of the Database .......................................................................... 388
Monitor Content Filter Health Status.................................................................................... 388
Troubleshoot Health Monitoring Errors............................................................................... 389
Enable Application Classification.......................................................................................... 391
Review Applications and Operations ................................................................................... 392
Download a New Version of the Application Classification Database ........................... 394
Review Application Attributes .............................................................................................. 394
Monitor Application Classification and Application Attributes Health Status.............. 398
Local Database Matching Example ....................................................................................... 400
Selecting and Downloading the Local Database........................................................................ 402
Setting the YouTube Server Key ............................................................................................ 406
Distinguishing Blue Coat Categories for YouTube in the Access Log ............................. 406
Scenario: Limit a User’s Daily Access to YouTube Videos ................................................ 407
Scenario: Limit a User’s Weekly Data Usage ....................................................................... 408
View Quota Statistics............................................................................................................... 408
Reset Usage Quotas ................................................................................................................. 409
Policy Examples Using the Application Control Objects................................................... 423
5
Configure Threat Risk Levels ....................................................................................................... 441
Requirements for Using Threat Risk Levels......................................................................... 441
Enable Threat Risk Levels....................................................................................................... 442
Write Threat Risk Policy ......................................................................................................... 443
Use Threat Risk Features ............................................................................................................... 446
Look up Threat Risks for a Web Page ................................................................................... 446
Download a New Version of the Database .......................................................................... 446
Monitor Threat Risk Statistics ................................................................................................ 447
Monitor Threat Risk Health Status ........................................................................................ 448
Troubleshoot Threat Risk Levels ........................................................................................... 449
6
Apple HLS Authentication ..................................................................................................... 556
Configuring the HTTP Streaming Proxy..................................................................................... 558
Configuring the Windows Media, Real Media, and QuickTime Proxies............................... 562
Limiting Bandwidth ....................................................................................................................... 565
"Viewing Streaming History Statistics" on page 571Configuring Bandwidth
Limitation—Fast Start (WM)............................................................................................ 565
Limiting Bandwidth for Smooth Streaming......................................................................... 566
Configuring the Multicast Network ............................................................................................ 567
Legacy Streaming Log Format ............................................................................................... 568
Reporter Streaming Log Format ............................................................................................ 569
Viewing Streaming History Statistics .......................................................................................... 571
Viewing Current and Total Streaming Data Statistics........................................................ 571
Configuring the Flash Streaming Proxy...................................................................................... 595
Configuring Client Browsers for Explicit Proxy.................................................................. 595
Intercepting the RTMP Service (Transparent Deployment) .............................................. 596
Intercepting the Explicit HTTP Service (Explicit Deployment) ........................................ 596
When VOD Content Gets Cached ......................................................................................... 599
Proxy Chaining......................................................................................................................... 599
CDN Interoperability Support ............................................................................................... 600
7
Chapter 28: Creating and Editing an Access Log Facility
Creating a Log Facility ................................................................................................................... 654
Editing an Existing Log Facility.................................................................................................... 656
Associating a Log Facility with a Protocol.................................................................................. 658
Configuring Global Settings.......................................................................................................... 660
8
Viewing WCCP Statistics and Service Group Status................................................................. 794
9
Chapter 41: TCP Connection Forwarding
Configuring TCP Connection Forwarding ................................................................................. 876
Copying Peers to Another Advanced Secure Gateway in the Cluster............................. 877
Removing a Peer....................................................................................................................... 877
10
Chapter 48: Certificate Realm Authentication
Configuring Certificate Realms .................................................................................................... 985
Creating a Certificate Realm................................................................................................... 985
Configuring Certificate Realm Properties ............................................................................ 985
Defining General Certificate Realm Properties ................................................................... 988
Specifying an Authorization Realm............................................................................................. 990
11
Chapter 51: Integrating the Appliance with Your Windows Domain
Integrate the Advanced Secure Gateway Appliance into the Windows Domain............... 1040
Join the Advanced Secure Gateway Appliance to the Windows Domain..................... 1041
Edit a Windows Domain....................................................................................................... 1042
Configure SNMP Traps for the Windows Domain ................................................................. 1044
Chapter 52: Integrating Advanced Secure Gateway Authentication with Active Directory Using IWA
About IWA Challenge Protocols.......................................................................................... 1046
About IWA Failover .............................................................................................................. 1046
Preparing for a Kerberos Deployment ...................................................................................... 1048
Enabling Kerberos in an IWA Direct Deployment............................................................ 1048
Enabling Kerberos in a BCAAA Deployment.................................................................... 1049
Configuring IWA on the Advanced Secure Gateway Appliance.......................................... 1050
Creating an IWA Realm ........................................................................................................ 1050
Configuring IWA Servers ..................................................................................................... 1052
Defining IWA Realm General Properties ........................................................................... 1057
Creating the IWA Authentication and Authorization Policies.............................................. 1059
Creating an IWA Authentication Policy ............................................................................. 1060
Creating a Guest Authentication Policy ............................................................................. 1062
Creating an IWA Authorization Policy .............................................................................. 1063
Configuring Client Systems for Single Sign-On....................................................................... 1065
Configure Internet Explorer for Single Sign-On................................................................ 1065
Configure Firefox for Single Sign-On.................................................................................. 1066
Using IWA Direct in an Explicit Kerberos Load Balancing/Failover Scenario................... 1066
12
Querying the LDAP Novell SSO Search Realm ....................................................................... 1105
Configuring Authorization ......................................................................................................... 1106
Defining Novell SSO Realm General Properties...................................................................... 1107
13
Configuring Download of CCL Updates from Blue Coat................................................ 1193
Managing Cached Intermediate Certificates ............................................................................ 1196
Turn off Intermediate Certificate Caching ......................................................................... 1196
View Cached Intermediate Certificates .............................................................................. 1196
Clear Cached Intermediate Certificates .............................................................................. 1198
Creating and Configuring an OCSP Responder ...................................................................... 1204
14
Chapter 67: Software and Hardware Bridges
Configuring a Software Bridge ................................................................................................... 1312
15
Thresholds and Notifications for Licensing Metrics......................................................... 1399
Notifications for Status Metrics............................................................................................ 1401
Thresholds and Notifications for Subscription Metrics.................................................... 1403
Quick Reference: Default Threshold Values and States ................................................... 1404
Changing Threshold and Notification Settings ................................................................. 1406
Viewing Health Monitoring Statistics................................................................................. 1408
Chapter 72: Verifying the Health of Services Configured on the Advanced Secure Gateway
Background DNS Resolution ...................................................................................................... 1414
Health Check Tests ....................................................................................................................... 1417
Changing Health Check Default Settings ................................................................................. 1425
Configuring Health Check Notifications .................................................................................. 1429
About Health Check Statistics .................................................................................................... 1453
16
Chapter 1: Introduction
This audience for this document is network administrators who are responsible
for managing Blue Coat® Advanced Secure Gateway® appliances. This
document provides reference information and procedures to configure
Advanced Secure Gateway.
The information in this document supersedes information in the appliance’s
Management Console online help.
Supporting Documentation
Supporting documentation for Advanced Secure Gatewayis available on
BlueTouch Online (BTO):
https://bto.bluecoat.com/documentation/All-Documents/
Note: Release Notes are available on BTO on the Downloads page. Log in to BTO
with your username and password to access the release image and release
notes.
21
Advanced Secure Gateway Administration Guide
Conventions Definition
22
Section 2 Notes and Warnings
The following is provided for your information and to caution you against actions
that can result in data loss or personal injury:
23
Advanced Secure Gateway Administration Guide
Blue Coat assumes that you are logged into the first page of the Management
Console or entered into configuration mode in the CLI.
In most cases, procedures in this guide tell you how to perform a task in the
Management Console, even if there is a CLI equivalent.
24
Chapter 2: Accessing the Appliance
This section provides procedures for accessing the Advanced Secure Gateway
so that you can perform administrative tasks using the Management Console
and/or the command-line interface. It assumes that you have performed the
first-time setup using the Serial Console or the front panel and that you have
minimally specified an IP address, IP subnet mask, IP gateway, and DNS
server, and that you have tested the appliance and know that it is up and
running on the network. If you have not yet done this, refer to the hardware
guides for your appliance model.
This section includes the following topics:
❐ "Accessing the Advanced Secure Gateway Appliance Using the
Management Console" on page 26
❐ "Accessing the Advanced Secure Gateway Using the CLI" on page 41
❐ "Configuring Basic Settings" on page 43
25
Advanced Secure Gateway Administration Guide
Note: When you access the Management Console home page, if you see a host
mismatch or an invalid certificate message, you must recreate the security
certificate used by the HTTPS-Console. For information on changing the security
certificate, see "Managing the HTTPS Console (Secure Console)" on page 1326.
26
Table 2–1 Ways to Access the Management Console
You want to run the Your deployment must have all of the See "Load the
Management Console following: Management Console
directly in a browser. • Any Advanced Secure Gateway version. Directly in a Browser" on
• A browser with NPAPI support. page 27.
• Browsers enabled with the minimum
supported version of Java to run the
Management Console.
You require an alternative Your deployment must have workstations with See "Run the
to running the the minimum supported version of Java to run Management Console
Management Console the Management Console (browsers need not using Java Web Start" on
directly in a browser be Java-enabled), and at least one of the page 28.
because: following:
• You know that the • Advanced Secure Gateway 6.6.5.x and
browser does not later and a browser without NPAPI
support NPAPI. support.
• Your browser is not • Any Advanced Secure Gateway version
configured to run and any browser version, provided you can
Java or JavaScript. access the Internet or can host the Launcher
applet internally.
You want to launch Your deployment has all of the following: See "Launch Multiple
multiple appliances. • Any browser version. Management Consoles"
• Workstations with the minimum supported on page 30.
version of Java to run Java Web Start;
browsers need not be Java-enabled.
• Access to the Internet.
Note: (Version 6.6.5.x and later) If the browser does not load the content
immediately, you can use Java Web Start instead (as described in "Run the
Management Console using Java Web Start" on page 28). A “Click here if your
browser does not support embedded applets” link appears at the bottom of the
Management Console; if you click the link, you are prompted to open or save a
Java Network Launch Protocol (JNLP) file. Otherwise, refresh the browser or wait
for the console to load the legacy Management Console.
27
Advanced Secure Gateway Administration Guide
2. Enter the user name and password that you created during initial
configuration. Upon successful login, the browser displays the Proxy tab of
the Advanced Secure Gateway Management Console.
Note: The event log records all successful and failed login attempts.
28
2. In the browser’s address bar, enter https://appliance_IP_address:port
The default management port is 8082.
For example, if the IP address configured during initial configuration is
192.168.0.6, type https://192.168.0.6:8082 in the address bar.
The browser prompts you to enter your user name and password.
3. Enter the user name and password that you created during initial
configuration.
The browser displays a message stating that NPAPI is not supported.
4. In the message, click the link to download the JNLP file (mc.jnlp).
Alternatively, in the Management Console footer, click the “Click here if your
browser does not support embedded applets” link to download the file.
If you have already downloaded the JNLP file, you can run it instead of
downloading a copy; go to step 5.
Save the file to a convenient location on disk. To avoid downloading copies of
the JNLP file, note the location for future use.
29
Advanced Secure Gateway Administration Guide
5. Open the JNLP file. When prompted, enter your user name and password
again.
Note: The event log records all successful and failed login attempts.
Note: If none of the appliances in your deployment run version 6.6.5.x or later,
you must have access to the internet to download the launcher.JNLP file from
BTO.
30
4. Run the JNLP file. The Management Console Launcher opens.
Figure 2–2 Management Console Launcher - Main dialog
31
Advanced Secure Gateway Administration Guide
Note: If you ran Launcher using the Launcher link in the Management
Console banner, the IP address and port fields are pre-populated with the
appliance’s console IP address and port.
a. Select the protocol (HTTP or HTTPS) and type the IP address in the
field.
b. In the Port field, type the port number of the appliance’s Management
Console.
c. (Recommended) In the Description field, enter a description for the
appliance to help identify it.
d. Click Add as New. The appliance you added appears in the list of
devices.
e. (Recommended) Test connectivity to the appliance you added. Select
the appliance in the list and click Test.
If the test is successful, a green checkmark appears beside the Test button.
If the test is unsuccessful, a red “X” appears beside the Test button. Check
the settings you entered and modify them if needed (see "Modify a
Device’s Properties" on page 33). Then, test the connection again.
32
3. To remove an appliance, select it in the list and click Delete. The appliance is
deleted from the list.
4. Click Done. Return to Launcher. The dialog displays the updated list of devices.
Note: You can also add appliances from the main Launcher dialog. The steps are
similar to the ones outlined previously.
Note: Deleting installed applications and applets in the Java Control Panel
removes the list of appliances from Launcher; thus, to prevent inadvertent
deletion, export the list periodically or when you make significant changes to
it.
33
Advanced Secure Gateway Administration Guide
Import/export devices:
1. On the Launcher dialog, click the Manage Devices link. The dialog displays a
“Device Connection Manager” list.
2. To import a list of devices:
a. Click the Import link at the top right of the dialog. See Figure 2–3 on
page 31.
b. In the dialog that opens, browse to the location of the CSV file to
import and select the file.
c. Specify what to do if devices already exist in the Launcher list:
• - This is selected by default. If devices exist in
Merge with current list
Launcher already, they are combined with the list of devices you
import.
• Replace the current list - If devices exist in Launcher already, the list of
devices you import replaces the existing list.
d. Click Done. Return to Launcher. The list of devices is imported.
3. To export the list of devices:
a. Click the Export link at the top right of the dialog. See Figure 2–3 on
page 31.
b. In the dialog that opens, browse to the location where you want to
save the CSV file. Enter a name for the file and save it.
4. Click Done. Return to Launcher. The list of devices is exported.
34
About the Management Console Banner
After you log in to the Advanced Secure Gateway appliance, the Management
Console displays a banner at the top of the page.
This guide covers the functions of the Advanced Secure Gateway Proxy tab.
The Proxy Management Console banner provides the following information:
❐ Appliance identification— the appliance name, hardware serial number, and
the software version.
❐ Appliance health status— Visible when the Proxy tab is selected. The health
state is represented by a text box and a color that corresponds to the health of
the system (OK-green, Warning- yellow or Critical -red). The system health
changes when one or more of the health metrics reaches a specified threshold
or returns to normal. The health state indicator is polled and updated every 10
seconds on the Advanced Secure Gateway.
To obtain more information about the health state, click the Health: status link
— OK, Warning, Critical. The Statistics > Health page displays; it lists the
current condition of the system’s health monitoring metrics. See "Verifying the
Health of Services Configured on the Advanced Secure Gateway" on page
1411 for more information about the health monitoring metrics.
❐ License status and version— Your Advanced Secure Gateway license includes
all the component licenses for the Proxy and Content Analysis features that
you have purchased. To view a list of the license components and their
expiration date, go to the Maintenance > Licensing > View tab.
❐ Blue Coat product documentation and customer support links. You must have
a Blue Touch Online account to access documentation and to request support.
To log out of the Management Console, click the Log Out link.
❐ Proxy and Content Analysis tabs. Advanced Secure Gateway appliances
include both a module and a Content Analysis module. Use the tabs to switch
from one to the next. For information on configuring ICAP services to use the
internal Content Anlaysis service, see Chapter 22: "Malicious Content
Scanning Services" or the help icon (?) in the Content Anlaysis module.
35
Advanced Secure Gateway Administration Guide
performance of traffic within your network using its optimization, policy control,
and caching techniques. The Summary page visually demonstrates the overall
performance and efficiency of your network.
If you have just completed initial setup and have not configured the Advanced
Secure Gateway to intercept any traffic, the Summary page will not display much
information. For example, you cannot view bandwidth efficiency for traffic being
intercepted by the Advanced Secure Gateway.
❐ Service: A service represents the type of traffic that is being intercepted; the top
5 services are ranked in descending order of bytes saved.
❐ Bytes Saved Last Hour:Bytes saved display bandwidth savings in the last 60
minutes. It represents data that did not traverse the WAN because of object
and byte caching, protocol optimization, and compression. It is calculated as:
Client Bytes - Server Bytes,
where Client Bytes is the data rate calculated to and from the client on the
client-side connection, and Server Bytes is the data rate calculated to and
from the server on the server-side connection.
36
❐ Percent Savings: A percentage value of bytes saved, calculated as:
{(Client Bytes - Server Bytes)/ Client Bytes} * 100
In the Savings panel shown above, the Percent Savings for FTP is 50% and
bandwidth savings is 2x, which is calculated as Client Bytes/Server Bytes.
Note: The graph in the percent savings column represents savings over the
last hour, while the label reflects the percent savings in the last minute. For
more information on bandwidth savings, click on any row and navigate to the
Statistics > Traffic History page. By default, the traffic history page displays
bandwidth usage and bandwidth gain statistics for the corresponding service
over the last hour.
The Interface Utilization panel displays statistics on interface use, reveals network
performance issues, if any, and helps determine the need to expand your network.
❐ Interface:
The interfaces are labeled with an adapter number followed by an
interface number. For example, on 2-port bridge cards, the interface number is
0 for WAN and 1 for LAN connections; 4-port bridge cards have 0 and 2 for
WAN and 1 and 3 for LAN.
❐ Link state:
Indicates whether the interface is in use and functioning. It also
displays the duplex settings and includes the following information:
• Up or Down: Up indicates that the link is enabled and can receive and
transmit traffic. Down indicates that the link is disabled and cannot pass
traffic.
• Auto or Manual: Indicates whether the link is auto-negotiated or manually
set
• 10Mbps, 100 Mbps or 1Gbps: Displays the capacity of the link.
• FDX or HDX: Indicates whether the interface uses full duplex or half duplex
connection, respectively. In some cases, if a duplex mismatch occurs when
the interface is auto-negotiated and the connection is set to half-duplex,
the display icon changes to a yellow warning triangle. If you view a
duplex mismatch, you can adjust the interface settings in the Configuration
> Network > Adapters tab.
37
Advanced Secure Gateway Administration Guide
❐ Transmit Rate and Receive Rate: Displays number of bits processed per second,
on each interface.
The graphs in the transmit rate and receive rate columns represent interface
activity over the last hour, while the value in the label represents interface
activity over the last minute.
❐ Errors: Displays the number of transmission errors, if any, in the last hour.
Interfaces with input or output errors are displayed in red.
For more information on an interface, click on any row; the Statistics > Network >
Interface History page displays.
This information is also displayed on the Management Console banner and under
Configuration > General > Identification. To assign a name to your Advanced Secure
Gateway, see "Configuring the Advanced Secure Gateway Appliance Name" on
page 44.
38
The Statistics area displays the current percentages of CPU usage and memory
utilization, and the number of concurrent users. Concurrent users represents the
number of unique IP addresses that are being intercepted by the Advanced Secure
Gateway. For more information on these key resources, click the link; the
corresponding panel under Statistics > System > Resources displays.
❐ The Statistics panel also displays whether the Advanced Secure Gateway is
enabled to act as Client Manager for ProxyClient and Unified Agent users.
The status information displayed for the remote clients include the following
options:
The Connectivity area displays the status of external devices and services that the
Advanced Secure Gateway appliance relies on, for effective performance. The
status indicates whether the appliance is able to communicate with the external
devices and services that are configured on it.
The external devices or services, that can be configured on the Advanced Secure
Gateway, include:
❐ WCCP capable routers/switches
❐ External ICAP devices (such as Blue Coat ProxyAV or Content Analysis
appliances)
❐ DNS Servers
❐ Authentication realms
Only those external devices or services that are configured on the Advanced
Secure Gateway are displayed on this panel. If, for example, ICAP is not yet
enabled on the Advanced Secure Gateway, ICAP is not listed in the connectivity
panel.
The connectivity status for these external devices is represented with an icon —
Ok, Warning, or Critical. The icon and the text portray the most severe health
status, after considering all the health checks configured, for the device or service.
39
Advanced Secure Gateway Administration Guide
With the exception of WCCP, click on any row to view the health status details in
the Statistics > Health Checks tab. The Statistics > Health Checks tab provides
information on the general health of the Content Analysis services configured on
the Advanced Secure Gateway, allows you to perform routine maintenance tasks
and to diagnose potential problems. For more information on health checks, see
"Verifying the Health of Services Configured on the Advanced Secure Gateway"
on page 1411.
To view details on the status of WCCP capable devices in your network, click on
the WCCP service row, the Statistics> Network > WCCP tab displays. The Statistics >
Network > WCCP tab provides information on the configured service groups and
their operational status. For more information on how to configure WCCP on the
Advanced Secure Gateway, see Chapter 33: "WCCP Configuration" on page 813.
For more detailed information about WCCP, refer to the WCCP Reference Guide.
If you do not respond within the 30-second period, you are logged out and lose all
unsaved changes. To log in again, click the You need to log in again to use the console
hyperlink in the browser (legacy Management Console only). To log out
completely, close the browser window.
40
Section 2 Accessing the Advanced Secure Gateway Using the CLI
You can connect to the Advanced Secure Gateway command-line interface via
Secure Shell (SSH) using the IP address, username, password that you defined
during initial configuration. The SSH management console service is configured
and enabled to use SSHv2 and a default SSH host key by default. If you wish to
access the CLI, you can use SSHv2 to connect to the Advanced Secure Gateway.
An SSH host key for SSHv2 and an SSH management service are configured by
default. If you want to use SSHv1 or Telnet without additional configuration.
Note: You can also access the CLI using Telnet or SSH v1. However, these
management services are not configured by default. For instructions on
configuring management services, see Chapter 68: "Configuring
Management Services" on page 1323.
41
Advanced Secure Gateway Administration Guide
Note: Most tasks can be performed in both the Management Console and the
CLI. This guide covers procedures for the Management Console; refer to the
Command Line Interface Reference for related CLI tasks. Tasks that are available only
in the Management Console or only in the CLI are noted as such.
42
Section A: Configuring Basic Settings
This sections describes how to configure basic settings, such as the Advanced
Secure Gatewayappliance name, time settings, and login parameters. It includes
the following topics:
❐ "How Do I...?" on page 43
❐ "Configuring the Advanced Secure Gateway Appliance Name" on page 44
❐ "Changing the Login Parameters" on page 45
❐ "Viewing the Appliance Serial Number" on page 48
❐ "Configuring the System Time" on page 49
❐ "Synchronizing to the Network Time Protocol" on page 52
How Do I...?
To navigate this section, identify the task to perform and click the link:
Locate the Appliance Serial Number? "Viewing the Appliance Serial Number" on
page 48
Configure the local time on the "Configuring the System Time" on page 49
Advanced Secure Gateway?
Configure the time for console log out on "Changing the Advanced Secure Gateway
the Advanced Secure Gateway? Timeout" on page 47
43
Advanced Secure Gateway Administration Guide
44
Section 4 Changing the Login Parameters
You can change the console username and password, the console realm name
which displays when you log in to the appliance, and the auto-logout time. The
default value is 900 seconds.
The Management Console requires a valid administrator username and password
to have full read-write access; you do not need to enter a privileged-mode
password as you do when using the CLI. A privileged-mode password, however,
must already be set.
2. Edit the username of the administrator that is authorized to view and revise
console properties. Only one console account exists on the Advanced Secure
Gateway. If you change the console account username, that username
overwrites the existing console account username. The console account
username can be changed to anything that is not null and contains no more
than 64 characters.
45
Advanced Secure Gateway Administration Guide
Note: This does not change the enabled-mode password. You can only
change the enabled-mode password through the CLI.
4. Refresh the screen, which forces the SGOS software to re-evaluate current
settings. When challenged, enter the new password.
5. (Optional) Restrict access by creating an access control list or by creating a
policy file containing <Admin> layer rules. For more information, see
"Limiting Access to the Advanced Secure Gateway" on page 67.
46
Realm Name
47
Advanced Secure Gateway Administration Guide
48
Section 2 Configuring the System Time
To manage objects, the Advanced Secure Gateway must know the current
Coordinated Universal Time (UTC), which is the international time standard and
is based on a 24-hour clock. The Advanced Secure Gateway accesses the Network
Time Protocol (NTP) servers to obtain accurate UTC time and synchronizes its
time clock.
By default, the Advanced Secure Gateway connects to an NTP server in the order
they are listed on the NTP tab and acquires the UTC time. You can view UTC time
under UTC in the Configuration > General > Clock > Clock tab. If the appliance cannot
access any of the listed NTP servers, you must manually set the UTC time.
You can, however, also record time stamps in local time. To record time stamps in
local time, you must set the local time based on your time zone. The Advanced
Secure Gateway appliance ships with a limited list of time zones. If a specific time
zone is missing from the included list, you can update the list at your discretion.
The list can be updated by downloading the full time zone database from http://
download.bluecoat.com/release/timezones.tar. Also, the time zone database
might need to be updated if the Daylight Savings rules change in your area.
49
Advanced Secure Gateway Administration Guide
2. Click Set Time zone. The Time Zone Selection dialog displays.
3. Select the time zone that represents your local time. After you select the local
time zone, event logs record the local time instead of GMT. To add additional
time zones to the list, update the appliance's time zone database, as described
in the following procedure.
4. Click OK to close the dialog.
5. Click Apply.
50
To update the database:
1. Select Configuration > General > Clock > Clock.
2. Enter the URL from which the database will be downloaded or click Set to
default.
3. Click Install.
51
Advanced Secure Gateway Administration Guide
52
To add an NTP server:
1. Select Configuration > General > Clock > NTP.
Basic Ports
This table presents the non-configurable ports which must be available.
53
Advanced Secure Gateway Administration Guide
Networking Ports
This table presents ports required for networking, when the listed features are
enabled.
54
This table presents ports required for ADNs and Proxy Client, when the listed
features are enabled.
Other Ports
This table presents other ports which are required when the indicated
feature is in use.
55
Advanced Secure Gateway Administration Guide
56
Chapter 3: Licensing
About Licensing
Each Advanced Secure Gateway requires a license to function. The license is
associated with an individual Advanced Secure Gateway serial number and
determines what software features are available and the number of concurrent
users that are supported.
When you configure a new Advanced Secure Gateway appliance, a license
must be installed before it can intercept and process user traffic.
The following sections describe the licensing options:
❐ "License Expiration" on page 58
❐ "License Types" on page 57
❐ "License Expiration" on page 58
License Types
The following license types are available:
❐ Permanent—A license for hardware platforms that permanently unlocks
the software features you have purchased. When a permanent license is
installed, any user limits imposed by that license are enforced, even if the
trial period is still valid.
❐ Subscription-based—A license that is valid for a set period of time. After
you have installed the license, the Advanced Secure Gateway appliance
will have full functionality, and you will have access to software upgrades
and product support for the subscription period.
Licensing Terms
Advanced Secure Gateway Appliances
Within sixty (60) days of the date from which the user powers up the Advanced
Secure Gateway (“Activation Period”), the Administrator must complete the
Advanced Secure Gateway licensing requirements as instructed by the
Advanced Secure Gateway appliance to continue to use all of the features. Prior
57
Advanced Secure Gateway Administration Guide
to the expiration of the Activation Period, the Advanced Secure Gateway software
will deliver notices to install the license each time the Administrator logs in to
manage the product. Failure to install the license prior to the expiration of the
Activation Period may result in some Advanced Secure Gateway features
becoming inoperable until the Administrator has completed licensing.
ProxyClient/Unified Agent
The Administrator may install ProxyClient or Unified Agent only on the number
of personal computers licensed to them. Each personal computer shall count as
one “user” or “seat.” The ProxyClient or Unified Agent software may only be
used with Blue Coat Advanced Secure Gateway appliances. The Administrator
shall require each user of the Blue Coat ProxyClient software to agree to a license
agreement that is at least as protective of Blue Coat and the Blue Coat ProxyClient
or Unified Agent software as the Blue Coat EULA.
License Expiration
When the base license expires, the appliance stops processing requests and a
license expiration notification message is logged in the Event Log (see "Viewing
Event Log Configuration and Content" on page 1375 for details on how to view
the event log).
In addition, for services set to Intercept:
❐ In a transparent deployment, Advanced Secure Gateway if the default policy
is set to Allow, the appliance acts as if all services are set to Bypass, passing
traffic through without examining it. If default policy is set to Deny, traffic to
these services is denied with an exception. For details, see "Exceptions Due to
Base License Expiration" .
❐ In an explicit deployment, regardless of the default policy setting, traffic to
these services is denied with an exception. For details, see "Exceptions Due to
Base License Expiration" .
58
❐ You can still perform configuration tasks through the CLI, SSH console, serial
console, or Telnet connection. Although a component is disabled, feature
configurations are not altered. Also, policy restrictions remain independent of
component availability.
Content Analysis—When the subscription licenses expire for your Antivirus, File
Reputation (Whitelisting), or Sandboxing services, files are not scanned with
those options. If policy is configured to ICAP scan all content, users may receive
exception messages relating to ICAP processing.
59
Advanced Secure Gateway Administration Guide
5. Enter your Blue Touch Online (BTO) credentials and click Login. If you do not
have a Blue Touch Online account, or you do not remember your credentials,
click the Forgot your password? link on this page.
6. Enter the serial number and hardware appliance model for your appliance
into the available fields and click Register New Appliance.
60
• In the Management Console, select Proxy > Maintenance > Tasks.
• Click Hardware and Software.
• Click Restart now.
5. When the appliance completes the restart, browse to the Content Analysis tab in
the Management Console.
6. Enable File inspection subscriptions:
• Browse to Content Analysis > System > Licensing.
• Select each available subscription element and click Save Changes.
Note: Locate the email from Blue Coat that contains the activation code(s) for
your software. You require these activation codes, as well as your appliance serial
number, to complete the licensing process on the Blue Coat Licensing Portal.
61
Advanced Secure Gateway Administration Guide
62
2. Follow the prompts to enter your serial number and download the license file.
3. Save the license file to a location that your appliance can access.
4. In the Management Console, select Maintenance > Licensing > Install, and then
select the appropriate option from the License Key Manual Installation drop-down
list:
Note: A message is written to the event log when you install a license through
the Advanced Secure Gateway.
63
Advanced Secure Gateway Administration Guide
64
Section 2 Viewing the Current License Status
You can view the license status in the Management Console in the following
ways:
❐ Select Statistics > Configuration > Maintenance. The license status displays as a link
in the upper right hand-corner. Hovering over the license link displays
information, such as the expiration date of the trial period. Click the link to
switch to the View license tab.
❐ Select Maintenance > Licensing > View. The tab displays the license components
with expiration dates.
❐ Select Maintenance > Health Monitoring. The tab displays thresholds for license
expiration dates.
Current high-
level license
data
License
components
For more
details, select a
component and
click.
Each licensable component is listed, along with its validity and its expiration
date.
• To view the most current information, click Refresh Data.
• Highlight a license component and click View Details. A dialog displays
more detailed information about that component.
See Also
❐ "About Licensing" on page 57
❐ "Locating the System Serial Number" on page 59
❐ "MACH5 or Secure Web Gateway Obtaining a BlueTouch Online Account" on
page 59
❐ "Registering and Licensing Blue Coat Appliance and Software" on page 60
65
Advanced Secure Gateway Administration Guide
66
Chapter 4: Controlling Access to the Advanced Secure
Gateway
This section describes how to control user access to the Advanced Secure
Gateway. It includes the following topics:
❐ "Limiting Access to the Advanced Secure Gateway" on page 67
❐ "About Password Security" on page 68
❐ "Limiting User Access to the Advanced Secure Gateway—Overview" on
page 69
❐ "Moderate Security: Restricting Management Console Access Through the
Console Access Control List (ACL)" on page 72
❐ "Maximum Security: Administrative Authentication and Authorization
Policy" on page 73
67
Advanced Secure Gateway Administration Guide
❐ Use the reset button (if the appliance has a reset button) to delete all system
settings. Otherwise, reset the to its factory settings by holding down the left
arrow key on the front-panel for 5 seconds. The appliance will be reinitialized.
To reconfigure the appliance or secure the serial port, refer to the hardware guides
for your appliance.
68
❐ RADIUS primary and alternate secret—For configuration information, see
Chapter 57: "RADIUS Realm Authentication and Authorization" on page
1125.
❐ LDAP search password—For configuration information, see "Defining LDAP
Search & Group Properties" on page 1084.
❐ Content filter download passwords—For configuration information, see
"Downloading the Content Filter Database" on page 375.
Note: If Telnet Console access is configured, Telnet can be used to manage the
Advanced Secure Gateway with behavior similar to SSH with password
authentication.
SSL configuration is not allowed through Telnet, but is permissible through SSH.
Behavior in the following sections that applies to SSH with password
authentication also applies to Telnet. Use of Telnet is not recommended because it
is not a secure protocol.
69
Advanced Secure Gateway Administration Guide
Table 4–1 Advanced Secure Gateway Console Access Methods/Available Security Measures
Security Measures Available Serial SSH with SSH with RSA Management
Console Password Authentication Console
Authentication
70
Table 4–1 Advanced Secure Gateway Console Access Methods/Available Security Measures (Continued)
Notes
❐ When using SSH (with a password) and credentials other than the console
account, the enable password is actually the same as the login password. The
privileged mode password set during configuration is used only in the serial
console, SSH with RSA authentication, or when logging in with the console
account.
❐ In this case, user credentials are evaluated against the policy before executing
each CLI command. If you log in using the console account, user credentials
are not evaluated against the policy.
71
Advanced Secure Gateway Administration Guide
To create an ACL:
1. Select Configuration > Authentication > Console Access > Console Access.
2b
2a
c. Click OK to add the workstation to the ACL and return to the Console
Access tab.
Important: Before you enforce the ACL, verify the IP address for the
workstation you are using is included in the list. If you forget, or you find
that you mis-typed the IP address, you must correct the problem using the
serial console.
72
5. Click Apply.
Note: If you choose a realm that relies on an external server and that server is
unavailable, the appliance will not be able to authenticate against that realm.
For best security, the following authentication realms are recommended by Blue
Coat for administrative authentication to the appliance.
❐ IWA-BCAAA (with TLS -- not SSL) with basic credentials
❐ Local
❐ .509 certificate based (including certificate realms; refer to the Common Access
Card Solutions Guide for information)
❐ LDAP with TLS (not SSL)
❐ IWA-Direct with basic credentials
73
Advanced Secure Gateway Administration Guide
❐ RADIUS
The following realms can be configured for administrative authentication, but
pass administrative credentials in clear text. These realms should not be used for
administrative authentication:
❐ Windows SSO
❐ Novell SSO
❐ IWA-BCAAA without SSL or TLS
❐ LDAP without SSL or TLS
Note: Other authentication realms can be used, but will result in administrative
credentials being sent in clear text.
2. Using the Command Line Interface (CLI), create a list of users who need read-
only access. The list must include a username and password for each user.
a. Enter configuration mode in the CLI; this example creates a list called
Read_Access.
#(config)security local-user-list create Read_Access
74
b. Edit the list to add user(s) and to create usernames and passwords.
This example adds a user named Bob Kent.
#(config)security local-user-list edit Read_Access
#(config)user create Bob_Kent
#(config)user edit Bob_Kent
#(config)password 12345
3. Connect the user list (created in Step 2) to the local realm (created in Step 1).
a. In the Configuration > Authentication > Local > Local Main tab, select
MC_Access from the Realm name drop-down menu.
c. In the Action column, right click and select Set. In the Set Action dialog
that displays, click New and select Authenticate. The Add Authentication
Object displays.
75
Advanced Secure Gateway Administration Guide
d. In the Add Authenticate Object dialog that displays, select the local realm
you created in Step 1.
e. Create an Admin Access Layer.
f. In the Source column, right click and select Set. In the Set Source Object
dialog that displays, click New and select User. The Add User Object
dialog displays.
g. Enter the name of the user for whom you want to provide read-only
access.
h. Click OK in both dialogs.
i. In the Action column, right click and select Allow Read-only Access.
5. Click Install Policy.
The user can now log in the Management Console as a user with read-only
access. Repeat step 4 and use Allow Read/Write access to define user access
with read/write privileges
76
Chapter 5: Backing Up the Configuration
77
Advanced Secure Gateway Administration Guide
78
To create signed archives, your appliance must have an SSL certificate guaranteed
by a CA. You can then use a trusted CA Certificate List (CCL) to verify the
authenticity of the archive.
Use signed archives only when security is high priority. Otherwise, use unsigned
archives. For information about creating secure archives, see "Creating and Saving
a Secure (Signed) Archive" on page 86.
79
Advanced Secure Gateway Administration Guide
80
Section 1 Archiving Quick Reference Table
The following table lists common archive management tasks and where to get
more information.
Learn about the archive types "About the Archive Types and Saved
Information" on page 78
81
Advanced Secure Gateway Administration Guide
82
8. Restore the archive, as described in "Restoring a Configuration Archive" on
page 105.
Figure 5–1 on page 83 describes the archive creation process.
83
Advanced Secure Gateway Administration Guide
2. Select Configuration > General > Archive. The Archive Configuration tab displays.
3b
3a
Note: You can also view the file by selecting Text Editor in the Install
Configuration panel and clicking Install.
84
3. Browse to the location of the archive and click Open. The configuration is
installed, and the results screen displays.
85
Advanced Secure Gateway Administration Guide
The appliance certificate displays if the appliance has one. Otherwise, the
following error is displayed:
Certificate "appliance-key" not found
4. If the appliance does not have an appliance certificate, create one as follows:
86
a. Create a keyring on the appliance.
A keyring contains a public/private key pair. It can also contain a
certificate signing request or a signed certificate.
b. Create a Certificate Signing Request (CSR) and send it to a Certificate
Signing Authority (CA).
c. Have the CA sign the CSR (this process results in a digital certificate).
d. Import the keyring and certificate as described in "Restoring an
Archived Key Ring and Certificate" on page 98.
For more information about appliance certificates, see "Managing X.509
Certificates" on page 1153.
2. Select the Configuration > General > Archive > Archive Storage tab.
3. From the Sign archives with keyring drop-down list, select a signing keyring to
use or accept the default (appliance-key).
4. Click Apply.
Note: If you do not click Apply, a pop-up displays when you click Save that
indicates that all unsaved changes will be saved before storing the archive
configuration. The unsaved changes are the Sign archives with keyring option
changes you made in Step 3.
5. From the Save archive drop-down list, select the archive type (Blue Coat
recommends Configuration - expanded).
6. Click Save.
87
Advanced Secure Gateway Administration Guide
2. Go to the Management Console Home page and view the Software version:
information to verify that the appliance is running the same software version
that was used to create the archive. For example:
Software version: SGOS 6.6.2.2
You can also verify the version from the appliance CLI:
# enable
# show version
88
Section E: Preparing Archives for Restoration on New Devices
While a configuration archive will back up the appliance configuration, that
configuration cannot be transferred to another device unless you save the SSL
keyrings on the appliance—especially the configuration-passwords-key keyring.
The process of creating the archive and saving the associated SSL keyrings is
called creating a transferable archive.
Note: You must also save the SSL keyrings if you plan to restore an encrypted
archive after a reinitialization. When you reinitialize the appliance, new keys get
created, and you will therefore not be able to restore the configuration unless you
first restore the configuration-passwords-key.
89
Advanced Secure Gateway Administration Guide
To ensure that the archive can be transferred to another appliance, you must do
one of the following:
❐ Restore the original configuration-passwords-key keyring
While it is possible to reset each of the passwords using the Management
Console, it is easier to save the original keyring so that you can import it to the
new appliance (before restoring the configuration). Restoring the keyring
allows all previously configured passwords to remain valid after archive
restoration.
❐ Change the encrypted passwords to clear text so that they can be regenerated.
Note: To save an SSL keyring, you must be able to view it. If the key is marked
no-show, you cannot save it.
90
Section 1 Creating a Transferable Archive
This section describes the steps required to create a transferable archive.
2. Go to the Management Console Home page and view the Software version:
information to verify that the appliance is running the same software version
that was used to create the archive. For example:
Software version: SGOS 5.3.0.2 Proxy Edition
You can also verify the version from the appliance CLI:
# enable
# show version
3. Restore the configuration-passwords-key data and any other SSL key data.
Import the configuration-passwords-key keyring as described in "Restoring
an Archived Key Ring and Certificate" on page 98.
4. Select Configuration > General > Archive.
5. Select Local File and click Install.
6. Browse to the location of the archive and click Open. The configuration is
installed, and the results screen displays.
91
Advanced Secure Gateway Administration Guide
You can also use the following procedure to save any other keyrings required to
reload SSL-related configuration that references those keyrings.
!
ssl ; switches from config mode to config ssl
!
inline keyring show configuration-passwords-key "end-inline"
!
end-inline
inline keyring show default "end-inline"
!
end-inline
!
inline certificate default "end-inline"
!
end-inline
!
! repeat this process for each keyring. Be sure to import the private
key first, then the keyrings certificate
!
exit ; returns to config mode
!
Do not specify your passwords; the system will prompt you for them when
you restore the keys. You can modify the template to include other keyrings
and certificates.
2. From the CLI, access the config prompt (using the serial console or SSH):
# config terminal
92
Keyring ID: appliance-key
Private key showability: no-show
Signing request: present
Certificate: absent
Note: The aes128 and aes256 encryption options are also supported.
This password is used to encrypt the private-key before displaying it. After
confirming the password, the Advanced Secure Gateway appliance displays the
encrypted private-key associated with that keyring.
Important: Do not lose the password used to encrypt the private key. If you
do, you will not be able to recover your private keys.
For example:
#(config ssl)view keypair des3 configuration-passwords-key
Encryption password: *****
Confirm encryption password: *****
93
Advanced Secure Gateway Administration Guide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-----END RSA PRIVATE KEY-----
For example:
#(config ssl)view certificate appliance-key
-----BEGIN CERTIFICATE-----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-----END CERTIFICATE-----
8. Copy the certificate and paste it into the template (copied in step 1) beneath
the inline certificate cert_name "end-inline" line).
94
9. Optional—For each named keyring that you want to restore, repeat steps 4
to 8.
Note: The appliance-key keyring's private key is not viewable, and cannot be
transferred to another Advanced Secure Gateway appliance. The default and
passive-attack-protection-only-key keys typically do not need to be
restored either.
10. Save the template with the configuration-passwords-key and other SSL key
data on a secure server.
11. Save the password information (that you used to encrypt the keys) in a secure
place, for example, a restricted access cabinet or safe.
After saving this data, create a configuration archive as described in "Creating a
Transferable Archive" on page 91. When you are ready to restore the archive, you
must first restore the SSL data on the target appliance as described in "Restoring
an Archived Key Ring and Certificate" on page 98.
Note: The commands in the following example are bounded by the document
text area and wrap to the next line. They are not shown here as they would
appear in the CLI. See Step 1 in "Option 1: Recording SSL Keyring and Key Pair
Information" on page 91 to view an example of how the commands should
appear.
!
ssl ; switches from config mode to config ssl
!
inline keyring show configuration-passwords-key "end-inline"
-----BEGIN RSA PRIVATE KEY-----
Proc-Type: 4,ENCRYPTED
DEK-Info: DES-EDE3-CBC,2F6148C8A9902D7F
1lJjGKxpkcWBXj424FhyQJPKRdgHUIxl2C6HKigth6hUgPqsSJj958FbzEx6ntsB
lI+jXj34Ni6U94/9ugYGEqWLCqed77M1/WA4s6U5TCI9fScVuGaoZ0EVhx48lI3N
LGQplOJXmr0L5vNj/e1/LSeCOHg+7ASyY/PaFr9Dk8nRqAhoWMM/PQE1kvAxuXzE
8hccfZaa1lH1MiPWfNzxf1RXIEzA2NcUirDHO63/XU3eOCis8hXZvwfuC+DWw0Am
tGVpxhZVN2KnfzSvaBAVYMh/lGsxdEJjjdNhzSu3uRVmSiz1tPyAbz5tEG4Gzbae
sJY/Fs8Tdmn+zRPE5nYQ/0twRGWXzwXOeW+khafNE3iQ1u6jxbST6fCVn2bxw+q/
95
Advanced Secure Gateway Administration Guide
bB/dEFUMxreYjAO8/Tu86R9ypa3a+uzrXULixg1LnBcnoSvOU+co5HA6JuRohc5v
86ZPklQ9V4xvApY/+3Q+2mF9skJPsOV01ItYWtrylg9Puw17TE56+k0EAOwU6FWd
dTpGJRguh7lFVmlQl2187NEoyHquttlIHxRPEKRvNxgCzQI3GEOfmD9wcbyxd1nT
X11U2YgwwwH0gzJHBQPIfPhE9wJTedm1dhW268kPFonc1UY3dZTq0tiOLwtDfsyx
ForzG9JHhPmlUgLtujsiG5Cg8S183GSyJFqZs8VKxTyby7xa/rMkjtr/lpS++8Tz
GZ4PimFJM0bgcMsZq6DkOs5MmLSRCIlgd3clPSHjcfp+H4Vu0OPIPL98YYPvcV9h
0Io/zDb7MPjIT5gYPku86f7/INIimnVj2R0a0iPYlbKX7ggZEfWDPw==
-----END RSA PRIVATE KEY-----
end-inline
!
inline keyring show default "end-inline"
-----BEGIN RSA PRIVATE KEY-----
Proc-Type: 4,ENCRYPTED
DEK-Info: DES-EDE3-CBC,2F6148C8A99AAAA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-----END RSA PRIVATE KEY-----
end-inline
!
inline certificate default "end-inline"
-----BEGIN CERTIFICATE-----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XerHBHpMPwzHdjl4ELqSgxFy9aei7y8=
-----END CERTIFICATE-----
end-inline
!
! repeat this process for each keyring. Be sure to import the private
key first, then the keyrings certificate
!
exit ; returns to config mode
!
Important: Blue Coat strongly recommends recording your SSL keyring and
key pair data because changing encrypted passwords to clear text is highly
insecure. Use the following procedure at your own risk.
You can edit the configuration to change encrypted passwords to clear text if you
choose to keep the existing configuration-passwords-key keyring intact on the
new appliance. You do not need to change hashed passwords to clear text—when
you restore the archive, new hashed-passwords are automatically generated using
the target Advanced Secure Gateway appliance’s configuration-passwords-key
keyring.
Important: This procedure is not valid for signed archives. Signing guarantees
that the archive has not been modified.
Note: Hashed passwords do not have to be changed to clear text. When you
restore the archive, they are restored as specified on the source device. The
difference between hashing and encryption is that encryption enables
information to be decrypted and read, while hashing is a mathematical
function used to verify the validity of data. For example, a system might not
need to know a user’s password to verify that password. The system can run a
hash function on the password and confirm that the mathematical result
matches that specified for the user.
97
Advanced Secure Gateway Administration Guide
Note: You can also import a certificate chain containing multiple certificates.
Use the inline certificate command to import multiple certificates through
the CLI. See "Example: Completed SSL Data Template" on page 95 for more
information.
If you are importing a keyring and one or more certificates onto a Advanced Secure
Gateway appliance, first import the keyring, followed by its related certificate. The
certificate contains the public key from the keyring, and the keyring and
certificate are related.
5a
5b
5c
5d
5e
98
e. Select Private Key Password and enter the configuration-passwords-key
password into the field. This is the password you saved when you
archived the keyring.
6. Click OK.
7. Click Apply.
The configuration-passwords-key does not have a certificate. However, if one or
more keyrings has a certificate, you must import it and associate it with a keyring.
99
Advanced Secure Gateway Administration Guide
100
Section 2 Creating and Uploading an Archive to a Remote Server
Use the following procedure to create a signed or unsigned archive and upload it
to a secure, remote host.
1. If you use HTTPS, you must specify an SSL device profile to use for the SSL
connection.
An SSL device profile, which can be edited, contains the information required
for device authentication, including the name of the keyring with the private
key and certificate this device uses to authenticate itself. The default keyring is
appliance-key. (For information on private keys, public keys, and SSL device
profiles, see "Managing X.509 Certificates" on page 1153.)
2. Obtain write permission to a directory on a secure, remote host. This is where
the archive will be stored.
3. Access the Management Console of the Advanced Secure Gateway appliance
you want to back up:
https://Appliance_IP:8082
7a
7b
7c
7d
7e
6. For signed archives, ensure that a keyring has been selected in the Sign archive
with keyring option.
101
Advanced Secure Gateway Administration Guide
In the preceding example, the %H%A prefix adds the hour (in 24-hour
format) and the full weekday name. Various combinations can be used.
See "Adding Identifier Information to Archive Filenames" on page 103 for
a list of allowed substitution values.
c. Optional, for HTTPS—Select an SSL device profile to use for the SSL
connection.
See "Uploading Archives to a Remote Server" on page 100 for more
information about device profiles.
d. Enter the remote server host name or IP address and port number. The
remote server can have an IPv4 or IPv6 address, or be a domain name
that resolves to an IPv4 or IPv6 address.
e. Enter the remote server upload path (not required for TFTP).
102
f. Enter the user name associated with the remote host (not required for
TFTP).
g. Optional—Change the HTTP, HTTPS, or FTP password.
8. Click Upload.
Specifier Description
%% Percent sign.
%a Abbreviated weekday name.
%A Full weekday name.
%b Abbreviated month name.
%B Full month name.
%C The Advanced Secure Gateway appliance name.
%d Day of month as decimal number (01 – 31).
%H Hour in 24-hour format (00 – 23).
%i First IP address of the Advanced Secure Gateway appliance, displayed in
x_x_x_x format, with leading zeros removed.
103
Advanced Secure Gateway Administration Guide
104
Section G: Restoring a Configuration Archive
To restore a configuration archive, you must:
❐ Perform pre-restoration tasks, for example, restoring the SSL configuration.
❐ For signed archives—Select a CCL to use to verify the archive.
❐ Restore the archive.
3. In the Management Console, click the Home link and look for the software
version in the banner to verify that the appliance is running the same software
version that was used to create the archive. The banner displays a version
such as:
SGOS 6.6.2.1 Proxy Edition
You can also verify the version from the appliance CLI:
# enable
# show version
4. Restore the configuration-passwords-key data and any other SSL key data.
Import the configuration-passwords-key keyring as described in "Restoring
an Archived Key Ring and Certificate" on page 98.
5. Select Configuration > General > Archive.
105
Advanced Secure Gateway Administration Guide
6. Optional, for signed archives—Select a CCL to use to verify the archive from
the Verify signed archive with CCL drop-down list. If you used the appliance-key
keyring, select appliance-ccl.
7. Optional, for signed archives—In the Install Configuration panel, check the
setting of the Enforce installation of signed archives option. If this option is
selected, only signed archives can be restored.
Note: Depending on the CA that was used to sign the certificate used for the
archive signature, you might have to import a CA certificate and create an
appropriate CCL. For details, see Chapter 60: "Managing X.509 Certificates"
on page 1153.
106
Section H: Sharing Configurations
To ease initial configuration, you can take a configuration from a running
appliance and use it to configure another appliance. This process is called
configuration sharing. You can take a post-setup configuration file (one that does not
include those configuration elements that are established in the setup console)
from an already-configured Advanced Secure Gateway appliance and push it to a
newly-manufactured or restored system that is to have the same or similar
configuration.
To create a configuration archive of the source device’s settings using the CLI:
1. Use an SSH client to establish a CLI session with the already configured
Advanced Secure Gateway appliance.
2. From the enable prompt (#), enter the following command:
show configuration post-setup
107
Advanced Secure Gateway Administration Guide
108
Section I: Troubleshooting
When pushing a shared configuration or restoring an archived configuration,
keep in mind the following issues:
❐ If the content-filtering database has not yet been downloaded, any policy that
references categories is not recognized.
❐ Unless you restore the SSL configuration-passwords-key keyring from the
source device, archives can only be restored onto the same device that was the
source of the archive. This is because the encrypted passwords in the
configuration (login, enable, FTP, etc.) cannot be decrypted by a device other
than that on which it was encrypted.
❐ Do not take an expanded archive from an operational Advanced Secure
Gateway appliance and install it onto another Advanced Secure Gateway
appliance. Expanded archives contain system-specific settings (for example,
hostnames, IP addresses, and connection forwarding settings) that will cause
conflicts.
❐ To use signed archives, your appliance must have an SSL certificate
guaranteed by a CA. If your appliance has a built-in appliance certificate, you
can use it and the corresponding appliance-ccl CCL to sign the archive.
Devices manufactured before July 2006 do not support appliance certificates.
If your appliance does not have a built-in appliance certificate, you must do
the following:
• Create a keyring on the appliance.
A keyring contains a public/private key pair. It can also contain a
certificate signing request or a signed certificate.
• Create a Certificate Signing Request (CSR) and send it to a Certificate
Signing Authority (CA).
• Have the CA sign the CSR.
To determine if your appliance has a built-in certificate, see "Using the
Appliance Certificate to Sign the Archive" on page 86.
See Also
For more information about appliance certificates, see Chapter 60:
"Managing X.509 Certificates" on page 1153.
109
Advanced Secure Gateway Administration Guide
110
Chapter 6: Explicit and Transparent Proxy
111
Advanced Secure Gateway Administration Guide
Internet Explorer Tools > Internet Options > Connections > LAN
Settings
Firefox Tools > Options > Advanced > Network > Settings >
Manual Proxy Configuration
Note: NEVER use the Advanced Secure Gateway management port (8081/8082)
to host the PAC file.
112
For additional information about PAC files, see the following:
http://www.proxypacfiles.com/proxypac/
Note: Only the accelerated_pac_base.pac file can be edited. Any text editor can
be used to edit and customize the accelerated PAC file to meet your needs. After
editing the file, you can load a PAC file only through the CLI:
#(config)inline accelerated-pac 123
-paste PAC file here-
123
Then set the browser to use the following URL as the automatic configuration
script: http://Appliance_IP_Address:8080/accelerated_pac_base.pac
113
Advanced Secure Gateway Administration Guide
114
#load accelerated-pac
115
Advanced Secure Gateway Administration Guide
Note: You can also use port 8080, but port 80 is preferred because it doesn’t
require that you specify a port for the PAC-URL in the users’ browsers.
116
❐ For a web page that contains a large number of URLs, a poorly written PAC
file may cause browser performance problems.
❐ It’s best to write your PAC files as small and efficiently as possible. Fast and
efficient Javascript will perform better within the browser, especially on
“busy” web pages.
117
Advanced Secure Gateway Administration Guide
Transparent Proxies
Configure transparent proxy in the following ways:
❐ Through hardware: See "Configuring Transparent Proxy Hardware" on page
118.
❐ Through bridging: "Bridging" on page 118.
❐ Through using the Advanced Secure Gateway as a gateway: See "Configuring
IP Forwarding" on page 119.
In addition to the transparent proxy configuration, you must create a proxy
service for the transparent proxy and enable the service. At this time, you can also
set other attributes for the service, including the destination IP address and port
range. For information on creating or editing a proxy service for transparent
configuration, see Chapter 7: "Managing Proxy Services" on page 121.
Bridging
Network bridging through the Advanced Secure Gateway provides transparent
proxy pass-through and failover support. This functionality allows Advanced
Secure Gateways to be deployed in environments where L4 switches and WCCP-
capable routers are not feasible options.
The Advanced Secure Gateway provides bridging functionality by two methods:
❐ Software—A software, or dynamic, bridge is constructed using a set of
installed interfaces. Within each logical bridge, interfaces can be assigned or
removed. Note that the adapters must of the same type. Although the
software does not restrict you from configuring bridges with adapters of
different types (10/100 or GIGE), the resultant behavior is unpredictable.
For instructions on setting up a software bridge, see "Configuring a Software
Bridge" on page 1312.
❐ Hardware—The Blue Coat Pass-Through card is a 10/100 dual interface
Ethernet device that enables a bridge, using its two adapters, so that packets
can be forwarded across it. However, if the system crashes, the Pass-Through
card becomes a network: the two Ethernet cables are connected so that traffic
can continue to pass through without restriction.
When the Pass-Through card is installed on the Advanced Secure Gateway, a
bridge is automatically created and traffic going through the bridge is
intercepted according to the proxy-service setting. Note that:
• Forwarding traffic behavior: By default, the bridge forwards packets that
are not to be intercepted.
118
• Proxy request behavior: Requests are proxied on either adapter, so if you
connect one side of the bridge to your Internet connection, there might be
a number of issues.
Configuring IP Forwarding
IP Forwarding is a special type of transparent proxy. The Advanced Secure Gateway
is configured to act as a gateway and is configured so that if a packet is addressed
to the Advanced Secure Gateway adapter, but not its IP address, the packet is
forwarded toward the final destination. If IP forwarding is disabled, the packet is
rejected as being mis-addressed.
By default, IP forwarding is disabled to maintain a secure network.
119
Advanced Secure Gateway Administration Guide
To enable IP forwarding:
1. Select the Configuration > Network > Routing > Gateways tab.
2. Select the Enable IP forwarding option at the bottom of the pane.
3. Click OK; click Apply.
120
Chapter 7: Managing Proxy Services
This chapter discusses proxy services and service groups and their roles in
intercepting traffic.
121
Advanced Secure Gateway Administration Guide
A collection of attributes that control what type of processing the Advanced Secure
Gateway appliance performs on the intercepted traffic. A proxy service listener
specifies where a Advanced Secure Gateway service listens for traffic. Four
attributes comprise the listener:
❐ Source address—Most of the time, this attribute is set to all source addresses,
which means any IPv4 or IPv6 address that originates the request. You can
also specify specific IP addresses and subnets. For example, you want to
exclude a network segment, so you specify a subnet and set to Bypass.
❐ Destination address—
122
• Explicit—Requires Web browser and service configuration. It sends
requests explicitly to a proxy instead of to the origin content servers. Only
destination addresses that match one of the IPv4 or IPv6 addresses on the
Advanced Secure Gateway appliance are intercepted.
• Destination IP address or subnet/prefix length—This listener type ensures
that only destination addresses matching the IPv4/IPv6 address or
subnet/prefix length are intercepted.
❐ Port—A specific port or port range. All default Advanced Secure Gateway
services are configured to their industry-standard ports. For example, the
explicit HTTP service is configured to listen on ports 80 and 8080.
❐ Action—The aforementioned action to take on traffic detected by this service:
Intercept or Bypass.
Note: For a complete list of supported proxy services and listeners, see
"Reference: Proxy Services, Proxy Configurations, and Policy" on page 156.
Note: This list applies to new installations or the result of restoring the appliance
to factory defaults after the ab upgraded from a lower version. Upon upgrading
to the current version, the Services tab retains existing services, service group
names, and policies.
123
Advanced Secure Gateway Administration Guide
Note: The HTTPS Reverse Proxy service is also available but not created by
default. For information about configuring the HTTPS Reverse Proxy, see
Chapter 15: "Configuring and Managing an HTTPS Reverse Proxy" on page 313.
124
The destination IP address of a connection can match multiple proxy service
listeners. Multiple matches are resolved using the most-specific match algorithm
used by routing devices. A listener is more specific if it has a larger Destination IP
subnet prefix. For example, the subnet 10.0.0.0/24 is more specific than
10.0.0.0/16, which is more specific than 10.0.0.0/8.
When a new connection is established, the Advanced Secure Gateway appliance
first finds the most specific listener destination IP. If a match is found, and the
destination port also matches, the connection is then handled by that listener. If
the destination port of the listener with the most specific destination IP does not
match, the next most-specific destination IP is found; this process continues until
either a complete match is found or no more matching addresses are found. If a
destination IP address is not specified, the closest matching explicit proxy service
listener has priority over a subnet match. In that instance, the explicit proxy
service listener handles the connection instead of the subnet listener. Explicit port
80 listeners with a destination host IP identical to the Advanced Secure Gateway
appliance have priority over other explicit listeners.
For example, assume the following services were defined as given in the
following table.
An HTTP connection initiated to server 10.167.10.2 could match any of the three
listeners in the above table. The most specific match algorithm finds that a listener
in the New York CRM service is the most specific and since the destination port of
the connection and the listener match, the connection is handled by this service.
The advantage of the most specific match algorithm becomes evident when at
some later point another server is added in the New York Data Center subnet. If
that server needs to be handled by a different service than the New York Data
Center service, a new service with a listener specific to the new server would be
added. The administrator does not need to be concerned about rule order in order
to intercept traffic to this particular server using the new, most specific service
listener.
As another example, assume the following service and listeners were defined:
Table 7–3 Second Example Configuration for Most Specific Match Algorithm
L1 HTTP Explicit 80
L2 HTTP 10.0.0.0/8 80
125
Advanced Secure Gateway Administration Guide
About Authenticate-401
Available on the Explicit HTTP and External HTTP services.
When this option is selected, all transparent and explicit requests received on the
port always use transparent authentication (cookie or IP, depending on the policy
configuration).
If you have deployed Authentication in the way recommended by Blue Coat—
where only the Advanced Secure Gateway appliance nearest the user performs the
authentication tasks—configuring Authenticate-401 is not necessary. However,
multiple, explicitly-configured Advanced Secure Gateway appliances in a proxy
chain are all attempting to perform authentication tasks can cause issues with
browsers. By forcing one of the proxies (recommended: the one furthest away
from the client) to use 401-style authentication instead of the standard proxy 407-
style authentication, the browser can better handle the multiple authentication
challenges.
126
❐ The URL used while evaluating policy is an http:// URL of the tunneled
HTTP request, not a tcp:// URL to which the tunnel was connecting.
❐ Forwarding policy is applied based on the new HTTP request; therefore, the
selected forwarding host selected support HTTP. A forwarding host of type
TCP cannot handle the request, which forces the request to be blocked.
Enabling protocol detection helps accelerate the flow of traffic. However, the TCP
session must be fully established with the client before either the application
proxy or the TCP tunnel proxy contacts the origin server. In some cases, like in the
active-mode FTP data connections, enabling protocol detection might cause a
delay in setting up the connection.
To avoid this connection delay, either use a protocol specific proxy, such as the
FTP proxy, or disable protocol detection.
If protocol detection is disabled, traffic flows over a TCP tunnel without
acceleration provided by a protocol-specific proxy.
127
Advanced Secure Gateway Administration Guide
❐ For TCP Tunnel, you have the option to select either (disabled by default). For
the TCP Tunnel service, the Early Intercept option is selectable and disabled by
default. When this option is disabled, the proxy delays responding to the
client until after it has attempted to contact the server. For maximum
transparency, disable this option. If reduced latency is more important, enable
it.
128
Section B: Configuring a Service to Intercept Traffic
This section describes:
❐ "Changing the State of a Service (Bypass/Intercept)" on page 130
❐ "Moving a Service" on page 136
❐ "Deleting a Service or Service Group" on page 137
❐ "Bypassing All Proxy Services (Troubleshooting)" on page 137
❐ "Importing a Service from the Service Library" on page 138
To learn more details about Blue Coat services, see "Proxy Services Concepts" on
page 122.
129
Advanced Secure Gateway Administration Guide
2: Click to
expand a group
3 (optional)
2. Click the group name to expand the group. For example, you want to
intercept the CIFS services.
3. Optional: Select the Default Action for traffic that does not match any current
service.
130
Source IP->Destination IP/Port Select action
4. From the drop-down for the service or an individual service port, select to
Bypass or Intercept.
Next Tasks
As previously mentioned, setting a service to Intercept is one step in controlling
specific traffic types. There are other options for the services themselves, plus
proxy configurations and policy definitions. You can also create custom services
and service groups.
131
Advanced Secure Gateway Administration Guide
Note: If you only need to change the state of the proxy service (Bypass/Intercept),
you can do so from the main Proxy Services tab. You do not need to enter New/
Edit mode to change this setting.
Before you begin, you must understand the goal of your deployment, how the
application proxy operates, and the IP addresses (source and/or destination) and
ports to intercept. Some proxy services, such as DNS, are simple—comprised only
of IP addresses and ports. Others, such as HTTP, have more attributes to consider.
For a high-level description of these options, see "About Proxy Attributes in the
Services" on page 126.
For specific proxy descriptions, see
2
3
2. At the bottom of the tab, click New Service Group. The New Service Group dialog
displays.
3. In the Service Group field, name the custom service group.
132
4. Click OK. The new service group displays under Custom Service Groups.
6a
6b
6c
6d
133
Advanced Secure Gateway Administration Guide
Note: The Detect Protocol setting is disabled by default. You must select
this check box for filtering to be recognized.
7. Create a listener, or the IP address(es) and ports that this application protocol
uses. In the Listeners area, click New. The New Listener dialog displays.
8a
8b
8c
8d
134
c. In the Port Range field, enter a single port number or a port range on
which this application protocol broadcasts. For a port ranges, enter a
dash between the start and end ports. For example: 8080-8085
d. In the Action area, select the default action for the service: Bypass
configures the service to ignore any traffic matching this listener.
Intercept configures the service to intercept and proxy the associated
traffic.
e. Click OK to close the dialog. The new listener displays in the Listeners
area.
9. Click Ok add the new service to the selected service group.
10. Click Apply.
See Also
❐ "Moving a Service"
❐ "Importing a Service from the Service Library"
135
Advanced Secure Gateway Administration Guide
Moving a Service
The predefined services are not anchored to their default groups. You can move a
service to any other predefined or custom group.
Note: You must move the entire service; that is, you cannot move individual
service listeners.
2a
2b
2c
136
3. Click Apply.
To delete a service:
1. From the Management Console, select the Configuration > Services > Proxy
Services tab.
Note: Downgrading to a version that does not support force bypass while
running in bypass mode will result in restoration of proxy services.
2. In the Force Bypass area, select the Temporarily bypass all proxy services option.
The bypass statement to red.
3. Click Apply.
137
Advanced Secure Gateway Administration Guide
3a
3b
3c
138
d. Click OK.
4. Click Apply.
139
Advanced Secure Gateway Administration Guide
140
Section 2 Proxy Service Global Options
Blue Coat provides optional settings that apply to all proxy services when
configured:
❐ "Ensuring Application Availability (Tunnel on Protocol Error)"
❐ "Using the Client IP Address for Server Connections" on page 143
❐ "Improving Performance by Not Performing a DNS Lookup" on page 144
❐ "Exempting Requests From Specific Clients" on page 148
Note: You can subscribe to the CachePulse service to optimize HTTP traffic. For
information, see "Enabling CachePulse" on page 192.
141
Advanced Secure Gateway Administration Guide
SSL Proxy
For the SSL proxy, the Tunnel on Protocol Error option applies when non-SSL
traffic arrives at the SSL port (443 by default). A common scenario that causes this
is having peer-to-peer applications (viz, Skype, BitTorrent, Gnutella, older AOL-
IM and eMule) configured to enable port 443 for peer-to-peer traffic without SSL
set as the transport protocol. A Advanced Secure Gateway appliance
transparently intercepting all 443 traffic cannot process these connections,
rendering the application unusable.
With an explicit proxy deployment, SSL errors during the initial handshake
causes the same issue. The following example illustrates this:
❐ The Advanced Secure Gateway appliance is configured to have an explicit
HTTP service on port 8080.
❐ The HTTP service is configured with detect protocol enabled, which hands off
SSL traffic to the SSL proxy from an HTTP CONNECT request. Detect Protocol is
set to OFF by default.
Note: The same applies to an explicit SOCKS proxy deployment with protocol
detection enabled or an explicit TCP listener.
Forwarding Note
Enabling the TCP Tunnel on Error option might cause issues if the Advanced
Secure Gateway appliance has forwarding rules that direct traffic to upstream
proxies or other devices:
❐ Forwarding hosts are not viewed as HTTP proxies (even if they are). The
initial Advanced Secure Gateway HTTP proxy connects with a TCP tunnel to
the forwarding host. If the appliance has a policy to forward and tunnels on
error, the forwarding rule might not match if the forwarding rule has a
condition based on information that is not present—any HTTP conditions,
such as:
• Request method
• Request URL
• Request headers
❐ In the case of tunnel on error with explicit proxy, HTTP must match a
forwarding host for the connection of a successful TCP tunnel to occur. If no
forwarding host matches, HTTP will not tunnel on error.
142
2. In the Tunnel on Protocol Error area, select TCP tunnel requests when a protocol error
is detected.
3. Click Apply.
Related Policy
The Visual Policy Manager (VPM) provides the Client Certificate Requested object in
the SSL Intercept Layer > Service column (the equivalent CPL is
client.certificate.requested={yes|no}).Use this policy in conjunction with an
SSL.Intercept(no) action, or a Do Not Intercept SSL action in the VPM, to minimize
traffic disruption when the SSL proxy intercepts secure traffic where the OCS
requests a client certificate.
When Tunnel on Error is enabled, the first detection of a client certificate request
from an OCS causes the connection to fail. The appliance adds the details for that
exchange to an internal list of connections for which SSL interception should be
negated. Subsequent requests function as expected.
You can globally enable the Reflect Client IP option for all services that will be
intercepted. To apply Reflect Client IP option to only a few services, first enable
this option globally and then create policy to disable the Reflect Client IP option
for the exceptions. Or, disable the option globally and create policy to enable it.
143
Advanced Secure Gateway Administration Guide
2. In the Reflect Client IP area, select Reflect client’s source IP when connecting to
servers.
3. Click Apply.
Important:If you enable Reflect Client IP and want the Advanced Secure
Gateway appliance to preserve persistent client connections, you must also add
policy.
VPM object: Web Access Layer > Action > Support Persistent Client Requests (static)
CPL:
<proxy>
http.client.persistence(preserve)
144
❐ DNS imputing on the Advanced Secure Gateway appliance is not configured
correctly. On the Advanced Secure Gateway appliance, you can configure a
list of suffixes to help with DNS resolution. In the event that the host name is
not found, these suffixes are appended to the host name provided by the
client. For information on DNS imputing, see "Resolving Hostnames Using
Name Imputing Suffixes" on page 833.
In each of the cases above, the Advanced Secure Gateway appliance cannot obtain
the destination IP address to serve client requests. When you enable the
Advanced Secure Gateway appliance to trust a client-provided destination IP
address, the Advanced Secure Gateway appliance uses the IP address provided
by the client and does not perform a DNS lookup.
Figure 7–1 No DNS lookup occurs; the transactions goes straight to the OCS.
Figure 7–2 The Advanced Secure Gateway appliance initiates a DNS lookup and initiates a new
connection to the server.
The Advanced Secure Gateway appliance cannot trust the client-provided
destination IP address in the following situations:
❐ The Advanced Secure Gateway appliance receives the client requests in an
explicit proxy deployment.
❐ The Advanced Secure Gateway appliance has a forwarding rule configured
for the request.
❐ The Advanced Secure Gateway appliance has a SOCKS gateway rule
configured for the request.
145
Advanced Secure Gateway Administration Guide
❐ The Advanced Secure Gateway appliance has policy that rewrites the server
URL.
A transproxy deployment is one where a client is configured to contact a
Advanced Secure Gateway appliance explicitly, and a new Advanced Secure
Gateway appliance is deployed between the client and its explicit proxy. The new
Advanced Secure Gateway appliance, now transparently intercepts the traffic
between the client and its explicit proxy. In a transproxy deployment, the
destination IP address used by the client does not match the host header in the
HTTP request, since the client is configured to use the explicit proxy. The path that
the client request takes in a transproxy deployment depends on whether or not
Trust Destination IP is enabled on the transparently deployed Advanced Secure
Gateway appliance.
❐ When Trust Destination IP is enabled on the transparent Advanced Secure
Gateway appliance, the transparent proxy trusts the destination IP included in
the request and forwards the request to the explicit proxy which is serviced
either from cache or from the Origin Content Server (OCS).
❐ When Trust Destination IP is disabled on the transparent Advanced Secure
Gateway appliance, the transparent proxy performs a DNS resolution on the
host header in the request. The request is then completed based on the
configured policy—forwarding rules, SOCKS gateway policy, and server URL
rewrite policy.
Note: If a client gives the destination address of a blocked site but the host name
of a non-blocked site, with Trust Destination IP enabled, the Advanced Secure
Gateway appliance connects to the destination address. This might allow clients
to bypass the configured security policy for your environment.
146
About the Default Settings
During the initial configuration tasks, the administrator determined the default
Trust Destination IP setting. In most deployments, the role of the appliance
determines the setting:
❐ Acceleration role: enabled.
❐ Most other proxy deployments: disabled for tighter security.
You can change these defaults through the Management Console, the CLI, or
through policy. If you use policy, however, be aware that it overrides the setting in
the in Management Console.
For information about using the trust_destination_ip(yes|no) CPL property,
refer to the Content Policy Language Guide.
147
Advanced Secure Gateway Administration Guide
Note: This prevents the appliance from enforcing any policy on these requests
and disables any caching of the corresponding responses. Because bypass entries
bypass Blue Coat policy, use bypass sparingly and only for specific situations.
148
Section 3 Adding Static Bypass Entries
You can add entries to prevent the Advanced Secure Gateway appliance from
intercepting requests from specified systems.
2. Click New to create a new list entry (or click Edit to modify a list entry). The
New Bypass List Entry dialog displays.
3. Create a Client Address or Server Address entry. The IP address can be IPv4 or
IPv6. If you enter an IPv4 address, you can specify a subnet mask. For IPv6
addresses, you can specify a prefix length.
4. (Optional) Add a Comment that indicates why you are creating the static
bypass rule for the specific source/destination combination. This is useful if
another administrator needs to tune the settings later.
5. Click OK to close the dialog.
6. Click Apply.
149
Advanced Secure Gateway Administration Guide
Note: Because bypass entries bypass Blue Coat policy, the feature should be used
sparingly and only for specific situations.
Notes
❐ Dynamic bypass entries are lost when the Advanced Secure Gateway
appliance is restarted.
❐ No policy enforcement occurs on client requests that match entries in the
dynamic or static bypass list.
❐ If a site that requires forwarding policy to reach its destination is entered into
the bypass list, the site is inaccessible.
150
Adding Dynamic Bypass Parameters to the Local Bypass List
The first step in configuring dynamic bypass is to set the server-threshold,
max-entries, or timeout values in the CLI.
Note: This step is optional because the Advanced Secure Gateway appliance uses
default configurations if you do not specify them. Use the default values unless
you have specific reasons for changing them. Contact Blue Coat Technical
Support for detailed advice on customizing these settings.
151
Advanced Secure Gateway Administration Guide
152
Section G: Trial or Troubleshooting: Restricting Interception From
Clients or To Servers
This section discusses Restricted Intercept topics. See "Restricted Intercept Topics"
for details.
153
Advanced Secure Gateway Administration Guide
Notes
❐ Restricted intercepts lists are only applicable to transparent connections.
❐ An entry can exist in both the Static Bypass List and the Restricted Intercept List.
However, the Static Bypass List overrides the entries in the Restricted Intercept
List.
154
2
3a
2. Select Restrict Interception to the servers and clients listed below-- all other
connections are bypassed.
155
Advanced Secure Gateway Administration Guide
156
Table 7–4 Proxy Types (Continued)
157
Advanced Secure Gateway Administration Guide
158
Table 7–5 Proxy Name and Listeners (alphabetical order) (Continued)
Note: The x-service-name field replaces the s-sitename field. The s-sitename
field can still be used for backward compatibility with squid log formats, but it
has no CPL equivalent.
Note: See Chapter 29: "Creating Custom Access Log Formats" on page 663 and
Chapter 30: "Access Log Formats" on page 671 for detailed information about
creating and editing log formats.
159
Advanced Secure Gateway Administration Guide
160
Chapter 8: Intercepting and Optimizing HTTP Traffic
This chapter describes how to configure the HTTP proxy to manage traffic and
accelerate performance in your environment.
How Do I...?
To navigate this chapter, identify the task to perform and click the link:
Configure the HTTP Proxy for object "Allocating Bandwidth to Refresh Objects
freshness? in Cache" on page 195
Step 4 in "To set HTTP default object
caching policy:" on page 180
161
Advanced Secure Gateway Administration Guide
Cache content without having to use "Using a Caching Service" on page 191
policy?
Fine-tune the HTTP Proxy for "Using a Caching Service" on page 191
bandwidth gain? "Using Byte-Range Support" on page 196
162
Section A: About the HTTP Proxy
Before Reading Further
Before reading this section, Blue Coat recommends that you be familiar with the
concepts in these sections:
❐ "About Proxy Services" on page 122.
The HTTP proxy is designed to manage Web traffic from the Internet, providing:
❐ Security
❐ Authentication
❐ Virus Scanning and Patience Pages
❐ Performance, achieved through Object Caching and Object Pipelining
❐ Transition functionality between IPv4-only and IPv6-only networks
The proxy can serve requests without contacting the Origin Content Server (OCS)
by retrieving content saved from a previous request made by the same client or
another client. This is called caching. The HTTP proxy caches copies of frequently
requested resources on its local hard disk. This significantly reduces upstream
bandwidth usage and cost and significantly increases performance.
Proxy services define the ports and addresses where a Advanced Secure Gateway
listens for incoming requests. The Advanced Secure Gateway has three default
HTTP proxy services: External HTTP, Explicit HTTP, and Internal HTTP. Explicit HTTP and
External HTTP use the HTTP proxy, while Internal HTTP uses TCP tunnel.
❐ The Explicit HTTP proxy service listens on ports 80 and 8080 for explicit
connections.
❐ The Internal HTTP proxy service listens on port 80 and transparently intercepts
HTTP traffic from clients to internal network hosts.
❐ The External HTTP proxy service listens on port 80 for all other transparent
connections to the Advanced Secure Gateway. Typically, these requests are for
access to Internet resources.
Although you can intercept SSL traffic on either port, to enable the Advanced
Secure Gateway to detect the presence of SSL traffic you must enable Detect
Protocol on the explicit HTTP service so that the SSL traffic is handed off to the SSL
Proxy. Default is set to OFF. For more information on SSL proxy functionality, see
Chapter 9: "Managing the SSL Proxy" on page 227.
Furthermore, you can create a bypass list on the Advanced Secure Gateway to
exclude the interception of requests sent from specific clients to specific servers
and disable caching of the corresponding responses. The static bypass list also
turns off all policy control and acceleration for each matching request. For
example, for all clients visiting www.bluecoat.com you might exclude interception
and caching of all requests, the corresponding responses, acceleration and policy
control. To create a static bypass list, used only in a transparent proxy
environment, see "Adding Static Bypass Entries" on page 149.
163
Advanced Secure Gateway Administration Guide
When accessing internal IP addresses, Blue Coat recommends using the TCP
tunnel proxy instead of the HTTP proxy. Some applications deployed within
enterprise networks are not always fully compatible with HTTP specs or are
poorly designed. Use of these applications can cause connection disruptions
when using HTTP proxy. As a result internal sites and servers use the Internal HTTP
service, which employs the TCP tunnel proxy.
Important: The TCP tunnel does not support HTTP proxy service functionality.
That is, only the TCP header of a request, (containing source and destination port
and IP) will be visible to the Advanced Secure Gateway for policy evaluation. To
ensure you get the most from the appliance, you must edit the External
(transparent) HTTP service to use the HTTP proxy instead of the default TCP
tunnel.
IPv6 Support
The HTTP proxy is able to communicate using either IPv4 or IPv6, either
explicitly or transparently.
In addition, for any service that uses the HTTP proxy, you can create listeners that
bypass or intercept connections for IPv6 sources or destinations.
164
Section B: Changing the External HTTP (Transparent) Proxy Service
to Intercept All IP Addresses on Port 80
By default, the External HTTP service includes an HTTP proxy service listener
configured on port 80. During the initial Advanced Secure Gateway
configuration, if it hasn’t already been set, you can set External HTTP to Intercept.
The following procedure describes how to set the service to Intercept mode.
2a
2b
165
Advanced Secure Gateway Administration Guide
HTTP Optimization
The HTTP proxy alleviates the latency in data retrieval and optimizes the delivery
of HTTP traffic through object caching and object pipelining. Caching minimizes
the transmission of data over the Internet and over the distributed enterprise,
thereby improving bandwidth use. Pipelining allows the Advanced Secure
Gateway to open several connections to a server, speeding up the delivery of
content into the cache. Pre-fetching is another method the Advanced Secure
Gateway uses to improve the user experience. Content on a requested web page
several levels deep is requested and cached for fast delivery to users.
For objects in cache, an intelligent caching mechanism in the Advanced Secure
Gateway maintains object freshness. This is achieved by periodically refreshing
the contents of the cache, while maintaining the performance within your
network.
The method of storing objects on disk is critical for performance and scalability.
SGOS, the operating system on the Advanced Secure Gateway, uses an object
store system which hashes object lookups based on the entire URL. This hashing
allows access to objects with far fewer lookups, as compared to a directory-based
file system found in traditional operating systems. While other file systems run
poorly when they are full, the Advanced Secure Gateway’s cache system achieves
its highest performance when it is full.
166
For more information on how the Advanced Secure Gateway executes permission
checks to ensure authentication over HTTP, see Section G: "Caching
Authenticated Data (CAD) and Caching Proxy Authenticated Data (CPAD)" on
page 202.
In case of a reverse proxy, object caching reduces the load on the OCS and
improves scalability of the OCS.
167
Advanced Secure Gateway Administration Guide
Although current browsers open multiple connections with the OCS to retrieve
objects in parallel, the Advanced Secure Gateway further accelerates the process
with its Object Pipelining algorithm which supports nested pipelines that are up
to three levels deep.
❐ The Object Pipelining algorithm allows the Advanced Secure Gateway to
open as many simultaneous TCP connections as the origin server allows, and
retrieves objects in parallel. The proxy also pre-fetches objects based on
pipelined requests. For example, if a pipelined HTML object has other
embedded objects, the HTTP proxy will pre-fetch those embedded objects
from the Web server without a request from the client. The objects are then
ready to be delivered from the cache straight to the user, as fast as the client
can request them.
While object pipelining enhances the user experience by minimizing latency and
improving response times for first-time Web page requests, it could increase
bandwidth utilization. Therefore by default, to avoid an increase in bandwidth
utilization, object pipelining is disabled for the reverse proxy and bandwidth gain
profiles. It is enabled, by default, only on the forward proxy — Normal profile,
where enhancing the response time for clients is vital.
168
Therefore, AAR is now disabled by default on systems running SGOS 6.2.6 and
later. However, if you upgrade from a pre-SGOS 6.2.6 release, AAR may still be
enabled. For information on how to configure this feature to best serve your
environment, see "Allocating Bandwidth to Refresh Objects in Cache" on page 195.
Planning Considerations
You can use CPL properties in the <Cache> layer to control meta tag processing.
The CPL commands can be used in lieu of the check boxes for parsing meta tags
through the Management Console. For details on the meta-tags, see Step 7 in "To
set HTTP default object caching policy:" on page 180.
The following CPL commands are applicable for HTTP proxy, HTTP refresh, and
HTTP pipeline transactions:
http.response.parse_meta_tag.Cache-Control(yes|no)
http.response.parse_meta_tag.Expires(yes|no)
http.response.parse_meta_tag.Pragma.no-cache(yes|no)
VPM support to control the processing of meta tags is not available.
169
Advanced Secure Gateway Administration Guide
From the (config) prompt, enter the following command to enable tolerant HTTP
request parsing (the default is disabled):
#(config) http tolerant-request-parsing
To disable HTTP tolerant request parsing:
#(config) http no tolerant-request-parsing
170
Compression is disabled by default. If compression is enabled, the HTTP proxy forwards
the supported compression algorithm (gzip and deflate) from the client’s request
(Accept-Encoding: request header) to the server as is, and attempts to send compressed
content to client whenever possible. This allows the Advanced Secure Gateway
appliance to send the response as is when the server sends compressed data, including
non-cacheable responses. Any unsolicited encoded response is forwarded to the client as
is.
Note: If compression is not enabled, the Advanced Secure Gateway appliance does
not compress the content if the server sends uncompressed content. However, the
appliance continues to uncompress content if necessary to apply transformations.
Any unsolicited encoded response is forwarded to the client as is.
For cache-hit compression behavior, see Table 8-1 below. For cache-miss compression
behavior, see Table 8-2.
.
171
Advanced Secure Gateway Administration Guide
Compression Exceptions
❐ The Advanced Secure Gateway appliance issues a transformation_error exception
(HTTP response code 403), when the server sends an unknown encoding and the
appliance is configured to do content transformation.
❐ The Advanced Secure Gateway appliance issues an unsupported_encoding
exception (HTTP response code 415 - Unsupported Media Type) when the appliance
is unable to deliver content due to configured policy.
The messages in the exception pages can be customized. For information on using
exception pages, refer to “Advanced Policy Tasks” in the Visual Policy Manager Reference.
Configuring Compression
Compression behavior can only be configured through policy—VPM or CPL.
172
❐ Client HTTP compression object: Allows you to determine the behavior when the
client wants the content in a different form than is in the cache.
❐ Server HTTP compression object: Allows you to enable or disable compression and to
set options.
❐ HTTP compression level object: Allows you to set a compression level of low,
medium, or high.
Refer to the Visual Policy Manager Reference to configure these HTTP compression
options.
You can use server-side or client-side controls to manage compression through policy, as
described in the following table.
173
Advanced Secure Gateway Administration Guide
Default Behavior
By default, Blue Coat sends the client’s list of the accept encoding algorithms, except for
unknown encodings. If compression is not enabled, the default overrides any configured
CPL policy.
If Accept-Encoding request header modification is used, it is overridden by the
compression related policy settings shown in Table 8-3. The Accept-Encoding header
modification can continue to be used if no compression policies are applied, or if
compression is not enabled. Otherwise, the compression-related policies override any
Accept-Encoding header modification, even if the Accept-Encoding header
modification appears later in the policy file.
Adding encoding settings with client-side controls depend on if the client originally listed
that encoding in its Accept-Encoding header. If so, these encodings are added to the list
of candidates to be delivered to the client. The first cache object with an Accept-Encoding
match to the client-side list is the one that is delivered.
174
http.server.accept_encoding(client);If no content transformation
policy is configured
http.server.accept_encoding(identity);If some content transformation
policy is configured
http.allow_compression(no); default
http.allow_decompression(no); default
Notes
❐ Policy-based content transformations are not stored as variant objects. If content
transformation is configured, it is applied on all cache-hits, and objects might be
compressed all the time at the end of such transformation if they are so configured.
❐ The variant that is available in the cache is served, even if the client requests a
compression choice with a higher qvalue. For example, if a client requests Accept-
encoding: gzip;q=1, deflate;q=0.1, and only a deflate-compressed object is
available in the cache, the deflate compressed object is served.
❐ The HTTP proxy ignores Cache-Control: no-transform directive of the OCS. To
change this, write policy to disallow compression or decompression if Cache-
Control: no-transform response header is present.
❐ The Advanced Secure Gateway appliance treats multiple content encoding (gzip,
deflate or gzip, gzip) as an unknown encoding. (These strings indicate the content has
been compressed twice.)
❐ The gzip and deflate formats are treated as completely separate and are not converted
from one to the other.
❐ Blue Coat recommends using gzip encoding (or allowing both gzip and deflate)
when using the HTTP compression feature.
❐ If the Advanced Secure Gateway appliance receives unknown content encoding and if
content transformation is configured (such as popup blocking), an error results.
❐ If the origin server provides compressed content with a different compression level
then that specified in policy, the content is not re-compressed.
❐ If the Advanced Secure Gateway appliance compressed and cached content at a
different compression level than the level specified in a later transaction, the content is
not re-compressed.
❐ Parsing of container HTML pages occurs on the server side, so pipelining
(prefetching) does not work when the server provides compressed content.
❐ Compressing a zip file breaks some browser versions, and compressing images does
not provide added performance.
❐ All responses from the server can be compressed, but requests to the server, such as
POST requests, cannot.
❐ Only 200 OK responses can be compressed.
175
Advanced Secure Gateway Administration Guide
Setting the maximum Determines the maximum object size to store in the Advanced Secure
object cache size Gateway. All objects retrieved that are greater than the maximum size are
delivered to the client but are not stored in the Advanced Secure Gateway.
Default: 1024 MB
Setting the TTL for Determines the number of minutes the SGOS stores negative responses
negative responses in for requests that could not be served to the client.
cache The OCS might send a client error code (4xx response) or a server error
code (5xx response) as a response to some requests. If you configure the
Advanced Secure Gateway to cache negative responses for a specified
number of minutes, it returns the negative response in subsequent
requests for the same page or image for the specified length of time. The
Advanced Secure Gateway will not attempt to fetch the request from the
OCS. Therefore, while server-side bandwidth is saved, you could receive
negative responses to requests that might otherwise have been served by
accessing the OCS.
By default, the Advanced Secure Gateway does not cache negative
responses. It always attempts to retrieve the object from the OCS, if it is
not already in cache.
Default: 0 minutes
Forcing freshness Verifies that each object is fresh upon access. Enabling this setting has a
validation before serving significant impact on performance because the HTTP proxy revalidates
an object from cache requested cached objects with the OCS before serving them to the client.
This results in a negative impact on bandwidth gain. Therefore, do not
enable this configuration unless absolutely required.
For enabling, select the Always check with source before serving object
check box.
Default: Disabled
176
Settings to Configure Notes
Object Caching
Parsing HTTP meta tag Determines how HTTP meta tag headers are parsed in the HTML
headers documents. The meta tags that can be enabled for parsing are:
• Cache-control meta tag
The sub-headers that are parsed when this check box is selected are:
private, no-store, no-cache, max-age, s-maxage, must-re-
validate, proxy-revalidate
• Expires meta tag
This directive parses for the date and time after which the document
should be considered expired.
• Pragma-no-cache meta tag
This directive indicates that cached information should not be used
and instead requests should be forwarded to the OCS.
Default: Disabled
Allocating bandwidth on Allows you to specify a limit to the amount of bandwidth the Advanced
the HTTP proxy for Secure Gateway uses to achieve the desired freshness. For more
maintaining freshness of information see, "Allocating Bandwidth to Refresh Objects in Cache" on
the objects in cache page 195.
Default: Disable refreshing
The above settings serve as defaults on the proxy. If you want a more granular
caching policy, for example— setting the TTL for an object, use Blue Coat Content
Policy Language (CPL). You can also use the VPM or CPL to bypass the cache or
to prohibit caching for a specific domain or server. Refer to the Content Policy
Language Guide for more information.
177
Advanced Secure Gateway Administration Guide
Caching/Optimization (Pipelining)
Configuration: Blue Coat Advanced Secure Gateway pipelining options enabled
(Configuration > Proxy Settings > HTTP Proxy > Acceleration Profile).
Symptom: The OCS becomes overwhelmed; users report slow access times in
their Web browsers.
Bandwidth Gain
Configuration: Blue Coat Advanced Secure Gateway Enable Bandwidth Gain Mode
option enabled (Configuration > Proxy Settings > HTTP Proxy > Acceleration Profile).
Symptom: The OCS becomes overwhelmed.
178
The Advanced Secure Gateway determines that objects in the cache require
refreshing. This operation itself is not costly, but the additional requests to the
OCS adds load to the WAN link. A global and per-server limit prevents the
problem.
For new installations (or following a restoration to factory defaults), clientless
limits are enforced by default; the Advanced Secure Gateway capacity per model
determines the upper default limit.
Continue with "Setting the HTTP Default Object Caching Policy" on page 180.
179
Advanced Secure Gateway Administration Guide
3. Configure default proxy policies (HTTP Proxy Policy area; see "About the HTTP
Object Caching Policy Global Defaults" on page 176):
a. In the Do not cache objects larger than field, enter the maximum object
size to cache. The default is 4096 MB for new installations of SGOS.
b. In the Cache negative responses for field, enter the number of minutes
that SGOS stores negative responses. The default is 0.
c. Force freshness validation. To always verify that each object is fresh
upon access, select the Always check with source before serving object
option. Enabling this setting has a significant impact on performance,
do not enable this configuration unless absolutely required.
d. Disable meta-tag parsing. The default is to parse HTTP meta tag
headers in HTML documents if the MIME type of the object is text/
html.
To disable meta-tag parsing, clear the option for:
• Parse cache-control meta tag
The following sub-headers are parsed when this check box is selected:
private, no-store, no-cache, max-age, s-maxage, must-
revalidate, proxy-revalidate.
180
• Parse expires meta tag
This directive parses for the date and time after which the document
should be considered expired.
• Parse pragma-no-cache meta tag
This directive indicates that cached information should not be used
and instead requests should be forwarded to the OCS.
4. Configure Clientless Request Limits (see "About Clientless Requests Limits" on
page 177):
a. Global Limit—Limits the number of concurrent clientless connections
from the Advanced Secure Gateway to any OCS. Strongly
recommended if Pipeline options or the Enable Bandwidth Gain Mode
option is enabled on the Configuration > Proxy Settings > HTTP Proxy >
Acceleration Profile tab.
See Also
❐ "Customizing the HTTP Object Caching Policy" on page 166.
❐ "Clearing the Object Cache" on page 1461
❐ "Selecting an HTTP Proxy Acceleration Profile" on page 182.
181
Advanced Secure Gateway Administration Guide
Topic Links
❐ "About the Normal Profile"
❐ "About the Portal Profile"
❐ "About the Bandwidth Gain Profile" on page 183
❐ "About HTTP Proxy Profile Configuration Components" on page 183
182
About the Bandwidth Gain Profile
The Bandwidth Gain profile is useful wherever server-side bandwidth is an
important resource. This profile is typically used in Internet Service Provider (ISP)
deployments. In such deployments, minimizing server-side bandwidth is most
important. Therefore, maintaining the freshness of an object in cache is less
important than controlling the use of server-side bandwidth. The Bandwidth-
Gain profile enables various HTTP configurations that can increase page response
times and the likelihood that stale objects are served, but it reduces the amount of
server-side bandwidth required.
183
Advanced Secure Gateway Administration Guide
184
Table 8–2 Description of Profile Configuration Components (Continued)
Substitute Get for PNC http [no] Typically, if a client sends an HTTP GET request
substitute pragma- with a Pragma: no-cache or Cache-Control:
no-cache no-cache header (for convenience, both are
hereby referred to as PNC), a cache must
consult the OCS before serving the content. This
means that HTTP proxy always re-fetches the
entire object from the OCS, even if the cached
copy of the object is fresh. Because of this, PNC
requests can degrade proxy performance and
increase server-side bandwidth utilization.
However, if the Substitute Get for PNC setting
is enabled, then the PNC header from the client
request is ignored (HTTP proxy treats the
request as if the PNC header is not present at
all).
Substitute Get for IE reload http [no] Some versions of Internet Explorer issue the
substitute ie- Accept: */* header instead of the Pragma:
reload no-cache header when you click Refresh. When
an Accept header has only the */* value, HTTP
proxy treats it as a PNC header if it is a type-N
object. You can control this behavior of HTTP
proxy with the Substitute GET for IE Reload
setting. When this setting is enabled, the HTTP
proxy ignores the PNC interpretation of the
Accept: */* header.
185
Advanced Secure Gateway Administration Guide
186
Table 8–2 Description of Profile Configuration Components (Continued)
187
Advanced Secure Gateway Administration Guide
188
Section 3 Configuring the HTTP Proxy Profile
Configure the profile by selecting any of the components discussed in "About
HTTP Proxy Profile Configuration Components" on page 183.
Text displays at the bottom of this tab indicating which profile is selected.
Normal is the default profile. If you have a customized profile, this text does
not display.
Important: If you have a customized profile and you click one of the Use
Profile buttons, no record of your customized settings remains. However,
after the Advanced Secure Gateway is set to a specific profile, the profile is
maintained in the event the Advanced Secure Gateway is upgraded.
Also, if you select any Pipeline option or the Enable Bandwidth Gain Mode
option, Blue Coat strongly recommends limiting clientless requests. See
"About Clientless Requests Limits" on page 177.
3. To select a profile, click one of the three profile buttons (Use Normal Profile, Use
Bandwidth Gain Profile, or Use Portal Profile).
The text at the bottom of the Acceleration Profile tab changes to reflect the new
profile.
Note: You can customize the settings, no matter which profile button you
select.
4. (Optional) To customize the profile settings, select or clear any of the check
boxes (see Table 8–2, "Description of Profile Configuration Components" on
page 183 for information about each setting).
189
Advanced Secure Gateway Administration Guide
See Also
❐ "Selecting an HTTP Proxy Acceleration Profile" on page 182.
❐ "About HTTP Proxy Profile Configuration Components" on page 183.
❐ "About HTTP Object Freshness" on page 168.
❐ "Using a Caching Service" on page 191.
190
Section E: Using a Caching Service
CachePulse is a caching service that provides you with optimal bandwidth gains
for popular or high-bandwidth websites. Utilizing highly effective Web caching
technology, CachePulse saves bandwidth on expensive international links and
backhaul traffic, thereby improving Web experience for users.
CachePulse accelerates the delivery of rich Web 2.0 content, video, and large files
such as:
• YouTube videos
• Netflix streaming media
• Microsoft Windows updates
Subscribing to the CachePulse service eliminates the need to maintain caching
policy; when you first enable the service, it downloads the latest version of the
caching policy database. CachePulse periodically updates the database as long as
the service is enabled and an Internet connection exists.
191
Advanced Secure Gateway Administration Guide
See Also
❐ "Downloading the CachePulse Database"
❐ "Notifications for Status Metrics" on page 1401
192
The License and Download Status field shows statistics about the previous
successful and unsuccessful downloads. If the last download was
unsuccessful, the field contains an error.
If you receive a download error, check your network configuration and make
sure that the appliance can connect to the Internet.
193
Advanced Secure Gateway Administration Guide
194
Section 5 Allocating Bandwidth to Refresh Objects in Cache
The Refresh bandwidth options control the server-side bandwidth used for all forms
of asynchronous adaptive refresh activity. On systems with increased object store
capacity, the value of asynchronous adaptive refresh has diminished markedly,
and can in many instances actually increase latency due to system load. Therefore,
this feature is disabled by default. You can select from the following options:
❐ Disable refreshing—Disables adaptive refresh. This setting is recommended on
systems that use an increased object capacity disk model. This is the default
setting for fresh installations of SGOS 6.2.6 and later.
❐ Let the SG appliance manage refresh bandwidth—The appliance will automatically
use whatever bandwidth is available in its efforts to maintain 99.9% estimated
freshness of the next access. You can also enable this from the CLI using the
#(config caching) refresh bandwidth automatic command. This setting is
recommended only on systems that are not using the increased object capacity
disk model (that is, systems that were manufactured with an SGOS version
prior to 6.2).
❐ Limit refresh bandwidth to x kilobits/sec—If you want to use adaptive refresh but
you want to limit the amount of bandwidth used, select this option and
specify a limit to the amount of bandwidth the Advanced Secure Gateway
uses to achieve the desired freshness. Before making adjustments, review the
logged statistics and examine the current bandwidth used as displayed in the
Refresh bandwidth field. It is not unusual for bandwidth usage to spike
occasionally, depending on access patterns at the time. Entering a value of
zero disables adaptive refresh.
195
Advanced Secure Gateway Administration Guide
The Refresh bandwidth field displays the refresh bandwidth options. The
default setting is to Disable refreshing.
Important: Blue Coat strongly recommends that you not change the setting
from the default if you have a system with an increased object store capacity.
196
When Byte-Range Support is Enabled
If the object is already in cache, the Advanced Secure Gateway serves the byte-
range request from the cache itself. However, if the client’s request contains a
PNC header, the Advanced Secure Gateway always bypasses the cache and serves
the request from the OCS.
If the object is not in cache, the Advanced Secure Gateway always attempts to
minimize delay for the client.
❐ If the byte-range requested is near the beginning of the object, that is the start
byte of the request is within 0 to 14336 bytes, then the Advanced Secure
Gateway fetches the entire object from the OCS and caches it. However, the
client is served the requested byte-range only.
❐ If the byte-range requested is not near the beginning of the object, that is the
start byte of the request is greater than 14336 bytes, then the Advanced Secure
Gateway fetches only the requested byte-range from the OCS, and serves it to
the client. The response is not cached.
Note: The HTTP proxy never caches partial objects, even if byte-range
support is enabled.
Since the Advanced Secure Gateway never caches partial objects, bandwidth gain
is significantly affected when byte-range requests are used heavily. If, for
example, several clients request an object where the start byte offset is greater
than 14336 bytes, the object is never cached. The Advanced Secure Gateway
fetches the same object from the OCS for each client, thereby causing negative
bandwidth gain.
Further, download managers like NetAnts® typically use byte-range requests
with PNC headers. To improve bandwidth gain by serving such requests from
cache, enable the revalidate pragma-no-cache option along with byte-range support.
See "Enabling Revalidate Pragma-No-Cache" on page 198.
197
Advanced Secure Gateway Administration Guide
To enable or disable the revalidate PNC setting, enter one of the following
commands at the (config) command prompt:
#(config) http revalidate-pragma-no-cache
-or-
#(config) http no revalidate-pragma-no-cache
198
client-side cumulative bytes of traffic is lower than the server-side cumulative
bytes of traffic for a given period of time. It is represented as a unit-less
multiplication factor and is computed by the ratio:
client bytes / server bytes
Some factors that contribute to negative bandwidth gain are:
❐ Abandoned downloads (delete_on_abandonment (no))
When a client cancels a download, the Advanced Secure Gateway continues
to download the requested file to cache it for future requests. Since the client
has cancelled the download, server-side traffic persists while the client-side
traffic is halted. This continued flow of traffic on the server-side causes
negative bandwidth gain.
Further with (delete_on_abandonment (yes)), when a client cancels a
download, the Advanced Secure Gateway terminates the connection and
stops sending traffic to the client. However, the server may have sent
additional traffic to the Advanced Secure Gateway before it received the TCP
RESET from the Advanced Secure Gateway. This surplus also causes negative
bandwidth gain.
❐ Refreshing of the cache
Bandwidth used to refresh contents in the cache contributes to server-side
traffic. Since this traffic is not sent to the client until requested, it might cause
negative bandwidth gain.
❐ Byte-range downloads
When download managers use an open-ended byte-range, such as Range:
bytes 10000-, and reset the connection after downloading the requested byte-
range. The packets received by the Advanced Secure Gateway from the server
are greater than those served to the client, causing negative bandwidth gain.
❐ Download of uncompressed content
If the Advanced Secure Gateway downloads uncompressed content, but
compresses it before serving the content to the client, server-side traffic will be
greater than client-side traffic. This scenario is typical in a reverse proxy
deployment, where the server offloads the task of gzipping the content to the
Advanced Secure Gateway.
❐ Reduced client-side throughput
In the short term, you will notice negative bandwidth gain if the client-side
throughput is lower than the server-side throughput. If, for example, the
Advanced Secure Gateway takes five minutes to download a 100 Mb file and
takes 10 minutes to serve the file to the client. The Advanced Secure Gateway
reflects negative bandwidth gain for the first five minutes.
To view bandwidth usage and bandwidth gain statistics on the HTTP proxy, click
Statistics > Traffic History tab. Select the HTTP proxy service to view statistics over
the last hour, day, week, month, and year. See Chapter 31: "Statistics" on page 733
for information on the graphs.
199
Advanced Secure Gateway Administration Guide
Compression
Compression is disabled by default. If compression is enabled, the HTTP proxy
forwards the supported compression algorithm (either deflate or gzip) from the
client’s request (Accept-Encoding: request header) to the server as is, and
attempts to send compressed content to client whenever possible. This allows
SGOS to send the response as is when the server sends compressed data,
including non-cacheable responses. Any unsolicited encoded response is
forwarded as is to the client.
For more information on compression, see "Understanding HTTP Compression"
on page 205.
200
#(config) http upload-with-pasv disable
#(config) http upload-with-pasv enable
#(config) http version {1.0 | 1.1}
#(config) http [no] www-redirect
#(config) http [no] xp-rewrite-redirect
Note: For detailed information about using these commands, refer to the
Command Line Interface Reference.
201
Advanced Secure Gateway Administration Guide
Figure 8–5 CAD: 200 response from the Origin Content Server.
The OCS then sends back one of the following responses:
❐ HTTP 200 response status, authentication is accepted. The user receives the
requested resource.
202
❐ HTTP 403 response status, user is not allowed to view the requested resource.
The user is authenticated but is not authorized to receive the content, hence
the user receives an error message.
When another user accesses the same URL, the Advanced Secure Gateway
authenticates the user with the OCS and verifies the freshness of the content using
the Get If Modified Since request. If the user is authorized and the content has
not been modified, the OCS returns an HTTP 304 response message to the
Advanced Secure Gateway. The Advanced Secure Gateway then serves the
content from cache.
If the content has been modified, the OCS returns the HTTP 200 response along
with the modified content.
Figure 8–6 CAD: 403 and 304 response codes from the OCS
Note: CAD is applicable only for pure HTTP authentication — the Advanced
Secure Gateway caches authenticated data only when the OCS includes the www-
Authenticate response code in the 401 response header. If, for example, the client
accesses an OCS that uses forms-based authentication, the Advanced Secure
Gateway does not perform CAD.
203
Advanced Secure Gateway Administration Guide
204
Understanding HTTP Compression
Compression reduces a file size but does not lose any data. Whether you should
use compression depends upon three resources: server-side bandwidth, client-
side bandwidth, and Advanced Secure Gateway CPU. If server-side bandwidth is
more expensive in your environment than CPU, always request compressed
content from the origin content server (OCS). However, if CPU is comparatively
expensive, the Advanced Secure Gateway appliance should instead be configured
to ask the OCS for the same compressions that the client asked for and to forward
whatever the server returns.
The default configuration assumes that CPU is costlier than bandwidth. If this is
not the case, you can change the Advanced Secure Gateway appliance behavior.
205
Advanced Secure Gateway Administration Guide
For cache-hit compression behavior, see Table 8-3 below. For cache-miss
compression behavior, see Table 8-4.
.
206
Table 8–5 Cache-Miss Compression Behavior (Continued)
Compression Exceptions
❐ The Advanced Secure Gateway appliance issues a transformation_error
exception (HTTP response code 403), when the server sends an unknown
encoding and the appliance is configured to do content transformation.
❐ The Advanced Secure Gateway appliance issues an unsupported_encoding
exception (HTTP response code 415 - Unsupported Media Type) when the
appliance is unable to deliver content due to configured policy.
The messages in the exception pages can be customized. For information on using
exception pages, The messages in the exception pages can be customized. For
information on using exception pages, refer to the Advanced Policy Tasks chapter, Section
E, of the Visual Policy Manager Reference.
Configuring Compression
Compression behavior can only be configured through policy—VPM or CPL.
207
Advanced Secure Gateway Administration Guide
a. From the Management Console, select Configuration > Policy > Visual
Policy Manager; click Launch.
b. Select Policy > Add Web Access Layer from the menu of the Blue Coat
VPM window that appears.
c. Type a layer name into the dialog that appears and click OK.
2. Add an Action object:
a. Right click on the item in the Action column; select Set.
b. Click New in the Set Action Object dialog that appears; select Set Client
HTTP Compression.
2c
2d
b. Select Policy > Add Web Access Layer from the menu of the Blue Coat
VPM window that appears.
c. Type a layer name into the dialog that appears and click OK.
2. Add an Action object:
a. Right click on the item in the Action column; select Set.
b. Click New in the Set Action Object dialog that appears; select Set Server
HTTP Compression.
208
d. Click OK again; close the VPM window and click Yes in the dialog to
save your changes.
• Select Policy > Add Web Access Layer from the menu of the Blue Coat VPM
window that appears.
• Type a layer name into the dialog that appears and click OK.
2. Add an Action object:
• Right click on the item in the Action column; select Set.
• Click New in the Set Action Object dialog that appears; select Set HTTP
Compression Level.
209
Advanced Secure Gateway Administration Guide
Default Behavior
By default, Blue Coat sends the client’s list of the accept encoding algorithms,
except for unknown encodings. If compression is not enabled, the default
overrides any configured CPL policy.
If Accept-Encoding request header modification is used, it is overridden by the
compression related policy settings shown in Table 8-5. The Accept-Encoding
header modification can continue to be used if no compression policies are
210
applied, or if compression is not enabled. Otherwise, the compression-related
policies override any Accept-Encoding header modification, even if the Accept-
Encoding header modification appears later in the policy file.
Adding encoding settings with client-side controls depend on if the client
originally listed that encoding in its Accept-Encoding header. If so, these
encodings are added to the list of candidates to be delivered to the client. The first
cache object with an Accept-Encoding match to the client-side list is the one that is
delivered.
Notes
❐ Policy-based content transformations are not stored as variant objects. If
content transformation is configured, it is applied on all cache-hits, and
objects might be compressed all the time at the end of such transformation if
they are so configured.
❐ The variant that is available in the cache is served, even if the client requests a
compression choice with a higher qvalue. For example, if a client requests
Accept-encoding: gzip;q=1, deflate;q=0.1, and only a deflate-compressed
object is available in the cache, the deflate compressed object is served.
❐ The HTTP proxy ignores Cache-Control: no-transform directive of the OCS.
To change this, write policy to disallow compression or decompression if
Cache-Control: no-transform response header is present.
211
Advanced Secure Gateway Administration Guide
❐ The gzip and deflate formats are treated as completely separate and are not
converted from one to the other.
❐ Blue Coat recommends using gzip encoding (or allowing both gzip and
deflate) when using the HTTP compression feature.
212
Section H: Viewing HTTP/FTP Statistics
This section discusses the following topics:
❐ "HTTP/FTP History Statistics"
❐ "Viewing the Number of HTTP/HTTPS/FTP Objects Served"
❐ "Viewing the Number of HTTP/HTTPS/FTP Bytes Served" on page 215
❐ "Viewing Active Client Connections" on page 216
❐ "Viewing HTTP/HTTPS/FTP Client and Server Compression Gain Statistics"
on page 217
❐ "Disabling the Proxy-Support Header" on page 219
Note: You can view current HTTP statistics through the CLI using the show http-
stats command.
213
Advanced Secure Gateway Administration Guide
3. (Optional) To set the graph scale to a different value, select a value from the
Graph scale should drop-down list.
214
Section 2 Viewing the Number of HTTP/HTTPS/FTP Bytes Served
The HTTP/HTTPS/FTP Bytes tab shows the sum total of the number of bytes served
from the device over the last 60 minutes, 24 hours, and 30 days. The chart shows
the total number of bytes for objects served by the device, including both cache
hits and cache misses.
3. (Optional) To set the graph scale to a different value, select a value from the
Graph scale should drop-down list.
215
Advanced Secure Gateway Administration Guide
3. (Optional) To set the graph scale to a different value, select a value from the
Graph scale should drop-down list.
216
Section 4 Viewing HTTP/HTTPS/FTP Client and Server Compression
Gain Statistics
Under HTTP/FTP History, you can view HTTP/FTP client and server
compression-gain statistics for the Advanced Secure Gateway over the last 60
minutes, 24 hours, and 30 days in the Client Comp. Gain and the Server Comp.
Gain tabs. Overall client and server compression-gain statistics are displayed
under System Usage. These statistics are not available through the CLI.
The green display on the bar graph represents uncompressed data; the blue
display represents compressed data. Hover your cursor over the graph to see the
compressed gain data.
See one of the following sections for more information:
❐ "Viewing HTTP/FTP Client Compressed Gain Statistics"
❐ "Viewing HTTP/FTP Server Compressed Gain Statistics" on page 218
3. (Optional) To set the graph scale to a different value, select a value from the
Graph scale should drop-down list.
See Also
"Viewing HTTP/HTTPS/FTP Client and Server Compression Gain Statistics" on
page 217
217
Advanced Secure Gateway Administration Guide
3. (Optional) To set the graph scale to a different value, select a value from the
Graph scale should drop-down list.
See Also
"Viewing HTTP/HTTPS/FTP Client and Server Compression Gain Statistics" on
page 217
218
Section I: Supporting IWA Authentication in an Explicit HTTP Proxy
Internet Explorer does not allow IWA authentication through a Advanced Secure
Gateway when explicitly proxied. To facilitate this authentication, Blue Coat
added a Proxy-Support: Session-based-authentication header. By default, when
the Advanced Secure Gateway receives a 401 authentication challenge from
upstream, it sends the Proxy-Support: Session-based-authentication header in
response.
The Proxy-Support header is not supported if:
❐ you are using an older browser (Refer to the SGOS Release Notes for supported
browser versions).
❐ both the Advanced Secure Gateway and the OCS perform IWA
authentication.
In either case, Blue Coat recommends that you disable the header and enable
Force IWA for Server Authentication. The Force IWA for Server Authentication action
converts the 401-type server authentication challenge to a 407-type proxy
authentication challenge that Internet Explorer supports. The Advanced Secure
Gateway also converts the resulting Proxy-Authentication headers in client
requests to standard server authorization headers, which allows an IWA
authentication challenge to pass through when Internet Explorer is explicitly
proxied through the appliance.
Note: To suppress the Proxy-Support header globally, use the http force-ntlm
command to change the option. To suppress the header only in certain situations,
continue with the procedures below.
219
Advanced Secure Gateway Administration Guide
3a
3b
3c
3d
220
Section J: Supporting Authentication on an Upstream Explicit Proxy
Proxy chaining may cause issues in HTTPS configurations. When an upstream
proxy requires Proxy-Authentication, a timeout may occur because by the time
the proxy authentication challenge occurs in the HTTP CONNECT request, the
client has already established a non-authorized connection to the downstream
proxy (which may or may not be a Advanced Secure Gateway).
To avoid this issue, use (command) (am I in the interface too?) when
protocol_detect is enabled. The HTTP proxy will challenge the client on any
CONNECT request for Proxy-Authentication. When the upstream proxy returns
the 200 OK message on receiving the Proxy-Authentication header to authorize
the request, but sends the credentials request on to the server.
Encrypted tap ( linky) works with this gesture...
Deployment Scenarios
Use this configuration when the Advanced Secure Gateway is inserted between a
client and an explicit proxy configured to use authentication. It can also be helpful
in transparent deployments.
• Explicit downstream: The Advanced Secure Gateway supports
authentication to the client for SSL/HTTPS traffic, with an upstream
proxy performing the authentication. The upstream proxy is not in your
(control)
• Transparent downstream: The Advanced Secure Gateway, deployed
transparently, supports authentication to the client for SSL/HTTPS traffic,
with an upstream proxy performing the authentication. For example, in a
chain where two proxies are configured transparently as accelerators and
a third further upstream functions explicitly, authentication requests may
not reach their destinations.
221
Advanced Secure Gateway Administration Guide
222
Section 5 How the Advanced Secure Gateway Appliance Handles an
Upgrade Request
Refer to the following overviews of how the Advanced Secure Gateway appliance
handles a WebSocket upgrade request in transparent proxy and in explicit proxy.
For more information on the policy condition mentioned in the following
overviews, refer to the Content Policy Language Reference and the Visual Policy
Manager Reference.
223
Advanced Secure Gateway Administration Guide
224
Section 6 Feature Limitations
❐ The appliance does not perform ICAP scanning (either REQMOD or
RESPMOD) on transactions using the WebSocket protocol.
❐ You must import the appliance’s signing certificate authority (CA) certificate
into the browser to prevent a trust error from occurring when the appliance
intercepts HTTPS and detects WebSocket over HTTPS.
225
Advanced Secure Gateway Administration Guide
226
Chapter 9: Managing the SSL Proxy
227
Advanced Secure Gateway Administration Guide
IPv6 Support
The SSL proxy is able to communicate using either IPv4 or IPv6, either explicitly
or transparently.
In addition, for any service that uses the SSL proxy, you can create listeners that
bypass or intercept connections for IPv6 sources or destinations.
Checking CRLs
An additional check on the server certificate is done through Certificate
Revocations Lists (CRLs). CRLs show which certificates are no longer valid; the
CRLs are created and maintained by Certificate Signing Authorities that issued
the original certificates.
Only CRLs that are issued by a trusted issuer can be used by the Advanced Secure
Gateway appliance. The CRL issuer certificate must exist as CA certificate on the
Advanced Secure Gateway appliance before the CRL can be imported.
The Advanced Secure Gateway appliance allows:
❐ One local CRL per certificate issuing authority.
❐ An import of a CRL that is expired; a warning is displayed in the log.
228
❐ An import of a CRL that is effective in the future; a warning is displayed in the
log.
229
Advanced Secure Gateway Administration Guide
230
Section A: Intercepting HTTPS Traffic
Intercepting HTTPS traffic (by decrypting SSL connections at the Advanced
Secure Gateway appliance) allows you to apply security measures like virus
scanning and URL filtering. See “Configuring STunnel” on page 248 to intercept
HTTPS using STunnel.
Configuration to intercept HTTPS traffic requires the following tasks:
❐ A Advanced Secure Gateway SSL license is required before you can make use
of the SSL proxy for interception. This can be verified in the maintenance tab >
licensing page.
❐ Determine whether you are using transparent or explicit mode. For
information on explicit versus transparent proxies, see Chapter 6: "Explicit
and Transparent Proxy" on page 111.
❐ Create an SSL service or HTTP/SOCKS services with protocol detection
enabled, depending on whether you are using transparent or explicit mode.
The Detect Protocol setting is disabled by default. For more information on
creating an SSL service, skip to "Configuring the SSL Proxy in Transparent
Proxy Mode" on page 232.
❐ Create or import an issuer keyring, which is used to sign emulated server
certificates to clients on the fly, allowing the SSL proxy to examine SSL
content. For more information on creating an issuer keyring, see "Specifying
an Issuer Keyring and CCL Lists for SSL Interception" on page 234.
❐ (Optional) Use the Notify User object or client consent certificates to notify users
that their requests are being intercepted and monitored. Whether this is
required depends on local privacy laws. The Advanced Secure Gateway
appliance has to decrypt the first request from the user to issue an HTML
notification page. If this is not desirable, use client consent certificates instead.
For more information on configuring the Notify User policy, refer to the Visual
Policy Manager Reference. For information on managing client consent
certificates, see "Using Client Consent Certificates" on page 234.
❐ Download CA certificates to desktops to avoid a security warning from the
client browsers when the Advanced Secure Gateway appliance is intercepting
HTTPS traffic. For information, see "Downloading an Issuer Certificate" on
page 235.
❐ Using policy (VPM or CPL), create rules to intercept SSL traffic and to control
validation of server certificates. By default, such traffic is tunneled and not
intercepted. You must create suitable policy before intercepting SSL traffic. For
more information on using policy to intercept SSL traffic, see Section B:
"Configuring SSL Rules through Policy" on page 240.
❐ Configure the Blue Coat AV or other third-party ICAP vendor, if you have not
already done this. For more information on ICAP-based virus scanning, see
Chapter 21: "Configuring Threat Protection" on page 453 (Blue Coat AV) and
Chapter 22: "Malicious Content Scanning Services" on page 465.
231
Advanced Secure Gateway Administration Guide
232
3. In the Name field, enter a meaningful name for this SSL proxy service.
4. From the Service Group drop-down list, select to which service this
configuration applies. By default, Other is selected.
5. Select SSL from the Proxy settings drop-down list.
6. TCP/IP Settings option: The Early Intercept option cannot be changed for the SSL
proxy service.
7. Create a new listener:
a. Click New; if you edit an existing listener, click Edit.
b. In the Source address area, the most common selection is All, which
means the service applies to requests from any client (IPv4 or IPv6).
You can, however, restrict this listener to a specific IPv4/IPv6 address
or user subnet/prefix length.
c. Select a Destination address from the options. The correct selection
might depend on network configuration. For overviews of the options,
see "About Proxy Services" on page 122.
d. In the Port Range field, enter a single port number or a port range on
which this application protocol broadcasts. For a port ranges, enter a
dash between the start and end ports. For example: 8080-8085
e. In the Action area, select the default action for the service: Bypass tells
the service to ignore any traffic matching this listener. Intercept
configures the service to intercept and proxy the associated traffic.
f. Click OK to close the dialog. The new listener displays in the Listeners
area.
8. Click OK to close the Edit Service dialog.
9. Click Apply.
Continue with "Specifying an Issuer Keyring and CCL Lists for SSL Interception"
on page 234.
233
Advanced Secure Gateway Administration Guide
Note: Only keyrings with both a certificate and a keypair can be used as issuer
keyrings.
You can also change the CA Certificate Lists (CCLs) that contain the CAs to be
trusted during client and server certificate validation. The defaults are adequate
for the majority of situations. For more information about CCLs, see Chapter 70:
"Authenticating an Advanced Secure Gateway Appliance" on page 1347.
2. Issuer Keyring: From the drop-down menu, select the keyring to use as the
issuer keyring. Any keyring with both a certificate and a keypair in the drop-
down menu can be used.
3. CCL for Client Certificates: Choose which CAs are trusted when the SSL proxy
validates client certificates. The default is <All CA Certificates>.
4. CCL for Server Certificates: Choose which CAs are trusted when the SSL proxy
validates server certificates. The CCL for server certificates is relevant even
when SSL proxy is tunneling SSL traffic. The default is browser-trusted.
5. Click Apply.
To configure policy, see "Configuring SSL Rules through Policy" on page 240.
234
With client consent certificates, each user is issued a pair of certificates with the
corresponding private keys. Both certificates have a meaningful user-readable
string in the common name field. One certificate has a string that indicates grant of
consent something like: “Yes, I agree to SSL interception”. The other certificate has
a common name indicating denial of consent, something like: “No, I do not agree
to SSL interception”.
Policy is installed on the Advanced Secure Gateway appliance to look for these
common names and to allow or deny actions. For example, when the string “Yes, I
agree to SSL interception” is seen in the client certificate common name, the
connection is allowed; otherwise, it is denied.
Note: You can e-mail the console URL corresponding to the issuer certificate to
end users so that the he or she can install the issuer certificate as a trusted CA.
235
Advanced Secure Gateway Administration Guide
5. Click Save. When the Save As dialog displays, click Save; the file downloads.
6. Click Open to view the Certificate properties; the Certificate window displays.
7. Click the Install Certificate button to launch the Certificate Import Wizard.
8. Ensure the Automatically select the certificate store based on the type of certificate
radio button is enabled before completing the wizard
9. Click Finish. the wizard announces when the certificate is imported.
10. (Optional) To view the installed certificate, go to Internet Explorer, Select Tools
> Internet Options > Contents > Certificates, and open either the Intermediate
Certification Authorities tab or the Trusted Root Certification Authorities tab,
depending on the certificate you downloaded.
Note: You can e-mail the console URL corresponding to the issuer certificate
to end users so that the end-user can install the issuer certificate as a trusted
CA.
236
3. Click Download an Advanced Secure Gateway Certificate as a CA Certificate; the list of
certificates on the system display.
4. Click a certificate (it need not be associated with a keyring); the Download
Certificate dialog displays.
5. Enable the options needed. View the certificate before trusting it for any
purpose.
6. Click OK; close the Advanced Statistics dialog.
237
Advanced Secure Gateway Administration Guide
Note: This only applies to SSL forward proxy transactions with HTTPS
interception enabled.
Task # Reference
3. From the Untrusted Issuer Keyring drop-down, select the desired keyring from
the list of eligible keyrings which will be used to sign untrusted server
certificates presented by the Advanced Secure Gateway appliance.
4. Click Apply.
238
Define Behavior in the Visual Policy Manager (VPM)
Override the Advanced Secure Gateway Management Console settings for
specific traffic, to specify whether the users should be prompted when a
certificate that has not been signed by a trusted Certificate Authority is
encountered.
In the SSL Intercept Layer, add one of the following Actions:
❐ Do not Preserve Untrusted Issuer
239
Advanced Secure Gateway Administration Guide
Note: For detailed instructions on using VPM, refer to the Visual Policy Manager
Reference.
240
d. Splash URL: The splash URL is added to the emulated certificate as a
certificate extension.
The STunnel options control various aspects of SSL interception.
a. Enable STunnel Interception: Establish a policy where configured STunnel
services (such as POP3S and SMTPS) are terminated and accelerated.
b. Enable SSL interception with automatic protocol detection: In addition to
STunnel interception as described above, discovered HTTPS is handed
off to the HTTPS proxy. Otherwise, SSL traffic continues in STunnel
mode.
5. Click OK to save the changes.
You can use the Disable SSL Intercept object to disable HTTPS Intercept.
5a
5b
5. Fill in the fields as described below. You can only select one field:
a. Hostname: This is the host name of the server whose traffic you want to
intercept. After entering the host name, use the drop-down menu to
specify Exact Match, Contains, At Beginning, At End, Domain, or Regex.
b. Subject: This is the subject field in the server's certificate. After you
enter the subject, use the drop-down menu to specify Exact Match,
Contains, At Beginning, At End, Domain, or Regex.
6. Click Add, then Close; click OK to add the object to the rule.
2. Click New and select the Server Certificate Category object. The Add Server
Certificate Category Object displays. You can change the name in the top field if
needed.
241
Advanced Secure Gateway Administration Guide
3. Select the categories. The categories you selected display in the right-hand
column.
4. Click OK.
Note: For detailed instructions on using VPM, refer to the Visual Policy Manager
Reference.
1. Select the Configuration > Policy > Visual Policy Manager tab and launch the VPM.
2. From the Policy drop-down menu, select Add SSL Access Layer.
3. In the Action column, right-click Set; the Set Action object displays.
4. Click New and select Set Server Certificate Validation object.
242
5. By default, server certificate validation is enabled; to disable it, select Disable
server certificate validation at the bottom of the dialog.
Notes
❐ If the Advanced Secure Gateway appliance and the origin content server
cannot agree on a common cipher suite for intercepted connections, the
connection is aborted.
243
Advanced Secure Gateway Administration Guide
244
Section C: Viewing SSL Statistics
The following sections discuss how to analyze various statistics generated by SSL
transactions.
Note: Some SSL statistics (SSL client connections and total bytes sent and
received over a period of time) can only be viewed through the Management
Console (see "Unintercepted SSL Data" on page 245 and "Unintercepted SSL
Clients" on page 246).
Status Description
Current unintercepted SSL The current number of unintercepted SSL client
connections connections.
Total unintercepted SSL connections The cumulative number of unintercepted SSL
client connections since the Advanced Secure
Gateway appliance was last rebooted.
Total bytes sent The total number of unintercepted bytes sent.
Total bytes received The total number of unintercepted bytes received.
245
Advanced Secure Gateway Administration Guide
3. Select a time period for the graph from the Duration: drop-down list. The
default is Last Hour.
4. (Optional) To set the graph scale to a different value, select a value from the
Graph scale should drop-down list.
246
3. Select the Duration: for the graph from the drop-down list. The default is Last
Hour.
4. (Optional) To set the graph scale to a different value, select a value from the
Graph scale should drop-down list.
247
Advanced Secure Gateway Administration Guide
Configuring STunnel
You can configure STunnel using the Visual Policy Manager (VPM) or the
Management Console.
248
• Enable SSL interception with automatic protocol detection:
In addition to
STunnel interception as described above, discovered HTTPS is handed off
to the HTTPS proxy. Otherwise, SSL traffic continues in STunnel mode.
Note: If an unsuccessful SSL interception occurs (the SSL handshake fails), the
traffic is tunneled.
249
Advanced Secure Gateway Administration Guide
2. On the branch peer, edit or create POP3S or SMTPS services (create a new
service at Configuration > Services > Proxy Services > New Service).
3. Click Apply on the Configuration tab.
For an SMTPS setup, follow the same configuration, except choose the
appropriate port and enter SMTPS as the Name.
Make sure your SSL policy is configured correctly for STunnel. See the next
section.
250
Traffic Mix
On the Traffic Mix > Service tab, view traffic distribution and bandwidth statistics
for SSL service traffic running through the Advanced Secure Gateway appliance.
Traffic History
STunnel sessions are listed under Traffic Mix and Traffic History:
1. Select the Statistics > Traffic Details> Traffic Mix/Traffic History.
2. On the Traffic Mix tab, select Proxy.
• The BW Usage and BW Gain tabs are available.
• The pie chart visually represents the bandwidth percentage for each proxy,
including STunnel.
• Scroll down in the table to view the STunnel (and HTTPS) information.
3. On the Traffic History tab, select Proxy.
• View STunnel on the BW Usage, BW Gain, Client Bytes and Server Bytes tabs.
251
Advanced Secure Gateway Administration Guide
Application Mix
The Advanced Secure Gateway appliance can classify SSL-tunneled traffic
without full HTTPS interception. The Statistics > Application Details > Application Mix
and Statistics > Application Details > Application History reports display the
applications detected in SSL-tunneled traffic. In the Proxy Type column in
Application Mix report, look for STunnel.
252
See "Active Sessions—Viewing Per-Connection Statistics" on page 759 for details
on using these windows.
Access Logging
View the SSL log to see the STunnel sessions; the cs-protocol value is set to stunnel.
253
Advanced Secure Gateway Administration Guide
b. On the Proxy Services tab, select Predefined Service Group >Standard >
HTTPS, and press Edit Service.
254
a. From the Management Console, on the Configuration tab, select Policy >
Visual Policy Manager > Launch. The Visual Policy Manager window pops
up.
b. On the VPM, from Policy, select Add SSL Access Layer, and provide a
name as required.
c. Highlight the added row, right click on Action, and choose Set.
d. On the Set Action Object window, click New..., and choose Enable
encrypted tap.
e. On the Add Encrypted Tap Object window, set the name, verify Enable
encrypted tap is selected, and choose the tap Interface to use from the
drop down.
f. Click Ok. The window closes.
g. Click Ok. The Set Action Object window closes.
5. Install the Encrypted Tap policy.
a. Click Install Policy. You will see a confirmation when the new policy has
been installed.
Note: Make sure the tapped interface is not the same as any client/server/
management interface in use, in order to avoid dumping tapped or decrypted
traffic onto real servers. Furthermore, to avoid dropping traffic at the L2
device (resultant of how L2 forwarding works), ensure there are no Layer 2
bridging devices between the Advanced Secure Gateway appliance and the
sniffer tools used on the tapped interface.
255
Advanced Secure Gateway Administration Guide
On another computer:
1. Connect the PC to the selected Ethernet interface.
2. Open the third-party application (such as Wireshark), and configure it to
monitor the network traffic on the selected Ethernet interface. The intercepted
HTTPS traffic should now be viewable by this application.
Troubleshooting
This section describes troubleshooting tips and solutions for Encrypted Tap.
❐ View access logs for Encrypted Tap. See ‘Viewing Access-Log Statistics.’
❐ View the Encrypted Tap debug log and statistics.
❐ Perform a packet capture at the hardware interface on the Advanced Secure
Gateway appliance. Go to Maintenance > Service Information > Packet Captures to
access packet captures. The capture provides details on the data transmitted
by the Advanced Secure Gateway appliance; compare this to the received tap
data.
❐ Perform policy tracing; refer to the Blue Coat Knowledge Base for articles on
how to perform an SSL policy trace.
256
Section F: Working with an HSM Appliance
A Hardware Security Module (HSM) provides additional security for storing
cryptographic keys and certificates, which is required in some highly regulated
industries. The Advanced Secure Gateway appliance is able to use a network-
attached HSM appliance to store resigning CA keys, and to perform digital
signature operations. The Advanced Secure Gateway appliance exchanges
signing requests and responses with the attached HSM appliance, over mutually
authenticated HTTPS requests. The Advanced Secure Gateway appliance sends
certificate data to the HSM.
The Advanced Secure Gateway appliance can work with multiple HSM
appliances, and multiple appliances can work with the same HSM. In the event
that a policy rule using an HSM to sign cannot work due to lack of response from
the HSM, the attempt is logged, and the applicable policy action configured for
HSM failure (cut through, drop, reject) occurs. In addition to the resigning
certificates, a mutually authenticated connection (communication pipeline) must
be set up by verified certificates. Configure the Advanced Secure Gateway
appliance with CLI, CPL, or the VPM.
257
Advanced Secure Gateway Administration Guide
An HSM requires a linked Device Profile (go to SSL > Device Profiles). Click New,
and create a FIPS compliant or non-compliant profile as required, then enter the
HSM credentials into the Create SSL Device Profile window. For more information,
see "Specifying an Issuer Keyring and CCL Lists for SSL Interception" for more
information.
Add an HSM
HSM appears in the Configuration > SSL menu. The new page contains three tabs.
Click Create on the HSM tab to set up an HSM connection.
1. On the Configuration > SSL > HSM tab, select Create. The Create HSM window pops up.
2. Enter the HSM credentials. For the Device Profile, select the HSM profile created
earlier. Click OK to save the information and close the window.
3. Click Apply on the HSM window. The new HSM appears in the list. Referenced
will show “No” until you use the new HSM in policy.
1. On the Configuration > SSL > HSM Keyrings tab, select Create. The Create HSM
Keyring window pops up.
2. Enter the HSM credentials. Use the Paste From Clipboard button to enter the
Certificate PEM file; the Key Label is the name associated with the private key
created on the SafeNet Java HSM. Click OK to save the information and close
the window..
3. Click Apply on the HSM Keyrings window. The new HSM keyring appears in the
list. Referenced will show “No” until you use the new keyring in policy.
258
Note: A keyring which is referenced by policy can’t be deleted.
Once a keyring has been created, you can click View Certificate to see the certificate
details and PEM file data. Click Preview to see a list of actions which will occur
when the keyring is implemented.
Note: HSM keyrings also appear in the Proxy Settings > SSL Proxy list of Issuer
Keyrings.
2. Create the new group. Move keyrings from the Available HSM Keyrings list to the
Included HSM Keyrings list with the Add>> and Remove>> buttons, to have them
included in the new group.
3. Click OK. The window closes.
4. Click Apply on the HSM Keygroups window.
259
Advanced Secure Gateway Administration Guide
3. Rename the layer on the Add New Layer window if required, then click OK (not
shown in the graphic).
4. Highlight the new layer, and right click at Action; select Set. The Set Action
Object window displays.
5. On the Set Action Object window, select New. > Enable SSL Interception.
6. On the Add SSL Interception Object window, select the Issuer Keyring to use for
HSM signatures. Configured HSM keyrings and keygroups appear on the
drop down list.
7. Click OK. The window closes.
8. Click Install Policy. You will see a “Policy installation was successful” message
on completion.
9. Close the VPM and click Apply.
260
261
Advanced Secure Gateway Administration Guide
Installing OpenSSL
After OpenSSL is installed, you must edit the openssl.cnf file and ensure the
path names are correct. By default root certificates are located under ./PEM/DemoCA;
generated certificates are located under /certs.
262
openssl req -new -x509 -keyout
c:\resources\ssl\openssl\bin\PEM\demoCA\private\cakey.pem -out
c:\resources\ssl\openssl\bin\PEM\demoCA\private\CAcert.pem
Using configuration from C:\Resources\SSL\OpenSSL\bin\openssl.cnf
Loading 'screen' into random state - done
Generating a 1024 bit RSA private key
.....................................+++++
................................................+++++
writing new private key to
'c:\resources\ssl\openssl\bin\PEM\demoCA\private\cakey.pem'
Enter PEM pass phrase:
2. Type any string more than four characters for the PEM pass phrase.
3. Enter the certificate parameters, such as country name, common name that are
required for a Certificate Signing Request (CSR).
The private key and root CA are now located under the directory ./PEM/
DemoCA/private
4. Create a keyring.
a. From the Management Console, select Configuration > SSL > Keyrings.
b. Click Create; fill in the fields as appropriate.
c. Click OK.
5. Create a CSR on the Advanced Secure Gateway appliance.
a. From the Management Console, select Configuration > SSL > Keyrings.
b. Highlight the keyring you just created; click Edit/View.
c. In the Certificate Signing Request pane, click Create and fill in the fields
as appropriate.
6. Paste the contents of the CSR into a text file called new.pem located in the ./bin
directory.
263
Advanced Secure Gateway Administration Guide
b. Click Import; enter the certificate name in the CA Cert Name field.
c. Paste the certificate, being sure to include the -----BEGIN
CERTIFICATE---- and the ----END CERTIFICATE----- statements in
the ./bin/PEM/demoCA/private/CAcert file.
d. Click OK.
264
Testing the Configuration
Import the root CA into your browser and construct an SSL interception policy.
All certificate management is done through the browser using the following URL:
http://@ip_server/CertSrv
For information on the following tasks, see:
❐ "Install the root CA onto the browser:" on page 265
❐ "Create an appliance keyring and certificate signing request:" on page 265
❐ "Sign the appliance CSR:" on page 266
❐ "Import the subordinate CA certificate onto the appliance:" on page 266
❐ "Test the configuration:" on page 267
265
Advanced Secure Gateway Administration Guide
5. Click Close.
Note: Ensure this keyring is used as the issuer keyring for emulated
certificates. Use policy or the SSL intercept setting in the Management
Console or the CLI.
4. Click Import to paste the contents of the newcert.pem file. This imported the
appliance’s subordinate CA certificate into the keyring.
5. To ensure the appliance trusts the newly -added certificate, import the
contents of the newcert.pem file into the CA Certificates list.
a. From the Management Console, select Configuration > SSL > CA
Certificates.
b. Click Import; enter the certificate name in the CA Cert Name field.
c. Paste the certificate, being sure to include the -----BEGIN
CERTIFICATE---- and the ----END CERTIFICATE----- statements in
the ./bin/PEM/demoCA/private/CAcert file.
d. Click OK.
e. Click Apply.
266
Test the configuration:
Import the root CA into your browser and construct an SSL interception policy.
You should not be prompted for any certificate warning.
267
Advanced Secure Gateway Administration Guide
268
Chapter 10: Managing the WebEx Proxy
This chapter describes how to use the Advanced Secure Gateway appliance
WebEx proxy to control WebEx sessions.
IPv6 Support
The Webex proxy is able to communicate using either IPv4 or IPv6, either
explicitly or transparently.
269
Advanced Secure Gateway Administration Guide
270
Section 2 Enable HTTP Handoff
1. Go to Configuration > Proxy Settings > WebEx Proxy.
2. Verify Enable HTTP handoff has been checked; it is checked by default.
271
Advanced Secure Gateway Administration Guide
6. Name the WebEx Site Object, then enter the site name in the detail you select at
the drop down. For example, enter “company1“ for an Exact Match, then click
OK. The Add WebEx Site Object window closes. The Site Name may only contain
alphanumeric characters.
272
9. Install the policy.
273
Advanced Secure Gateway Administration Guide
7. Name the object (for example, “WebExApplication”), select WebEx from the
left side list, and click OK.
274
• If the Advanced Secure Gateway appliance is unable to connect to the
BCWF, you will see a “Problem connecting” message.
8. Click New on the Add Combined Destination Object window, and select the Request
URL Operation. The system displays the Add Request Web Operation Control
window.
a. Name the object (for example, “WebExOperation-UploadFiles”).
b. Select Upload Files from the left side list, and click OK.
Note: Other WebEx operations include Host Meeting, Join Meeting, and Login.
9. To set up policy where both objects are required for the action to occur, set up
an AND situation.
a. Highlight the first new object (“WebExApplication”), and click Add to
move it to the top right object field.
b. Highlight the second new object (“WebExOperation-UploadFiles”),
and click Add to move it to the lower object field.
c. Click OK. The window closes.
d. Click OK on the Set Destination Object window.
275
Advanced Secure Gateway Administration Guide
10. On the VPM window, right click Action on the current layer, and choose Allow or
Deny.
276
Section 5 Control Desktop Sharing with Policy
Use a combined object to deny local desktop sharing through WebEx. Desktop
sharing is controlled by the Share Application function; the process is otherwise
the same as "Control File Uploads with Policy" .
Before You Begin
❐ Make sure the BCWF is licensed and active.
❐ Make sure the WebEx HTTP Handoff has been enabled before enacting policy.
❐ Go to Configuration > Application Classification > General, and click Enable Blue Coat
Application Classification on this device. This works with the Blue Coat Web Filter
to identify applications.
7. Name the object (for example, “WebExApplication”), select WebEx from the
left side list, and click OK.
277
Advanced Secure Gateway Administration Guide
278
9. To set up policy where both objects are required for the action to occur, set up
an AND situation.
279
Advanced Secure Gateway Administration Guide
280
Section 6 WebEx Proxy Access Logging
WebEx actions are reported under the Collaboration proxy access log by default.
Actions include:
• a user joining a meeting
• a user leaving a meeting
• a user connection is dropped abruptly
• a file or application sharing session starting
• a file or application finishing
• a file or application being blocked
To verify Access Logging is enabled, go to Configuration > Access Logging > General,
and click Enable Access Logging on the Default Logging tab. Verify the Collaboration
log appears on the Configuration > Access Logging > Logs tab.
For information about access log customization, refer to the "Creating Custom
Access Log Formats" . To view the Collaboration log, go to Statistics > Access
Logging, and select collaboration in the Log field.
Each individual WebEx meeting has a designated nine digit Meeting ID. This
Meeting ID is recorded in the access logs. Follow the Show Log Collaboration link.
The following table provides the log decode.
c-ip Client IP
281
Advanced Secure Gateway Administration Guide
282
Section 7 Review WebEx Proxy Sessions
After WebEx traffic begins to flow through the Advanced Secure Gateway
appliance, you can review the statistics page and monitor results in various
WebEx categories. The presented statistics are representative of the client
perspective.
283
Advanced Secure Gateway Administration Guide
284
Chapter 11: Managing the File Transport Protocol (FTP) Proxy
This chapter discusses the Blue Coat implementation of proxy support for File
Transport Protocol (FTP).
How Do I...?
To use this chapter, identify the task and click the link:
Customize the welcome banner for the FTP "Configuring FTP Connection Welcome
proxy? Banners" on page 292
About FTP
The Advanced Secure Gateway appliance supports two FTP modes:
❐ Native FTP, where the client connects through the FTP proxy, either
explicitly or transparently; the Advanced Secure Gateway appliance then
connects upstream through FTP (if necessary).
285
Advanced Secure Gateway Administration Guide
❐ Web FTP, where the client uses an explicit HTTP connection. Web FTP is used
when a client connects in explicit mode using HTTP and accesses an ftp://
URL. The Advanced Secure Gateway appliance translates the HTTP request
into an FTP request for the origin content server (OCS), if the content is not
already cached, and then translates the FTP response with the file contents
into an HTTP response for the client.
Native FTP uses two parallel TCP connections to transfer a file, a control connection
and a data connection.
❐ Control connections: Used for sending commands and control information,
such as user identification and password, between two hosts.
❐ Data connections: Used to send the file contents between two hosts. By
default, the Advanced Secure Gateway appliance allows both active and
passive data connections.
• Active mode data connections: Data connections initiated by an FTP
server to an FTP client at the port and IP address requested by the FTP
client. This type of connection method is useful when the FTP server can
connect directly to the FTP client. The FTP command for active mode is
PORT (for IPv4) or EPRT (for IPv6). When an IPv4 FTP client is
communicating with an IPv6 FTP server, the Advanced Secure Gateway
appliance will perform the required conversion (PORT to EPRT); the
clients and servers will be unaware that this conversion has taken place.
• Passive mode data connections: Data connections initiated by an FTP
client to an FTP server at the port and IP address requested by the FTP
server. This type of connection is useful in situations where an FTP server
is unable to make a direct connection to an FTP client because the client is
located behind a firewall or other similar device where outbound
connections from the client are allowed, but inbound connections to the
client are blocked. The FTP command for passive mode is PASV (for IPv4)
or EPSV (for IPv6). When an IPv4 FTP client is communicating with an
IPv6 FTP server, the Advanced Secure Gateway appliance will perform
the required conversion (PASV to EPSV); the clients and servers will be
unaware that this conversion has taken place.
When using the FTP in active mode, the FTP data connection is formed from the
server (OCS) to the client, which is opposite from the direction of the FTP control
connection.
286
Configuring IP Addresses for FTP Control and Data Connections
The FTP client determines whether the client-side data connection is active or
passive from the client to the Advanced Secure Gateway appliance. The
Advanced Secure Gateway appliance determines the server-side connections.
By default, the Advanced Secure Gateway appliance allows both active and
passive data mode connections. FTP connections are divided into client-side
control and data connections and server-side control and data connections.
❐ Client-side control connection: The proxy always uses the client’s IP address
to respond to the client. No configuration is necessary here.
❐ Client-side data connection: The proxy's behavior depends on the
ftp.match_client_data_ip(yes | no) property that is set via policy using
CPL. If this property is enabled (the default), the proxy uses the same IP
address for the data connection as it uses for the client-side control
connection. If the property is disabled, the proxy uses its own IP address,
choosing the address associated with the interface used to connect back to the
client.
When an FTP client uses different protocols for control and data connections
(for example, IPv4 for control and IPv6 for data), the
ftp.match_client_data_ip property must be set to no so that the Advanced
Secure Gateway appliance’s address is used for the data connection. Because
each Advanced Secure Gateway interface is configured with an IPv4 and an
IPv6 address in a mixed Internet protocol environment, the Advanced Secure
Gateway appliance will use the appropriate IP address for the type of FTP
server. For example, for transferring data to an IPv6 FTP server, the appliance
will set up with the data connection using its IPv6 address.
When the client-side data and control connections are over IPv4 and the
server-side control and data connections are over IPv6, the
ftp.match_client_data_ip property can be set to yes.
❐ Server-side control connection: The proxy uses the IP address selected by the
reflect_ip(auto | no | client | vip | ip_address) property. By default, this
is the local proxy IP address associated with the interface used to connect to
the server.
Client IP reflection is set globally from the Configuration > Proxy Settings >
General tab. By default, the CPL reflect_ip( ) setting is auto, which uses this
global configuration value.
Client IP reflection will automatically be disabled when the client is IPv4 and
the server is IPv6.
Note: Setting client IP address reflection for FTP affects the source address
that is used when making the outgoing control connection to the origin
server. It might also affect which address is used by the proxy for data
connections.
287
Advanced Secure Gateway Administration Guide
For information on creating and modifying policy through VPM, refer to the
Visual Policy Manager Reference. For information on creating and modifying policy
through CPL, refer to the <Emphasis>Blue Coat Content Policy Language Guide.
The ftp.match_server_data_ip( ) and ftp.match_client_data_ip( )
properties can only be set through CPL.
Note: Some clients might display an error when passive mode is disabled on the
Advanced Secure Gateway appliance, requiring you to manually request active
mode using the PORT/EPRT FTP commands.
The FTP client software controls any messages displayed to the end user as a
result of this response from the Advanced Secure Gateway appliance.
288
The ftp.match_server_data_ip(no) property most likely will not work correctly
with these servers.
Notes
❐ Internet Explorer does not support proxy authentication for native FTP.
❐ The FTP proxy does not support customized exception text; that is, you can
use policy to deny requests, but you can't control the text sent in the error
message.
289
Advanced Secure Gateway Administration Guide
Note: Web FTP requires an HTTP service, not an FTP service. For information on
configuring an HTTP proxy service, see Chapter 8: "Intercepting and Optimizing
HTTP Traffic" on page 161.
2a
2b
290
Configuring the FTP Proxy
The FTP proxy has several configurable settings related to caching of FTP objects
and whether passive mode is allowed.
2a
2b
2c
2d
2e
where current_time is the time when the object was requested by the
client. So, if it’s been 10 days since the object was modified, and the setting
is 10%, the object will be cached for one day.
c. Enter an amount, in hours, that the object remains in the cache before
becoming eligible for deletion. This setting applies to objects for which
the last-modified date is unknown. The default is 24 hours.
d. Select Allow use of passive mode to clients. The default is enabled, allowing
data connections to be initiated by an FTP client to an FTP server at the
port and IP address requested by the FTP server. (Active mode
connections are always allowed, regardless of whether the passive
mode setting is enabled or disabled.)
e. (Optional) See "Configuring FTP Connection Welcome Banners" on
page 292.
3. Click Apply.
291
Advanced Secure Gateway Administration Guide
Note: Neither proxy authentication for transparent FTP nor proxy chaining are
supported with the Checkpoint syntax. When native FTP traffic from an FTP
client (such as WSFtp) is being authenticated by the Advanced Secure Gateway
appliance using the Raptor syntax, the recommended authentication mode is auto
or proxy.
Note: Configurable banners are only displayed when FTP is explicitly proxied
through the Advanced Secure Gateway appliance. In transparent deployments,
the banner is sent to the client when proxy authentication is required; otherwise,
the FTP server sends the banner.
292
2. In the Welcome Banner field, enter a line of text that is displayed on FTP clients
upon connection. If the message length spans multiple lines, the Advanced
Secure Gateway appliance automatically formats the string for multiline
capability.
3. Click Apply.
293
Advanced Secure Gateway Administration Guide
294
Chapter 12: Managing the Domain Name Service (DNS)
Proxy
This chapter discusses managing Domain Name Service (DNS) traffic through
the DNS proxy on the Advanced Secure Gateway appliance (to configure the
Advanced Secure Gateway connections to DNS servers, see "Adding DNS
Servers to the Primary or Alternate Group" on page 829).
IPv6 Support
The DNS proxy is able to communicate using IPv4 or IPv6, either explicitly or
transparently.
The resolving name list can contain entries for IPv4 and IPv6 addresses. An
entry can contain either IPv4 or IPv6 addresses, although you cannot combine
IPv4 and IPv6 addresses in a single entry.
295
Advanced Secure Gateway Administration Guide
2a
2b
296
<DNS-Proxy>
dns.request.name=www.example.com dns.respond.a(vip)
-or-
<DNS-Proxy>
dns.request.name=.example.com dns.respond.a(vip)
-or-
<DNS-Proxy>
dns.request.name=www.example.com dns.respond.a(10.1.2.3)
-or-
<DNS-Proxy>
dns.request.name=www.google.com dns.respond.aaaa(2001::1)
An entry can contain either IPv4 or IPv6 addresses, although you cannot combine
IPv4 and IPv6 addresses in a single entry. Use the dns.respond.a property for IPv4
hosts and dns.respond.aaaa for IPv6 hosts. If you specify vip instead of a specific
IP address, the response will contain the Advanced Secure Gateway IP address
(the IPv6 address for dns.respond.aaaa or the IPv4 address for dns.respond.a).
Note: You can also create a resolving name list using the Visual Policy Manager
(VPM). For more information about the DNS Access Layer in the VPM, refer to the
Visual Policy Manager Reference.
297
Advanced Secure Gateway Administration Guide
298
Chapter 13: Managing a SOCKS Proxy
IPv6 Support
The SOCKS proxy includes basic IPv6 support for CONNECT and BIND.
In addition, for any service that uses the SOCKS proxy, you can create listeners
that bypass or intercept connections for IPv6 sources or destinations.
299
Advanced Secure Gateway Administration Guide
2a
2b
3. Click Apply.
300
Section 1 Configuring the SOCKS Proxy
Complete the following steps to create a SOCKS proxy and to configure SOCKS-
proxy connection and timeout values. For more information, see "About SOCKS
Deployments" on page 299.
2. The displayed defaults should be sufficient for most purposes. The following
table discusses the options.
Table 13–1 SOCKS Proxy Options
301
Advanced Secure Gateway Administration Guide
<proxy> client.protocol=socks
ALLOW socks.version=5
DENY
❐ If browsers and FTP clients are configured to use SOCKS encapsulation and a
rule in policy is matched that denies a transaction, a page cannot be displayed
message displays instead of an exception page.
This is expected behavior, as a deny action abruptly closes the client's TCP
connection, yet the client is expecting a SOCKS-style closure of the connection.
You can avoid this, and return an exception page, by applying the following
policy:
• If using the VPM, go to a Web Access Layer, create two rules. For the first
rule, select Service > New > Client Protocol > SOCKS > TCP Tunneling over SOCKS;
for the second, select Service > New > Client Protocol > SOCKS > All SOCKS.
• If using CPL, enter the following:
<Proxy>
DENY socks=yes tunneled=yes
DENY socks=yes
302
Section 2 Viewing SOCKS History Statistics
The SOCKS History tabs (SOCKS Clients, SOCKS Connections, and SOCKS client
and server compression) display client data, Connect, Bind, and UPD Associate
requests, client and server UDP, TCP and compression requests.
Note: The SOCKS history statistics are available only through the Management
Console.
303
Advanced Secure Gateway Administration Guide
304
3. (Optional) To set the graph scale to a different value, select a value from the
Graph scale should drop-down list.
3. (Optional) To set the graph scale to a different value, select a value from the
Graph scale should drop-down list.
305
Advanced Secure Gateway Administration Guide
306
Chapter 14: Managing Shell Proxies
This chapter discusses how to configure the Telnet shell proxy. Shell proxies
provide shells which allow a client to connect to the Advanced Secure Gateway
appliance. In this version, only a Telnet shell proxy is supported.
Substitution Description
307
Advanced Secure Gateway Administration Guide
Substitution Description
client.protocol This is telnet.
client.address IP address of the client. IPv4 and IPv6 addresses
are accepted.
308
❐ Explicit termination with proxy authentication, where after obtaining the
destination host and port information from the user, the Advanced Secure
Gateway appliance challenges for proxy credentials. After the correct proxy
credentials are provided and authenticated, the appliance makes an upstream
connection and goes into tunnel mode. In this case, the appliance provides a
shell.
❐ Transparent termination without proxy authentication, where the Advanced
Secure Gateway appliance intercepts Telnet traffic through an L4 switch,
software bridge, or any other transparent redirection mechanism. From the
destination address of TCP socket, the Advanced Secure Gateway appliance
obtains OCS contact information and makes the appropriate upstream
connection, either directly or through any configured proxy. For more
information on configuring a transparent proxy, see Chapter 6: "Explicit and
Transparent Proxy" on page 111.
❐ Transparent termination with proxy authentication, where, after intercepting
the transparent connection, the Advanced Secure Gateway appliance
challenges for proxy credentials. After the correct proxy credentials are
provided and authenticated, the Advanced Secure Gateway appliance makes
an upstream connection and goes into tunnel mode.
After in the shell, the following commands are available:
❐ help: Displays available commands and their effects.
❐ telnet server[:port]: Makes an outgoing Telnet connection to the specified
server. The colon (:) between server and port can be replaced with a space, if
preferred. The server can be an IPv4 or an IPv6 host.
❐ exit: Terminates the shell session.
309
Advanced Secure Gateway Administration Guide
Bypass Recommended
service group (by default)
2. Scroll to the Bypass Recommended service group and click it to expand the list.
3. Select Telnet.
4. From the drop-down list, select Intercept.
5. Click Apply.
310
2
2. To set the maximum concurrent connections, select Limit Max Connections. Enter
the number of maximum concurrent connections allowed for this service.
Allowed values are between 1 and 65535.
3. (Optional) Change the default banner settings.
• Welcome banner—Users see this when they enter the shell. The default
string is: Blue Coat $(module_name) proxy.
• Realm banner—Users see this help message just before they see the
Username prompt for proxy authentication. The default string is:
Enter credentials for realm $(realm).
311
Advanced Secure Gateway Administration Guide
Note: The Shell history statistics are available only through the Management
Console.
2. Select a time- period for the graph from the Duration: drop-down list. The
default setting is last hour.
3. (Optional) To set the graph scale to a different value, select a value from the
Graph scale should drop-down list.
312
Chapter 15: Configuring and Managing an HTTPS Reverse
Proxy
This section describes how to use the Blue Coat HTTPS Reverse Proxy solution.
It includes the following topics:
❐ Section A: "About the HTTPS Reverse Proxy" on page 313
❐ Section B: "Configuring the HTTPS Reverse Proxy" on page 314
❐ Section C: "Configuring HTTP or HTTPS Origination to the Origin Content
Server" on page 321
313
Advanced Secure Gateway Administration Guide
Note: One common scenario in using HTTPS reverse proxy, which connects the
client to the Advanced Secure Gateway appliance, is in conjunction with HTTPS
origination, which is used to connect to the origin content server (OCS). For more
information on this option, see Section C: "Configuring HTTP or HTTPS
Origination to the Origin Content Server" on page 321.
Prerequisite Tasks
Before creating an HTTP reverse proxy service, you must:
❐ Create or import a keyring (Configuration > SSL > Keyrings > SSL Keyrings).
❐ (If necessary) Create a Certificate Signing Request (CSR) that can be sent to a
Certificate Signing Authority (CA). After the CSR has been signed and the
certificate has been created, import the certificate to the keyring you created or
imported in the previous step. (Select Configuration > SSL > Keyrings. Select the
keyring you created or imported, and then click Edit. In the Certificate Signing
Request section, click Import, paste the CSR, and click OK. Click Close > Apply).
-or-
❐ Create a certificate for internal use and associate it with the keyring.
❐ (Optional, if using server certificates from CAs) Import Certificate Revocation
Lists (CRLs) so the Advanced Secure Gateway appliance can verify that
certificates are still valid.
When these steps are complete, you can configure the HTTPS reverse proxy
service.
314
Creating an HTTPS Reverse Proxy Service
Unlike other services, the Advanced Secure Gateway appliance does not create an
HTTPS Reverse Proxy service by default. (The Advanced Secure Gateway
appliance has an HTTPS proxy service configured on port 443.) Therefore, you
must create a new service.
315
Advanced Secure Gateway Administration Guide
3
4
c. CA Cert List: Use the drop-down list to select any already created list
that is on the system.
d. SSL Versions: Select the version(s) to use for this service from the list.
The default is TLS v1, TLS v1.1, and TLS v1.2.
316
e. Verify Client: Select this option to enable mutual SSL authentication. See
"About Mutual SSL Authentication" on page 319 for information.
Selecting this option makes the Forward Client Certificate option available.
f. Forward Client Cert: (Available if Verify Client is selected)
Select this option
to put the extracted client certificate information into the Client-Cert
header that is included in the request when it is forwarded to the
origin content server. The header contains the certificate serial number,
subject, validity dates, and issuer (all as name=value pairs). The actual
certificate itself is not forwarded.
6. Create a listener for the IP address(es) and ports that this application protocol
uses. In the Listeners area, click New. The New Listener dialog displays.
8a
8b
8c
8d
317
Advanced Secure Gateway Administration Guide
318
About Mutual SSL Authentication
During an SSL handshake, the client and server negotiate the mode of operation,
the type of authentication required by both parties, the cryptographic and
hashing algorithms to use for providing confidentiality and integrity, and the
compression algorithm to use for the session.
SSL authentication can use the following modes of operation:
❐ Typical SSL authentication: This mode provides confidentiality and integrity
of the data sent between the client and the server, and requires the server to
authenticate to the client using an X.509 certificate.
❐ Mutual SSL authentication: In this mode, the server authenticates to the client
using an X.509 certificate and the client must authenticate to the server with a
separate X.509 certificate.
When a Common Access Card (CAC) is used, the certificate identifies the user
who owns the CAC. For information on CAC authentication, refer to the
Common Access Card Solutions Guide.
In mutual SSL authentication, an SSL connection between a client and a server is
established only if the client and server validate each other’s identity during the
SSL handshake. Both the server and the client must have their own valid
certificate and the associated private key in order to authenticate.
Note: TLS is supported based on the server and client in use. For brevity, this
section refers only to SSL; however, SSL can be used interchangeably with TLS.
In this scenario, the user logs in to the Advanced Secure Gateway appliance
(server) using a browser (client). During this process, the client (browser)
validates the server (Advanced Secure Gateway appliance) certificate. This
includes the following checks:
❐ The certificate subject must match the server’s hostname.
319
Advanced Secure Gateway Administration Guide
In this scenario, the user logs in to the Advanced Secure Gateway appliance using
mutual SSL authentication. During this process:
1. The client (browser) validates the server (Advanced Secure Gateway
appliance) certificate. This includes the following checks:
• The certificate subject must match the server’s hostname.
• The certificate must be issued by a CA listed in the browser’s Trusted Root
Certificate store.
• The client confirms that the server has the certificate's private key by
challenging the server to sign random data. The client validates the
signature using the server's certificate.
2. The server (Advanced Secure Gateway appliance) validates the client
certificate that the browser presents. This includes the following checks:
• The certificate must be issued by a CA in the CCL for the Advanced Secure
Gateway appliance service that is performing the validation.
• The server confirms that the client has the certificate's private key by
challenging the client to sign random data. The server validates the
signature using the client's certificate.
• The certificate must be valid; it must have a valid signature and not be
expired.
• (If using a CRL) The certificate must not have been revoked.
320
Section C: Configuring HTTP or HTTPS Origination to the Origin
Content Server
In previous procedures, you configured HTTPS Reverse Proxy to the Advanced
Secure Gateway appliance. In two common termination scenarios, you must also
configure HTTPS origination to the Origin Content Server (OCS).
The first two scenarios are used to provide a secure connection between the proxy
and server, if, for example, the proxy is in a branch office and is not co-located
with the server.
Table 15–1 Scenario 1: HTTPS Reverse Proxy with HTTPS Origination
Steps Steps
• Configure a keyring. • (Optional) Add a forwarding host.
• Configure the SSL client. • (Optional) Set an HTTPS port.
• Configure the HTTPS service. • (Optional) Enable server certificate
Table 15–2 Scenario 2: HTTP Termination with HTTPS Origination
Steps Steps
• Client is explicitly proxied. • Server URL rewrite.
-or-
• Add a forwarding host
• Set an HTTPS port.
• (Optional) Enable server certificate
verification
Using server URL rewrite is the preferred method. For information on rewriting
the server URL, refer to the <Emphasis>Blue Coat Content Policy Language Guide.
321
Advanced Secure Gateway Administration Guide
The next scenario is useful when the Advanced Secure Gateway appliance is
deployed as a reverse proxy. This scenario is used when it is not necessary for a
secure connection between the proxy and server. For information on using the
Advanced Secure Gateway appliance as a reverse proxy, see Section D: "Selecting
an HTTP Proxy Acceleration Profile" on page 182.
Table 15–4 Scenario 2: HTTP Reverse Proxy with HTTPS Origination
Steps Steps
• Configure a keyring • Server URL rewrite
• Configure the SSL client -or-
• Configure the HTTPS service • Add a forwarding host
• Set an HTTP port
Using server URL rewrite is the preferred method. For information on rewriting
the server URL, refer to the Content Policy Language Reference.
322
Table 15–5 HTTP Origination Commands (Continued)
323
Advanced Secure Gateway Administration Guide
324
Chapter 16: Using the Advanced Secure Gateway Appliance
in an IPv6 Environment
325
Advanced Secure Gateway Administration Guide
326
Section 1 Using the Advanced Secure Gateway Appliance in an ISATAP
Network
One way to transition a network from IPv4 to IPv6 is with the Intra-Site
Automatic Tunnel Addressing Protocol (ISATAP). ISATAP uses a tunneling
approach to transport IPv6 traffic across an existing IPv4 infrastructure by
encapsulating IPv6 packets with an IPv4 header. ISATAP-based connectivity can
immediately be used to deliver IPv6 services while the IPv4-only infrastructure is
gradually migrated to integrate native IPv6 capabilities. The tunneling of IPv6
traffic through the use of IPv4 encapsulation is called 6-in-4.
In this example of an ISATAP topology, remote IPv6 clients need to access IPv6
servers over the enterprise IPv4 network. To accomplish this, IPv6 traffic from the
client is encapsulated by the ISATAP router before traversing the IPv4 network.
For example, IPv6 packets destined for IPv6 Server 1 in the data center are
encapsulated with the IPv4 tunnel address of ISATAP Tunnel 1. IPv6 packets
destined for the Internet are encapsulated with the IPv4 tunnel address of ISATAP
Tunnel 2.
327
Advanced Secure Gateway Administration Guide
byte caching and compression over an ADN tunnel (assuming a peer is found).
The following flow diagram describes how the Advanced Secure Gateway
processes ISATAP traffic.
Notes:
❐ If the requested object is in cache or if the security policy determines that the
request should not be allowed, the response is sent back to the client
immediately over the encapsulated client-side connection.
❐ ISATAP is disabled by default.
❐ Reflect Client IP settings do not apply to the outer encapsulation header (the
IPv4 address). Reflect Client IP settings are honored only for inner IPv6 source
addresses for connections intercepted by application proxies, not the ISATAP
proxy.
Feature Requirements
❐ The routers must support ISATAP.
❐ The Advanced Secure Gateway appliances must be inline between the
ISATAP-capable routers.
❐ ISATAP must be enabled. See "Optimizing ISATAP Traffic" on page 341.
Feature Limitations
❐ Features that modify the destination address, such as URL rewrites and
advanced forwarding, can cause issues with ISATAP processing because the
IP encapsulation information must be preserved. If the destination address
gets modified, users will see TCP connection errors because the server cannot
be found.
328
❐ Only explicit ADN deployments are supported for ISATAP encapsulated
traffic. The Advanced Secure Gateway uses the destination address in the
encapsulation header to perform the route lookup for establishing the explicit
ADN tunnel.
❐ In a virtually inline (WCCP) deployment, the appliance is able to handle the
ISATAP traffic and optimize the services for which application proxies are
available, but the ISATAP proxy is not able to optimize the remaining ISATAP
traffic, as it can in an inline deployment. This limitation occurs because the
remaining traffic will likely not be redirected to the applianceAdvanced
Secure Gateway.
329
Advanced Secure Gateway Administration Guide
IPv6 Proxies
The following proxies have underlying protocols that support IPv6 and can
communicate using either IPv4 or IPv6:
Table 16–1
TCP Tunnel
ISATAP Proxy
When the Advanced Secure Gateway encounters Intra-Site Automatic Tunnel
Addressing Protocol (ISATAP) traffic, it decides whether to process the 6-in-4
packets with the ISATAP proxy or one of the traditional application proxies
(HTTP, FTP, CIFS, etc.). To make the decision on which proxy to use, the
Advanced Secure Gateway identifies the service inside the encapsulated packet. If
the Advanced Secure Gateway is intercepting this service, the traffic is processed
by one of the traditional application proxies. If the service is not intercepted, the
Advanced Secure Gateway uses the ISATAP proxy to optimize the IPv6 packet
330
and payload over an ADN tunnel, assuming an ADN peer is found. Note that this
proxy processes all ISATAP traffic that is not handled by application proxies,
including ICMP, UDP, TCP, and routing protocols. If an ADN peer is not found,
the packet cannot be optimized; it is simply sent to its destination.
The ISATAP proxy uses the following techniques to optimize the IPv6 packets:
❐ Byte caching
❐ Compression
The ISATAP proxy works differently than the application proxies: it processes
individual packets instead of entire streams. It does not inspect the contents of the
payload; it optimizes the entire packet.
Traffic that is processed by the ISATAP proxy appears in Active Sessions as the
ISATAP_tunnel service and the ISATAP proxy type. The Active Sessions report
lists the IPv4 tunnel address (not the IPv6 destination) as the server address since
the ISATAP proxy has no insight into the payload of the packet.
The ISATAP proxy is not enabled by default. Until you enable ISATAP, 6-in-4
packets will be bypassed. See "Optimizing ISATAP Traffic" on page 341.
331
Advanced Secure Gateway Administration Guide
Use the Configuration > Services > Management Services option to view or modify the
listeners for each management service.
332
Features that Support IPv6
The SGOS software accommodates the entry of either IPv4 or IPv6 IP addresses in
applicable features. Table 16–2 lists the features that can be configured with either
IPv4 or IPv6 addresses.
Table 16–2
DNS servers "Adding DNS Servers to the #(config dns forwarding)edit primary
Primary or Alternate Group" #(config dns fowarding primary)add server
on page 829 2001:db8:85a3::8a2e:370:7334
Forwarding hosts "Creating Forwarding Hosts" #(config forwarding) create host ipv6-
on page 890 proxy 2001:db8::1 http proxy
"IPv6 Forwarding" on page
335
333
Advanced Secure Gateway Administration Guide
Table 16–2
Upload access "Editing Upload Clients" on #(config log log_name) ftp-client primary
logs to an IPv6 page 646 host 2001:418:9804:111::200
server
The IP address or hostname fields for these features accommodate the entry of
IPv4 or IPv6 addresses and, when applicable, include a field for entering the
prefix length (for IPv6 addresses) or subnet mask (for IPv4 addresses). For
example:
334
IPv6 Forwarding
To minimize WAN traffic, you can create forwarding hosts — the Advanced
Secure Gateway configured as a proxy to which certain traffic is redirected for the
purpose of leveraging object caching. (See "About the Forwarding System" on
page 881.) It is possible to create IPv4-to-IPv6 forwarding, IPv6-to-IPv4
forwarding, and IPv6-to-IPv6 forwarding.
For example, to create a policy that forwards an IPv4 destination to an IPv6
forwarding host:
1. Create an IPv4 virtual IP (VIP) address for the Advanced Secure Gateway.
2. Create a forwarding host entry using an explicit IPv6 address or a hostname
that resolves into an IPv6 address.
3. Launch the Visual Policy Manager (VPM)—Configuration > Policy > Visual Policy
Manager.
335
Advanced Secure Gateway Administration Guide
IPv6 Limitations
IPv6 support on the Advanced Secure Gateway has the limitations described
below.
❐ The following proxies do not currently have IPv6 support:
• MMS streaming
• CIFS
• MAPI
❐ The Advanced Secure Gateway does not intercept link-local addresses in
transparent mode since this deployment isn’t practical; transparent link-local
addresses will be bypassed.
336
❐ IPv6 is not supported in a WCCP deployment.
337
Advanced Secure Gateway Administration Guide
3b
3a
3. Assign addresses:
a. Click Add IP. The Add IP Address dialog displays.
b. Enter the IPv6 address and prefix length.
c. Click OK twice to close each dialog.
d. Click Apply.
4. Add a DNS server for IPv6. Select the Configuration > Network > DNS > Groups tab.
5. You can place both network servers types (IPv4 and IPv6) in the same DNS
group, or separate them into different groups.
a. Click Edit or New and add a DNS server for IPv6.
b. Click Apply.
6. IPv6 requires its own gateway. Select the Configuration > Network > Routing >
Gateways tab.
338
7. Define two default gateways: one for IPv4 and one for IPv6:
a. Click New. The Add List Item dialog displays.
b. Create a gateway to be used for IPv6.
c. Click OK to close the dialog.
d. Click Apply.
e. Repeat Steps a - d to create an IPv4 gateway (if you haven’t done so
already).
8. (Optional) Create policy for IPv6 servers. See "IPv6 Policies" on page 342.
339
Advanced Secure Gateway Administration Guide
340
Section 4 Optimizing ISATAP Traffic
The Advanced Secure Gateway can see inside a 6-in-4 encapsulated packet so that
it can identify the service and use the appropriate proxy to optimize the traffic.
For example, the Flash proxy optimizes Flash streaming traffic with object
caching, TCP optimization, and protocol optimization (assuming an ADN peer is
found). For services that are not intercepted (such as ICMPv6 and UDP), the
Advanced Secure Gateway uses the ISATAP proxy; this proxy optimizes the IPv6
packet and payload using byte caching and compression over an ADN tunnel
(assuming a peer is found).
1. Make sure your Advanced Secure Gateway appliances are inline between
ISATAP-capable routers.
2. Enable both ISATAP options in the CLI.
a. Access the Advanced Secure Gateway CLI, with enable (write) access.
b. Type conf t to go into configuration mode.
c. At the #(config) prompt, type the following CLI commands:
isatap adn-tunnel enable
isatap allow-intercept enable
3. Use the Active Sessions report to verify ISATAP traffic is being processed and
optimized by the appropriate proxy: ISATAP or the applicable application
proxy.
341
Advanced Secure Gateway Administration Guide
2a
2b
See Also
❐ "IPv6 Support on the Advanced Secure Gateway" on page 330
❐ "Configuring the Advanced Secure Gatewayto Work in an IPv6 Environment"
on page 337
❐ "Configuring an ADN for an IPv6 Environment" on page 340
❐ "IPv6 Policies" on page 342
IPv6 Policies
With the global policy for DNS lookups, the Advanced Secure Gateway appliance
first uses the configured IPv4 DNS servers for processing DNS requests. If this
lookup fails, the Advanced Secure Gateway appliance looks up the host on the
configured IPv6 DNS servers. This processing of DNS requests happens
automatically. To change the global setting for IP connection type preference, use
the following policy:
server_url.dns_lookup(dns_lookup_value)
where
dns_lookup_value = ipv4-only|ipv6-only|prefer-ipv4|prefer-ipv6
342
If you have a known list of servers that are on IPv6 networks, you can avoid
timeouts and unnecessary queries by creating policy to look up host names on
IPv6 DNS servers only. For example:
<Proxy>
url.domain=etrade.com server_url.dns_lookup(ipv6-only)
url.domain=google.com server_url.dns_lookup(ipv6-only)
This policy overrides the global policy and look up the specified hosts
(etrade.com and google.com) on the IPv6 DNS servers only.
343
Advanced Secure Gateway Administration Guide
344
Chapter 17: Geolocation
To comply with local regulations, assist with traffic analysis, or reduce the risk
of fraud and other security issues, you may need to know the origin of traffic in
your network, or restrict outbound connections to specific countries. SGOS
supports geolocation in both reverse proxy and forward proxy modes:
❐ Client geolocation in reverse proxy mode: You can use client geolocation to
identify the source of traffic through the Advanced Secure Gateway
appliance based on IP address (and when applicable, the effective client IP
address; refer to the Visual Policy Manager Reference for information on
effective client IP address).
❐ Geolocation in forward proxy mode: You can use geolocation to restrict by
country the outbound connections that your users make.
To use geolocation, you must download a geolocation database. This database
maps IP addresses to the countries with which they are associated and provides
the supported names and ISO codes for countries, such as “United States [US]”.
You can add conditions based on the country associated with a given IP
address; the conditions then determine policy actions, such as denying traffic to
or from a specific country.
345
Advanced Secure Gateway Administration Guide
346
Section 2 Overview: Setting up, Using, and Removing Geolocation
Perform the following steps to set up, use, and remove Geolocation.
Task Reference
Look up the IP addresses and countries for a URL. "DNS Lookup" on page 349
Perform this step to determine the originating
countries and IP addresses for a given URL.
347
Advanced Secure Gateway Administration Guide
Note: Refer to the Command Line Interface Reference for the related CLI command
for enabling geolocation.
See Also
❐ "Identifying a Country by IP Address" on page 352
❐ "Troubleshooting Geolocation" on page 354
348
Section 4 DNS Lookup
You can determine the IP addresses to which a specified domain resolves, as well
as the geographical location of each IP address.
Note: You must have configured DNS servers for the appliance for the DNS
lookup to work. In the Management Console, select Configuration > Network > DNS to
configure primary and alternate DNS servers.
349
Advanced Secure Gateway Administration Guide
350
Section 5 Downloading the Geolocation Database
To download the geolocation database:
1. In the Management Console, select Configuration > Geolocation > General.
2. On the Download tab, in the Download Options section, click Download Now.
When the download starts, the section displays a “Download is in progress”
message.
If you receive a download error, check your network configuration and make
sure that the appliance can connect to the Internet.
If the download is successful, the License and Download Status section
displays statistics.
You can now write policy using country name or country code as defined in
the geolocation database. You will also be able to see the supported country
names and codes:
❐ In the Management Console (Configuration > Geolocation > General > General tab).
❐ In output for the #show geolocation countries and #(config geolocation)
view countries CLI commands.
❐ When you add geolocation objects in the Visual Policy Manager (VPM).
Note: Refer to the Command Line Interface Reference for the related CLI command
for downloading the geolocation database.
351
Advanced Secure Gateway Administration Guide
To write policy about a specific country, use the country code specified in
square brackets beside the country name. For example, the country code for
Italy is “IT”.
If the IP address you enter is not valid, an error appears. See "Troubleshooting
Geolocation" on page 354 for more information.
4. (Optional) To view the list of countries in the geolocation database, click Show
list of countries in Geolocation database. The list opens in a separate browser
window.
352
Section 7 Writing Geolocation Policy
You can add geolocation policy through the VPM or by composing Content Policy
Language (CPL).
353
Advanced Secure Gateway Administration Guide
354
Section 9 Access Log Errors
The following access log errors may appear in the access log if there is a problem
with your subscription.
❐ The Geolocation subscription file is out of date
❐ Failed trying to get the subscription settings from the Geolocation
subscription file
❐ Failed trying to download the Geolocation subscription file
❐ Failed trying to extract and activate the Geolocation payload file
Note: If you receive other errors while setting up or using geolocation, refer to
the Blue Coat Knowledge Base.
355
Advanced Secure Gateway Administration Guide
Additional locations:
Countries defined by geolocation database:
Warning: The geolocation database is not installed
Removing Policy
To remove geolocation policy:
1. In the Management Console, select Configuration > Policy > Visual Policy Manager.
2. Click Launch to launch the VPM.
3. Remove any geolocation objects or rules. Refer to the Visual Policy Manager
Reference for instructions.
4. Click Install Policy.
356
Chapter 18: Filtering Web Content
Content Filtering allows you to categorize and analyze Web content. With
policy controls, content filtering can support your organization’s Web access
rules by managing or restricting access to Web content and blocking downloads
from suspicious and unrated Web sites, thereby helping protect your network
from undesirable or malicious Web content.
The Advanced Secure Gateway appliance supports Blue Coat WebFilter and
Intelligence Services as well as other third-party databases. This chapter
describes how to configure the appliance to process client Web requests and to
control and filter the type of content retrieved.
For information on integrating your local appliance content filtering policy
with Blue Coat Cloud Service policy, please see Universal Policy: Applying Global
Policy to Local and Remote Users.
357
Advanced Secure Gateway Administration Guide
358
If your subscription with the database vendor expires or if the available database
is not current, the category unlicensed is assigned to all URLs and no lookups
occur on the database. To ensure that the latest database version is available to
you, by default, the Advanced Secure Gateway appliance checks for database
updates once in every five minutes.
359
Advanced Secure Gateway Administration Guide
Legend
A: A client connected to the Advanced Secure Gateway appliance.
B: Advanced Secure Gateway appliance content filtering solution (content filter vendor
+ Blue Coat policy).
C: Web Content.
Process Flow
1: (Blue arrow) The client requests a Web page.
2: The Advanced Secure Gateway appliance checks the requested URL against the on-
box content filtering database to determine the categorization.
3: After the URL is categorized, the policy engine determines if the URL is allowable
or not.
4: (Blue arrow) The URL is allowed and the request continues to its destination.
5. (Red arrow) The policy denies the request and returns a message concerning
corporate Web compliance.
360
Supported Content Filter Providers
The Advanced Secure Gateway appliance supports several content filter
providers.
❐ Blue Coat WebFilter. Blue Coat WebFilter provides both an on-box content
filtering database and the WebPulse service, a cloud-based threat-protection
feature.
❐ Intelligence Services. This is a framework for the delivery of data feeds to Blue
Coat platforms. Multiple data feeds are entitled by subscription to an
Intelligence Services solution bundle. These data feeds are delivered and
made available to the Advanced Secure Gateway appliance through the
Intelligence Services framework. You can obtain a license for one or more
bundles, and also enable or disable data feeds in your solution bundle as your
requirements change.
❐ Local database. Create and upload your custom content filtering database to
the Advanced Secure Gateway appliance. This database must be in a text file
format.
❐ The Internet Watch Foundation (IWF) database. For information about the
IWF, visit their web site at: http://www.iwf.org.uk/
❐ A supported third-party content filtering vendor database— Proventia or
Optenet. You cannot use two third-party content filtering vendors at the same
time.
❐ YouTube. The appliance obtains video categories from the YouTube Data API
v3.0. After you enable Blue Coat categories for YouTube, you can reference
these categories in policy to control YouTube traffic.
Note: This feature is provided on an "as-is" basis. Blue Coat has no control of,
and is not responsible for, information and content provided (or not) by
YouTube. Customer is required to apply and use its own API key in order to
activate this feature, and therefore obligated to comply with all terms of use
regarding the foregoing (for example, see https://developers.google.com/
youtube/terms), including quotas, restrictions and limits on use that may be
imposed by YouTube. Blue Coat shall not be liable for any change,
discontinuance, availability or functionality of the features described herein.
361
Advanced Secure Gateway Administration Guide
WebPulse is a cloud service that allows inputs from multiple enterprise gateways
and clients and creates a computing grid. This grid consists of Blue Coat
WebFilter, K9, and ProxyClient customers, who provide a large sample of Web
content requests for popular and unrated sites. Based on the analysis of this large
volume of requests, the computing grid continuously updates the master
Blue Coat WebFilter database, and the Advanced Secure Gateway expediently
updates its on-box copy of the Blue Coat WebFilter database. About 95% of the
Web requests made by a typical enterprise user (for the English language) are
present in the on-box Blue Coat WebFilter database, thereby minimizing
bandwidth usage and maintaining quick response times.
By default, the WebPulse service is enabled and configured to dynamically
categorize unrated and new Web content for immediate enforcement of policy.
Typically, the response time from the dynamic categorization service is about
500 milliseconds and is subject to the response/performance of the site in
question. However, if this service is causing significant delays to your enterprise
web communications, you can run it in Background mode.
If dynamic categorization is disabled, proactive threat detection, content and
reputation ratings are also disabled.
The appliance contacts the WebPulse service using mutual endpoint
authentication over TLS. For best security, the connection is always encrypted.
If you opt to use a non-secure connection, all data is sent over the connection as
plain text. For information, see "Configuring WebPulse Services" on page 382.
362
human analysis. These ratings are then used to update the master Blue Coat
WebFilter database, and the automatic database update feature then refreshes the
local Blue Coat WebFilter database on the Advanced Secure Gateway appliance.
When dynamic categorization is performed in Background mode, the Advanced
Secure Gateway appliance continues to service the URL request without waiting
for a response from the WebPulse dynamic categorization service. The system
category pending is assigned to the request, indicating that the policy was
evaluated with potentially incomplete category information. When WebPulse
returns a category rating, the rating is stored in a dynamic categorization cache so
that the next time the URL is accessed, WebPulse will not be required to
determine its category.
Note: The dynamic service is consulted only when the installed Blue Coat
WebFilter database does not contain authoritative category information for a
requested URL. If the category returned by the WebPulse service is blocked by
policy, the offending material does not re-enter the network.
The URL is first looked up in the local Blue Coat Web Filter (BCWF) database. The
expected results are shown in the following table.
363
Advanced Secure Gateway Administration Guide
364
Found in Found in Rating Process Mode Result / Description
Local BCWF Cache
Database
See Also:
❐ "About the Dynamic Categorization Process" on page 365
❐ "Dynamic Categorization States" on page 366
❐ "Considerations Before Configuring WebPulse Services" on page 367
❐ "About Private Information Sent to WebPulse" on page 368
365
Advanced Secure Gateway Administration Guide
The following diagram illustrates Blue Coat WebFilter’s content filtering flow
when dynamic categorization is employed.
Legend
A: A client connected into the Advanced Secure Gateway appliance.
B: Advanced Secure Gateway appliance with Blue Coat WebFilter and Dynamic
Categorization enabled.
C: WebPulse cloud server.
D: Web content.
Process Flow
1: (Blue arrow) Client 1 requests a Web page.
2: The Advanced Secure Gateway appliance checks the requested URL against the Blue
Coat WebFilter database for categorization. No match is found.
3: The WebPulse Service returns the categorization of the URL if it has already been
determined. If not, WebPulse accesses and analyzes the requested site and returns a
real-time categorization if the confidence rating is high enough. If a category cannot be
determined automatically with high confidence, the service returns a category unknown
status, but records the site for future categorization.
4: After the URL is categorized, the policy engine determines if the URL is allowable or
not. Steps 5 and 6 describe what happens if the URL is allowable. Step 7 describes
what happens if the URL is not allowable.
5: (Blue arrow) The URL is allowed and the request continues to its destination for full
retrieval.
6: (Blue arrow) The allowed content is served back to the client.
7: (Red arrow) The policy denies the request and returns a message concerning
366
❐ Suspended: Categorization from the database continues, but the service is no
longer employed. This occurs when the installed database is over 30 days old
due to the expiration of BCWF download credentials or network problems.
After credentials are renewed or network problems are resolved, the service
returns to Enabled.
367
Advanced Secure Gateway Administration Guide
SOCKS Gateways
If you use proxy chaining for load balancing or for forwarding the dynamic
categorization request through an upstream SOCKS gateway, you must configure
the SOCKS gateway before configuring the WebPulse service.
Important: Before configuring the SOCKS gateway target for WebPulse, verify
that the SOCKS gateway is operating correctly.
When both SOCKS and forwarding are configured, the Advanced Secure
Gateway connects to the SOCKS gateway first, then to the forwarding host, and
then to the WebPulse service.
368
private domains within your network, you can use dynamic categorization to
ensure accuracy of content filter ratings, while preserving the security of sensitive
information relating to your private networks.
Before a request is sent for content rating to the WebPulse cloud service, the
following conditions are verified on the Advanced Secure Gateway appliance:
• Is WebPulse service and dynamic categorization enabled?
• Is dynamic categorization permitted by policy?
• Is the host specified in the private domain or private subnet list?
Any request that is determined to be part of your configured private
network is not sent to WebPulse.
The Advanced Secure Gateway appliance might send information from HTTP
and HTTPS requests to the WebPulse service if they are not directed to hosts that
are part of the configured private network.
369
Advanced Secure Gateway Administration Guide
You can further control whether to include the URL path and query string, and
individually control whether the Referer or User-Agent headers are sent for
specific requests. Restrictions are accomplished through the use of policies that
can be defined from the Advanced Secure Gateway appliance management
console or CLI.
Table 18–1 on page 370 lists the type of information that is sent to the WebPulse
service based on default settings for all SGOS versions supporting WebPulse.
Table 18–1 Information Sent to the WebPulse Service Based on Default SGOS Settings
370
See Also
❐ "Configuring WebPulse Services" on page 382
❐ "Viewing Dynamic Categorization Status (CLI only)" on page 385
❐ Section K: "Applying Policy" on page 410
❐ Content Policy Language Reference
Note: Blue Coat respects your security needs. If the request URL or the Referer
header for a malware threat pertains to a private URL, no malware notification is
issued.
See Also
❐ "Configuring WebPulse Services" on page 382
❐ "Viewing Dynamic Categorization Status (CLI only)" on page 385
371
Advanced Secure Gateway Administration Guide
372
Section 2 Enabling a Content Filter Provider
This is the first step in setting up a web content filter on the Advanced Secure
Gateway. This procedure assumes you have a valid account with your preferred
vendor.
Prerequisite: "Web Content Filtering Task Overview" on page 372
2. Select the option for your preferred provider. You can opt to enable the local
database, Internet Watch Foundation, BCWF, a third-party vendor (select your
preferred vendor from the Third-party database drop-down list), and YouTube.
Note: Before you can enable YouTube, you require a server key from
Google. See "Setting the YouTube Server Key" on page 406 for information.
If you try enabling YouTube without a server key, you receive an error
message.
3. Select the Lookup Mode option. For a web request, the look up mode determines
the databases that the Advanced Secure Gateway appliance searches for a
category match. To perform a lookup, the database must be enabled. The look
up sequence executed is policy, local database, IWF, Blue Coat WebFilter and
finally a selected third-party database.
Note: For YouTube, the Lookup mode option is hard-coded to Always. This
means that the database is always consulted for category information.
373
Advanced Secure Gateway Administration Guide
The built in exception page can be customized, for customizing the exception
page, refer to the “Advanced Policy Tasks” chapter in the Visual Policy
Manager Reference.
5. Click Apply.
2. Click the WebFilter link. The Blue Coat tab opens (Configuration > Content Filtering
> Blue Coat).
3. In the Data Source menu, select WebFilter or Intelligence Services. Then, click
Apply.
Note: If a Blue Coat WebFilter (BCWF) username and password are configured
on the appliance, but you save a configuration archive (or Management Center
backs up the configuration) while the data source is set to Intelligence Services,
the archive does not save the BCWF username/password. To archive the BCWF
username and password, switch the data source back to Webfilter and save a
separate configuration file.
374
Section 3 Downloading the Content Filter Database
The dynamic nature of the Internet makes it impossible to categorize web content
in a static database. With the constant flow of new URLs, URLs of lesser-known
sites, and updated Web content, maintaining a current database presents a
challenge. To counter this challenge, the Advanced Secure Gateway appliance
supports frequent content filter database downloads.
For more information, see one of the following topics:
❐ "About Database Updates"
❐ "Downloading a Content Filter Database" on page 376
For more information about the Blue Coat WebFilter database, see "About Blue
Coat WebFilter and the WebPulse Service" on page 361.
Note: By default, the Advanced Secure Gateway appliance checks for database
updates once in every five minutes. While you can schedule the time interval for
an automatic database update, the frequency of checks is not configurable.
375
Advanced Secure Gateway Administration Guide
For information about content filter updates, or if you are setting up the content
filter provider for the first time, see "About Database Updates" on page 375.
2. Download the database. Except for IWF, you must enter valid subscription
credentials to download the database. If the database has previously been
downloaded on a local Web server that requires authentication, you must
configure the Advanced Secure Gateway to use credentials that allow access
to the Web server, which hosts the content filter database.
a. Enter your username and password (required for BCWF, Proventia,
and Optenet).
b. (Optional) Click Change Password. The Change Password dialog
displays. Enter your password and click OK.
376
c. The default database download location is displayed in the URL or
Server field. If you have been instructed to use a different URL, enter it
here.
d. (Optional) If you changed the URL for downloading the database, to
reset to the default location, click Set to default. The default download
location overwrites your modification.
e. Click Apply to save all your changes.
f. Click Download Now. The Download Status dialog displays.
g. Click Close to close the Download status dialog.
It may take several minutes for the database download to complete. When
the database has been downloaded, proceed to "Viewing the Status of a
Database Download".
377
Advanced Secure Gateway Administration Guide
Note: The maximum number of categories for any single URL is 16. If more than
16 categories are specified, the Advanced Secure Gateway appliance arbitrarily
matches against 16 out of the total number specified.
378
3. Click Test. A new web page displays with the category, application, and
operation that BCWF has assigned to the URL. For example, the URL
facebook.com/video/upload_giver.php is categorized as follows:
Social Networking; Audio/Video Clips
Facebook
Upload Videos
The test results in this example indicate that the URL has two categories (Social
Networking and Audio/Video Clips), is the Facebook application, and is the
Upload Videos operation.
Note that not all URLs have applications and operations associated with them.
For URLs that BCWF has not assigned an application or operation, the test results
indicate none.
If you have a license, you can also test applications and operations using
Application Classification. See Section E: "Using Intelligence Services to Classify
Applications" on page 391 for information.
Content filtering databases can be very large and require significant resources to
process. It might be necessary to adjust the amount of memory allocated to the
database in the following situations:
❐ If you are not using ADN and have a high transaction rate for content filtering,
you can increase the memory allocation setting to High. This helps content
filtering run more efficiently.
❐ If you are using both ADN and content filtering but the transaction rate for
content filtering is not very high, you can reduce the memory allocation
setting to Low. This makes more resources available for ADN, allowing it to
support a larger number of concurrent connections.
3. Click Apply.
379
Advanced Secure Gateway Administration Guide
See Also
❐ "Supported Content Filter Providers" on page 361
❐ "About Private Information Sent to WebPulse" on page 368
❐ "Specifying a Blue Coat Data Source" on page 374
380
2. Click the Real-time analysis link. The console displays the Configuration > Threat
Protection > WebPulse tab.
381
Advanced Secure Gateway Administration Guide
382
To configure WebPulse services:
1. Select the Configuration > Threat Protection > WebPulse tab.
383
Advanced Secure Gateway Administration Guide
384
Configuring Dynamic Categorization Requests for HTTP/HTTPS (CLI
only)
You can configure dynamic categorization requests for HTTP and HTTPS
transactions sent to WebPulse in the CLI.
To enable or disable sending HTTP header information to WebPulse, use the
following command:
SGOS#(config bluecoat) service send-request-info {enable | disable}
The setting is enabled by default. When enabled, WebPulse receives HTTP
headers with Referer, User-Agent, Content-Type, and Content-Length
information. When the setting is disabled, the Advanced Secure Gateway
appliance does not send any HTTP header information to WebPulse.
To specify the mode and amount of information sent to WebPulse for HTTPS
transactions, use the following command:
SGOS#(config bluecoat) service send-https-url {full | path | disable}
The following are parameters for the command:
• full — Send entire URL (domain, path, and query string).
• path — Send only the domain and path.
• disable — Do not send a rating request for HTTPS transactions.
385
Advanced Secure Gateway Administration Guide
See Also
❐ "Applying Policy to Categorized URLs"
❐ "More Policy Examples"
❐ "Defining Custom Categories in Policy"
Note: You can switch to the BCWF database; see "Specifying a Blue Coat Data
Source" on page 374. To configure BCWF, refer to "About Blue Coat WebFilter and
the WebPulse Service" on page 361.
386
Verify Subscribed Bundles
After you verify requirements, make sure your subscribed bundles appear in the
appliance Management Console as expected. Verify that your Intelligence
Services bundles are correct and valid.
1. In the Management Console, select Maintenance > Licensing > View.
2. In the Intelligence Services Bundles section, look for the names of your
subscribed bundles and their expiration dates.
Any feeds that are part of multiple subscribed bundles are listed under each
bundle.
Description Reference
Monitor the Content Filter health status. "Monitor Content Filter Health Status"
on page 388
Dynamic Categorization
By default, when you set Intelligence Services as the data source and download
the database, dynamic categorization in real time is enabled on the appliance.
To disable dynamic categorization, select Configuration > Content Filtering > Blue Coat
and click the Enabled link beside Real-time analysis. The console displays the
Configuration > Threat Protection > WebPulse tab. Then, clear the Perform Dynamic
Categorization option.
For information on the other settings on this tab, refer to"Configuring WebPulse
Services" on page 382.
387
Advanced Secure Gateway Administration Guide
Note: You can set a notification method, or disable notification, for all subscribed
services at once; select Maintenance > Health Monitoring > Subscription.
388
2. In the License column, select Content Filter Expiration. Then, click Edit. The
console displays an Edit Health Monitor Settings dialog.
3. In the dialog, specify the Critical Threshold and the Warning Threshold.
4. Specify the Notification method(s): Log, Trap, or Email.
Note: If you have selected BCWF as the data source, the Health Monitoring >
Subscription tab displays a BlueCoat WebFilter Communication Status metric even
if you do not use BCWF as a content filter. In this case, the metric represents the
Application Classification health only, not BCWF as a content filter provider. See
Section E: "Using Intelligence Services to Classify Applications" on page 391 for
information on Application Classification.
389
Advanced Secure Gateway Administration Guide
390
Section E: Using Intelligence Services to Classify Applications
The Application Classification service uses the Intelligence Services database.
Before you can use the feature:
❐ Make sure that Intelligence Services is set as the data source. See "Specifying a
Blue Coat Data Source" on page 374.
❐ Ensure that your license is valid. See "View the License Status" on page 388.
After enabling the feature, you can review applications and operations for web
pages. As of , you can review the attributes associated with a web application. In
addition, you can download new database versions when required, and also
check the feature’s health status. See the following sections for information.
Description Reference
Note: You have the option of using either BCWF or the Intelligence Services
categorization data feed for content filtering. When content filtering is enabled
(Content Filtering > General > Blue Coat), the appliance uses whatever data source is
selected as the non-third-party on-box content filtering database for Application
Classification.
391
Advanced Secure Gateway Administration Guide
2. On the General tab, select Enable Blue Coat Application Classification on this device.
3. Click Apply. The appliance attempts to download the database for the first
time.
The service will automatically check for and download updates if:
• the service is enabled
• an Internet connection exists
Note: To disable this service, make sure that Application Attributes (introduced
in version 6.6.4) is disabled. For details, see "Enable Application Attributes" on
page 395.
Note: A Critical error occurs if the initial download attempt fails. After the
database downloads successfully, the service periodically checks for a newer
version of the database. If several update checks fail to connect to Blue Coat, a
Warning error occurs in Health Monitoring until the failure is corrected.
392
Look up the Application and Operation for a URL
Determine which application and operation exist for a specific web page.
1. In the Management Console, select Configuration > Application Classification >
General > General.
2. On the General tab, in the Classification Lookup section, enter a URL in the URL
field and click Lookup.
The console displays the lookup results. Refer to Table 18–2, "Classification
Lookup Results" to determine what the messages mean.
393
Advanced Secure Gateway Administration Guide
Note: You can also use BCWF to review the applications and operations for a
URL. See "Testing the Application and Operation for a URL" on page 378.
394
Enable Application Attributes
Before enabling Application Attributes, verify that Application Classification is
enabled. For details, see "Enable Application Classification" on page 391.
1. In the Management Console, select Configuration > Application Classification >
Attributes > Attributes.
2. On the Attributes tab, select Enable Blue Coat Application Attributes on this device.
3. Click Apply. The appliance attempts to download the database for the first
time.
The service will automatically check for and download updates if:
• the service is enabled
• an Internet connection exists
2. On the Attributes tab, in the Attribute Lookup section, select an application from
the Application menu.
3. From the Attribute menu, select an attribute. The attributes that are available
depend on the application you selected in the previous step.
4. Click Lookup.
395
Advanced Secure Gateway Administration Guide
The console displays the lookup results. Look for details beside Value.
Note: The attribute Overall Risk Level is not related to the Web Application
Firewall risk score policy or Threat Risk Levels (an Intelligence Services feed). For
details on risk score policy, refer to the Content Policy Language Reference. For
details on Threat Risk Levels, see "Analyzing the Threat Risk of a URL" on page
439.
396
• Overall Risk Level: 5
• Strong Authentication: 0
Based on the attribute details, you can write policy to intercept, control, and
log requests to weibo.com as needed.
Note: You must replace all spaces and punctuation in attribute names with
underscores in CPL, but use no more than one underscore in a row. For example,
specify the Admin Audit attribute as Admin_Audit, and specify the Valid & Trusted
Server Certificates attribute as Valid_Trusted_Server_Certificates.
You can verify how to specify an attribute by selecting it in the Application Attributes
VPM object and viewing the generated CPL. For details on this VPM object, refer
to the Visual Policy Manager Reference.
2. Click Download Now. The database download starts in the background; when it
is complete, the tab displays the status of the download.
You can also click Refresh to view the status of the download.
397
Advanced Secure Gateway Administration Guide
If there are no errors with the license, the Value displays the number of days
left and the State is OK.
If there are no errors with the server, the Value is No update errors and the State is
OK.
Note: You can set a notification method, or disable notification, for all subscribed
services at once in the CLI using the #(config) alert notification subscription
communication-status command.
398
Section F: Configuring a Local Database
The following sections describe how to select and refer to a local database and
how to schedule the database update schedule:
❐ "About the Local Database"
❐ "Creating a Local Database"
❐ "Selecting and Downloading the Local Database"
Note: Blue Coat recommends locating your local database on the same server as
any policy files you are using.
399
Advanced Secure Gateway Administration Guide
Policy Example
This example uses the same syntax as the local database example.
<proxy>
ALLOW
400
Creating a Local Database
The local database is a text file that must be located on a web server that is
accessible by the Advanced Secure Gateway appliance on which you want it
configured. You cannot upload the local database from a local file.
The local database file allows define category statements only.
2. Upload the text file to a Web server that the Advanced Secure Gateway
appliance can access.
3. Continue with "Selecting and Downloading the Local Database".
401
Advanced Secure Gateway Administration Guide
402
b. Click Download Now. The Management Console displays the Download
Status dialog.
8. Click Apply.
Note: Incremental updates are not available for the local database.
See Also
❐ "Applying Policy"
❐ "Applying Policy to Categorized URLs"
❐ "More Policy Examples"
❐ "Defining Custom Categories in Policy"
403
Advanced Secure Gateway Administration Guide
See Also
❐ "Applying Policy"
❐ "Applying Policy to Categorized URLs"
❐ "More Policy Examples"
❐ "Defining Custom Categories in Policy"
See Also
❐ "Applying Policy"
❐ "Applying Policy to Categorized URLs"
❐ "Defining Custom Categories in Policy"
404
Section I: About Blue Coat Categories for YouTube
The appliance recognizes three types of YouTube URLs. The effectiveness of
policy and coaching pages differs amongst the different URL types. Refer to the
following table.
URL Type Example(s) of User Action Deny Coaching
policy page
works works
Embedded in User plays a video that has been Yes. The Yes. The
an <iframe> embedded in a blog post. deny page coaching
The URL could start with: is confined page is
within the confined
http://www.youtube.com/embed/
<iframe>. within the
<iframe>.
Note: This feature is provided on an "as-is" basis. Blue Coat has no control of,
and is not responsible for, information and content provided (or not) by YouTube.
Customer is required to apply and use its own API key in order to activate this
feature, and therefore obligated to comply with all terms of use regarding the
foregoing (for example, see https://developers.google.com/youtube/terms),
including quotas, restrictions and limits on use that may be imposed by YouTube.
Blue Coat shall not be liable for any change, discontinuance, availability or
functionality of the features described herein.
405
Advanced Secure Gateway Administration Guide
The list of categories is static. In the Visual Policy Manager, you can view the
categories in the category list (Configuration > Edit Categories) and in the Request
URL Category object, but you cannot add, rename, edit, or remove them.
406
Section J: Using Quotas to Limit Internet Access
You can limit user access to the Internet by creating policy for:
❐ Time quotas: Limit the amount of time that users can spend on the Internet or
Internet resource during a specific period of time
❐ Volume quotas: Limit users’ Internet or Internet resource usage during a
specific period of time
To create time and volume quotas, use the Time Quota and Volume Quota objects in
the VPM instead of writing policy in Content Policy Language (CPL). For detailed
information on the quota objects, refer to the Visual Policy Manager Reference.
Note: Before you can install quota policy, you must enable the quota library in
the CLI. Issue the following command:
#(config)policy quota
407
Advanced Secure Gateway Administration Guide
408
The Volume Quota page (https://<IP_address:port>/quota/volume/view)
displays the following details:
Current quota consumption for user '<username_or_IP_address>':
x bytes.
Note: Be sure to enter the correct quota name and username/IP address. The
appliance does not validate your entries, and if you enter names/addresses that
do not exist, the page displays a quota consumption of 0 minutes/bytes.
Note: Be sure to enter the correct quota name and username/IP address.
The appliance does not validate your entries.
6. To reset the usage for all time/volume quotas, click the Reset all time/volume
quotas link. The page displays one of the following confirmation messages:
All time quota consumption has been reset to 0 minute.
All volume quota consumption has been reset to 0 byte.
409
Advanced Secure Gateway Administration Guide
Creating a Blacklist
If your default proxy policy is set to allow and you would like to block users
access to certain categories, you must create policy to block all requests for the
categories that you wish to restrict access in your network.
410
In this example, Sports/Recreation, Gambling, and Shopping categories are blocked
with a single rule and a predefined exception page content_filter_denied is
served to the user. This exception page informs the user that the request was
denied because the requested content belongs to a category that is blocked.
411
Advanced Secure Gateway Administration Guide
3. Access the VPM (Configuration > Policy > Visual Policy Manager).
.
4a
4c
4b
b. In the Set Destination Object dialog, click New > Request URL Category. The
Add Request URL Category Object dialog displays.
c. Expand the list of categories for your content filter database in the
Categories list.
412
5. Select the categories to block and click OK. This example blocks Shopping,
Gambling and Sports/Recreation categories.
6. Set the action for blocking the categories In the Action column, right click and
select Deny or Deny Content Filter.
• Deny—Denies the user request without providing an denial explanation.
• Deny Content Filter—Denies the user access to the requested content and
describes that the request was denied because it belongs to a category
blocked by organizational policy.
Note: While the following example blocks most downloads, it will not prevent all
web downloads. For example, compressed and encrypted files, server side scripts
and webmail attachments are not detected.
413
Advanced Secure Gateway Administration Guide
a. In the Action column, right click and select Set. The VPM displays the
Set Action Object dialog.
b. In the Set Action Object dialog, click New > Authenticate. The VPM
displays the Add Authenticate Object dialog. Select the authentication
mode and realm.
c. Click OK to save your changes and exit.
2. Add a rule in a Web Access Layer to restrict access to downloads by file
extension and by Apparent Data Type of the content:
a. In the Destination column, right click and select Set. The VPM displays
the Set Destination Object dialog.
414
b. In the Set Destination Object dialog, click New > File Extensions. The VPM
displays the Add File Extension Object dialog.
2c
c. In the Known Extensions field, Find and Add .exe files. Click OK.
415
Advanced Secure Gateway Administration Guide
d. Remaining in the Set Destination Object dialog, select New > Apparent
Data Type. Select the apparent data types that includes Windows
executables and Windows Cabinet files. Click OK.
e. Combine the two rules using a combined object. In the Set Destination
Object dialog, select New > Combined Destination Object and add the file
extensions and the apparent data type rule created above. Click OK
416
Creating a Whitelist
If the default policy on the Advanced Secure Gateway appliance is set to deny,
you must create a whitelist to permit web access to users. Whitelists require
constant maintenance to be effective. Unless your enterprise web access policy is
very restrictive, Blue Coat recommends setting the default policy to allow. The
default policy of allow keeps the help desk activity less hectic when managing
web access policies.
417
Advanced Secure Gateway Administration Guide
c. Expand the list of categories for your content filter database in the
Categories list.
4. Select the categories to allow and click OK. This example allows Business/
Economy and the Computers/Information Security categories. Click OK to close
each dialog.
5. Set the action for blocking the categories In the Action column, right-click and
select Allow.
418
Creating Policy to Log Access to Specific Content
To monitor web content requests from users in the network, you can record
information in the Advanced Secure Gateway appliance event log. For example,
you can create policy to allow or deny access to a category and record users who
attempt to access the specified category. The following example, illustrates how to
use policy to track users who access the Adult/Mature Content category.
419
Advanced Secure Gateway Administration Guide
d. Select the categories to monitor and click OK. This example tracks
access of Adult/Mature Content.
b. Select from the list of Substitution Variables to log specific details about
the URL or the USER and click OK. For information on substitution
variables, refer to the Visual Policy Manager Reference.
420
The following example illustrates how to block access (this is a mode of operation
called fail-closed) to the requested content when category information is
unavailable.
The System category unavailable includes the unavailable and unlicensed
conditions. The unlicensed condition helps you identify that the category was not
identified because the content filter license has expired.
421
Advanced Secure Gateway Administration Guide
422
Pre-requisites for Controlling Web Applications
• Proxy Edition license
• Blue Coat WebFilter license.
• The Blue Coat WebFilter feature must be enabled. (Configuration > Content
Filtering > General).
Note: To filter through the list of supported applications, you can enter the
name of the application in the Filter applications by: pick list. Based on your
input, the on-screen display narrows the list of applications. You must then
select the application(s) for which you want to create rules.
423
Advanced Secure Gateway Administration Guide
d. On the Action column, right click and select Deny. Your rules should
look similar to the following (third row).
4. To properly block access to all games, including those on Facebook, you must
create another Web Access Layer that defines the rule as follows.
a. Select Policy > Add Web Access Layer.
b. On the Destination column, right-click and select Request URL Category.
c. Select the Games category from the list that displays and click OK.
5. Click Install Policy. You have now installed policy that blocks all games in your
network, and permits access to the Facebook and LinkedIn applications in the
social networking category.
424
Use Case: Allow limited access on Facebook but deny access all other sites in the
social networking category. In this example, you restrict users from uploading
attachments, videos or pictures on Facebook, but allow all other operations that
the application supports.
1. Launch the Advanced Secure Gateway Proxy Management Console.
2. Launch the Visual Policy Manager (VPM).
Select Configuration > Policy > Visual Policy Manager, and click Launch.
3. Select Policy > Add Web Access Layer.
4. Create a rule that allows access to Facebook but restricts uploads.
a. On the Destination column, right click and select Set > New > Combined
Destination Object.
b. Select New > Request URL Application and select Facebook from the list of
applications.
c. Select New > Request URL Operation.
d. Select Upload Attachment, Upload Videos and Upload Pictures from the list of
operations and click OK.
e. Create the rule that checks for the application and the associated
operation.
• Select the application object you created for Facebook in Step 4b and
Add it to At least one of these objects.
425
Advanced Secure Gateway Administration Guide
• Select the Negate option in the bottom list. The display text changes
from AND At least one of these objects to AND None of these objects. Then
select the operation object you created for the uploading actions in
Step 4d and click Add. Your policy should look similar to the following.
You have now created a rule that matches on the application Facebook but
prevents the action of uploading attachments, pictures or video. When a
user attempts to upload these items on Facebook, the action will be
blocked.
5. Restrict access to all other social networking sites.
a. Select Edit > Add Rule to add a new rule in the same Web Access Layer.
b. On the Destination column, right-click and select Request URL Category.
c. Select the Social Networking category from the list that displays and click
OK.
See Also
❐ Content Policy Language Reference
❐ Command Line Interface Reference
426
Verify the Application Filtering Policy is Working Properly
After you have installed your application filtering policy, verify that the policy
works as intended. From a client workstation on the network:
❐ Verify that you cannot access websites of blocked categories.
❐ Confirm that you can access websites of allowed categories.
❐ For each application that is unitarily blocked, verify that you cannot access
any component of the application.
❐ For each operation that is blocked for an application, verify that you cannot
perform that operation for that application. In addition, verify that you can
perform operations that are not denied.
If your policy is not working properly, verify that you have spelled the
application and operation names exactly as listed in the view applications and
view operations command output. Also make sure that the operation is
supported by the application. Correct any errors, install the revised policy, and
run through the above verification steps again.
Additional Information
The following two access log variables are available in the Blue Coat Reporter
access log format (bcreportermain_v1):
x-bluecoat-application-name
x-bluecoat-application-operation
Limitations
The policy compiler will not display a warning if you create policy that defines
unsupported combinations of application names and operations. For example,
Twitter does not support uploading of pictures but the compiler does not warn
you that the following policy is invalid.
url.application.name=Twitter url.application.operation=”Upload
Pictures” deny
427
Advanced Secure Gateway Administration Guide
Use Case: Student access to Health sites is limited to a specified time of day, when
the Health 100 class is held.
This time the policy contains no exceptions:
❐ Rule 1: Health sites can be accessed Monday, Wednesday, and Friday from 10-
11am.
❐ Rule 2: Health sites can not be accessed at other times.
define condition Health_class time
weekday=(1, 3, 5) time=1000..1100
end
<proxy>
; 1) Allow access to health while class in session
ALLOW category=health condition=health_class_time
; 2) at all other times, deny access to health
DENY category=health
428
To add URLs to a category, you only need to specify a partial URL:
Note: The local database produces only the most specific URL match and returns
a single category.
The same policy syntax will produce a different match. If more that one category
is provided, policy processing may match more than one category and hence will
return more than one category. See "Local Database Matching Example" on page
400 for more information.
❐ Hosts and subdomains within the domain you specify will automatically be
included
❐ If you specify a path, all paths with that prefix are included (if you specify no
path, the whole site is included). For example, if you add
www2.nature.nps.gov/air/webcams/parks/grcacam/nps.gov/grca
only the pages in the /grca directory of nps.gov is included in the category,
but if you just add www2.nature.nps.gov/ all pages in the entire directory are
included in the category.
Example:
define category Grand_Canyon
kaibab.org
www2.nature.nps.gov/air/webcams/parks/grcacam
nps.gov/grca
grandcanyon.org
end
Any URL at kaibab.org is now put into the Grand_Canyon category (in addition to
any category it might be assigned by a provider). Only those pages in the /grca
directory of nps.gov are put in this category.
429
Advanced Secure Gateway Administration Guide
Example:
<proxy>
category=Webcams DENY
category=National_Parks ALLOW
category=Travel time =0800..1800 DENY
Click the Test button on the Management Console or the test-url command in
CLI to validate the categories assigned to any URL. This can help you to ensure
that your policy rules have the expected effect (refer to Configuring Policy Tracing
in the Content Policy Language Reference).
If you are using policy-defined categories and a content-filter provider at the
same time, be sure that your custom category names do not coincide with the
ones supplied by your provider. You can also use the same names—this adds your
URLs to the existing categories, and extends those categories with your own
definitions. For example, if the webcam mentioned above was not actually
categorized as travel by your provider, you could do the following to add it to the
Travel category (for the purpose of policy):
430
define category Travel ; extending a vendor category
www2.nature.nps.gov/air/webcams/parks/grcacam/ ; add the GC webcam
end
Note: The policy definitions described in this section can also be used as
definitions in a local database. See "Configuring a Local Database" on
page 399 for information about local databases.
Section L: Troubleshooting
This section describes troubleshooting tips and solutions for content filtering
issues. It discusses the following topics:
❐ "Unable to Communicate with the WebPulse Service" on page 431
❐ "Event Log Message: Invalid WebPulse Service Name, Health Check Failed"
on page 431
❐ "Error Determining Category for Requested URL" on page 431
❐ "Error Downloading a Content Filtering Database" on page 432
Note: The Advanced Secure Gateway appliance resolves the domain name
sp.cwfservice.net once a day and maintains the list of returned IP addresses.
The Advanced Secure Gateway appliance then uses the IP address that
provides the fastest service. If an IP address that is in use fails to respond, the
Advanced Secure Gateway appliance fails over to an alternate IP address.
Health checks are automatically conducted on all the IP addresses to make
this failover as smooth as possible and to restore service to the geographically
closest IP address as soon as it is available.
2. Check the firewall logs for messages about denied or blocked traffic
attempting to reach IP addresses or in response from IP addresses. A firewall
rule denying or blocking in either direction impedes WebPulse.
431
Advanced Secure Gateway Administration Guide
Event Log Message: Invalid WebPulse Service Name, Health Check Failed
The following event log message is displayed:
Invalid WebPulse service name - Health check failed - Receive failed.
These messages are common in event logs and, for the most part, should not affect
your service. A server may fail an L4 health check for various reasons, but unless
all servers (services) are unavailable for extended periods of time, you should not
experience interruptions in WebPulse services and can regard this as expected
behavior.
When the proxy makes a request for the WebPulse service name, several IP
addresses for our servers are returned. The Advanced Secure Gateway appliance
periodically performs a quick Layer-4 health check (opening and closing a TCP
socket with no data transfer) to each of those servers. In the event that the
Advanced Secure Gateway appliance cannot contact the server or does not receive
a response quickly enough, it logs similar event log messages.
Your WebPulse service is interrupted unless all of the servers are unable to be
contacted for more than a few seconds. When one of these error messages
appears, the services health status changes back to healthy within 2 to 10 seconds.
432
Possible Causes Check the Following
A communication error occurred contacting Check the event log entries for
the WebPulse service. WebPulse messages.
The Advanced Secure Gateway If you are using a trial or demo license,
appliance license has expired. instead of a perpetual license, the
Advanced Secure Gateway appliance
license might have expired. Verify the
status of your license on the
Maintenance > Licensing > View tab. To
purchase a license, contact Blue Coat
Technical Support or your Blue Coat
sales representative.
(Possible, but not likely) There are issues Check event log entries for disk or
with memory or a disk error. memory messages.
❐ For the ERROR: HTTP 401 - Unauthorized, verify that you have entered your
username and password correctly. For example, the following error message
was generated when an incorrect username was entered to download a BCWF
database:
Download log:
Blue Coat download at: Thu, 21 June 2015 18:03:08
Checking incremental update
Checking download parameters
Fetching:http://example.com/
Warning: HTTP 401 - Unauthorized
Downloading full control file
Blue Coat download at: Thu, 21 June 2015 18:03:17
Downloading from http://example.com/
Fetching:http://example.com/
ERROR: HTTP 401 - Unauthorized
Download failed
Download failed
Previous download:
...
433
Advanced Secure Gateway Administration Guide
If you have an upstream proxy and all internet traffic must be forwarded to
this upstream proxy, you must enable download-via-forwarding on this
Advanced Secure Gateway using the following CLI command:
> enable
# config t
#(config)forwarding
#(config forwarding) download-via-forwarding enable
❐ For the Socket Connection Error, check for network connectivity and Internet
access in your network.
Only after completing network troubleshooting, perform the following
procedure if the socket connection error persists.
Because the content filter database is downloaded using SSL, if the SSL client
on the Advanced Secure Gateway appliance gets corrupt, a connection error
occurs.
1. Verify that you have a valid SSL client on the Advanced Secure Gateway
appliance.
a. Access the Command Line Interface (CLI) of the Advanced Secure
Gateway appliance.
b. In configuration mode, view the SSL client configuration.
Blue Coat SG210 Series>en
Enable Password:XXXXX
Blue Coat SG210 Series#conf t
Blue Coat SG210 Series#(config)ssl
Blue Coat SG210 Series#(config ssl)view ssl-client
SSL-Client Name Keyring CCL Protocol
default <None> browser-trusted TLSv1.2vTLSv1.1
2. If you have an SSL client configured but the issue still persists, delete, and
recreate the SSL client.
a. In the Configuration mode:
Blue Coat SG210 Series#(config ssl)delete ssl-client
ok
Blue Coat SG210 Series#(config ssl)create ssl-client default
defaulting protocol to TLSv1.2vTLSv1.1 and CCL to browser-trusted
ok
434
Chapter 19: Web Application Protection
You can protect web applications from web attacks using Application
Protection, which is a component of Web Application Protections, a
subscription-based offering that supplements the services available in Web
Application Reverse Proxy. This feature downloads a SQL injection fingerprints
database, which defines how the appliance detects attacks.
435
Section A: Using Application Protection
Application Protection allows the appliance to detect SQL injection attacks
without the need to write and maintain SQL injection policy. When you enable the
feature, it downloads a database containing the latest SQL injection fingerprints,
culled from real-world attacks. This allows the appliance to detect numerous SQL
injection attacks against different SQL databases that web applications use.
To keep the database up-to-date, you can configure settings to be notified
whenever an update is available, or you can allow the service to automatically
download new versions.
436
Note: The Critical error appears if the initial download attempt fails. After the
database downloads successfully, the service periodically checks for a newer
version of the database. If several update checks fail to connect to Blue Coat, a
Warning error appears in Health Monitoring until the failure is corrected.
See Also
❐ "Using Application Protection" on page 436
❐ "Verifying the Database Download" on page 437
Enable Notification
To enable notification:
1. In the Management Console, select Configuration > Threat Protection > Application
Protection.
2. (If feature is not already enabled) On the Application Protection tab, select
Enable.
3. Select the Do not auto download, but notify when a new version becomes available
check box.
4. Click Apply.
When a new database is available, a notification is sent to the administrator e-
mail account and also recorded in the event log.
See Also
❐ "Verifying the Database Download" on page 437
437
438
Chapter 20: Analyzing the Threat Risk of a URL
The Threat Risk Levels service analyzes a requested URL's potential risk and
summarizes it in the form of a numeric value (see "Threat Risk Levels
Descriptions" ). You can reference these values in policy to protect your
network and your users from potentially malicious web content.
Threat Risk Levels are calculated based on numerous factors that measure
current site behavior, site history, and potential of future malicious activities.
This service is part of Intelligence Services. For information on Intelligence
Services, refer to the "Using Intelligence Services to Classify Applications" on
page 391.
Note: Threat Risk Levels are not related to risk score policy. For details on risk
score policy, refer to the Content Policy Language Reference.
439
Advanced Secure Gateway Administration Guide
The service returns a system-defined value in the rare instance when a threat
risk level does not apply. See Table 20–2 for an overview of the values. Note
that the report color for all system values is gray.
none Threat Risk Level not available The URL does not have a threat
risk level assigned to it and the
request is not forwarded to
WebPulse (or it has been
forwarded and there is still no
data).
pending Threat Risk Level data pending No risk level is assigned to the
background WebPulse analysis URL on the Advanced Secure
Gateway appliance, but the
appliance performed a
WebPulse request in the
background. Subsequent
requests for the URL could
match a result from the
WebPulse cache.
440
Table 20–2 System-defined values for Threat Risk Levels
3 Write threat risk level policy through "Write Threat Risk Policy" on
the VPM or using CPL. page 443
Note: After verifying that you have a license, you can make sure that you
have the Threat Risk Levels service. See "Verify Subscribed Bundles" on page
387
441
Advanced Secure Gateway Administration Guide
2. On the General tab, select Enable Threat Risk lookups on this device.
Note: A Critical error appears if the initial download attempt fails. After the
database downloads successfully, the service periodically checks for a newer
version of the database. If several update checks fail to connect to Blue Coat, a
Warning error appears in Health Monitoring until the failure is corrected.
442
Write Threat Risk Policy
CPL and VPM policy objects have been added and updated to support the
feature.
443
Advanced Secure Gateway Administration Guide
444
<DNS-proxy>
dns.request.threat_risk.level=7 trace.request(yes)
Trigger an action based on the threat risk of the hostname extracted from
the X.509 certificate
server.certificate.hostname.threat_risk=<numeric_or_system_value>
Note: The hostname is extracted from the X.509 certificate returned by the
server while establishing an SSL connection. If it is not an SSL connection, the
value is null.
Example
The appliance blocks the connection when it detects the hostname from the
X.509 certificate has a threat risk level of 8.
<proxy>
deny server.certificate.hostname.threat_risk.level=8
Trigger an action based on the threat risk of the URL that the appliance
sends for user request
server_url.threat_risk.level=<numeric_or_system_value>
Note: If the URL was rewritten, the condition matches the risk levels of the
rewritten URL instead of the requested URL.
Example
The appliance blocks the connection when it detects the URL sent for user
request has a threat risk level of 10.
<proxy>
deny server_url.threat_risk.level=10
445
Advanced Secure Gateway Administration Guide
Look up the threat risks associated with a "Monitor Threat Risk Statistics" on
specific URL. page 447
2. On the General tab, in the Threat Risk Lookup section, enter a URL in the
URL field and click Lookup. The console displays the threat risk level
associated with the URL, as described in "Threat Risk Levels Descriptions"
on page 439.
3. (Optional) Click the View Threat Risk Levels link to display the list of threat
risk levels in a new browser window.
446
2. On the Download tab, click Download Now..
The database download starts in the background; when it is complete, the
tab displays the status of the download.
You can also click Refresh or Refresh Status to view the status of the
download.
Note: Before you can view threat risk statistics, you must enable the feature
(Configuration > Threat Protection > Threat Risk Levels > General) and download the
database. If the Threat Risk Levels service is disabled or the database is not
downloaded, the report screen displays no data.
In addition, report data does not persist if you disable and then re-enable the
Threat Risk Levels service. The report data is accurate from when you last
enabled the feature.
447
Advanced Secure Gateway Administration Guide
To change the time range for the report, select an option beside Duration:
❐ Last Hour: This is the default selection. The report displays data from the last
60 minutes. It may take a minute or more for the report to start displaying
activity.
❐ Last Day: The report displays data from the last 24 hours.
❐ Last Week: The report displays data from the last seven days.
❐ Last Month:
The report displays data for one month, for example, from
November 19 to December 19.
❐ Last Year:The report displays data for one year, for example, from January
2015 to January 2016.
448
If there are no errors with the license, the Value displays the number of days
left and the State is OK.
Note: You can set a notification method, or disable notification, for all
subscribed services at once in the CLI using the #(config) alert notification
subscription communication-status command.
449
Advanced Secure Gateway Administration Guide
450
451
Advanced Secure Gateway Administration Guide
452
Chapter 21: Configuring Threat Protection
The Advanced Secure Gateway supports threat protection scanning with the
use of either external appliance services such as ProxyAV or Content Analysis,
or the internal Content Analysis service. When configured, these services
analyze incoming web content and protect users from malware and malicious
content. Malware is defined as software that infiltrates or damages a computer
system without the owner’s informed consent. The common types of malware
include adware, spyware, viruses, downloaders and Trojan horses.
Blue Coat’s threat protection solution protects user productivity, blocks
malware downloads and web threats, and enables compliance to network
security policies.
The following sections describe how to configure threat protection with the
internal Content Analysis service:
❐ "About Threat Protection"
❐ "Enabling Malware Scanning"
❐ "Updating the Malware Scanning Policy"
❐ "Fine Tuning the Malware Scanning Policy using VPM"
❐ "Disable Malware Scanning"
❐ "Edit an ICAP Content Analysis Service"
❐ "Delete an ICAP service From the List of ICAP services"
453
Advanced Secure Gateway Administration Guide
454
Task Task Description
2. Select whether to transfer The Advanced Secure Gateway appliance and the
data between the Advanced ProxyAV appliance or Content Analysis appliances
Secure Gateway and the communicate with each other using plain ICAP,
ProxyAV or Content secure ICAP, or both methods.
Analysis service using plain To use secure communication mode between
ICAP or secure ICAP. appliances, either use the built-in SSL device profile or
create a new SSL device profile to authorize ProxyAV
or Content Analysis on the Advanced Secure Gateway
appliance. For information about SSL device profile,
see "About SSL Device Profiles" on page 1349.
If you create an SSL device profile, verify that the CA
certificate is imported in the Advanced Secure
Gateway appliance at Configuration > SSL > External
Certificates. Otherwise, when the Verify Peer option is
enabled in Configuration > SSL > Device Profiles, the
Advanced Secure Gateway appliance fails to verify
ProxyAV or Content Analysis as trusted.
For information on enabling secure connection on
ProxyAV appliance or Content Analysis, or creating a
new certificate, refer to the ProxyAV Configuration and
Management Guide or the Content Analysis System
WebGuide.
455
Advanced Secure Gateway Administration Guide
2. Select New. The Management Console displays the Add New CAS/ProxyAV
ICAP Server dialog.
3. In the Server host name or IP address field, enter the host name or IP address of
the ICAP server. Only an IPv4 address is accepted.
4. Select the connection mode(s) and ports. The default is plain ICAP only.
If you select secure ICAP, you must add an SSL device profile. An SSL device
profile contains the information required for device authentication, including
the name of the keyring with the private key and certificate this requires to be
authenticated. For information on SSL device profiles, see "About SSL Device
Profiles" on page 1349.
5. Click OK to save your changes and exit the open dialog.
You now have proxyavx service that is automatically created to perform
response modification. Response modification means that the ICAP service
only acts on requested content that is redirected to it by the Advanced Secure
Gateway appliance after the content is served by the origin web server.
456
6. Click Perform health check to verify that the ICAP server is accessible. The
health check result is displayed immediately. For information on health
checks, see "Managing ICAP Health Checks" on page 485.
7. Continue with "Enabling Malware Scanning".
Note: The threat protection policy cannot be edited. If you would like to
supplement or override the configuration in this policy, see "Fine Tuning the
Malware Scanning Policy using VPM" on page 462.
457
Advanced Secure Gateway Administration Guide
458
To select a connection security mode:
1. Select Configuration> Threat Protection > Malware Scanning.
459
Advanced Secure Gateway Administration Guide
See Also
❐ "Updating the Malware Scanning Policy"
❐ "Fine Tuning the Malware Scanning Policy using VPM"
460
2. Click Update malware scanning policy. The Management Console displays the
Install Malware Scanning Policy dialog.
Note: If you change the default URL, you cannot revert to the default
value. You must manually re-enter the URL.
4. Click Install.
5. (Optional) Click View to view the contents of the updated threat protection
policy file.
461
Advanced Secure Gateway Administration Guide
2. Launch the VPM and create policy to scan all traffic from an internal host
using the high performance mode. This example uses the 10.0.0.0/8 subnet.
a. Select Configuration > Policy > Visual Policy Manager.
b. Click Launch.
c. In the VPM, select Policy > Add Web Content Layer.
d. In the Action column, right-click and select Set. The VPM displays the
Set Action Object dialog.
e. Click New > Set Malware Scanning. The VPM displays the Add Malware
Scanning Object dialog.
f. Select Perform high performance malware scan.
g. Click OK to save your changes and exit all open dialogs.
h. In the Destination column, right click and select Set. The VPM displays
the Set Destination Object dialog.
462
i. Select Destination IP Address/Subnet. The VPM displays the Set
Destination IP/Subnet Object dialog.
j. Add the IP address and subnet for the internal host and click Close.
k. Click OK to save your changes and exit all open dialogs.
l. Click Apply to install the policy. After this policy is installed, all traffic
from the internal subnet 10.0.0.0/8 will be scanned using the high
performance mode.
3. The completed rule is similar to the following.
463
Advanced Secure Gateway Administration Guide
Note: If you have enabled malware scanning and have added only one Content
Analysis or ProxyAV appliance for content scanning, you must disable malware
scanning before you can delete that service from the CAS/ProxyAV ICAP Servers list.
Malware scanning must be disabled so that the ICAP service to be deleted is no
longer referenced in the threat protection policy.
464
Chapter 22: Malicious Content Scanning Services
465
Advanced Secure Gateway Administration Guide
Note: Advanced Secure Gateway appliance does not support secure ICAP for
the internal Content Analysis service.
466
❐ Response modification (RESPMOD)—Allows modification of inbound client
requests. These requests are sent from the Advanced Secure Gateway
appliance to the ICAP server after the requested content is retrieved from the
origin content server.
❐ REQMOD or RESPMOD is an attribute that is specified in the ICAP service,
which is configured between the Advanced Secure Gateway appliance and
the ICAP server. This is represented in the VPM as Perform Response
Analysis.
467
Advanced Secure Gateway Administration Guide
Note: Some ICAP servers do not support virus scanning for request modification,
but support only content filtering.
468
The following diagram illustrates the request modification process flow.
469
Advanced Secure Gateway Administration Guide
Sense Settings
The Sense Settings feature allows the Advanced Secure Gateway appliance to
query any identified ICAP server running v1.0, detect the parameters, and
configure the ICAP service as appropriate. See "Creating an ICAP Service" on
page 481.
ISTags
ISTags eliminates the need to designate artificial pattern version numbers, as was
required in v0.95.
Every response from an ICAP v1.0 server must contain an ISTag value that
indicates the current state of the ICAP server. For instance, when the pattern/
scanner version of a virus scanner on the ICAP server changes, the ISTag value
changes. This change invalidates all content cached with the previous ISTag value
and a subsequent request for any content in cache must be refetched from the
origin content server and scanned by the ICAP server.
Backing out a virus pattern on the ICAP server can revert ISTags to previous
values that are ignored by the Advanced Secure Gateway appliance. To force the
Advanced Secure Gateway appliance to recognize the old values, use the Sense
Settings option. See "Creating an ICAP Service" on page 481.
Persistent Connections
New ICAP connections are created dynamically as ICAP requests are received (up
to the defined maximum connection limit). The connection remains open to
receive subsequent requests. If a connection error occurs, the connection closes to
prevent more errors.
470
Determining Which Files to Scan
In determining which files to scan, this integrated solution uses the content
scanning server’s filtering in addition to Proxy capabilities. The following table
describes the supported content types and protocols.
Table 22–1 Content Types Scanned By ICAP Server and the Advanced Secure Gateway
All or specified file types, based • All HTTP objects • Streaming content (for
on the file extension, as (uploaded or downloaded) example, RTSP and MMS)
configured on the server. • All FTP over HTTP • Live HTTP streams (for
Examples: .exe (executable (webftp) objects (uploaded or example, HTTP radio
programs), .bat (batch downloaded) streams)
files), .doc and .rtf (document • All native FTP objects • CIFS
files), and .zip (archive files); or (uploaded or downloaded) • MAPI
specific MIME types.
The above is true for both • IM
transparent and explicit proxies.
• TCP tunnel traffic
471
Advanced Secure Gateway Administration Guide
Notes
❐ Patience pages are not compatible with infinite stream connections—or live
content streamed over HTTP—such as a cam or video feed. ICAP scanning
cannot begin until the object download completes. Because this never occurs
with this type of content, the Advanced Secure Gateway appliance continues
downloading until the maximum ICAP file size limit is breached. At that
point, the Advanced Secure Gateway appliance either returns an error or
attempts to serve the content to the client (depending on fail open/closed
policy). However, even when configured to fail open and serve the content,
the delay added to downloading this large amount of data is often enough to
cause the user give up before reaching that point.
❐ Patience pages are limited to web browsers.
Note: This feature is supported for the HTTP proxy only; FTP connections are not
supported.
472
Trickling Data From the Start
In trickle from start mode, the Advanced Secure Gateway appliance buffers a small
amount of the beginning of the response body. As the ICAP server continues to
scan the response, the Advanced Secure Gateway appliance allows one byte per
second to the client.
LEGEND:
1: After 5 seconds (default), trickling begins.
2: The response is received from the ICAP server (clean), and the client receives the
remaining bytes at the best connection possible.
Figure 22–3 A client receives only the initial bytes of a transaction during the ICAP scan.
After the ICAP server completes its scan:
❐ If the object is deemed to be clean (no response modification is required), the
Advanced Secure Gateway appliance sends the rest of the object bytes to the
client at the best speed allowed by the connection.
❐ If the object is deemed to be malicious, the Advanced Secure Gateway
appliance terminates the connection and the remainder of the response object
bytes—which in this case are the majority of the bytes—are not sent to the
client.
Deployment Notes
❐ This method is the more secure option because the client receives only a small
amount of data pending the outcome of the virus scan.
❐ One drawback is that users might become impatient, especially if they notice
the browser display of bytes received. They might assume the connection is
poor or the server is busy, close the client, and restart a connection.
473
Advanced Secure Gateway Administration Guide
LEGEND:
1: After 5 seconds (default), the ICAP scan begins, but the client begins receiving bytes at
the best connection possible.
2: Trickling begins for the final 16K of data.
3: The response is received from the ICAP server (clean), and the client receives the
remaining bytes.
Figure 22–4 A client receives most of the bytes immediately during the ICAP scan.
After the ICAP server completes its scan, the behavior is the same as described in
"Trickling Data From the Start" on page 473.
Deployment Notes
❐ Blue Coat recommends this method for media content, such as flash objects.
❐ This method is more user-friendly than trickle at start. This is because users
tend to be more patient when they notice that 99% of the object is downloaded
versus 1%, and are less likely to perform a connection restart. However,
network administrators might perceive this method as the less secure method,
as a majority of the object is delivered before the results of the ICAP scan.
474
Deciding between Data Trickling and Patience Pages
Advanced Secure Gateway appliance configuration options plus policy allow you
to provide different ICAP feedback actions depending upon the type of traffic
detected:
❐ Blue Coat defines interactive as the request involving a web browser. web
browsers support data trickling and patience pages.
❐ Non-interactive traffic originates from non-browser applications, such as
automatic software download or update clients. Such clients are not
compatible with patience pages; therefore, data trickling or no feedback are
the only supported options.
Based on whether the requirements of your enterprise places a higher value either
on security or availability, the Advanced Secure Gateway appliance allows you to
specify the appropriate policy. However, you must also consider the user agents
involved when determining the appropriate feedback method. For example,
streaming clients cannot deliver patience pages, but they are susceptible to
connection time-outs. Therefore, trickling is the suggested method. The following
diagram provides basic guidelines for deciding which feedback method to
implement.
475
Advanced Secure Gateway Administration Guide
476
How Deferred Scanning Works
Deferred scanning detects the possibility of infinite streams by the fact that the
number of ICAP resources in use has reached a certain threshold. It then defers
the scanning of those streams by deferring the oldest, outstanding ICAP requests
first. For every new ICAP request, the Advanced Secure Gateway appliance does
the following:
❐ If the total number of outstanding ICAP actions for the current server has
reached the defer threshold, the Advanced Secure Gateway appliance defers
the oldest ICAP connection that has not yet received a full object.
The defer threshold is specified by the administrator as a percentage. For
example, if the defer threshold is set to 70 percent and the maximum
connections are set to 100, then up to 70 connections are allowed before the
Advanced Secure Gateway appliance begins to defer connection which have
not finished downloading a complete object.
Note: See "Creating an ICAP Service" on page 481 for information about setting
the defer scanning threshold value on the Advanced Secure Gateway appliance
Proxy Management Console.
When an ICAP connection is deferred, the connection to the ICAP server is closed.
The application response continues to be received and when the download is
complete the ICAP request is restarted. The new ICAP request may still be
queued if there are no available ICAP connections. After a request is deferred,
ICAP waits to receive the full object before restarting the request. If there is a
queue when a deferred action has received a complete object, that action is
queued behind other deferred actions that have finished. However it will be
queued before other new requests.
477
Advanced Secure Gateway Administration Guide
Notes
❐ Failover is configured as part of the ICAP policy definition.
❐ You cannot configure failover policy until ICAP services are configured on the
Advanced Secure Gateway appliance.
❐ To avoid errors, ICAP service names cannot be named fail_open or fail_closed
(the CLI commands prevent these names from being created).The internal
Content Anlaysis services included with Advanced Secure Gateway
deployments cannot be used in conjunction with ICAP failover.
478
Section B: Configuring ICAP Services
This section describes how to configure the Advanced Secure Gateway appliance
to communicate with an ICAP server for content scanning.
To configure threat protection with an external Content Analysis or ProxyAV, see
Chapter 21: "Configuring Threat Protection" on page 453.
To use the internal Content Analysis Service on your Advanced Secure Gateway
appliance, see the help in the Content Analysis tab of the HTTPS Management
Console.
1. Install and configure the Follow the manufacturer instructions for installing the
ICAP server ICAP server, including any configuration necessary to
work with the Advanced Secure Gateway appliance.
Based on your network environment, you might use
the Advanced Secure Gateway appliance with
multiple ICAP servers or multiple scanning services
on the same server. Configure options as needed,
including the exception message displayed to end
users in the event the requested object was modified
or blocked.
2. Decide whether to scan data Scan data using the plain ICAP method, secure ICAP
using plain ICAP or secure method or both.
ICAP • Plain ICAP should be used only for non-
confidential data. In particular, if plain ICAP is
used for intercepted HTTPS traffic, then data
intended to be cryptographically secured would
be transmitted in plain text on the local network.
• Secure ICAP send data through a secure data
channel. This method protects the integrity of
messages that are sent between the Advanced
Secure Gateway and the ICAP server while it
allows users to authenticate ICAP servers by
enabling certificate verification.
479
Advanced Secure Gateway Administration Guide
Table 22–2 Workflow Tasks–Configuring Advanced Secure Gateway ICAP Communications (Continued)
5. Specify the feedback Select patience pages or data trickling for feedback
method method. See "Configuring ICAP Feedback" on page
489.
6. Add ICAP rules to policy Depending on your network needs, add ICAP rules to
policy and install the policy file on the Advanced
Secure Gateway appliance.
See "Creating ICAP Policy" on page 509.
480
Section 1 Creating an ICAP Service
An ICAP service is a collection of attributes that defines the communication
between the Advanced Secure Gateway appliance and the external ICAP server. It
includes the server IP address or hostname, ICAP scanning method, and a host of
other options including the supported number of connections.
Note: The internal Content Analysis service automatically creates both a request
and response modification service. These services cannot be configured, but are
available for use in the Set Request or Set Response Analysis service dialog in the
Visual Policy Manager, as well as in the Malware Scanning configuration.
You must create an ICAP service for each ICAP server or scanning service. For
example, if you are using the Advanced Secure Gateway appliance with multiple
ICAP servers or multiple scanning services (RESPMOD or REQMOD) on the
same server, add an ICAP service for each server and RESPMOD or REQMOD
service.
Similar ICAP scanning services can then be grouped together to create a service
group that helps distribute and balance the load of scanning requests. Further,
each ICAP service or service group can be accessed through VPM or CPL to
configure policy for better administrative control.
The following instructions describe how to create an ICAP service for any
supported third-party ICAP server.
2a
2b
481
Advanced Secure Gateway Administration Guide
3. Highlight the ICAP service name and click Edit. The the Management Console
displays the Edit ICAP Service dialog.
4a-f
a. In the Service URL field, enter the ICAP server URL, which includes the
URL schema, ICAP server hostname or IP address. For example, the
ProxyAV and Content Analysis appliances support this type of URL
icap://10.x.x.x/avscan. If your ICAP server is something other than
ProxyAV or Content Analysis, check with your ICAP vendor for the
appropriate URL format.
b. In the Maximum Number of Connections field, enter the maximum
possible connections at any given time that can occur between the
Advanced Secure Gateway appliance and the ICAP server. The range
is a number from 5 to 4096. The default is 5. The number of
recommended connections depends on the capabilities of the ICAP
server. Refer to the vendor’s product information.
Note: The connection timeout value does not measure how much of the
scanning process is complete, it is a mechanism for ensuring that the
communication between the appliances is alive and healthy. The details of
482
the interaction between the Advanced Secure Gateway appliance and the
ICAP server can only be viewed through a packet capture.
If the ICAP server does not respond within the configured timeout value,
by default, the user will not receive the requested content. However, if
Content Analysis or ProxyAV is your ICAP server, the scanning response
configured in the Configuration > Threat Protection > Malware Scanning
determines whether or not the user is served the requested content.
5a-e
5. Configure service ports for plain ICAP and secure ICAP. You can enable one
or both types of ICAP connections at the same time. However, you must select
at least one type of ICAP service.
a. Select This service supports plain ICAP connections to use plain ICAP. Use
plain ICAP when you are scanning plain data (HTTP). In this case, if
the HTTPS proxy is enabled on the Advanced Secure Gateway
appliance, the data is decrypted first on the Advanced Secure Gateway
appliance and then sent to the ICAP server.
b. In the Plain ICAP port field, enter a port number. The default port is 1344.
483
Advanced Secure Gateway Administration Guide
c. Select This service supports secure ICAP connections to use secure ICAP.
Use secure ICAP when you are scanning sensitive or confidential data
(HTTPS).
d. In the Secure ICAP port field, enter a port number. The default port is
11344.
e. If you selected secure ICAP, make sure that you select a valid SSL
profile for secure ICAP in the SSL Device Profile field. This associates an
SSL device profile with the secure ICAP service.
Note: If you do not select an SSL device profile you cannot use secure
ICAP connections. The SSL device profile can be customized for your
environment. For more information, see "Appliance Certificates and SSL
Device Profiles" on page 1348.
6b
6c
6d
6a
6e
484
c. (Only for RESPMOD service) If you are using file scanning policies
based on file extensions on the ProxyAV appliance, enter 0 in the
Preview size (bytes) field, and select enabled. With a 0 bytes preview size,
only response headers are sent to the ICAP server; more object data is
only sent if requested by the ICAP server.
or
If you have enabled the Kaspersky Apparent Data Types feature on the
ProxyAV appliance, enter a value (512 is recommended) in the Preview size
(bytes) field, and select enabled. The ICAP server reads the object up to the
specified byte total. The ICAP server either continues with the transaction
(that is, receives the remainder of the object for scanning) or opts out of the
transaction.
or
Unselect enabled if the above two situations do not apply to you; do not
use the preview option.
d. (Optional) The Send options allow additional information to be
forwarded to the ICAP server. Select one or more of the following:
Client address, Server address, Authenticated user, or Authenticated groups.
See Also
❐ "About Content Scanning" on page 466
❐ "Configuring ICAP Services" on page 479
❐ "Securing Access to an ICAP Server" on page 495
❐ "Monitoring Content Analysis and Sessions" on page 501
❐ "Creating ICAP Policy" on page 509
❐ "Managing Virus Scanning" on page 524
485
Advanced Secure Gateway Administration Guide
486
b. In the dialog that appears, enter values for the Critical Threshold and
Critical Interval. (Warning Threshold and Interval are not measured
for this metric.)
See "Planning Considerations for Using Health Monitoring" on page 1396
for more information.
c. Select a notification output (Log; Trap; Email).
d. Click OK.
4. Set alert notification properties for deferred ICAP connections:
a. Select ICAP Deferred Connections and click Edit.
b. Repeat steps 3b through 3d.
5. Click Apply.
Example
The following example depicts the changing health of an ICAP connection metric
configured with the default threshold (80%) and interval (120 seconds) and when
log entries are created during the health monitoring process:
❐ Metric health starts at OK.
❐ The metric exceeds 80% for 60 seconds and then returns below threshold. The
state is still OK and no log entry is created.
❐ The metric exceeds 80% again. After being above threshold for 120 seconds,
the metric becomes Critical and a log entry is created for the Critical state.
❐ The metric goes below 80% for 100 seconds before exceeding the threshold.
The state is still Critical and no log entry is created.
❐ The metric goes below threshold. After being below threshold for 120 seconds,
the metric becomes OK and a log entry is created for the OK state.
487
Advanced Secure Gateway Administration Guide
488
Section 2 Configuring ICAP Feedback
This section describes how to specify what type of feedback is provided to users
during an ICAP scan. See "Improving the User Experience" on page 471.
2a
2b
2c
3a
3b
3c
Note: When the deferred scanning option is enabled and a patience page
is configured, the browser continues to receive a patience page until the
object is fully received and the outstanding ICAP actions have
completed.
489
Advanced Secure Gateway Administration Guide
• Trickle object data from start: The client receives 1 byte per second, which
should prevent connection time-outs while the ICAP server performs
the scan. If the response from the ICAP server is clean, the client
receives the rest of the object data at the best connection speed
possible. If the scan detects malicious content, the connection is
dropped. This is the more secure method.
• Trickle object data at end: The client receives most (99%) of the object
data, but the final bytes are sent at the rate of one per second while the
ICAP scanner performs the scan. If the response from the ICAP server
is clean, the client receives the rest of the object data at the best
connection speed possible. If the scan detects malicious content, the
connection is dropped. This is the least secure method, as most of the
data has already been delivered to the client. However, this method
provides the best user experience because there most of the object is
already delivered.
Note: When deferred scanning is enabled and the data trickle options are
configured, the object continues to trickle during deferred scanning.
However, due to the trickle buffer requirement, there may be a delay
before the Advanced Secure Gateway appliance begins sending a
response.
490
Section 3 Customizing ICAP Patience Text
This section describes how to customize text displayed during ICAP scanning.
Patience pages are displayed if the appropriate option is selected, as described in
the previous section: "Improving the User Experience" on page 471.
The following topics describe how to customize the HTTP/FTP patience page:
❐ "HTTP Patience Text" on page 491
❐ "FTP Patience Text" on page 493
2a
2b
2c
2d
2. In the HTTP Patience Page Customization section, click Header, Summary, Details, or
Help. The corresponding customize dialog displays. Customize the
information as appropriate.
491
Advanced Secure Gateway Administration Guide
Interactivity Notes
❐ When ICAP scanning is enabled and a patience page is triggered, a unique
URL is dynamically generated and sent to the browser to access the patience
page. This unique URL might contain a modified version of the original URL.
This is expected behavior.
492
❐ Patience pages and exceptions can only be triggered by left-clicking a link. If a
user right-clicks a link and attempts to save it, it is not possible to display
patience pages. If this action causes a problem, the user might see browser-
specific errors (for example, an Internet site not found error); however, ICAP
policy is still in effect.
❐ A patience page is not displayed if a client object request results in an HTTP
302 response and the Advanced Secure Gateway appliance pipelines the
object in the Location header. After the Advanced Secure Gateway receives
the client request for the object, the client enters a waiting state because a
server-side retrieval of the object is already in progress. The wait status of the
client request prevents the patience page from displaying. To prevent the
Advanced Secure Gateway appliance from pipelining these requests (which
decreases performance) and to retain the ability to provide a patience page,
configure HTTP as follows:
# (config) http no pipeline client redirects
❐ The status bar update does not work if it is disabled or if the Javascript does
not have sufficient rights to update it.
❐ Looping: Certain conditions cause browsers to re-spawn patience pages. For
example, a site states it will begin a download in 10 seconds, initiates a pop-up
download window, and returns to the root window. If the download window
allows pop-ups, the patience page displays in a separate window. The
automatic return to the root window initiates the download sequence again,
spawning another patience page. If unnoticed, this loop could cause a system
hang. The same behavior occurs if the user clicks the back button to return to
the root window. For known and used download sites, you can create policy
that redirects the page so that it doesn’t return to the root window after a
download starts.
493
Advanced Secure Gateway Administration Guide
2. In the FTP Patience Page Customization field, click Summary; the Management
Console displays the Customize FTP Patience Text dialog. Customize the FTP
client patience text as appropriate.
3. Click OK.
4. Click Apply.
494
Section C: Securing Access to an ICAP Server
You can secure access between the Advanced Secure Gateway appliance and an
ICAP server using a variety of methods. Choosing the appropriate method is
contingent upon your platform considerations and network topology.
Secure ICAP can be used regardless of your network topology or platform
considerations. Because secure ICAP has no such restrictions, it is a method that is
both reliable and easy to set up; however, secure ICAP might result in added
expense when running your network.
To offset the added expense of running secure ICAP, other alternatives can be
considered; however, these alternatives do depend on network topology and
platform considerations.
This section discusses three methods to consider when setting up your ICAP
server.
❐ "Using Secure ICAP" on page 496
❐ "Using a Crossover Cable" on page 498
❐ "Using a Private Network" on page 499
495
Advanced Secure Gateway Administration Guide
Note: The internal Content Analysis request and response services do not
support secure ICAP, as the ICAP server exists on the same appliance.
a. Select Default and copy the certificate. You must include the
----BEGIN CERTIFICATE---- and -----END CERTIFICATE----
statements.
3. From the Advanced Secure Gateway appliance’s Management Console, copy
the ProxyAV appliance’s default SSL certificate to the CA Certificate List.
a. Select Configuration > SSL > CA Certificates.
b. Click Import. The Import CA Certificate dialog displays.
c. Choose a name for this certificate and enter it in the CA Cert Name field,
then paste the certificate in the CA Certificate PEM panel. You must
include the ----BEGIN CERTIFICATE---- and -----END CERTIFICATE---
-- statements.
d. Click OK. The dialog closes and you return to the CA Certificates tab.
e. Click Apply to save your settings.
4. Create a CA Certificate List. For more information, see "Managing CA
Certificate Lists" on page 1191.
a. From the Advanced Secure Gateway appliance Management Console,
select Configuration > SSL > CA Certificates > CA Certificate Lists. The CA
Certificates Lists page displays.
496
b. Click New. The Create CA Certificate List dialog displays.
c. Enter the name of the certificate list in the field provided.
d. Locate the certificate that you imported in Step 3, then click Add >> to
move the certificate to the Selected column.
e. Click OK. The dialog closes and you return to the CA Certificate Lists
page. The new certificate list is shown in the table.
f. Click Apply to save your settings.
5. Create an SSL device profile for the ICAP server. For more information, see
"About SSL Device Profiles" on page 1349.
a. From the Advanced Secure Gateway appliance Management Console,
select Configuration > SSL > Device Profiles. The Profiles page displays.
b. Click New. The Create SSL Device Profile dialog displays.
c. Enter the name of the device profile in the field provided.
d. Set Keyring to <None>.
e. Select the CCL that you created in Step 4 from the drop-down list.
f. Enable Verify peer by selecting the check box.
g. Click OK. The dialog closes and you return to the Profiles page.
h. Click Apply to save your settings.
6. Configure ICAP on the Advanced Secure Gateway appliance.
a. From the Advanced Secure Gateway appliance Management Console,
select Configuration > Content Analysis > ICAP > ICAP Services. The Services
page displays.
b. Click New. The Add list item dialog displays.
c. Enter the name of the ICAP service, then click OK. The dialog closes
and you return to the Services page. The new service is listed in the
table.
d. Select the ICAP service you just created, then click Edit. The Edit ICAP
Service ICAP_Service_Name dialog displays.
e. Enter the Service URL of the ICAP server, for example, icap://
192.0.2.0/avscan.
f. In the ICAP Service Ports section, select the check box for This service
supports secure ICAP connections.
g. Set the SSL device profile to the profile that was created in Step 5.
h. To set remaining configurations for the Advanced Secure Gateway
appliance, see "Creating an ICAP Service" on page 481.
i. Click OK. The dialog closes and you return to the ICAP Services page.
j. Click Apply to save your settings.
497
Advanced Secure Gateway Administration Guide
b. Select New. The Add list item dialog displays. Enter the ICAP service in
the field provided, then click OK. The dialog closes and you return to
the ICAP Services page.
c. Select the service you just created, then click Edit. The Edit ICAP Service
dialog displays.
d. Enter the Service URL of the ICAP server, for example, icap://
192.0.2.0/avscan.
e. In the ICAP Service Ports section, select the check box for This service
supports plain ICAP connections.
498
Section 6 Using a Private Network
Larger enterprises may require redundancy in the network (for example, multiple
Advanced Secure Gateway appliances and/or multiple ICAP servers such as
Content Analysis or ProxyAV appliances). Redundant appliances address the
limitations of the single ICAP server/single-Advanced Secure Gateway
deployment. The Advanced Secure Gateway appliance can load balance web
content scanning between multiple ICAP servers, or designate a sequence of ICAP
servers as failover devices should the primary ICAP appliance go offline. Similarly,
secondary Advanced Secure Gateway appliances can be configured as failover
devices should the primary Advanced Secure Gateway appliance go down and can
provide further proxy support in the network.
If you have multiple Advanced Secure Gateway appliances that share multiple
ICAP servers, you can configure a private network that is completely separate
from other networks within your organization.
The figure shows a Advanced Secure Gateway appliance using multiple ICAP
servers interconnected on a private network.
499
Advanced Secure Gateway Administration Guide
Blue Coat recommends that all Advanced Secure Gateway appliances reside
on the same subnet as the ICAP servers, even in cases where multiple
Advanced Secure Gateway appliances are load balanced with multiple ICAP
servers. Although you can put the ICAP server in California and the
Advanced Secure Gateway appliance in New York, performance will suffer.
For optimal performance, the ICAP server and Advanced Secure Gateway
appliance must be physically and logically close to each other; Blue Coat
recommends that the ICAP server be on the next-hop VLAN.
3. Set each Advanced Secure Gateway appliance's IP address from this subnet on
its interface 1:0, with selected netmask.
4. Set each ICAP server’s IP address from this subnet on its interface 1 using the
same netmask.
5. Plug each Advanced Secure Gateway appliance’s interface 1:0 and each ICAP
server’s interface 1 into the private network switch.
6. Create one or more ICAP services on each Advanced Secure Gateway
appliance, pointing at the ICAP servers’ IP addresses selected above.
a. Create an ICAP response service. Select Configuration > Content Analysis >
ICAP > ICAP Services. The ICAP Services page displays.
b. Select New. The Add list item dialog displays. Enter the ICAP service in
the field provided, then click OK. The dialog closes and you return to
the ICAP Services page.
c. Select the service you just created, then click Edit. The Edit ICAP Service
dialog displays.
d. Enter the Service URL of the ICAP server, for example, icap://
192.0.2.0/avscan.
e. In the ICAP Service Ports section, select the check box for This service
supports plain ICAP connections.
500
Section D: Monitoring Content Analysis and Sessions
This section discusses the following topics:
❐ "Introduction to Content Analysis Request Monitoring"
❐ "ICAP Graphs and Statistics" on page 502
❐ "Monitoring ICAP-Enabled Sessions" on page 505
501
Advanced Secure Gateway Administration Guide
Statistic Definition
Secure Requests ICAP scanning transactions that are encrypted and tunneled
over SSL
Deferred Requests ICAP scanning transactions that have been deferred until
the full object has been received
Bytes Sent Bytes of ICAP data sent to the ICAP service or service group
Note: Bytes Sent does not include secure ICAP traffic.
Bytes Received Bytes of data received from the ICAP service or service
group
502
Displaying ICAP Graphs
ICAP graphs can be used as diagnostic and troubleshooting tools. For instance, if
the Active Requests graph shows excessive queued ICAP requests on a regular
basis, this may indicate the need for a higher capacity ICAP server.
Additional Information
❐ While the ICAP statistics screen is displayed, you can view new graphs by
selecting different services, service groups, time periods, or graph types.
503
Advanced Secure Gateway Administration Guide
For the time period you selected, the Advanced Secure Gateway appliance
displays statistics for individual services as well as totals for all services.
504
Monitoring ICAP-Enabled Sessions
For detailed information about active and errored sessions that have ICAP
scanning enabled, view the Active Sessions and Errored Sessions pages. You can
filter the session list to display only the ICAP-enabled sessions, so that you can
easily view the status of each session (transferring, deferred, scanning,
completed) and see fine-grained details (such as client IP address, server name,
bytes, savings, and protocol).
Additional ICAP filters are available as well. You can also filter by:
❐ Type of ICAP service (REQMOD or RESPMOD)
❐ Service name
❐ ICAP status (for example, display only the deferred sessions)
Additional filters are optional. If you leave all the options set to Any, all ICAP
sessions are displayed.
4. (Optional) Select the service name from the Service drop-down list.
5. (Optional) Select the ICAP state from the Status drop-down list: Any, transferring,
deferred, scanning, completed.
6. (Optional) To limit the number of connections to view, select Display the most
recent and enter a number in the results field. This helps optimize performance
when there is a large number of connections.
7. (Optional) To view the current errored proxied sessions, select Show errored
sessions only.
8. Click Show. The Proxied Sessions table displays the ICAP-enabled sessions.
505
Advanced Secure Gateway Administration Guide
Of particular interest in the Proxied Sessions table is the ICAP (I) column. This
column indicates the status of the ICAP-enabled session, with unique icons
identifying the status of the connection. Table 22–4 describes each of the icons. For
descriptions of the other columns in the table, see "About the Proxied Sessions
Statistics" on page 763.
(magnifying glass) Scanning — ICAP requests are in the process of being scanned
Additional Information
❐ Icon Tooltips—When you mouse over an ICAP icon, a tooltip displays details
about the ICAP-enabled session:
• The type of service (REQMOD and/or RESPMOD)
• The name of the service
• The ICAP state (transferring, deferred, scanning, or completed), for
example:
REQMOD Service: icap1 (completed)
506
❐ When the following conditions are meet, two ICAP services display for one
explicit HTTPS connection:
• An ICAP service group is used for request modification (REQMOD) and
there are more than one ICAP service in the ICAP service group.
• Explicit HTTPS connection are set by policy to perform ICAP request
modification (REQMOD).
• The Advanced Secure Gateway appliance is configured to intercept these
HTTPS connections.
❐ When only one type of service is used for a session, the tooltip indicates
whether the other type is inactive or unsupported, for example:
RESPMOD Service: inactive
Sorting—If you click the I column heading, the sessions are sorted in the
following order:
❐ Transferring
❐ Deferred
❐ Scanning
❐ Completed
❐ Inactive
❐ Unsupported
4. (Optional) Select the service name from the Service drop-down list.
5. (Optional) Select the ICAP state from the Status drop-down list: Any,
transferring, deferred, scanning, completed.
6. (Optional) To limit the number of sessions to view, select Display the most recent
and enter a number in the results field. This helps optimize performance when
there is a large number of connections.
507
Advanced Secure Gateway Administration Guide
7. Click Show. The Proxied Sessions table provides the active and inactive errored
ICAP-enabled sessions.
508
Section E: Creating ICAP Policy
While the ICAP service defines the parameters for setting up the transaction
between the Advanced Secure Gateway appliance and the ICAP server, ICAP
policy allows you to specify the response or action for each ICAP service or
service group that is configured. For example, using policy, you may have a
general rule for scanning all incoming responses and set an action to deny content
if the scan cannot be completed. You then can create a rule that allows responses
from specific business critical sites to be served even if the scan cannot be
completed. Or, for super users in your enterprise, you can allow access to
password protected archives whose content cannot be scanned.
Policy allows for creating granular rules based on individual users, groups of
users, time of day, source, protocol, user agent, content type and other attributes.
For example, you can create policy to define an action when a virus is detected, or
when an ICAP error or ICAP server failover occurs in your network. Policy can be
created using the graphical user interface, the Visual Policy Manager (VPM) or
Content Policy Language (CPL).
The following topics are discussed in this section:
❐ "VPM Objects" on page 509
❐ "Example ICAP Scanning Policy" on page 510
❐ "Exempting HTTP Live Streams From Response Modification" on page 515
❐ "Streaming Media Request Modification Note" on page 515
❐ "Using ICAP Error Codes in Policy" on page 515
❐ "Using ICAP Headers in Policy" on page 521
❐ "CPL Notes" on page 523
VPM Objects
The VPM contains the following objects specific to Web content scanning.
Table 22–5 AV Scanning Objects
Object Layer>Column
Virus Detected Web Access>Service
509
Advanced Secure Gateway Administration Guide
For information on the VPM and defining policies, refer to Visual Policy Manager
Reference.
For more information on using CPL, refer to Content Policy Language Guide.
To perform virus scanning, protecting both the server side and the client side:
1. In the VPM, select Policy > Web Access Layer. Name the layer RequestAV.
2. Right-click the Action column; select Set. The Management Console displays
the Set Action Object dialog.
3. Click New.
4. Select Set Perform Request Analysis; the VPM displays the Add ICAP Request
Analysis Service Object dialog.
510
5a
5b
5c
5d
5e
511
Advanced Secure Gateway Administration Guide
6. In the VPM, select Policy > Add Web Content Layer. Name the layer ResponseAV.
7. Right-click the Action column; select Set. The VPM displays the Set Action
Object dialog.
8. Click New.
9. Select Set Response Analysis; the VPM displays the Add Response Analysis
Service Object dialog.
10a
10b
10c
10d
512
d. Select If available use secure ICAP connections for encrypted
requests. Accept the default: Deny the client request. This prevents a
client from downloading a threat. If a virus is found, the content is not
downloaded.
e. Repeat Step b for to add the additional failover services.
f. Click OK; click OK again to add the object to the rule.
513
Advanced Secure Gateway Administration Guide
5c
5a
5b
5d
514
❐ As the CAS/ProxyAV is configured to serve password-protected objects, only
the IT group can download such files; everyone else is denied.
515
Advanced Secure Gateway Administration Guide
The following table lists the error codes and their descriptions:
Table 22–6 ICAP Error Codes Available in Policy
Password protected Password Protected Archive Archive file could not be scanned because
it is password protected.
Max file size exceeded Maximum File Size Maximum individual file size to be
Exceeded scanned exceeds settings in configuration.
The maximum individual file size that
can be scanned depends on the RAM and
disk size of the ProxyAV appliance
model.
Max total size exceeded Maximum Total Size Maximum total uncompressed file size
Exceeded exceeds settings in configuration. The
maximum limit varies by ProxyAV
appliance model.
Max total files exceeded Maximum Total Files Maximum total files in an archive exceeds
Exceeded settings in configuration.
The maximum is 100,000.
Max archive layers Maximum Archive Layers Maximum number of layers in a nested
exceeded Exceeded archive exceeds settings in configuration.
The maximum by vendor is:
• Panda: 30
• McAfee: 300
• All others: 100.
File type blocked File Type Blocked Blocked a file type as configured on the
ICAP server settings.
File extension blocked File Extension Blocked Blocked a file extension as configured on
the ICAP server settings.
Antivirus load failure Anti-virus Load Failure Unable to load antivirus engine on the
ICAP server.
516
ICAP Error Code VPM Object Name Description
ICAP connection mode ICAP Connection Mode not ICAP server does not support the
not supported Supported configured connection mode. For
example, plain ICAP is required but
server supports only secure ICAP and
vice versa.
ICAP security error ICAP Security Error (Secure ICAP error) Unable to establish a
secure connection to the ICAP server. This
could be because the SSL device profile is
not enabled or is corrupt.
517
Advanced Secure Gateway Administration Guide
b. Click New and select ICAP Error Code. The VPM displays the Add ICAP
Error Code dialog.
c. Click Selected Errors and select the Decode error from the list of available
errors.
d. Click OK to save your changes and exit all open dialogs.
3. In the Source column, right click and select Set. The VPM displays the Set
Source Object dialog.
518
a. Select Group. The VPM displays the Add Group Object dialog.
b. Add the group and authentication realm for the users with access to
unscanned content. Click OK to save your changes and exit the Add
Group Object dialog.
4. In the Action column, right-click set the action to Allow. Now you have rule in
the Web Access Later that allows the group access to content when the
Advanced Secure Gateway appliance receives the ICAP decode error.
5. Add another rule in the Web Access Layer to deny access to unscanned content
to all other users in the network.
519
Advanced Secure Gateway Administration Guide
a. In the Service column, right click and select Set. The VPM displays the
Set Service Object dialog.
b. Select the ICAP error code service object that you created in Step 1
from the list. Click OK.
c. In the Action column, right click and set action to Deny.
6. Click Install Policy to install the policy.
520
Section 1 Using ICAP Headers in Policy
When you enable ICAP, traffic through the Advanced Secure Gateway appliance
is sent to an ICAP device such as a Content Analysis or ProxyAV appliance for
scanning. That device scans the content and returns useful information in ICAP
headers to the Advanced Secure Gateway appliance. As an administrator, you can
make policy decisions based on that response, which can contain information
about the scanned files such as virus details and threat levels.
521
Advanced Secure Gateway Administration Guide
522
CPL Notes
The following CPL properties are available to manage ICAP services:
• request.icap_service() for request modification
• response.icap_service() for response modification
❐ If policy specifies that an ICAP service is to be used, but the service is not
available, the default behavior is to fail closed—that is, deny the request or
response. The following CPL allows the serving of objects without ICAP
processing if the server is down.
request.icap_service(service_name, fail_open)
response.icap_service(service_name, fail_open)
When the ICAP service is restored, these objects are scanned and served from
the cache if they are requested again.
Note: Blue Coat recommends this CPL to be used for internal sites; use with
caution.
❐ When configuring the secure ICAP feature, the following CPL is used:
Note: This CPL allows the user to configure the secure_connection separately
for each service in failover sequence.
request.icap_service.secure_connection(option)
response.icap_service.secure_connection(option)
request.icap_service.secure_connection.service_name(option)
response.icap_service.secure_connection.service_name(option)
request.icap_service.secure_connection
[service__0,service_1,...,service_N-1](option)
response.icap_service.secure_connection
[service__0,service_1,..., service_N-1](option)
523
Advanced Secure Gateway Administration Guide
Advanced Configurations
This section summarizes more-advanced configurations between the Advanced
Secure Gateway appliance and multiple ICAP servers. These brief examples
provide objectives and suggest ways of supporting the configuration.
524
appliance checks to see if the object is up to date, and then rescans it. If two
requests for the same object are directed to different servers, then the scanning
signature changes and the object is rescanned.
Note: The access log string cannot exceed 256 characters. If the header name or
value extends the length over the limit, then that string does not get logged. For
example, if the x-virus-id header value is 260 characters, the access log displays
"x-virus-id:" with no value because the value is too long to display. Also, if the
access log string is already 250 characters and the Advanced Secure Gateway
appliance attempts to append a "Malicious-Mobile-Type:" string, the string is not
appended
Access log entries might vary depending upon the type of ICAP scan performed
and the custom log formats. For information about default and custom access log
formats, see Chapter 29: "Creating Custom Access Log Formats" on page 663.
525
Advanced Secure Gateway Administration Guide
526
Chapter 23: Configuring Service Groups
This chapter describes how to create and manage external Content Analysis
ICAP service groups. In high-traffic network environments, a service group
accelerates response time by a performing a higher volume of scanning.
527
Advanced Secure Gateway Administration Guide
Figure 23–1 shows a service group of three Blue Coat AV ICAP servers.
Legend:
A: AV1; ICAP
server with 1
maximum connections and a specified weight of 1.
B: AV2; ICAP server with 10 maximum connections and a specified weight of 1.
C: AV3, ICAP server with 25 maximum connections and a specified weight of 3.
Figure 23–1 ICAP Service Group
To help distribute and balance the load of scanning requests when the Advanced
Secure Gateway is forwarding requests to multiple services within a service
group, the Advanced Secure Gateway uses an intelligent load balancing
algorithm. When deciding which service in the service group to send a scanning
request, this algorithm takes into consideration the following factors:
❐ Number of requests that are in a waiting state on each service (a request is in
this state when it has been sent to the service but the response hasn’t been
received)
❐ Number of unused connections available on each service (calculated by
subtracting the number of active transactions from the connection maximum
on the server)
❐ The user-assigned weight given to each server (see "Weighting" below)
Weighting
Weighting determines what proportion of the load one server bears relative to the
others when transactions are waiting to be scanned. (The waiting transactions are
typically large file downloads.) If all servers have either the default weight (1) or
the same weight, each share an equal proportion of the load when transactions are
waiting. If one server has weight 25 and all other servers have weight 50, the
25-weight server processes half as much as any other server.
528
Before configuring weights, consider the capacity of each server. The processing
capacity of the server hardware in relationship to other servers (for example, the
number and performance of CPUs or the number of network interface cards)
could affect assigned weight of a ICAP server.
Having appropriate weights assigned to your services is critical when all servers
in a service group have waiting transactions. As servers reach their capacity,
proper weighting is important because requests are queued according to weight.
One technique for determining weight assignments is to start out by setting equal
weights to each service in a group; then, after several thousand requests, make
note of how many requests were handled by each service. For example, support
there are two services in a group: Service A handled 1212 requests, Service B
handled 2323. These numbers imply that the second service is twice as powerful
as the first. So, the weights would be 1 for Service A and 2 for Service B.
Setting the weight value to 0 (zero) disables weighted load balancing for the ICAP
service. Therefore, if one ICAP server of a two-server group has a weight value of
1 and the second a weight value of 0, should the first server go down, a
communication error results because the second server cannot process the
request.
Load Balancing
When load balancing between services, how does the Advanced Secure Gateway
decide which ICAP service to send a scanning request to? For each service, it
calculates an index by dividing the number of waiting transactions by the server
weight (think of this as wait/weight). The ICAP service with the lowest index
value handles the new ICAP action, assuming that the service has an available
connection to use. If it does not, it sends the request to the service with the next
lowest index value that has a free connection.
Note: If there are no transactions waiting, load balancing using the assigned
weights does not take effect.
Example 1
Service A and B are in the same service group.
❐ Service A can handle up to 50 connections, is assigned a weight of 1, has 17
active transactions, with 5 transactions in the waiting state. The index is
calculated by dividing the wait by the weight: 5/1 = 5.
❐ Service B can handle up to 100 connections, is assigned a weight of 2, has 17
active connections, with 15 waiting transactions. The index is 15/2 = 7.5.
To which service will the Advanced Secure Gateway assign the next ICAP action?
Service A because it has a lower index.
Example 2
Service C and D are in the same service group.
529
Advanced Secure Gateway Administration Guide
530
Section 1 Creating a Service Group
Create the service group and add the relevant ICAP services to the group.
Services within group must be the same type (ICAP).
2b
2a
531
Advanced Secure Gateway Administration Guide
5b
5a
See Also
"About Service Groups" on page 527
"Deleting a Service Group or Group Entry" on page 533
"Displaying Content Analysis and Group Information" on page 533
532
Deleting a Service Group or Group Entry
You can delete the configuration for an entire service group from the Advanced
Secure Gateway, or you can delete individual entries from a service group.
Note: A service or service group used in a Advanced Secure Gateway policy (that
is, if a policy rule uses the entry) cannot be deleted; it must first be removed from
the policy.
ICAP-Version: 1.0
URL: icap://10.9.59.100/
Plain-ICAP-enabled: yes
Plain-ICAP-port: 1344
Secure-ICAP-enabled: no
Secure-ICAP-port: none
Ssl-device-profile: none
Max-conn: 25
533
Advanced Secure Gateway Administration Guide
Timeout(secs): 70
Defer-threshold: 80%
Notification: virus-detected
Use ICAP Vendor's virus page: disabled
Event-log: connection-failure
Methods: RESPMOD
Preview-size: 0
Send: nothing
ISTag:
Last-ISTag-change: never
534
Chapter 24: Managing Streaming Media
535
Advanced Secure Gateway Administration Guide
536
In the case of live video broadcasts, SGOS can take a single stream of video and
then split it locally into enough streams to serve all local viewers; this is called live
splitting.
537
Advanced Secure Gateway Administration Guide
In the typical streaming server-client model, the streaming server sends a separate
copy of the media stream to each client that requested the same unique stream.
Because streaming media uses a considerable amount of bandwidth, delivering
multiple copies of the same media data between the streaming server and the
clients can cause significant network and server congestion. The more clients that
request the same media stream, the more bandwidth is used.
Planning for efficient bandwidth use is important for streaming media because
bandwidth use has a direct correspondence to the quality of the media streams
that are delivered to the clients. If your network is congested, your users are likely
to experience problems such as jagged video, patchy audio, and unsynchronized
video and audio as packets are dropped or arrive late. Conversely, the more
bandwidth that is available, the better the quality of media streams.
The appliance has several methods for allocating bandwidth to streaming media
traffic. See "Limiting Bandwidth" on page 546.
538
Limitation
Active Sessions will report HTTP-based streaming protocol information (such as
Apple HLS, Adobe HDS, and Microsoft Smooth) as either HTTP or as the
appropriate streaming type (ms_smooth, apple_hls, adobe_hds), depending on the
types of requests on the connection at any given moment. This is due simply to
the nature of the protocols.
539
Advanced Secure Gateway Administration Guide
540
In a Reverse Proxy deployment, the appliance can function as a Windows Media
server, with WM content delivered over the RTSP and HTTP protocols.
As a Content Delivery Network (CDN) node, the appliance supports a shared
cache for pre-populated content for delivery over RTSP, RTMP, or HTTP
protocols.
Deployment action: Windows Media clients must be configured to enable the
HTTP protocol to stream the WM content using HTTP protocol. Similarly, WM
clients must be configured to enable RTSP/TCP, and/or RTSP/UDP protocols to
stream WM content using RTSP protocol.
Live Support
Table 24–1 Windows Media live streaming feature support
UDP Retransmission No
On-Demand Support
Table 24–2 Windows Media on-demand streaming feature support
UDP Retransmission No
Stream Change No
541
Advanced Secure Gateway Administration Guide
Multicast Support
Table 24–3 Windows Media multicast UDP streaming feature support
Feature Multicast
Server-Side Playlists No
Stream Change No
542
❐ max_bitrate(bitrate|no). Sets the maximum bit rate that can be served to the
client. (This property does not apply to the bit rate consumed on the gateway
connection.) If the bit rate of a client-side session exceeds the maximum bit
rate set by policy, that client session is denied.
❐ force_cache(yes|no).
Causes the appliance to ignore cache directives and
cache VOD content while serving it to clients.
❐ streaming.fast_cache(yes|no). Disables the ability of the WM client to
request fast-caching of streaming content from the streaming server.
Bandwidth Management
Windows Media supports bandwidth management for both client-side and
gateway-side streaming traffic. Bandwidth limits are also be supported for pass-
through streams. See "Limiting Bandwidth" on page 546 for more information.
543
Advanced Secure Gateway Administration Guide
Delivery Methods
SGOS supports the following streaming delivery methods:
❐ Unicast—A one-to-one transmission, where each client connects individually
to the source, and a separate copy of data is delivered from the source to each
client that requests it. Unicast supports both TCP- and UDP-based protocols.
The majority of streaming media traffic on the Internet is unicast.
❐ Multicast—Allows efficient delivery of streaming content to a large number of
users. Multicast enables hundreds or thousands of clients to play a single
stream, thus minimizing bandwidth use.
The following table provides a high-level comparison of unicast and multicast
transmission.
Table 24–4 Unicast vs. Multicast
Device requirement The network devices use The network devices must
unicast. support multicast (not all
do).
544
Serving Content: Video-on-Demand Unicast
With video-on-demand, individuals can select pre-recorded content from a
central information bank, allowing a movie or film clip to be broadcasted
immediately when requested. Common examples of VOD include Netflix Watch
Instantly movies, Hulu television shows, training videos, and news broadcasts.
SGOS stores frequently requested data and distributes it upon client requests.
Because the appliance is closer to the client than the origin server, the data is
served locally, which saves bandwidth and increases quality of service by
reducing pauses or buffering during playback. Because of its proximity to the end
user, the appliance provides higher quality streams (also dependent on the client
connection rate) than the origin server.
Note that VOD content can be paused, rewound, and played back.
Benefits of Multicast
The benefits of using multicast for streaming media include the following:
❐ It alleviates network congestion.
❐ For live streaming events that have a large audience, multicast significantly
reduces network traffic compared to the traffic that would result from
transmitting the same live event over unicast. If unicast transport is used, the
same content must be sent across the network multiple times or it must be
broadcast to all devices on the network.
545
Advanced Secure Gateway Administration Guide
Limitations of Multicast
The limitations of multicast include the following:
❐ Multicast support is not yet widely available on the Internet. Therefore, using
multicast to deliver content is limited to intranet-style deployments.
❐ Not all networking equipment supports multicasting. In addition, not all
network administrators enable the multicast functionality on their networking
equipment.
❐ Switches do not understand multicast. When a multicast stream reaches a
switch, the switch sends the multicast stream to all of its ports. A switch treats
a multicast address as an Ethernet broadcast.
Limiting Bandwidth
The following sections describe how to configure the appliance to limit global and
protocol-specific media bandwidth.
To manage streaming media bandwidth, you configure the appliance to restrict
the total number of bits per second the appliance receives from the origin media
servers and delivers to clients. The configuration options are flexible to allow you
to configure streaming bandwidth limits for the appliance, as well as for the
streaming protocol proxies (Windows Media, Real Media, and QuickTime).
546
Note: Bandwidth claimed by HTTP, non-streaming protocols, and network
infrastructure is not constrained by this limit. Transient bursts that occur on the
network can exceed the hard limits established by the bandwidth limit options.
After it has been configured, the appliance limits streaming access to the specified
threshold. If a client tries to make a request after a limit has been reached, the
client receives an error message.
Note: If a maximum bandwidth limitation has been specified for the appliance,
the following condition can occur. If a Real Media client, followed by a Windows
Media client, requests streams through the same appliance and total bandwidth
exceeds the maximum allowance, the Real Media client enters the rebuffering
state. The Windows Media client continues to stream.
547
Advanced Secure Gateway Administration Guide
Flash
The appliance caches pre-recorded audio and video content delivered over Real
Time Messaging Protocol (RTMP), RTMP traffic tunneled over HTTP (RTMPT).
Flash media files have .flv, .f4v extensions.
MS Smooth
The appliance caches on-demand Smooth Streaming video content delivered over
HTTP. Silverlight is the typical player used for Smooth Streaming and is available
as a plug-in for web browsers running under Microsoft Windows and Mac OS X.
548
Windows Media
The appliance caches Windows Media-encoded video and audio files. The
standard extensions for these file types are: .wmv, .wma, and .asf.
Real Media
The appliance caches Real Media-encoded files, such as RealVideo and
RealAudio. The standard extensions for these file types are: .ra, .rm, and .rmvb.
Other content served from a Real Media server through RTSP is also supported,
but it is not cached. This content is served in pass-through mode only. (Pass-
through mode offers application, layer-7 proxy functionality, but does not support
acceleration features—caching, pre-population, splitting, and multi-casting.)
QuickTime
The appliance does not cache QuickTime content (.mov files). All QuickTime
content is served in pass-through mode only.
Adobe HDS
The appliance caches on-demand and live video content delivered over HTTP.
Apple HLS
The appliance caches on-demand and live video content delivered over HTTP.
549
Advanced Secure Gateway Administration Guide
❐ MMS (Microsoft Media Services), MMSU (MMS UDP), and MMST (MMS
TCP) are considered to be identical.
❐ RTMP and RTMPT are considered to be identical.
Splitting of live unicast streams provides bandwidth savings, since subsequent
requests do not increase network traffic.
Note: The Flash proxy does not cache videos that the OCS delivers by
dynamic streaming.
550
Pre-Populating Content
Note: This feature applies to Windows Media and Real Media only.
SGOS supports pre-population of streaming files from RTSP, MMS, both HTTP
(web) servers and origin content servers (that is, streaming servers). Pre-
populating content saves download time.
Using the content distribute CLI command, content is downloaded from the
HTTP server and renamed with a given URL argument. A client requesting the
content perceives that the file originated from a media server. If the file on the
origin media server experiences changes (such as naming convention), SGOS
bypasses the cached mirrored version and fetches the updated version.
Example:
content distribute rtsp://wm_server/bar.wmv from http://web_server/
bar.wmv
Flash
❐ Flash pre-population always downloads content from a media server. The
download time occurs at normal streaming speeds, similar to pre-populating
Windows Media and Real Media content from a media server; the required
download time is equivalent to the file length. For example, a two-hour movie
requires two hours to download.
551
Advanced Secure Gateway Administration Guide
Windows Media Server version 9 and higher contains a feature called Fast
Streaming that allows clients to provide streams with extremely low buffering
time.
SGOS supports the following functionality for both cached and uncached content:
❐ Fast Start—Delivers an instant playback experience by eliminating buffering
time. The first few seconds of data are sent using the maximum available
bandwidth so that playback can begin as soon as possible.
❐ Fast Cache—Streams content to clients faster than the data rate that is
specified by the stream format. For example, fast caching allows the server to
transmit a 128-kilobits-per-second (Kbps) stream at 500 Kbps. The Windows
Media client buffers the streaming content before it is rendered at the specified
rate — 128 Kbps for this stream.
In the case of MBR VOD content, fast- caching content to the local cache of the
Windows Media client impacts playback quality. To maintain smooth
streaming of MBR VOD content, you might need to disable the fast-caching
ability of the Windows Media client. By default, fast-caching is enabled in
SGOS. You can use the VPM or CPL to configure policy for disabling fast
caching, thereby preventing the Windows Media clients from fast- caching
content to the local cache. For the VPM and CPL properties, see the Visual
Policy Manager Reference and the Content Policy Language Reference.
Fast Recovery and Fast Reconnect are currently not supported.
IPv6 Support
All streaming proxies include IPv6 support, and the appliance can act as a
transitional devices between IPv4 and IPv6 networks for Flash, Smooth Streaming
over HTTP, Windows Media (RTSP, HTTP), Real Media, and QuickTime.
Streaming proxies support IPv6 in the following ways:
❐ Flash: RTMP-based protocols (such as RTMP, RTMPT) support IPv6 for
making upstream connections to the origin content server (OCS) as well as can
accept IPv6 client connections.
❐ MS Smooth, Adobe HDS, and Apple HLS: Protocols streaming over HTTP
support IPv6 for making upstream connections to the OCS, and can accept
IPv6 client connections.
❐ Windows Media:
552
• RTSP and HTTP protocols support IPv6 for making upstream connections
to the OCS, and can accept IPv6 client connections.
• For multicast-station, the RTSP protocol can be used when retrieving
content from an IPv6 OCS and sending multicast to IPv4 clients.
• ASX rewrite is IPv6 capable, but only for the HTTP protocol.
❐ Real Media and QuickTime: RTSP and HTTP protocols support IPv6 for
making upstream connections to the OCS, and can accept IPv6 client
connections.
Note that Windows Media over MMS does not support IPv6.
553
Advanced Secure Gateway Administration Guide
554
prompts the client for the proper password. If the client password is accepted, the
Windows Media server might also require the client to provide a password for
authentication. If a previously accepted client attempts to access the same
Windows Media content again, the appliance verifies the user credentials using its
own credential cache. If successful, the client request is forwarded to the
Windows Media server for authentication.
Configure the appliance to recognize the type of authentication the origin content
server is using: BASIC or NTLM/Kerberos.
555
Advanced Secure Gateway Administration Guide
556
Section B: Configuring Streaming Media
This section describes how to configure the various streaming options. It contains
the following topics:
❐ "Configuring the HTTP Streaming Proxy" on page 558
❐ "Configuring the Windows Media, Real Media, and QuickTime Proxies" on
page 562
❐ "Limiting Bandwidth" on page 565
❐ "Configuring the Multicast Network" on page 567
❐ "Viewing Streaming History Statistics" on page 571
❐ "Configuring the Flash Streaming Proxy" on page 595
❐ "Reference: Access Log Fields" on page 568
❐ "Reference: CPL Triggers, Properties, and Actions for Streaming Proxies" on
page 570
557
Advanced Secure Gateway Administration Guide
2a 2b
2c
2. Change the applicable HTTP services to Intercept:
a. In the Standard service group, locate the applicable HTTP service:
Explicit HTTP or External HTTP.
Note: The Internal HTTP service is set to use the TCP Tunnel proxy—not the HTTP
proxy. If you have an internal MS Smooth server whose traffic you want to
optimize, Blue Coat recommends creating a new service that intercepts the traffic
from that streaming server.
b. Select Intercept for each set of ports defined for the service.
3. Click Apply.
558
3. Enable Microsoft Smooth Streaming, Adobe HTTP Dynamic Streaming, and Apple HTTP
Live Streaming handoff: Enabled by default. When an HTTP Streaming client
requests a stream, the HTTP proxy service passes control to the appropriate
proxy, so that HTTP streaming will be supported through the HTTP proxy
port. Disable one of these options only if you do not want to optimize traffic
for that protocol.
2a
2b
2c
2. Change the streaming services to Intercept:
559
Advanced Secure Gateway Administration Guide
a. Scroll through the list of services and select the Standard service group;
select the MMS and RTSP groups.
b. From the MMS All ->All:1755 row drop-down list, select Intercept.
c. From the RTSP All ->All:554 row drop-down list, select Intercept.
3. Click Apply.
Now that the streaming listeners are configured, you can configure the streaming
proxies. Proceed to:
❐ "Configuring the Windows Media, Real Media, and QuickTime Proxies" on
page 562 to configure the proxy options that determine how to process
streaming traffic.
❐ (Optional) "Adding a New Streaming Service" (below) to add new streaming
services that bypass specific network segments or listen on ports other than
the defaults.
2. Scroll the list of services and select the Standard service group.
3. Click New Service. The New Service dialog displays with the default settings.
560
4a
4b
4c
4e
4f
4d
4g
561
Advanced Secure Gateway Administration Guide
2. Select the tab for the proxy you want to configure: Windows Media, Real Media,
QuickTime.
2
3
4
3. Enable HTTP handoff: Enabled by default. When a Windows Media, Real Media,
or QuickTime client requests a stream from the appliance over port 80, which
in common deployments is the only port that allows traffic through a firewall,
the HTTP module passes control to the streaming module so HTTP streaming
can be supported through the HTTP proxy port. Disable this option only if
you do not want HTTP streams to be cached or split.
4. Forward client-generated logs to origin media server: Enabled by default. The
appliance logs information, such as client IP address, the date, and the time, to
the origin server for Windows Media and Real Media content. See
"Forwarding Client Logs" on page 567 for more information about log
forwarding.
562
5. Enable multicast (Real Media proxy only): The appliance receives a unicast
stream from the origin RealServer and serves it as a multicast broadcast. This
allows the appliance to take a one-to-one stream and split it into a one-to-
many stream, saving bandwidth and reducing the server load. It also
produces a higher quality broadcast.
Multicasting maintains a TCP control (accounting) channel between the client
and RealServer. The multicast data stream is broadcast using UDP from the
appliance to RealPlayers that join the multicast. SGOS support for Real Media
uses UDP port 554 (RTSP) for multicasting. This port number can be changed
to any valid UDP port number.
6. Specify how often the appliance checks cached streaming content for
freshness.
• Never check freshness:
Although this is the default setting, Blue Coat
recommends selecting one of the other freshness options.
• Check freshness every value hours: The appliance checks content freshness
every n.nn hours.
See Also
❐ "Click Apply.Configuring Streaming Services to Intercept Traffic"
❐ "Limiting Bandwidth"
563
Advanced Secure Gateway Administration Guide
564
Section 5 Limiting Bandwidth
This section describes how to limit bandwidth from the clients to the appliance
and from the appliance to origin content servers.
Note: This global setting does not control Flash or Smooth Streaming traffic.
2a
2b
See Also
❐ "Click Apply.Configuring Streaming Services to Intercept Traffic" on page 559
❐ "Configuring the Windows Media, Real Media, and QuickTime Proxies" on
page 562
❐ "Configuring the Multicast Network" on page 567
565
Advanced Secure Gateway Administration Guide
Upon connection to the appliance, Windows Media clients do not consume more
bandwidth (in kilobits per second) than the defined value.
566
Section 6 Configuring the Multicast Network
This section describes how to configure the appliance multicast service.
Additional steps are required to configure the appliance to serve multicast
broadcasts to streaming clients (Windows Media and Real Media); those
procedures are provided in subsequent sections.
2a
2b
2c
Note: For Real Media, the log is only forwarded before a streaming session is
halted; QuickTime log forwarding is not supported.
567
Advanced Secure Gateway Administration Guide
568
❐ channelURL: URL to the .nsc file.
❐ c-buffercount: Number of times the client buffered while playing the stream.
❐ c-bytes: An MMS-only value of the total number of bytes delivered to the
client.
❐ c-playerid: Globally unique identifier (GUID) of the player.
❐ c-playerlanguage: Client language-country code.
❐ c-playerversion: Version number of the player.
❐ c-rate: Mode of Windows Media Player when the last command event was
sent.
❐ c-starttime: Timestamp (in seconds) of the stream when an entry is generated
in the log file.
❐ c-totalbuffertime: Time (in seconds) the client used to buffer the stream.
❐ protocol: Protocol used to access the stream: mms, http, asfm, rtsp, rtmp,
rtmpt, rtmpe, rtmpte.
❐ x-duration:
Length of time a client played content prior to a client event (FF,
REW, Pause, Stop, or jump to marker).
❐ x-wm-c-dns: Hostname of the client determined from the Windows Media
protocol.
❐ x-wm-c-ip: The client IP address determined from the Windows Media
protocol.
❐ x-cs-streaming-client: Type of streaming client in use (windows_media,
real_media, quicktime,flash,ms_smooth).
569
Advanced Secure Gateway Administration Guide
Triggers
streaming.client=
streaming.content= (not applicable to MS Smooth proxy)
570
Section 7 Viewing Streaming History Statistics
The Streaming History tabs display bar graphs that illustrate the number of active
client connections over the last hour (60 minutes), day (24 hours), and month (30
days) for a specific streaming proxy (Windows Media, Real Media, QuickTime,
and Flash). These statistics are not available through the CLI. The Current
Streaming Data and Total Streaming Data tabs display real-time values for current
connections and live traffic activity on the appliance. Current and total streaming
data statistics are available through the CLI.
Note: The MS Smooth (Smooth Streaming) proxy does not currently collect data
to be displayed in the streaming history panel.
4. (Optional) To set the graph scale to a different value, select a value from the
Graph scale should drop-down list.
571
Advanced Secure Gateway Administration Guide
2. Select a streaming protocol (Windows Media, Real Media, QuickTime, Flash) from
the Protocol drop-down list.
3. Select a traffic connection type (Live Traffic, On-Demand Traffic, or Passthru Traffic)
from the drop-down list.
2. Select a streaming protocol (Windows Media, Real Media, QuickTime, Flash) from
the Protocol drop-down list.
3. Select a traffic connection type (Live Traffic, On-Demand, or Passthru Traffic) from
the drop-down list.
572
To clear streaming statistics:
To zero-out the streaming statistics, enter the following command at the CLI
prompt:
SGOS# clear-statistics {quicktime | real-media | windows-media}
573
Advanced Secure Gateway Administration Guide
574
Unicast to Multicast
Unicast to multicast streaming requires converting a unicast stream on the server-
side connection to a multicast station on the appliance. The unicast stream must
contain live content before the multicast station works properly. If the unicast
stream is a video-on-demand file, the multicast station is created but is not able to
send packets to the network. For video-on-demand files, use the broadcast-alias
command. A broadcast alias defines a playlist, and specifies a starting time, date,
and the number of times the content is repeated.
Multicast to Multicast
Use the multicast-alias command to get the source stream for the multicast
station.
Note: For MMS protocol only, you can use an alias—multicast-alias, unicast-
alias, or broadcast-alias—as a source stream for a multicast station. WM-RTSP
and WM-HTTP do not support aliases.
Syntax
multicast-station name {alias | url} [address | port | ttl]
where
• name specifies the name of the multicast station, such as station1.
• {alias | url} defines the source of the multicast stream. The source can
be a URL or it can be a multicast alias, a unicast alias, or simulated live.
(The source commands must be set up before the functionality is enabled
within the multicast station.)
• [address | port | ttl] are optional commands that you can use to
override the default ranges of these values. (Defaults and permissible
values are discussed below.)
575
Advanced Secure Gateway Administration Guide
576
Getting the .nsc File
The .nsc file is created from the multicast station definition and saved through
the browser as a text file encoded in a Microsoft proprietary format.
Without an .nsc file, the multicast station definition does not work.
To create an .nsc file from the newly created station1, open the file by navigating
through the browser to the multicast station’s location (where it was created) and
save the file as station1.nsc.
The file location, based on the streaming configuration above:
http://10.25.36.47/MMS/nsc/station1.nsc
Save the file as station1.nsc.
Note: You can also enter the URL in Windows Media Player to start the stream.
The newly created file is not editable; the settings come from the streaming
configuration file. In that file, you have already defined the following pertinent
information:
❐ The address, which includes TTL, IP address, IP port, Unicast URL, and the
NSC URL. All created .nsc files contain a unicast URL for rollover in case
Windows Media Player cannot find the streaming packets.
❐ The description, which references the RTSP URL that you defined.
❐ The format, which contains important Advanced Streaming Format (ASF)
header information. All streams delivered by the multicast station definition
have their ASF headers defined here.
577
Advanced Secure Gateway Administration Guide
asx-rewrite: No rules
multicast-alias: No rules
unicast-alias: No rules
broadcast-alias: No rules
multicast-station: station1 rtsp://10.25.36.47/tenchi
224.2.207.0 40465 5 (playing)
Note: Playing at the end of the multicast station definition indicates that the
station is currently sending packets onto the network. The IP address and
port ranges have been randomly assigned from the default ranges allowed.
578
Managing Simulated Live Content (Windows Media)
This section describes simulated live content and how to configure your appliance
to manage and serve simulated live content.
Note: This note applies to HTTP only. If a client opens Windows Media Player
and requests an alias before the starting time specified in the broadcast-alias
option, the HTTP connection closes after a short time period. When the specified
time arrives, the player fails to reconnect to the stream and remains in waiting
mode.
where:
579
Advanced Secure Gateway Administration Guide
Example 1
This example creates a playlist for simulated live content. The order of playback is
dependent on the order you enter the URLs. You can add up to 128 URLs.
SGOS#(config) streaming windows-media broadcast-alias alias url
Example 2
This example demonstrates the following:
❐ creates a simulated live file called bca.
❐ plays back rtsp://ocs.bca.com/bca1.asf and rtsp://ocs.bca.com/bca2.asf.
❐ configures the appliance to play back the content twice.
❐ sets a starting date and time of today at 4 p.m., 6 p.m., and 8 p.m.
SGOS#(config) streaming windows-media broadcast-alias bca rtsp://
ocs.bca.com/bca1.asf 2 today 4pm,6pm,8pm
SGOS#(config) streaming windows-media broadcast-alias bca rtsp://
ocs.bca.com/bca2.asf
580
See the following topics:
❐ "About ASX Rewrite"
❐ "Windows Media Player Interactivity Notes"
❐ "Configuring the Windows Media, Real Media, and QuickTime Proxies"
Note: If an .asx file syntax does not follow the standard <ASX> tag-based syntax,
the ASX rewrite module is not triggered.
For the appliance to operate as a proxy for Windows Media Player requires the
following:
❐ The client is explicitly proxied for HTTP content to the appliance that rewrites
the .asx metafile.
❐ The streaming media appliance is configurable.
With the asx-rewrite command, you can implement redirection of the streaming
media to a appliance by specifying the rewrite protocol, the rewrite IP address,
and the rewrite port.
The protocol specified in the ASX rewrite rule is the protocol the client uses to
reach the appliance. You can use forwarding and policy to change the default
protocol specified in the original .asx file that connects to the origin media server.
581
Advanced Secure Gateway Administration Guide
When creating ASX rewrite rules, you need to determine the number priority. It is
likely you will create multiple ASX rewrite rules that affect the .asx file; for
example, rule 100 could redirect the IP address from 10.25.36.01 to 10.25.36.47,
while rule 300 could redirect the IP address from 10.25.36.01 to 10.25.36.58. In
this case, you are saying that the original IP address is redirected to the IP address
in rule 100. If that IP address is not available, the appliance looks for another rule
matching the incoming IP address.
In this scenario, the URL used by the downstream appliance for caching and
access logging can be different than what is expected. Specifically, the
downstream appliance creates an access log entry with protocol2://
upstream_SecApp/redirect as the requested URL. Content is also cached using
this truncated URL. Blue Coat recommends that the ASX rewrite rule be
configured for only the downstream appliance, along with a proxy route rule
that can forward the Windows Media streaming requests from the
downstream to upstream appliances.
where:
• in-addr—Specifies the hostname or IP address delivering the content
• cache-proto—Specifies the rewrite protocol on the appliance. Acceptable
values for the rewrite protocol are:
• mmsu specifies Microsoft Media Services UDP
• mmst specifies Microsoft Media Services TCP
• http specifies HTTP
582
• mms specifies either MMS-UDP or MMS-TCP
• * specifies the same protocol as in the .asx file
If the .asx file is referred from within another .asx file (not a
recommended practice), use a * for the cache-proto value. The *
designates that the protocol specified in the original URL be used. As a
conservative, alternative approach, you could use HTTP for the cache-
proto value.
To ensure that an ASX rewrite rule is immediately recognized, clear the local
browser cache.
Example
This example:
❐ Sets the priority rule to 200.
❐ Sets the protocol to be whatever protocol was originally specified in the URL
and directs the data stream to the appropriate default port.
❐ Provides the rewrite IP address of 10.9.44.53, the appliance.
SGOS#(config) streaming windows-media asx-rewrite 200 * * 10.9.44.53
Note: ASX files must be fetched from HTTP servers. If you are not sure of the
network topology or the content being served on the network, use the
asterisks to assure the protocol set is that specified in the URL.
583
Advanced Secure Gateway Administration Guide
584
Section D: Configuring Windows Media Player
This section describes how to configure Windows Media Player to communicate
through the appliance.
To apply Windows Media streaming services, Windows Media Player must be
installed and configured to use explicit proxy. For a transparent deployment, no
WMP configuration is necessary.
Note: The following procedure example uses Windows Media Player 11.
Installation and setup varies with different versions of Windows Media Player.
3a
4a
3b
4b
3c
585
Advanced Secure Gateway Administration Guide
Striding
When you use Windows Media Player, consider the following interactivities in
regard to using fast forward and reverse (referred to as striding):
❐ If you request a cached file and repeatedly attempt play and fast forward, the
file freezes.
❐ If you attempt a fast reverse of a cached file that is just about to play, you
receive an error message, depending on whether you have a proxy:
• Without a proxy: A device attached to the system is not functioning.
• With a proxy: The request is invalid in the current state.
❐ If Windows Media Player is in pause mode for more than ten minutes and you
press fast reverse or fast forward, an error message displays: The network
connection has failed.
Other Notes
❐ Applies to WMP v9: If a url_host_rewrite rule is configured to rewrite a host
name that is a domain name instead of an IP address, a request through the
MMS protocol fails and the host is not rewritten. As the connect message sent
by the player at the initial connection does not contain the host name, a
rewrite cannot occur. HTTP requests are not affected by this limitation.
❐ If explicit proxy is configured and the access policy is set to deny, a requested
stream using HTTP from Windows Media Player 9 serves the stream directly
from the origin server even after the request is denied. The player sends a
request to the OCS and plays the stream from there.
586
Blue Coat recommends the following policy:
<proxy>
streaming.content=yes deny
-or-
<proxy>
streaming.content=windows_media deny
The above rules force the HTTP module to hand off HTTP requests to the
MMS module. MMS returns the error properly to the player, and does not go
directly to the origin server to try to serve the content.
❐ If you request an uncached file using the HTTP protocol, the file is likely to
stop playing if the authentication type is set to BASIC or NTLM/Kerberos and
you initiate rapid seeks before the buffering begins for a previous seek.
Windows Media Player, however, displays that the file is still playing.
❐ If a stream is scheduled to be accessible at a future time (using a simulated live
rule), and the stream is requested before that time, Windows Media Player
enters a waiting stage. This is normal. However, if HTTP is used as the
protocol, after a minute or two Windows Media Player closes the HTTP
connection, but remains in the waiting stage, even when the stream is
broadcasting.
Notes:
For authentication-specific notes, see "Windows Media Server-Side
Authentication" on page 554 and "Windows Media Proxy Authentication" on
page 554.
587
Advanced Secure Gateway Administration Guide
Note: This procedure features RealPlayer, version 10.5. Installation and setup
menus vary with different versions of RealPlayer. Refer to the RealPlayer
documentation to configure earlier versions of RealPlayer.
To configure RealPlayer:
1. Start RealPlayer.
2. Select Tools > Preferences.
3a 3b
4a
4b
588
a. Select Connection > Proxy.
b. Click Change Settings. The Streaming Proxy Settings dialog appears.
4. Configure options:
a. In the PNA and RTSP proxies: field, select Use proxies.
b. Enter the proxy IP address and the port number used for the explicit
proxy (the default RTSP port is 544). These settings must match the
settings configured in the appliance. If you change the appliance
explicit proxy configuration, you must also reconfigure RealPlayer. If
using transparent proxy, RTSP port 554 is set by default and cannot be
changed.
Note: For HTTP Proxy, if you have an HTTP proxy already configured in
your browser, select Use system Internet Connection proxy settings.
d. Optional: In the Do not use proxy for: section, you can enter specific hosts
and bypass the appliance.
589
Advanced Secure Gateway Administration Guide
5a
5b
590
8a
8b
591
Advanced Secure Gateway Administration Guide
2a
2b
2d
2c
592
593
Advanced Secure Gateway Administration Guide
594
Section 8 Configuring the Flash Streaming Proxy
Note: The Flash streaming proxy requires a valid Flash license.
Perform these tasks to configure the Flash proxy so that it splits live streams and
caches video-on-demand.
1 Configure the client browsers to use the appliance "Configuring Client Browsers for
as an explicit proxy. Explicit Proxy" on page 595
3 Enable HTTP handoff so that RTMP tunneled over "Enabling HTTP Handoff for the Flash
HTTP is also intercepted. Proxy" on page 597
Note: You cannot configure Firefox browsers because Flash uses Windows
settings.
595
Advanced Secure Gateway Administration Guide
7. For HTTP, enter the IP address of the appliance, and add the port number;
8080 is the default.
8. Select Use the same proxy server for all protocols.
9. Click OK and exit out of all open dialogs.
Most likely, you will already have an RTMP service; if not, you should create it.
Then set the service to Intercept:
1. In the Management Console, select Configuration > Services > Proxy Services.
2. Locate the RTMP service in the Standard group.
3. Select Intercept.
4. Click Apply.
596
3. Select Intercept for Explicit:8080 and Explicit:80.
4. Click Apply.
3. Select the Enable HTTP handoff check box and click Apply.
597
Advanced Secure Gateway Administration Guide
Encrypted Flash connections will show one of the following three messages in the
Detail column:
Additional Information
See the following sections for additional information related to the Flash proxy:
❐ "When VOD Content Gets Cached" on page 599
❐ "Proxy Chaining" on page 599
❐ "CDN Interoperability Support" on page 600
598
When VOD Content Gets Cached
❐ The Flash proxy caches fully-played and partially-played portions of VOD
content. If a video is played from the beginning to the end, the file is fully
cached. If a video is stopped in the middle of play, only the played portion is
cached. The next time a user requests the same video, the cached portion will
be served from the cache and the remainder of the video will be played from
the OCS (and added to the cache).
❐ With the default settings:
• If the playing video is not already cached, it will be cached as it is played
from the OCS.
• If the playing video has already been cached, it will be played from the
cache.
• If the playing video is stored in the cache but the cache is out of date from
what is on the OCS, it will not play from the cache or be written to cache.
❐ The Flash proxy caches content that is connected to the beginning of the video
(User 1 and User 2 below). If a playspurt isn’t attached to the beginning of the
video, the content cannot be cached (User 3.) In order for content to be
appended to the cache, the client must begin playing the video somewhere
from within the cached region; then, when the uncached content is played
from the OCS, it will be added to the cache (User 2).
❐ Encrypted and plain content are stored separately in the object cache.
Proxy Chaining
Proxy chaining (hierarchy of proxies) supports the use of multiple appliances
between the server and client. This hierarchy of proxy servers (set by the
administrator using policy gestures) allows further maximizing of bandwidth
usage optimization achieved by features such as live splitting. If forwarding is set
up in an organized manner, the overhead involved in splitting and transmitting
live streams gets pushed to the end of the proxy chain (the one closest to the end
users), which avoids sending any piece of content across any given WAN link
more than once.
To enable proxy chaining, you must create forwarding hosts using the MC or CLI
and set the proxy hierarchy using the following policy gestures:
599
Advanced Secure Gateway Administration Guide
❐ Traffic can be forwarded to the next appliance by using the following policy
gesture:
forward(fwd_host)
where the fwd_host must be type proxy and have a defined http port.
❐ Traffic can be forwarded to the server by using the following policy gesture:
forward(fwd_host)
where the fwd_host must be type server and have a defined rtmp port.
Use the following CLI command to create forwarding hosts:
#(config forwarding)create host ?
<host-alias> <host-name> [http[=<port>]] [https[=<port>]]
[ftp[=<port>]]
[mms[=<port>]] [rtmp[=<port>]] [rtsp[=<port>]] [tcp=<port>]
[telnet[=<port>]]
[ssl-verify-server[=(yes|no)]] [group=<group-name>] [server|proxy]
request.header.User-Agent <string>
streaming.client flash
streaming.rtmp.app_name <string>
600
Table 24–5 CPL Triggers
streaming.rtmp.page_url <URL>
streaming.rtmp.stream_name <string>
streaming.rtmp.swf_url <URL>
url <URL>
live yes, no
streaming.content flash
601
Advanced Secure Gateway Administration Guide
602
Section H: Supported Streaming Media Clients and Protocols
This section describes the vendor-specific streaming protocols supported by the
appliance.
Note: Silverlight is supported when it streams Windows Media content from the
WM server using WM-HTTP protocol. In this scenario, its interaction with the
appliance is similar to that of Windows Media Player, and, as such, is handled by
the Windows Media proxy.
603
Advanced Secure Gateway Administration Guide
Flash Protocols
Flash streaming proxy supports the following RTMP-based protocols:
604
Windows Media Protocols
SGOS supports Windows Media content streamed over RTSP and HTTP. The
following Windows Media transports are supported:
Client-side
❐ RTP over unicast UDP (RTSP over TCP, RTP over unicast UDP)
❐ Interleaved RTSP (RTSP over TCP, RTP over TCP on the same connection)
❐ RTP over multicast UDP (RTP over multicast UDP; for live content only)
❐ HTTP streaming
❐ MMS-UDP (Microsoft Media Streaming—User Data Protocol)
❐ MMS-TCP (Microsoft Media Streaming—Transmission Control Protocol)
❐ Multicast-UDP is the only delivery protocol supported for multicast. No TCP
control connection exists for multicast delivery
Server-side
❐ Interleaved RTSP
❐ HTTP streaming
❐ MMS-TCP between the appliance and origin server for video-on-demand and
live unicast content
Server-side RTP over UDP is not supported. If policy directs the RTSP proxy to
use HTTP as server-side transport, the proxy denies the client request. The client
then rolls over to MMS or HTTP.
Client-Side
❐ HTTP streaming (RTSP and RDT over TCP tunneled through HTTP)—HTTP
streaming is supported through a handoff process from HTTP to RTSP. HTTP
accepts the connection and, based on the headers, hands off to RTSP. The
headers identify an RTSP URL.
❐ RDT over unicast UDP (RTSP over TCP, RDT over unicast UDP)
❐ Interleaved RTSP (RTSP over TCP, RDT over TCP on the same connection)
605
Advanced Secure Gateway Administration Guide
❐ RDT over multicast UDP (RTSP over TCP, RDT over multicast UDP; for live
content only)
Server-Side
❐ HTTP streaming
❐ Interleaved RTSP
Unsupported Protocols
The following Real Media protocols are not supported in this version of SGOS:
❐ PNA
❐ Server-side RDT/UDP (both unicast and multicast)
QuickTime Protocols
SGOS supports the following QuickTime protocols:
❐ HTTP streaming (RTSP and RDT over TCP tunneled through HTTP)—HTTP
streaming is supported through a handoff process from HTTP to RTSP. HTTP
accepts the connection and, based on the headers, hands off to RTSP. The
headers identify an RTSP URL.
❐ RTP over unicast UDP (RTSP over TCP, RDT over unicast UDP)
❐ Interleaved RTSP (RTSP over TCP, RDT over TCP on the same connection)
Server-Side
❐ HTTP streaming
❐ Interleaved RTSP
Unsupported Protocols
The following QuickTime protocols are not supported in this version of SGOS:
❐ Server-side RTP/UDP, both unicast and multicast, is not supported.
Client-side multicast is not supported.
606
Chapter 25: Bandwidth Management
Bandwidth management (BWM) allows you to classify, control, and limit the
amount of bandwidth used by different classes of network traffic flowing into
or out of the Advanced Secure Gateway appliance. Network resource sharing
(or link sharing) is accomplished by using a bandwidth-management hierarchy
where multiple traffic classes share available bandwidth in a controlled
manner.
Note: The Advanced Secure Gateway does not attempt to reserve any
bandwidth on the network links that it is attached to or otherwise guarantee
that the available bandwidth on the network can sustain any of the bandwidth
limits which have been configured on it. The Advanced Secure Gateway can
only shape the various traffic flows passing through it, and prioritize some
flows over others according to its configuration.
607
Advanced Secure Gateway Administration Guide
❐ Create policy rules using those bandwidth classes to identify and classify the
traffic in the Advanced Secure Gateway.
❐ Enable bandwidth management.
Bandwidth management configuration consists of two areas:
❐ Bandwidth allocation—Thisis the process of creating and configuring
bandwidth classes and placing them into a bandwidth class hierarchy. This
process can be done using either the Management Console or the CLI. See
"Allocating Bandwidth" on page 608.
❐ Flow classification—This is the process of classifying traffic flows into
bandwidth management classes using policy rules. Policy rules can classify
flows based on any criteria testable by policy. You can create policy rules using
either the Visual Policy Manager (VPM), which is accessible through the
Management Console, or by composing Content Policy Language (CPL). See
"Flow Classification" on page 612.
Note: For more information about using VPM to create policy rules, refer to the
Visual Policy Manager Reference. For information about composing CPL, refer to the
Content Policy Language Guide.
Allocating Bandwidth
The process of defining bandwidth classes and grouping them into a bandwidth
class hierarchy is called bandwidth allocation. Bandwidth allocation is based on:
❐ the placement of classes in a hierarchy (the parent/child relationships).
❐ the priority level of classes in the same hierarchy.
❐ the minimum and/or maximum bandwidth setting of each class.
For example deployment scenarios, see "Bandwidth Allocation and VPM
Examples" on page 617.
Bandwidth Classes
To define a bandwidth class, you create the class, giving it a name meaningful to
the purpose for which you are creating it. You can configure the class as you
create it or edit it later. The available configuration settings are:
❐ Parent: Used to create a bandwidth-management hierarchy.
❐ Minimum Bandwidth: Minimum amount of bandwidth guaranteed for traffic
in this class.
❐ Maximum Bandwidth: Maximum amount of bandwidth allowed for traffic in
this class.
❐ Priority: Relative priority level among classes in the same hierarchy.
608
Parent Class
A parent class is a class that has children. When you create or configure a
bandwidth class, you can specify another class to be its parent (the parent class
must already exist). Both classes are now part of the same bandwidth-class
hierarchy, and so are subject to the hierarchy rules (see "Class Hierarchy Rules
and Restrictions" on page 610).
Minimum Bandwidth
Setting a minimum for a bandwidth class guarantees that class receives at least
that amount of bandwidth, if the bandwidth is available. If multiple hierarchies
are competing for the same available bandwidth, or if the available bandwidth is
not enough to cover the minimum, bandwidth management is not be able to
guarantee the minimums defined for each class.
Note: The Advanced Secure Gateway does not attempt to reserve any bandwidth
on the network links that it is attached to or otherwise guarantee that the
available bandwidth on the network can be used to satisfy bandwidth class
minimums. The Advanced Secure Gateway can only shape the various traffic
flows passing through it, and prioritize some flows over others according to its
configuration.
Maximum Bandwidth
Setting a maximum for a bandwidth class puts a limit on how much bandwidth is
available to that class. It does not matter how much bandwidth is available; a class
can never receive more bandwidth than its maximum.
To prevent a bandwidth class from using more than its maximum, the Advanced
Secure Gateway inserts delays before sending packets associated with that class
until the bandwidth used is no more than the specified maximum. This results in
queues of packets (one per class) waiting to be sent. These queues allow the
Advanced Secure Gateway to use priority settings to determine which packet is
sent next. If no maximum bandwidth is set, every packet is sent as soon as it
arrives, so no queue is built and nothing can be prioritized.
Unlike minimums and priority levels, the maximum-bandwidth setting can
purposely slow down traffic. Unused bandwidth can go to waste with the
maximum-bandwidth setting, while the minimum-bandwidth settings and
priority levels always distributes any unused bandwidth as long as classes
request it. However, priority levels are not meaningful without a maximum
somewhere in the hierarchy. If a hierarchy has no maximums, any class in the
hierarchy can request and receive any amount of bandwidth regardless of its
priority level.
Priority
When sharing excess bandwidth with classes in the same hierarchy, the class with
the highest priority gets the first opportunity to use excess bandwidth. When the
high-priority class uses all the bandwidth it needs or is allowed, the next class
609
Advanced Secure Gateway Administration Guide
gets to use the bandwidth, if any remains. If two classes in the same hierarchy
have the same priority, then excess bandwidth is shared in proportion to their
maximum bandwidth setting.
Class Hierarchies
Bandwidth classes can be grouped together to form a class hierarchy. Creating a
bandwidth class allows you to allocate a certain portion of the available
bandwidth to a particular type of traffic. Putting that class into a bandwidth-class
hierarchy with other bandwidth classes allows you to specify the relationship
among various bandwidth classes for sharing available (unused) bandwidth.
The way bandwidth classes are grouped into the bandwidth hierarchy determines
how they share available bandwidth among themselves. You create a hierarchy so
that a set of traffic classes can share unused bandwidth. The hierarchy starts with
a bandwidth class you create to be the top-level parent. Then you can create other
bandwidth classes to be the children of the parent class, and those children can
have children of their own.
To manage the bandwidth for any of these classes, some parent in the hierarchy
must have a maximum bandwidth setting. The classes below that parent can then
be configured with minimums and priority levels to determine how unused
bandwidth is shared among them. If none of the higher level classes have a
maximum bandwidth value set, then bandwidth flows from the parent to the
child classes without limit. In that case, minimums and priority levels are
meaningless, because all classes get all the bandwidth they need at all times. The
bandwidth, in other words, is not being managed.
610
❐ The minimum bandwidth available to traffic directly classified to a parent
class is equal to its assigned minimum bandwidth minus the minimum
bandwidths of its children. For example, if a parent class has a minimum
bandwidth of 600 kbps and each of its two children have minimums of 300
kbps, the minimum bandwidth available to traffic directly classified into the
parent class is 0.
611
Advanced Secure Gateway Administration Guide
Flow Classification
You can classify flows to BWM classes by writing policy rules that specify the
bandwidth class that a particular traffic flow belongs to. A typical transaction has
four traffic flows:
1. Client inbound—Traffic flowing into the Advanced Secure Gateway from a
client (the entity sending a request, such as a client at a remote office linked to
the appliance).
2. Server outbound—Traffic flowing out of the Advanced Secure Gateway to a
server.
3. Server inbound—Traffic flowing back into the appliance from a server (the
entity responding to the request).
4. Client outbound—Traffic flowing back out of the appliance to a client.
The figure below shows the traffic flows between a client and server through the
Advanced Secure Gateway.
Some types of traffic can flow in all four directions. The following example
describes different scenarios that you might see with an HTTP request. A client
sends a GET to the Advanced Secure Gateway (client inbound). The appliance
then forwards this GET to a server (server outbound). The server responds to the
Advanced Secure Gateway with the appropriate content (server inbound), and
then the appliance delivers this content to the client (client outbound).
Policy allows you to configure different classes for each of the four traffic flows.
See "Using Policy to Manage Bandwidth" on page 617 for information about
classifying traffic flows with policy.
612
Section 1 Configuring Bandwidth Allocation
You can use either the Management Console or the CLI to perform the following
tasks:
❐ Enable or disable bandwidth management.
❐ Create and configure bandwidth classes.
❐ Delete bandwidth classes.
❐ View bandwidth management class configurations.
Existing
parent
class 3a
3b
3c
3d
3e
613
Advanced Secure Gateway Administration Guide
After you add a child class to a parent class, the parent class is denoted by a
folder icon. Double-click the folder to view all of the child classes under that
parent.
4. Select Enable Bandwidth Management (if not currently selected).
5. Click Apply.
Note: You cannot delete a class that is referenced by another class or by the
currently installed policy. For instance, you cannot delete a class that is the parent
of another class or one that is used in an installed policy rule. If you attempt to do
so, a message displays explaining why this class cannot be deleted.
1. Select Configuration > Bandwidth Management > BWM Classes > Bandwidth Classes.
2. Highlight the class to delete and Delete.
3. Click Yes to delete the class.
4. Click Apply.
614
Section 2 Bandwidth Management Statistics
The bandwidth management statistics tabs ("Current Class Statistics" and "Total
Class Statistics" on page 615) display the current packet rate and total number of
packets served, the current bandwidth rate, and the total number of bytes served
and packets dropped.
2. To view the statistics of child bandwidth classes, double-click the folder icon
of the parent class.
The child classes become visible. A second double-click closes the folder.
See Also
❐ "Using Policy to Manage Bandwidth" on page 617
615
Advanced Secure Gateway Administration Guide
2. To view the statistics of child bandwidth classes, double-click the folder icon
of the parent class. A second double-click closes the folder.
See Also
❐ "Using Policy to Manage Bandwidth"
616
Section 3 Using Policy to Manage Bandwidth
After creating and configuring bandwidth management classes, create policy
rules to classify traffic flows using those classes. Each policy rule can only apply
to one of four traffic flow types:
❐ Client inbound
❐ Client outbound
❐ Server inbound
❐ Server outbound
You can use the same bandwidth management classes in different policy rules;
one class can manage bandwidth for several types of flows based on different
criteria. However, any given flow is always be counted as belonging to a single
class. If multiple policy rules match a flow and try to classify it into multiple
bandwidth classes, the last classification done by policy applies.
To manage the bandwidth classes you have created, you can either compose CPL
or use the VPM. To see examples of policy using these methods, see "Bandwidth
Allocation and VPM Examples" on page 617 or "Policy Examples: CPL" on page
624.
617
Advanced Secure Gateway Administration Guide
Each of the classes above has a maximum set at an amount equal to half of the
total link bandwidth for each office. A hierarchy does not exist in this scenario.
The administrator launches the VPM and creates a new Web Access Layer,
naming it FTP/HTTP Limitations. He selects the Client IP Address/Subnet object in the
Source column, filling in the IP address and mask of the subnet used by Office_A.
618
He selects a Combined Service Object in the Service column, naming it FTP/HTTP and
adding a Client Protocol for FTP and for HTTP.
619
Advanced Secure Gateway Administration Guide
In the Action column, he selects Manage Bandwidth, naming it Office_A and setting it
to manage the bandwidth of Office_A on the Client side in the Outbound direction.
He adds two more similar rules for the other two offices. He is able to reuse the
same Combined Service Object in the Service column, but must add new objects
specific to each office in the Source and Action columns. The order of the rules does
not matter here, because each office, and thus each rule, is distinct because of its
IP address/subnet mask configuration.
The administrator now has three separate hierarchies. In each one, bandwidth is
limited by the configuration of the parent class, and the two child classes are
prioritized to determine how they share any unused bandwidth. Because no
minimums have been set, the highest priority class has the first opportunity to use
all of the available bandwidth; whatever is left then goes to the next priority class.
Priority levels are only effective among the classes in the same hierarchy. This
means that the priority levels for the Office_A hierarchy do not affect the classes in
the Office_B or Office_C hierarchies.
620
He first edits each of the three VPM rules for the three offices. He edits each the
Manage Bandwidth objects, changing the name of the objects to Emp_A, Emp_B,
and Emp_C and changes the bandwidth class to the corresponding employee class.
Next, he creates three more rules for the CEO, moving them above the first three
rules. For the CEO rules, he selects the same combined FTP/HTTP object in the
Service column; in the Action column, he selects a Manage Bandwidth object
configured for client side/outbound, as before, but this time, he names the objects
CEO_A, CEO_B, and CEO_C and selects the corresponding CEO bandwidth class. In
the Source column, he creates a Combined Source Object, naming it for the CEO. He
combines the Client IP/subnet object already created for each office with a User
object that he creates for the CEO.
The administrator places all three CEO rules above the employee rules, because
the Advanced Secure Gateway looks for the first rule that matches a given
situation and ignores the remaining rules. If he had placed the CEO rules below
the employee rules, the appliance would never get to the CEO rules because the
CEO’s Web surfing client IP address matches both the CEO rules and the
employee rules, and the Advanced Secure Gateway would stop looking after the
first match. With the CEO rules placed first, the appliance applies the CEO rules to
the CEO’s Web surfing, and an employee’s Web surfing does not trigger the CEO
rules and instead skips ahead to the appropriate employee rule.
621
Advanced Secure Gateway Administration Guide
class Emp_A, setting the parent to Staff_A. Finally, he edits the class CEO_A,
changing the priority to 2. The resulting hierarchy is illustrated below. To see what
the administrator did to the policy rules, see "Task Three: VPM" on page 622.
622
Task Four: Bandwidth Allocation
The administrator decided later that he needed to guarantee employees some
bandwidth. He configures a minimum for the class Emp_A, as illustrated below.
He decides to leave the minimum on the parent class Staff_A and not to set a
minimum for the class Mgmt_A. This is okay, because the minimum of the parent
class is available to its children if the parent class does not use all of it, and the
only way that the CEO can get more than 250 kbps is if the employees and
management combined use less than 500.
This last change does not require additional changes to policy; the administrator
has added a minimum to a class that he has already classified for traffic using
policy.
In the above scenario, the class called Staff_A does not have traffic configured for
it—it was created to guarantee bandwidth minimums for its child classes.
However, if it were configured for traffic, it would have a practical minimum of
300 kbps. The practical minimum of a parent class is equal to its assigned
minimum bandwidth minus the minimums of its children. In that case, if the
parent class Staff_A used 300 kbps and the child class Emp_A used 200 kbps, the
child class Mgmt_A would not receive any bandwidth unless the class CEO_A was
using less than 250 kbps. Under those circumstances, the administrator probably
also needs to create a minimum for management.
623
Advanced Secure Gateway Administration Guide
column to the Manage Bandwidth object, selecting Server side/Inbound and the Sports
bandwidth class he created. After installing the policy and verifying that
bandwidth management is enabled, he is finished.
<proxy>
condition=student_mp3_weekday limit_bandwidth.server.inbound(mp3)
<proxy>
condition=http_posts limit_bandwidth.client.inbound(http_post)
624
Example Three: CPL
In this example, the administrator of a remote site wants to limit the amount of
bandwidth used to pre-populate the content from headquarters to 50 kbps during
work hours. The CPL triggers used are current-time and pre-population
transactions. The action taken is to limit the total amount of bandwidth consumed
by pre-pop flows.
CLI:
#(config) bandwidth-management
#(config bandwidth-management) create pre-pop
#(config bandwidth-management) edit pre-pop
#(config bw-class pre-pop) max-bandwidth 50
CPL:
define condition prepop_weekday
content_management=yes weekday=1..5 hour=9..16
end condition
<proxy>
condition=prepop_weekday limit_bandwidth.server.inbound(pre-pop)
625
Advanced Secure Gateway Administration Guide
626
Chapter 26: Configuring Access Logging
Access logging allows you to track Web usage for the entire network or specific
information on user or department usage patterns. These logs and reports can
be made available in real-time or on a scheduled basis. This chapter describes
access logging and provides procedures for enabling access logging and
configuring upload schedules.
Note: Event logging is not the same as access logging. Event logging allows you
to specify the types of system events logged, the size of the event log, and to
configure Syslog monitoring.
Note: The only data that can be logged in an access log on the Advanced Secure
Gateway are the access-log fields and the CPL fields (found in Chapter 30:
"Access Log Formats" on page 671).
These log records can be directed to one or more log facilities, which associates
the logs with their configured log formats, upload schedules, and other
customizable components. In addition, access logs can be encrypted and
digitally signed before uploading.
Data stored in log facilities can be automatically uploaded to a remote location
for analysis and archive purposes. The uploads can take placing using HTTP,
FTP, or one of several proprietary protocols. After they are uploaded, reporting
tools such as Blue Coat Reporter can be used to analyze the log files. For
information on using Blue Coat Reporter, refer to the Blue Coat Reporter Initial
Configuration Guide.
627
Advanced Secure Gateway Administration Guide
About Facilities
A log facility is a separate log that contains a single logical file and supports a
single log format. The facility contains the file’s configuration and upload
schedule information as well as other configurable information such as how often
to rotate (switch to a new log) the logs at the destination, any passwords needed,
and the point at which the facility can be uploaded.
Multiple access log facilities are supported, although each access log supports a
single log format. You can log a single transaction to multiple log facilities
through a global configuration setting for the protocol that can be modified on a
per-transaction basis through policy.
628
❐ Instant Messaging
❐ Peer-to-peer (P2P)
❐ RealMedia/QuickTime
❐ SOCKS
❐ SSL
❐ TCP Tunnel
❐ Telnet
❐ Windows Media
SGOS can create access logs with any one of a number of log formats, and you can
create additional types using custom or ELFF format strings. The log types
supported are:
❐ NCSA common log format
❐ SQUID-compatible format
❐ ELFF (W3C Extended Log File Format)
❐ Custom, using the strings you enter
The log facilities, each containing a single logical file and supporting a single log
format, are managed by policy (created through the Visual Policy Manager (VPM)
or Content Policy Language (CPL)), which specifies the destination log format
and log file.
629
Advanced Secure Gateway Administration Guide
630
Section 1 Configuring a Log for Uploading
The upload schedule defines the frequency of the access logging upload to a remote
server, the time between connection attempts, the time between keep-alive
packets, the time at which the access log is uploaded, and the protocol that is
used. When configuring an upload schedule, you can specify either periodic
uploading or continuous uploading. Both periodic and continuous uploading can
send log information from an Advanced Secure Gateway appliance farm to a
single log analysis tool. This allows you to treat multiple appliances as a single
entity and to review combined information from a single log file or series of
related log files.
With periodic uploading, the SGOS software transmits log entries on a scheduled
basis (for example, once daily or at specified intervals) as entries are batched,
saved to disk, and uploaded to a remote server.
Note: If you do not need to analyze the upload entries in real time, use periodic
uploading because it is more reliable than continuous uploading.
If there is a problem configuring continuous uploading to Microsoft Internet
Information Server (IIS), use periodic uploading instead.
631
Advanced Secure Gateway Administration Guide
3a
3b
3c
4a 5
4b
b. To change the time between connection attempts, enter the new time
(in seconds) in the Wait between connect attempts field.
c. (Only accessible if you are updating continuously) To change the time
between keep-alive packets, enter the new time (in seconds) in the Time
between keep-alive log packets field.
632
• Periodic Upload: You can upload the access logs now or you can cancel
any access-log upload currently in progress (if you are doing periodic
uploads). You can rotate the access logs now (if you are doing continuous
uploads). These actions do not affect the next scheduled upload time.
• Cancel upload (for periodic uploads) allows you to stop repeated upload
attempts if the Web server becomes unreachable while an upload is in
progress. Clicking this sets log uploading back to idle if the log is waiting
to retry the upload. If the log file is in the process of uploading, it takes
time for it to take effect.
6. Click Apply.
633
Advanced Secure Gateway Administration Guide
Note: If you have multiple access logs, each access log has its own list of
objects.
❐ Show access log statistics: The statistics of an individual access log is shown.
❐ Show statistics of all logs:
The statistics of all the access logs on the system are
displayed in a single list.
❐ Show last N bytes in the log: The last N bytes in the log are shown.
❐ Show last part of log every time it changes:
A stream of the latest log entries is
shown on the page as they are written in the system.
❐ Show access log tail with optional refresh time: A refresh from the browser displays
the latest log entries.
❐ Show access log objects: The statistics of individual access log objects are
displayed.
❐ Show all access log objects: The statistics of all access log object are displayed in
a single list.
634
2. From the Log drop-down list, select the log to view.
3. Click Start Tail to display the access log tail.
The Advanced Secure Gateway displays a maximum of 500 lines. Entries that
pre-date these 500 lines are not displayed.
4. Click Stop Tail to stop the display or Clear Tail to clear the display.
Status Description
active Log writing is active.
active - early upload The early upload threshold has been reached.
disabled An administrator has disabled logging.
idle Log writing is idle.
initializing The system is initializing.
shutdown The system is shutting down.
635
Advanced Secure Gateway Administration Guide
stopped The access log is full. The maximum log size has
been reached.
unknown A system error has occurred.
Estimated compressed size of the uploaded access log and Advanced Secure
Gateway access log size might differ during uploading. This occurs because new
entries are created during the log upload.
636
2. Under Status of Last Upload, check the appropriate status information displayed
in the Upload client field.
3. Check the other status information. For information about the status, see the
table below.
Table 26–2 Upload Status Information
Status Description
Connect time The last time a client connection was made or attempted.
Remote filename The most recent upload filename. If an access log was
encrypted, only the encrypted access log file (the ENC file)
displays.
Remote size The current size of the upload file. If an access log was
encrypted, only the encrypted access log file size (the ENC
file) displays. The private key file (the DER file) varies, but
is usually about 1 Kb.
Maximum bandwidth The maximum bandwidth used in the current or last
connection.
Current bandwidth The bandwidth used in the last second (available only if
currently connected).
Final result The result of the last upload attempt (success or failure).
This is available only if not connected.
637
Advanced Secure Gateway Administration Guide
c. To disable a particular log, click Disable logging to and select that log
from the drop-down list; to disable all access logging, click Disable all
access logging.
5. Click OK; click OK again; close the VPM window and click Yes in the dialog to
save your changes.
638
Chapter 27: Configuring the Access Log Upload Client
The Advanced Secure Gateway appliance supports three types of upload client:
❐ FTP client, the default
❐ HTTP client
❐ Custom client
❐ Blue Coat Reporter client
❐ Kafka client
Blue Coat also supports secure FTP (FTPS), secure HTTP (HTTPS), secure
Custom client, and secure Kafka client. The Custom client is based on plain
sockets.
Note: You must have a socket server to use the Custom client.
639
Advanced Secure Gateway Administration Guide
The SGOS software allows you to upload either compressed access logs or plain-
text access logs. The device uses the gzip format to compress access logs. Gzip-
compressed files allow more log entries to be stored in the device. Advantages of
using file compression include:
❐ Reduces the time and resources used to produce a log file because fewer disk
writes are required for each megabyte of log-entry text.
❐ Uses less bandwidth when the device sends access logs to an upload server.
❐ Requires less disk space.
Compressed log files have the extension .log.gz. Text log files have the
extension .log.
For greater security, you can configure the SGOS software to:
❐ Encrypt the access log
❐ Sign the access log
640
Section 1 Importing an External Certificate
You can import an X.509 certificate into the Advanced Secure Gateway appliance
to use for encrypting data.
4. Enter the name of the external certificate into the External Cert Name field and
paste the certificate into the External Certificate field. Be sure to include the ----
BEGIN CERTIFICATE---- and -----END CERTIFICATE---- statements.
5. Click OK.
6. Click Apply to commit the changes to the Advanced Secure Gateway
appliance.
641
Advanced Secure Gateway Administration Guide
642
Section 2 Digitally Signing Access Logs
You can digitally sign access logs to certify that a particular Advanced Secure
Gateway appliance wrote and uploaded this log file. Signing is supported for
both content types— text and gzip—and for both upload types—continuous and
periodic. Each log file has a signature file associated with it that contains the
certificate and the digital signature for verifying the log file. The signature file has
the same name as the access log file but with a .sig extension; that is,
filename.log.sig, if the access log is a text file, or filename.log.gzip.sig, if the
access log is a gzip file.
For information about verifying a log, see "Verifying a Digital Signature" on page
646.
Continue with "Configuring the Upload Client to Digitally Sign Access Logs" .
643
Advanced Secure Gateway Administration Guide
2 3b
3a
2. From the Log drop-down list, select the log facility to configure. The facility
must exist before it displays in this list.
3. Select and configure the client type:
a. From the Client type drop-down list, select the upload client to use.
Only one client can be configured for each log facility.
b. Click Settings to customize the upload client.
For information on customizing the clients, skip to "Editing the FTP client"
on page 648, "Editing the HTTP client" on page 649, "Editing the Custom
client" on page 647.
For information about testing the upload client, see "Testing Access Log
Uploading" on page 633.
4. Configure Transmission Parameters, if applicable:
a. (Optional) To use an external certificate to encrypt the uploaded log
facility, select an external certificate from the Encryption Certificate drop-
down list. You must first import the external certificate to the
Advanced Secure Gateway appliance (see "Importing an External
Certificate" on page 641).
The encryption option is not available for Custom clients.
b. (Optional) To enable the digital signature of the uploaded access log,
select a keyring from the Keyring Signing drop-down list. The signing
keyring, with a certificate set to smime, must already exist. A certificate
set to any other purpose cannot be used for digital signatures.
The digital signing option is not available for Custom clients.
c. Select one of the Save the log file as radio buttons to determine whether
the access log that is uploaded is compressed (gzip file, the default) or
not (text file).
644
If you select text file, you can change the Send partial buffer after n seconds
field to the time you need (30 seconds is the default).
This field configures the maximum time between text log packets,
meaning that it forces a text upload after the specified length of time even
if the internal log buffer is not full. If the buffer fills up before the time
specified in this setting, the text uploads right away, and is not affected by
this maximum setting.
Note: If you selected gzip file, the Send partial buffer after n seconds field is not
configurable. Also, this setting is only valid for continuous uploading (see
Chapter 26: "Configuring Access Logging" on page 627 for information
about continuous uploading).
Note: Before you can manage the bandwidth for this log facility, you must
first create a bandwidth-management class. It is the log facility that is
bandwidth-managed—the upload client type does not affect this setting. See
Chapter 25: "Bandwidth Management" on page 607 for information about
enabling bandwidth management and creating and configuring the
bandwidth class.
Less bandwidth slows down the upload, while more could flood the network.
5. Click Apply.
See Also
"Verifying a Digital Signature" on page 646
"Digitally Signing Access Logs" on page 643
To disable an upload:
1. Select Configuration > Access Logging > Logs > Upload Client.
2. Select the log facility for which you want to disable an upload from the Log
drop-down menu.
3. Select NONE from the Client type drop-down menu.
4. Click Apply.
645
Advanced Secure Gateway Administration Guide
where
cacrt The CA certificate used to issue the certificate in the signature
file.
filename.sig The file containing the digital signature of the log file.
filename.log The log file generated after decryption. If the access log is a gzip
file, it contains a .gz extension.
logFile The filename that is generated after signature verification.
Note: Multiple upload clients can be configured per log facility, but only one can
be enabled and used per upload.
646
Editing the Custom client
To edit the custom client:
1. Select Configuration > Access Logging > Logs > Upload Client.
2. Select Custom client from the Client type drop-down list. Click the Settings
button.
4a 4b
4c
3. From the Settings for drop-down list, select to configure the primary or
alternate custom server.
4. Fill in the server fields, as appropriate:
a. Host: Enter the host name of the upload destination. If Use secure
connections (SSL) is selected, the host name must match the host name
in the certificate presented by the server. The host can be defined as an
IPv4 address, or a domain name that resolves to an IPv4 address.
b. Port: If an IP address is entered for the host, specify a port number; the
default is 69 for custom clients.
c. Use secure connections (SSL): Select this if you are using secure
connections.
5. Click OK.
Click Apply.
647
Advanced Secure Gateway Administration Guide
4a 4b
4c
4d
4e
5
6
7
3. Select the primary or alternate FTP server to configure from the Settings for
drop-down list.
4. Fill in the server fields, as appropriate:
a. Host: The name of the upload client host. If the Use secure connections
(SSL) check box is selected, the host name must match the host name in
the certificate presented by the server. The host can be defined as an
IPv4 or IPv6 address, or a domain name that resolves to an IPv4 or
IPv6 address.
b. Port: If an IP address is entered for the host, specify a port number; the
default is 21 for FTP clients.
c. Path: The directory path where the access log is uploaded on the server.
d. Username: This is the username that is known on the host you are
configuring.
e. Change Password: Change the password on the FTP; the Change
Password dialog displays; enter and confirm the new password; click
OK.
5. Filename: The Filename field is comprised of text and/or specifiers. The default
filename includes specifiers and text that indicate the log name (%f), name of
the external certificate used for encryption, if any (%c), the fourth parameter of
the Advanced Secure Gateway appliance IP address (%l), the date and time
(Month: %m, Day: %d, Hour: %H, Minute: %M, Second: %S), and the .log
or .gzip.log file extension.
648
Note: Be cautious if you change the Filename field. If an ongoing series of
access logs files are produced and you do not have time-specifiers in this field,
each access log file produced overwrites the old file. Also, if you use more
than one external certificate to encrypt logs, include the %c specifier in the
Filename field to keep track of which external certificate was used to encrypt
the uploaded log file.
6. Secure Connections: If you use FTPS, select the Use secure connections (SSL)
check box. The remote FTP server must support FTPS.
7. Local Time: If you want the upload to reflect the local time it was uploaded
instead of Universal Time Coordinates (UTC), select Local Time.
8. Use PASV: With Use PASV selected (the default), the Advanced Secure Gateway
appliance connects to the FTP server. With Use PASV de-selected, the FTP
server uses the PORT command to connect to the Advanced Secure Gateway
appliance.
9. Click OK.
10. Click Apply.
Note: To create an HTTPS client, you must also import the appropriate CA
Certificate. For more information, see "Importing CA Certificates" on page 1188.
649
Advanced Secure Gateway Administration Guide
4a 4b
4c
4d
4e
5
6
7
3. From the Settings for drop-down list, select the primary or alternate HTTP
server to configure.
4. Fill in the server fields, as appropriate:
a. Host: The name of the upload host. If Use secure connections (SSL) is
selected, the host name must match the host name in the certificate
presented by the server. The host can be defined as an IPv4 or IPv6
address, or a domain name that resolves to an IPv4 or IPv6 address.
b. Port: If an IP address is entered for the host, specify a port number; the
default is 80 for HTTP clients.
c. Path: The directory path where the access log facility is uploaded on
the server.
d. Username: This is the username that is known on the host you are
configuring.
e. Change Password: Change the password on the HTTP host; the Change
Password dialog displays; enter and confirm the new password and
click OK.
5. Filename: The Filename field is comprised of text and/or specifiers. The default
filename includes specifiers and text that indicate the log name (%f), name of
the external certificate used for encryption, if any (%c), the fourth parameter of
the Advanced Secure Gateway appliance IP address (%l), the date and time
(Month: %m, Day: %d, Hour: %H, Minute: %M, Second: %S), and the .log
or .gzip.log file extension.
650
Note: Be cautious if you change the Filename field. If an ongoing series of
access log files are produced and you do not have time-specifiers in this field,
each access log file produced overwrites the old file. Also, if you use more
than one external certificate to encrypt logs, include the %c specifier in the
Filename field to keep track of which external certificate can decrypt the
uploaded log file.
6. Local Time: If you want the upload to reflect the local time it was uploaded
instead of Universal Time Coordinate (UTC), select Local Time.
7. Use secure connections (SSL): Select this to create an HTTPS client. To create an
HTTPS client, you must also create a key pair, import or create a certificate,
and, if necessary, associate the key pair and certificate (called a keyring), with
the SSL device profile.
8. Click OK.
9. Click Apply.
Troubleshooting
❐ Problem: The Advanced Secure Gateway appliance is uploading logs more
frequently than expected.
Description: If access logging is enabled, logs can accrue on the Advanced
Secure Gateway appliance’s hard drive even if the upload client is not
configured for specific protocols (often the case if you configured streaming,
IM, or P2P). Eventually the size of these combined logs, triggers the global
Start an Early upload threshold (Configuration > Access Logging > General > Global
Settings. The Advanced Secure Gateway appliance attempts to upload all
configured logs more often than expected. For example, a main log that is
configured for upload every 24 hours starts to upload small portions of the
main log every 10 minutes.
Solution: To prevent the access logs that do not have an upload client
configured from triggering the Start an Early upload threshold, edit the default
logs for each protocol that you do not need uploaded. Set them to <None> from
the Configuration > Access Logging > Logs > Upload Client tab.
651
Advanced Secure Gateway Administration Guide
652
Chapter 28: Creating and Editing an Access Log Facility
This chapter describes how to modify existing log facilities for your needs. You
can also create new log facilities for special circumstances.
653
Advanced Secure Gateway Administration Guide
Note: Several log facilities have already been created. Before creating a new
one, check the existing ones to see if they fit your needs. If you want to use a
custom log format with the new log facility, you must create the log format
before associating it with a log (see Chapter 29: "Creating Custom Access Log
Formats" on page 663).
3a
3b
3c
4a
4b
Note: The name can include specifiers from Table 30–5 on page 679. For
example, if you name the file:
• AccLog, the name will be AccLog
• AccLog%C%m%d%H%M%S, the name becomes
AccLog Advanced Secure Gateway appliance_name month day hour
min sec
654
b. Log Format: Select a log format from the drop-down list.
c. Description: Enter a meaningful description of the log. It is used for
display purposes only.
4. Fill in the Log file limits panel as appropriate. (You can edit these settings later.
See "Configuring Global Settings" on page 660.)
a. The maximum size for each remote log file (the file on the upload
server) defaults to 0, meaning that all data is sent to the same log file. If
you set a maximum size, a new log file opens when the file reaches
that size. This setting is valid for both periodic and continuous
uploads.
b. Specify a size that triggers an early upload—the maximum upload size
varies depending on the size of the appliance disks (the maximum
allowed upload threshold appears below this field).
5. Click OK to close the dialog.
6. Click Apply.
655
Advanced Secure Gateway Administration Guide
Note: If you change the log format of a log, remember that ELFF formats require
an ELFF header in the log (the list of fields being logged are mentioned in the
header) and that non-ELFF formats do not require this header.
The format of data written to the log changes as soon as the format change is
applied; for best practices, do a log upload before the format change and
immediately after (to minimize the number of log lines in a file with mixed log
formats).
Upload the log facility before you switch the format.
2a
2b
2c
3a
3b
656
3. Fill in the Log file limits panel as appropriate:
a. The maximum size for each remote log file (the file on the upload
server) defaults to 0, meaning that all data is sent to the same log file. If
you set a maximum size, a new log file opens when the file reaches
that size. This setting is valid for both periodic and continuous
uploads.
b. Specify a size that triggers an early upload—the maximum upload size
varies depending on the size of the appliance disks (the maximum
allowed upload threshold appears below this field).
4. Click OK to close the dialog.
5. Click Apply.
2. Select the log facility you want to delete and click Delete. The console displays
the Confirm Delete dialog.
3. Click OK.
The log is successfully deleted when it is no longer displayed under Logs.
657
Advanced Secure Gateway Administration Guide
Note: If you have a policy that defines protocol and log association, that policy
overrides any settings you make here.
The following list shows the protocols supported and the default log facilities
assigned to them, if any:
CIFS cifs
FTP main
HTTP main
HTTPS-Reverse-Proxy main (Set to the same log facility that HTTP is using
upon upgrade.)
HTTPS-Forward-Proxy ssl (If the facility for HTTP, TCP, or SOCKS is set
before upgrade.)
Instant Messaging im
MAPI mapi
SOCKS none
SSL ssl (If the facility for HTTP, TCP or SOCKS is set before
upgrade.)
Telnet main
658
Note: To disable access logging for a particular protocol, you must either disable
the default logging policy for that protocol (see "Disabling Access Logging for a
Particular Protocol" on page 659) or modify the access logging policy in VPM
(refer to the Visual Policy Manager Reference).
659
Advanced Secure Gateway Administration Guide
2a
2b
2c
Note: To ensure that the appliance uploads older log entries before
they are deleted, make sure that you have correctly specified an
upload server, an early upload threshold for each individual log, and a
660
global early upload threshold. Inability to connect to the upload server
(for example, due to incorrect settings or network issues) will result in
data loss.
c. Specify the sum total of all log sizes to trigger an early upload. The
appliance attempts to upload the log that caused the total log size to
reach the global limit.
Individual logs each have their own early upload setting, which remain in
effect even if you specify a global value. This means that, provided that
upload is configured and working, the global early upload threshold
could trigger a log upload before the file size reaches the threshold defined
in the specific log facility.
3. The Global Upload section allows you to perform actions on all available log
facilities.
• Click Upload All to upload all logs immediately, and click OK to confirm
the action.
• Click Cancel to prevent further attempts to upload all log facilities and
cancel all uploads that are in progress.
4. Click Apply.
661
Advanced Secure Gateway Administration Guide
662
Chapter 29: Creating Custom Access Log Formats
This chapter describes the default access log formats and describes how to
create customized access log formats.
Note: Reserved log formats cannot be edited or modified in any way. If you
wish to create a custom log format based on an existing reserved log format,
see "Creating a Custom or ELFF Log Format" on page 667.
For a description of each value in the log, see Chapter 30: "Access Log
Formats" on page 671.
❐ bcreportermain_v1 is designed to send HTTP access information to Blue Coat
Reporter. This is a reserved format and cannot be edited. This format
includes the following fields:
date time time-taken c-ip cs-username cs-auth-group x-exception-id
sc-filter-result cs-categories cs(Referer) sc-status s-action cs-
method rs(Content-Type) cs-uri-scheme cs-host cs-uri-port cs-uri-
path cs-uri-query cs-uri-extension cs(User-Agent) s-ip sc-bytes cs-
bytes x-virus-id x-bluecoat-application-name x-bluecoat-application-
operation
663
Advanced Secure Gateway Administration Guide
❐ bcreporterwarp_v1 is designed to log reverse proxy traffic data. With this data,
reverse proxy administrators can run reports for inspecting traffic flow
between the appliance and backend web application servers. The
bcreporterwarp_v1 access log format is recommended for Web Application
Firewall (WAF) deployments because it includes detailed information for
requests that WAF blocks (or monitors). To populate the Web Application
Protection and Geolocation access log fields, you must have valid
subscriptions for the respective service and enable the feature on the
appliance. This is a reserved format and cannot be edited. This format
includes the following fields:
date time time-taken c-ip cs-username cs-auth-group x-bluecoat-
transaction-uuid x-exception-id cs(Referer) sc-status s-action cs-
method rs(Content-Type) cs-uri-scheme cs-host cs-uri-port cs-uri-path
cs-uri-query cs-uri-extension cs(User-Agent) s-ip sc-bytes cs-bytes x-
virus-id x-cs-client-ip-country x-user-x509-serial-number x-user-x509-
subject rs-bytes x-cs-client-effective-ip x-cs-client-effective-ip-
country cs(X-Forwarded-For) rs-service-latency r-ip x-bluecoat-
application-name x-bluecoat-waf-attack-family x-risk-score x-bluecoat-
waf-block-details x-bluecoat-waf-monitor-details
• In version 6.6.4.3 and later, this format contains two additional fields:
• x-bluecoat-request-details-header
• x-bluecoat-request-details-body
664
https://bto.bluecoat.com/documentation/All-Documents/
Security%20Analytics%20Platform
❐ collaboration is
designed to log WebEx actions. It is an ELFF format that
includes the following fields:
date time c-ip r-dns duration x-collaboration-method s-action x-
collaboration-user-id x-collaboration-meeting-id x-webex-site
The ELFF/custom access log format strings that represent the previous strings
are:
$(c-ip) - $(cs-username) $(localtime) $(cs-request-line) $(sc-status)
$(sc-bytes)
❐ squid is a reserved format that cannot be edited. You can create a new SQUID
log format using custom strings. The default SQUID format is SQUID-1.1 and
SQUID-2 compatible.
SQUID uses several definitions for its field formats:
665
Advanced Secure Gateway Administration Guide
SQUID-2 has the same fields as SQUID-1.1, although some of the field values
have changed.
❐ ssl is an ELFF format that includes the following fields:
date time time-taken c-ip s-action x-rs-certificate-validate-status x-
rs-certificate-observed-errors x-cs-ocsp-error x-rs-ocsp-error cs-host
s-supplier-name x-rs-connection-negotiated-ssl-version x-rs-
connection-negotiated-cipher x-rs-connection-negotiated-cipher-size x-
rs-certificate-hostname x-rs-certificate-hostname-category x-cs-
connection-negotiated-ssl-version x-cs-connection-negotiated-cipher x-
cs-connection-negotiated-cipher-size x-cs-certificate-subject s-ip s-
sitename
666
Section 1 Creating a Custom or ELFF Log Format
First, decide what protocols and log formats to use, and determine the logging
policy and the upload schedule. Then perform the following:
❐ Associate a log format with the log facility.
❐ Associate a log facility with a protocol and/or create policies for protocol
association and to manage the access logs and generate entries in them (if you
do both, policy takes precedence).
❐ Determine the upload parameters for the log facility.
For more information, see "Default Access Log Formats" on page 663.
2. Click New (or highlight a format and click Edit). The Create Format dialog
displays. If you select an unconfigurable format, you receive an error message.
3a
3b
3c 3d
3e
667
Advanced Secure Gateway Administration Guide
668
3. Highlight the portion of the string that you wish to copy and use a keyboard
shortcut to copy the text onto the clipboard.
Note: Be aware that you cannot copy and paste selections using the right
mouse button from within the Management Console; you must use keyboard
shortcuts.
6. Select the format string field (if there is an existing string, place the cursor
where you want to insert the string) and paste the string from the clipboard
using a keyboard shortcut.
7. Continue from step 3 from "To create or edit the log format:" on page 667.
669
Advanced Secure Gateway Administration Guide
670
Chapter 30: Access Log Formats
This chapter describes the access log formats that are created by Advanced
Secure Gateway appliance:
❐ "Custom or W3C ELFF Format"
❐ "SQUID-Compatible Format" on page 675
❐ "NCSA Common Access Log Format" on page 679
ELFF is a log format defined by the W3C that contains information about
Windows Media and RealProxy logs.
The Advanced Secure Gateway appliance can create access logs with any one of
six formats. Four of the six are reserved formats and cannot be configured.
However, you can create additional logs using custom or ELFF format strings.
When using an ELFF or custom format, a blank field is represented by a dash
character. When using the SQUID or NCSA log format, a blank field is
represented according to the standard of the format.
ELFF formats are created by selecting a corresponding custom log format using
the table below. Unlike the Blue Coat custom format, ELFF does not support
character strings and require a space between fields.
671
Advanced Secure Gateway Administration Guide
❐ Changes all spaces within fields to + or %20. The ELFF standard requires that
spaces only be present between fields.
ELFF formats are described in the following table.
Table 30–2 Blue Coat Custom Format and Extended Log File Format
672
Table 30–2 Blue Coat Custom Format and Extended Log File Format (Continued)
673
Advanced Secure Gateway Administration Guide
Table 30–2 Blue Coat Custom Format and Extended Log File Format (Continued)
%O - [Not used.]
%P s-port Port of the appliance on which the client
established its connection
%Q cs-uri-query Query from the 'log' URL.
%R cs(Referer) Request header: Referer
%S s-sitename The service type used to process the
transaction
%T duration Time taken (in seconds) to process the request
%U cs-uri-path Path from the 'log' URL. Does not include
query.
%V cs-version Protocol and version from the client's request,
e.g. HTTP/1.1
%W sc-filter- Content filtering result: Denied, Proxied or
result Observed
%X cs(X- Request header: X-Forwarded-For
Forwarded-
For)
%Y - [Not used.]
%Z s-icap-info ICAP response information
674
SQUID-Compatible Format
The SQUID-compatible format contains one line for each request. For SQUID-1.1,
the format is:
time elapsed remotehost code/status bytes method URL rfc931
peerstatus/peerhost type
For SQUID-2, the columns stay the same, though the content within might change
a little.
675
Advanced Secure Gateway Administration Guide
Value Description
ACCELERATED (SOCKS only) The request was handed to the
appropriate protocol agent for handling.
ALLOWED An FTP method (other than the data transfer method)
is successful.
DENIED Policy denies a method.
A DENIED s-action value is returned for CIFS, Endpoint
Mapper, MAPI, FTP, IM, P2P, Shell Proxy, SOCKS
proxy, streaming proxies, and SSL proxy when policy
denies a request. When the same kind of denial
happens in the HTTP Advanced Secure Gateway
appliance, TCP_DENIED is reported.
FAILED An error or failure occurred.
LICENSE_EXPIRED (SOCKS only) The request could not be handled
because the associated license has expired.
TUNNELED Successful data transfer operation.
TCP_ Refers to requests on the HTTP port.
TCP_ACCELERATED For CONNECT tunnels that are handed off to the
following proxies: HTTP, SSL, Endpoint mapper, and
P2P for BitTorrent/EDonkey/Gnutella.
TCP_AUTH_HIT The requested object requires upstream
authentication, and was served from the cache.
TCP_AUTH_HIT_RST The requested object requires upstream
authentication, but the client connection was reset
before the complete response was delivered.
TCP_AUTH_MISS The requested object requires upstream
authentication, and was not served from the cache.
This is part of CAD (Cached Authenticated Data).
TCP_AUTH_MISS_RST The requested object requires upstream
authentication, and was not served from the cache; the
client connection was reset before the complete
response was delivered.
TCP_AUTH_FORM Forms-based authentication is being used and a form
challenging the user for credentials is served in place
of the requested content.
Note: Upon submission of the form, another access log
entry is generated to indicate the status of the initial
request.
676
Table 30–3 Action Field Values (Continued)
Value Description
TCP_AUTH_REDIRECT The client was redirected to another URL for
authentication.
TCP_CLIENT_REFRESH The client forces a revalidation with the origin server
with a Pragma: no-cache. If the server returns 304
Not Modified, this appears in the
Statistics:Efficiency file as In Cache,
verified Fresh.
677
Advanced Secure Gateway Administration Guide
Value Description
TCP_REFRESH_HIT A GIMS request to the server was forced and the
response was 304 Not Modified; this appears in the
Statistics:Efficiency file as In Cache, verified
Fresh.
678
NCSA Common Access Log Format
The common log format contains one line for each request. The format of each log
entry is shown below:
remotehost rfc931 authuser [date] “request” status bytes
Each field is described in the following table.
Table 30–4 Log Entry Fields
Specifier Description
%% Percent sign.
%a Abbreviated weekday name.
%A Full weekday name.
%b Abbreviated month name.
%B Full month name.
%c The certificate name used for encrypting the log file (expands to nothing in
non-encrypted case).
%C The Advanced Secure Gateway appliance name.
%d Day of month as decimal number (01 – 31).
%f The log name.
%H Hour in 24-hour format (00 – 23).
%i First IP address of the Advanced Secure Gateway appliance, displayed in
x_x_x_x format, with leading zeros removed.
679
Advanced Secure Gateway Administration Guide
Category: bytes
cs-bodylength Number of bytes in the body
(excludes header) sent from
client to appliance
cs-bytes %B Number of bytes sent from
client to appliance
cs- Number of bytes in the header
headerlength sent from client to appliance
rs-bodylength Number of bytes in the body
(excludes header) sent from
upstream host to appliance
680
Table 30–6 Access Log Formats
Category: cifs
x-cifs-bytes- Total number of bytes written to
written the associated resource
x-cifs- Total number of bytes read by
client-bytes- CIFS client from the associated
read resource
x-cifs- Total number of read operations
client-read- issued by the CIFS client for the
operations associated resource
x-cifs- Total number of non read/write
client-other- operations issued by the CIFS
operations client for the associated
resource
x-cifs- Total number of write
client-write- operations issued by the CIFS
operations client for the associated
resource
x-cifs-dos- DOS error class generated by
error-class server, in hexadecimal
681
Advanced Secure Gateway Administration Guide
Category: connection
682
Table 30–6 Access Log Formats
683
Advanced Secure Gateway Administration Guide
684
Table 30–6 Access Log Formats
685
Advanced Secure Gateway Administration Guide
686
Table 30–6 Access Log Formats
687
Advanced Secure Gateway Administration Guide
688
Table 30–6 Access Log Formats
Category: dns
x-dns-cs- dns.client_transpo The transport protocol used by
transport rt the client connection in a DNS
query
x-dns-cs- dns.request.addres The address queried in a
address s reverse DNS lookup
x-dns-cs-dns dns.request.name The hostname queried in a
forward DNS lookup
x-dns-cs- dns.request.opcode The DNS OPCODE used in the
opcode DNS query
x-dns-cs- dns.request.type The DNS QTYPE used in the
qtype DNS query
x-dns-cs- dns.request.class The DNS QCLASS used in the
qclass DNS query
x-dns-rs- dns.response.code The DNS RCODE in the
rcode response from upstream
x-dns-rs-a- dns.response.a The DNS A RRs in the response
records from upstream
x-dns-rs- dns.response.cname The DNS CNAME RRs in the
cname-records response from upstream
689
Advanced Secure Gateway Administration Guide
Category:
mapi
x-mapi-method The method associated with the
MAPI request
x-mapi-user- The distinguished name of the
dn user negotiated by MAPI
x-mapi-user The name of the user negotiated
by MAPI. See x-mapi-user-dn
for the fully distinguished
name.
x-mapi-cs- The count of RPC messages
rpc-count received from the client
x-mapi-sr- The count of RPC messages sent
rpc-count to the server
x-mapi-rs- The count of RPC messages
rpc-count received from the server
x-mapi-sc- The count RPC messages sent to
rpc-count the client
x-mapi- Total number of RPC messages
endpoint-rpc- sent to the end point
count
Category: mapi-http
(Version 6.6.4 and later) These fields pertain to Office 365 traffic.
x-mail- SMTP message identifier
message-id
690
Table 30–6 Access Log Formats
Category: p2p
x-p2p-client- Number of bytes from client
bytes
Category: packets
c-pkts-lost- Number of packets lost during
client transmission from server to
client and not recovered at the
client layer via error correction
or at the network layer via UDP
resends.
c-pkts-lost- Maximum number of
cont-net continuously lost packets on the
network layer during
transmission from server to
client
c-pkts-lost- Number of packets lost on the
net network layer
c-pkts- Number of packets from the
received server (s-pkts-sent) that are
received correctly by the client
on the first try
c-pkts- Number of packets repaired
recovered-ECC and recovered on the client
layer
c-pkts- Number of packets recovered
recovered- because they were resent via
resent UDP.
691
Advanced Secure Gateway Administration Guide
Category: req_rsp_line
cs-method method %m Request method used from
client to appliance
x-cs-http- http.method HTTP request method used
method from client to appliance. Empty
for non-HTTP transactions
cs-protocol client.protocol Protocol used in the client's
request
cs-request- http.request_line %r First line of the client's request
line
692
Table 30–6 Access Log Formats
693
Advanced Secure Gateway Administration Guide
Category: special_token
x-bluecoat- amp The ampersand character
special-amp
694
Table 30–6 Access Log Formats
Category: ssl
x-rs- server.certificate Hostname from the server's SSL
certificate- .hostname certificate
hostname
695
Advanced Secure Gateway Administration Guide
696
Table 30–6 Access Log Formats
Category: status
x-bluecoat- url.application. Reports the application name.
application- name
name
x-bluecoat- url.application. Reports the operation an
application- operation application.
operation
x-bluecoat- release.id The release ID of the Advanced
release-id Secure Gateway operating
system
x-bluecoat- release.version The release version of the
release- Advanced Secure Gateway
version operating system
x-http- The reason(s) the HTTP
noncacheable response was not cached
-reason
697
Advanced Secure Gateway Administration Guide
698
Table 30–6 Access Log Formats
699
Advanced Secure Gateway Administration Guide
700
Table 30–6 Access Log Formats
701
Advanced Secure Gateway Administration Guide
Category: streaming
audiocodec Audio codec used in stream.
avgbandwidth Average bandwidth (in bits per
second) at which the client was
connected to the server.
channelURL URL to the .nsc file
c-buffercount Number of times the client
buffered while playing the
stream.
c-bytes An MMS-only value of the total
number of bytes delivered to
the client.
c-cpu Client computer CPU type.
c-hostexe Host application
c-hostexever Host application version
number
c-os Client computer operating
system
c-osversion Client computer operating
system version number
c-playerid Globally unique identifier
(GUID) of the player
c- Client language-country code
playerlanguag
e
702
Table 30–6 Access Log Formats
703
Advanced Secure Gateway Administration Guide
704
Table 30–6 Access Log Formats
705
Advanced Secure Gateway Administration Guide
Category: url
cs-host %v Hostname from the client's
request URL. If URL rewrite
policies are used, this field's
value is derived from the 'log'
URL
cs-uri log_url %i The 'log' URL.
cs-uri- log_url.address IP address from the 'log' URL.
address DNS is used if URL uses a
hostname.
706
Table 30–6 Access Log Formats
707
Advanced Secure Gateway Administration Guide
708
Table 30–6 Access Log Formats
709
Advanced Secure Gateway Administration Guide
Category: user
cs-auth-group group One group that an
authenticated user belongs to. If
a user belongs to multiple
groups, the group logged is
determined by the Group Log
Order configuration specified in
VPM. If Group Log Order is not
specified, an arbitrary group is
logged. Note that only groups
referenced by policy are
considered.
710
Table 30–6 Access Log Formats
711
Advanced Secure Gateway Administration Guide
712
Table 30–6 Access Log Formats
713
Advanced Secure Gateway Administration Guide
Category: ci_request_header
cs(Accept) request.header.Acc Request header: Accept
ept
714
Table 30–6 Access Log Formats
715
Advanced Secure Gateway Administration Guide
716
Table 30–6 Access Log Formats
717
Advanced Secure Gateway Administration Guide
718
Table 30–6 Access Log Formats
719
Advanced Secure Gateway Administration Guide
720
Table 30–6 Access Log Formats
721
Advanced Secure Gateway Administration Guide
722
Table 30–6 Access Log Formats
723
Advanced Secure Gateway Administration Guide
724
Table 30–6 Access Log Formats
Category: si_response_header
725
Advanced Secure Gateway Administration Guide
726
Table 30–6 Access Log Formats
727
Advanced Secure Gateway Administration Guide
728
Table 30–6 Access Log Formats
729
Advanced Secure Gateway Administration Guide
730
Table 30–6 Access Log Formats
Category: WAF
x-bluecoat- Details on blocked requests per
waf-block- WAF policy.
details
x-bluecoat- Details on allowed requests per
waf-monitor- WAF policy.
details
731
Advanced Secure Gateway Administration Guide
732
Chapter 31: Statistics
733
Advanced Secure Gateway Administration Guide
734
g h e
b
a
Key:
a: View aggregated bandwidth usage or gain graphs and statistics. d
735
Advanced Secure Gateway Administration Guide
3. (Optional) Clear the Include bypassed bytes check box if you don't want to
include bypassed traffic in the graphs, statistics, and calculations; this would
allow you to get a clearer view of traffic that is intercepted.
4. To see the bandwidth rate of service/proxy traffic, select the BW Usage tab
(underneath the line graph).
The green area represents client data, the blue area is server data, and the
brown is bypassed bytes (if included).
5. To see how much bandwidth is gained due to optimization of server/proxy
traffic, select the BW Gain tab.
The line graph indicates the bandwidth gain due to optimizations, averaged
over the time interval, expressed as a multiple (for example, 2x means that
twice the amount of bandwidth is available).
6. Select the time period you are interested in from the Duration drop-down list.
The graphs and statistics automatically update to reflect the time period you
selected. Thereafter, the chart data automatically updates every 60 seconds.
Hover the mouse cursor over the chart data to view detailed values.
Figure 31–2 Traffic Mix Statistics— displayed when the cursor hovers over chart data
The values that display when you hover the mouse cursor over the chart data can
include:
❐ C = Client-side traffic data rate. This statistic represents the data rate calculated
(to and from the client) on the client–side connection. Data rate is represented
by units of bits per second (bps) from measurements that are sampled at one-
minute intervals. All application protocol-level bytes are counted, including
application-protocol overhead such as HTTP and CIFS headers.
❐ S= Server-side traffic data rate. This statistic represents the data rate
calculated (to and from the server) on the server–side connection. The data
rate is represented by units of bits per second (bps) from measurements that
are sampled at one-minute intervals. All application-level bytes are counted,
including application overhead such as HTTP and CIFS headers.
❐ B = Bypassed traffic data rate. This statistic reflects that data rate of bypassed
traffic (traffic that is not intercepted by Advanced Secure Gateway services).
The data rate is represented by units of bits per second (bps).
736
❐ Gain = Bandwidth Gain. This statistic, representing the overall bandwidth
benefit achieved by object and byte caching, compression, protocol
optimization, and object caching, is computed by the ratio:
client bytes / server bytes
737
Advanced Secure Gateway Administration Guide
738
When you include or exclude bypassed bytes, only the graph data and totals are
affected. The table data in the lower half of the page is not altered.
739
Advanced Secure Gateway Administration Guide
740
Section 2 Viewing Traffic History
The Traffic History report shows historical data about proxies and services; you
can select a particular proxy or service and then view its bandwidth usage, gain,
client bytes, and server bytes over different time periods.
b c
Key:
a: View traffic history statistics by service or by proxy.
b: Modify the historical reporting period.
c: Include or exclude bypassed bytes.
d: View totals for client bytes, server bytes, and bandwidth gain for the selected service
or proxy type.
e: Display charts for bandwidth usage, bandwidth gain, client bytes, and server bytes.
741
Advanced Secure Gateway Administration Guide
5. To view the average bandwidth gain and total client and server bytes for the
selected proxy/service during the specified time period, look at the statistics to
the left of the graph area.
6. If you are interested in other time periods or proxies/services, repeat the above
steps.
The graphs and statistics automatically update to reflect the time period and
proxy/service you selected. Thereafter, the chart data updates automatically
every 60 seconds.
Hover the mouse cursor over the chart data to view detailed values.
742
Section 3 Supported Proxies and Services
The Traffic History and Traffic Mix reports display data for the following proxy types
and services of these proxy types.
❐ "Supported Proxy Types" on page 743
❐ "Supported Services" on page 743
❐ "Unsupported Proxy Types" on page 744
• Windows Media
Supported Services
The following services are supported in the Traffic History and Traffic Mix reports:
743
Advanced Secure Gateway Administration Guide
• X Windows
Note: Endpoint Mapper proxy bytes are the result of Remote Procedure Call
(RPC) communication for MAPI traffic.
• SOCKS • Telnet
744
Section 4 Viewing the Application Mix Report
The Application Mix report shows a breakdown of the Web applications running
on the network. This report can give you visibility into which Web applications
users are accessing, the amount of bandwidth these applications are consuming,
and how much bandwidth is gained by optimization of Web applications over
different time periods. The report has three parts to it:
❐ Line graph showing aggregated bandwidth usage or gain (see "Viewing
Bandwidth Details for Web Applications" on page 746)
❐ Pie graph showing client/server byte distribution of Web applications (see
"Viewing Client/Server Byte Distribution for Web Applications" on page 747)
❐ Statistical table listing client/server bytes and savings for each Web
application (see "Viewing Application Statistics" on page 748)
c b
Key:
a: Modify the reporting time period.
b: View client- or server byte-distribution charts and statistics.
c: View aggregated bandwidth usage or gain graphs.
d: Review client bytes, server bytes, and bandwidth savings.
e: Review totals for client bytes, server bytes, and total savings.
Supported Applications
The Blue Coat WebFilter database contains a list of applications that it can
recognize; when a user enters a URL in a Web browser, BCWF identifies whether
it is one of the supported applications. The supported applications are then
included in the Application Mix report. Any URLs that are not associated with a
supported application are categorized as none, and are included in the
<Unidentified> slice in the pie chart.
745
Advanced Secure Gateway Administration Guide
Tip: To see a list of supported applications, display the Active Sessions report,
select the Application filter, and look at the application names on the drop-down
list. As new applications are supported, they will be updated in the BCWF
database and subsequently in the Application filter.
The values that display when you hover the mouse cursor over the chart data, are
called tool tips. These values can include:
746
❐ C = Client-side traffic data rate. This statistic represents the data rate calculated
(to and from the client) on the client–side connection. Data rate is represented
by units of bits per second (bps) from measurements that are sampled at one-
minute intervals. All application protocol-level bytes are counted, including
application-protocol overhead such as HTTP headers.
❐ S = Server-side traffic data rate. This statistic represents the data rate
calculated (to and from the server) on the server–side connection. The data
rate is represented by units of bits per second (bps) from measurements that
are sampled at one-minute intervals. All application-level bytes are counted,
including application overhead such as HTTP headers.
❐ Unopt = Unoptimized traffic data rate. This statistic reflects the data rate of
original traffic served to/from the client or server prior to or subsequent to
ADN optimization. The data rate is represented by units of bits per second
(bps).
❐ Opt = Optimized traffic data rate. This statistic reflects the data rate of ADN-
optimized traffic. Data rate is represented by units of bits per second (bps).
❐ Gain = Bandwidth Gain. This statistic, representing the overall bandwidth
benefit achieved by object and byte caching, compression, protocol
optimization, and object caching, is computed by the ratio:
client bytes / server bytes
747
Advanced Secure Gateway Administration Guide
748
Section 5 Viewing the Application History Report
The Application History report shows historical data about Web applications; you
can select a particular Web application and then view its bandwidth usage, gain,
client bytes, and server bytes over different time periods.
a b
d
c
Key:
a: View statistics for a particular Web application.
b: Modify the historical reporting period.
c: View totals for client and server bytes and the average bandwidth gain for the selected
application.
d: Display charts for bandwidth usage, bandwidth gain, client bytes, and server bytes.
749
Advanced Secure Gateway Administration Guide
5. To view the average bandwidth gain and total client and server bytes for the
selected application during the specified time period, look at the statistics to
the left of the graph area.
6. If you are interested in other time periods or applications, repeat the above
steps.
750
Section 6 Viewing System Statistics
The Statistics > System pages enable you to view:
❐ "Resources Statistics" on page 751
❐ "Contents Statistics" on page 754
❐ "Event Logging Statistics" on page 757
❐ "Failover Statistics" on page 758
Resources Statistics
The Resources tabs (CPU, Concurrent Users, Disk Use, and Memory Use) allow you to
view information about how the CPU, disk space and memory are being used,
and how disk and memory space are allocated for cache data. You can view data
allocation statistics through both the Management Console and the CLI, but disk
and memory use statistics are available only through the Management Console.
751
Advanced Secure Gateway Administration Guide
752
Viewing Disk Use Statistics
The Disk Use tab shows statistics about the Advanced Secure Gateway appliance
disk usage.
❐ System objects—Percentage of storage resources currently used for system
objects.
❐ Access logs—Percentage of storage resources currently used for access logs.
❐ Cache—Percentage of storage resources available for cache objects. This
statistic represents both cache that is in use and the remaining space for cache.
The total disk usage is the sum of the first two statistics: system objects usage and
the access logs usage. SNMP monitoring reports on this total for disk usage alerts;
for more information on SNMP monitoring, see Section C: "Monitoring Network
Devices (SNMP)" on page 1377.
The total disk installed is the sum of all three statistics: system objects usage,
access logs usage, and available cache.
753
Advanced Secure Gateway Administration Guide
Note: The Kernel attempts to maximize the number and lifetime of cache
buffers, but if needed, it will recover cache buffers using the LRU replacement
algorithm to satisfy a memory allocation request.
Contents Statistics
The Contents tabs (Distribution and Data) allow you to see information about objects
currently stored or served that are organized by size. The cache contents include
all objects currently stored by the Advanced Secure Gateway appliance. The cache
contents are not cleared when the appliance is powered off.
754
❐ Use Logarithmic Scale— Enables all cached objects with a wide range of values
to be represented in the graph. For example, the Advanced Secure Gateway
appliance might have one million cached objects of 1KB or less in size and
only 10 objects of 500kb or less in size. If the logarithmic scale is disabled,
larger objects might not be visible on the graph.
755
Advanced Secure Gateway Administration Guide
756
Event Logging Statistics
The event log contains all events that have occurred on the Advanced Secure
Gateway. Configure the level of detail available by selecting Maintenance > Event
Logging > Level (For details, see "Selecting Which Events to Log" on page 1367).
2. Click Log start or Log end or the forward and back arrow buttons to move
through the event list.
3. (Optional) Click the Poll for new events check box to poll for new events that
occurred while the log was being displayed.
757
Advanced Secure Gateway Administration Guide
Failover Statistics
At any time, you can view statistics for any failover group you have configured
on your system.
2. From the Failover Group drop-down list, select the group to view.
The information displayed includes the multicast address, the local address, the
state, and any flags, where V indicates that the group name is a virtual IP address,
R indicates that the group name is a physical IP address, and M indicates that this
machine can be configured to be the master if it is available.
758
Section 7 Active Sessions—Viewing Per-Connection Statistics
Viewing active sessions enables you to view detailed statistics about proxied
sessions, errored sessions, bypassed connections, and ADN inbound connections.
• Viewing the proxied sessions provides information for diagnostic
purposes.
• Viewing bypassed connections helps identify new types of traffic flowing
through the Advanced Secure Gateway appliance, as well as traffic flows
that would benefit from optimization.
• Viewing active ADN inbound connections provides information for
diagnostic purposes.
• Viewing errored sessions enables you to track details for troubleshooting.
For specific information, see "Analyzing Proxied Sessions" on page 760,
"Analyzing Bypassed Connections Statistics" on page 772, and "Viewing Errored
Sessions and Connections" on page 774.
Note: You can also view session statistics for ADN inbound connections, which is
described in "Reviewing ADN Active Sessions" on page 900.
See Also
❐ "Example Scenarios Using Active Sessions for Troubleshooting" on page 759
❐ "Analyzing Proxied Sessions" on page 760
❐ "Analyzing Bypassed Connections Statistics" on page 772
❐ "Viewing Errored Sessions and Connections" on page 774
759
Advanced Secure Gateway Administration Guide
Important: Use the statistics on the Proxied Sessions pages as a diagnostic tool
only. The Proxied Sessions pages do not display every connection running through
the Advanced Secure Gateway. This feature displays only the active sessions—one
client connection (or several), together with the relevant information collected
from other connections associated with that client connection. Because it displays
only open connections, you cannot use the data for reporting purposes.
The Proxied Sessions page displays statistics for the following protocols:
❐ Adobe HDS
❐ Adobe HLS
❐ CIFS
❐ Endpoint Mapper
❐ Flash
❐ FTP
❐ HTTP
❐ HTTPS Forward Proxy
❐ HTTPS Reverse Proxy
760
❐ MAPI
❐ MSRPC
❐ MS Smooth QuickTime
❐ Real Media
❐ SSL
❐ STunnel
❐ TCP Tunnel
❐ Websocket
❐ Windows Media
❐
3. Enter the appropriate information for the filter you have selected:
Filter Information to Enter
Application Select a Web application from the drop-down list. All
(For Proxy Edition supported applications appear on this list; this list will
license only) automatically populate with new applications as they are
added to the BCWF database. (Note that this requires that
your system downloads an updated BCWF database; by
default, your system will automatically check for
updates.)
Client Address Enter the client’s IP address or IP address and subnet
mask
Client Port Enter a client port number.
761
Advanced Secure Gateway Administration Guide
ICAP Select the ICAP service type from the drop-down list: Any,
(For Proxy Edition REQMOD, RESPMOD
license only)
Select the service name from the Service drop-down list.
Select the ICAP state from the Status drop-down list: Any,
transferring, deferred, scanning, completed
Notes:
• The ICAP filtering fields are optional. If you leave all
the options set to Any, all ICAP-enabled sessions are
listed.
• To see entries that represents a session instead of a
connection, you must expand that row (by clicking the
Client column) to see all the connections inside the
session.
Protocol Select a filter from the drop-down list.
Server Address Enter the IP address or hostname of the server. Hostname
filters automatically search for suffix matches. For
example, if you filter for example.com,
test.example.com is included in the results.
4. (Optional) To limit the number of connections to view, select Display the most
recent and enter a number in the results field. This optimizes performance
when there is a large number of connections.
5. (Optional) To view the current errored proxied sessions, select Show errored
sessions only. For more details, see "Viewing Errored Sessions and
Connections" on page 774.
6. Click Show.
762
For example, a CIFS session might report an error that was preventing it from
being accelerated. The administrator would then reconfigure some settings on the
client or server to fix the problem. After that, the administrator could terminate
the session on the Advanced Secure Gateway, which would force the client to
connect again and allow the new connection to be accelerated.
❐ Session and connection totals are displayed on the bottom left side of the
page.
The following table describes the per-column statistics and the various icons on
the Proxied Sessions page.
Table 31–1 Column and Icon Descriptions on the Proxied Sessions Page
763
Advanced Secure Gateway Administration Guide
Table 31–1 Column and Icon Descriptions on the Proxied Sessions Page (Continued)
764
Table 31–1 Column and Icon Descriptions on the Proxied Sessions Page (Continued)
765
Advanced Secure Gateway Administration Guide
Table 31–1 Column and Icon Descriptions on the Proxied Sessions Page (Continued)
766
Table 31–1 Column and Icon Descriptions on the Proxied Sessions Page (Continued)
767
Advanced Secure Gateway Administration Guide
HTTP
The tree view displays (as shown above) for HTTP if multiple hosts are contacted
during a session or if pipelining is used.
FTP
FTP uses multiple, concurrent connections. These are represented as separate
rows in the tree view, as shown in the following figure.
MMS
The active sessions feature displays MMS streams that have a client associated
with them. MMS streams that do not have a client associated with them
(multicast, content management requests, and so on) are not displayed. MMS
streams are displayed as follows:
768
❐ MMS UDP streams have two connections, one for data and one for control.
❐ MMS TCP streams have a single connection.
❐ MMS HTTP streams have a single connection.
For additional information about streaming connections, see "About MMS
Streaming Connections" on page 768.
ADN Tunnels
If the traffic is flowing through an ADN tunnel, the bytes are counted after ADN
optimization, meaning that compressed byte counts are displayed.
769
Advanced Secure Gateway Administration Guide
Aborted Downloads
In some cases, you might see the server bytes increasing even after the client has
closed the connection. This can occur when a client requests a large object and
aborts the download before receiving the entire object. The server bytes continue
to increase because the Advanced Secure Gateway is retrieving the object for
caching. You can change this behavior by enabling the bandwidth gain mode.
770
Viewing HTML and XML Views of Proxied Sessions Data
Access the following URLs to get HTML and XML views of active session
statistics:
❐ HTML: https://Proxy_IP:8082/AS/Sessions/
❐ XML: https://Proxy_IP:8082/AS/ProxiedConnections/xml
See Also
❐ "Analyzing Bypassed Connections Statistics"
❐ "Viewing Errored Sessions and Connections"
771
Advanced Secure Gateway Administration Guide
3. Enter the appropriate information for the filter you have selected:
Filter Information to Enter
Client Address Enter the client’s IP address or IP address and subnet
mask
Client Port Enter a client port number.
Server Address Enter the IP address or hostname of the server. Hostname
filters automatically search for suffix matches. For
example, if you filter for example.com, test.example.com
is included in the results.
Server Port Enter a server port number.
Service Select an enabled service from the drop-down list.
4. (Optional) To limit the number of connects to view, select Display the most recent
and enter a number in the results field. This helps optimize performance when
there is a large number of connections.
772
5. (Optional) To view the current errored bypassed connections, select Show
errored sessions only. For more details, see See "Viewing Errored Sessions and
Connections" on page 774.
6. Click Show.
Note the following:
❐ Unavailable connections (gray) indicate connections that are now closed.
❐ Previously-established connections displayed with (<--?-->) text indicate that
the direction of these connections is unknown.
❐ One-way connections are displayed in color.
773
Advanced Secure Gateway Administration Guide
❐ HTML: https://Proxy_IP:8082/AS/BypassedConnections/
❐ XML: https://Proxy_IP:8082/AS/BypassedConnections/xml
See Also
❐ "Active Sessions—Viewing Per-Connection Statistics"
❐ "Example Scenarios Using Active Sessions for Troubleshooting"
❐ "About the Proxied Sessions Statistics"
❐ "Analyzing Proxied Sessions"
❐ "Viewing Errored Sessions and Connections"
774
ICAP Select the type of service from the drop-down list: Any,
(For Proxy Edition REQMOD, RESPMOD
license only)
Select the service name from the Service drop-down list.
Select the ICAP state from the Status drop-down list: Any,
transferring, deferred, scanning, completed
Note: The ICAP filtering fields are optional. If you leave
all the options set to Any, all ICAP-enabled sessions will be
listed.
The ICAP filter is available for proxied sessions only.
Proxy Select a proxy from the drop-down list.
Proxy filter is available for proxied sessions only.
Server Address Enter the IP address of server.
Server Port Enter a server port number.
Service Select a service from the drop-down list.
Service is not available for ADN inbound connections.
Peer Address Enter the IP address of peer.
Peer address is available for ADN inbound connections
only.
4. (Optional) To limit the number of connections to view, select Display the most
recent and enter a number in the results field.
5. Click Show.
6. Scroll to the right to display the Detail column and view error details. To sort
by error type, click the Detail column header. The Age column displays how
long it has been since that session ended.
775
Advanced Secure Gateway Administration Guide
See Also
❐ "Active Sessions—Viewing Per-Connection Statistics"
❐ "Example Scenarios Using Active Sessions for Troubleshooting"
❐ "Analyzing Proxied Sessions"
❐ "About the Proxied Sessions Statistics"
❐ "Analyzing Bypassed Connections Statistics"
❐ "Reviewing ADN Active Sessions"
ADN History
The Statistics > ADN History pages allow you to view either usage statistics or gain
statistics and either unoptimized bytes or optimized bytes through the ADN
History tab. For more information about these statistics, see "Reviewing ADN
History" on page 898.
SG Client Statistics
The Statistics > SG Client History pages display the SG Client Manager statistics.
Refer to the ProxyClient Configuration and Deployment Guide for more information
about these statistics.
776
Content Analysis
The Statistics > Content Analysis page displays the history for all proxied traffic
that match ICAP policy. This includes both request and response modifications,
internal and external Content Analysis appliances, (internal Content Analysis is
only available in Advanced Secure Gateway appliance deployments) secure or
plain requests, and deferred and queued connections.
Graph information can report on individual Content Analysis services or service
groups.
The tabs at the bottom of this page allow you to examine Content Analysis traffic
currently being processed, (Active Requests) traffic that has completed
processing, (Completed Requests) as well as Connection and Byte history.
WCCP Statistics
The Statistics > Network > WCCP page displays whether WCCP is enabled and
displays the number of packets redirected by the Advanced Secure Gateway,
status of the configured service groups including details on the Here I am, I see you
and the number of redirect assign messages sent to the routers in the group by the
Advanced Secure Gateway. See "Viewing WCCP Statistics and Service Group
Status" on page 794 for more information.
Protocol Statistics
The Statistics > Protocol Details pages provide statistics for the protocols serviced by
the Advanced Secure Gateway. These statistics should be used to compliment the
statistics in the Traffic History and Traffic Mix pages.
The descriptions of these statistics are located in the proxy services to which they
pertain. The following list provides a listing of these statistics and describes where
to find additional information.
❐ CIFS History
The Statistics > Protocol Details > CIFS History pages enable you view statistics for
CIFS objects, CIFS bytes read, CIFS bytes written, and CIFS clients. See
"Reviewing CIFS Protocol Statistics" on page 313 for more information about
these statistics.
❐ HTTP/FTP History
The Statistics > Protocol Details > HTTP/FTP History pages enable you view
statistics for HTTP/HTTPS/FTP objects, HTTP/HTTPS/FTP bytes, HTTP/
HTTPS/FTP clients, client compression gain, and server compression gain.
See "Viewing FTP Statistics" on page 293 and "Understanding HTTP
Compression" on page 205 for more information about these statistics.
For HTTP/FTP bandwidth usage statistics, see the Traffic Mix and Traffic History
pages.
❐ IM History
The Statistics > Protocol Details > IM History pages enable you view statistics for
IM connection data, IM activity data, and IM clients.
777
Advanced Secure Gateway Administration Guide
❐ MAPI History
The Statistics > Protocol Details > MAPI History pages enable you view statistics for
MAPI client bytes read, MAPI client bytes written, and MAPI clients. See
"Reviewing Endpoint Mapper Proxy Statistics" on page 324 for more
information about these statistics.
For MAPI bandwidth usage statistics, see the Traffic Mix and Traffic History
pages.
❐ P2P History
The Statistics > Protocol Details > P2P History pages enable you view statistics for
P2P data, P2P clients, and P2P bytes. Refer to the P2P information in the Visual
Policy Manager Reference for more information about these statistics.
❐ Shell History
The Statistics > Protocol Details > Shell History pages enable you view statistics for
shell clients. See "Viewing Shell History Statistics" on page 312 for more
information about these statistics.
❐ SOCKS History
The Statistics > Protocol Details > SOCKS History pages enable you view statistics
for SOCKS clients, SOCKS connections, client compression gain, and server
compression gain. See "Viewing SOCKS History Statistics" on page 303 for
more information about these statistics.
❐ SSL History
The Statistics > Protocol Details > SSL History pages enable you view statistics for
unintercepted SSL data, unintercepted SSL clients, and unintercepted SSL
bytes. See "Viewing SSL History Statistics" on page 245 for more information
about these statistics.
❐ Streaming History
The Statistics > Protocol Details > Streaming History pages enable you view
statistics for Windows Media, Real Media, QuickTime, current streaming data,
total streaming data, and bandwidth gain. See "Viewing Streaming History
Statistics" on page 571 for more information about these statistics.
For MMS bandwidth usage statistics, see the Traffic Mix and Traffic History
pages.
778
Health Check Statistics
Use the Statistics > Health Checks page to view the state of various health checks:
whether the health check is enabled or disabled, if it is reporting the device or
service to be healthy or sick, or if errors are being reported. See Chapter 72:
"Verifying the Health of Services Configured on the Advanced Secure Gateway"
on page 1411 for more information.
Access Logging
The Statistics > Access Logging pages enable you to view the log tail, log size, and
upload status of the access log. See "Viewing Access-Log Statistics" on page 634
for more information.
Advanced URLs
The Statistics > Advanced tab provides a list of Advanced URLs. Blue Coat Technical
Support might direct you to these links to provide additional information during
troubleshooting.
779
Advanced Secure Gateway Administration Guide
780
Chapter 32: WCCP Configuration
Note: WCCP is supported for the default routing domain only. You cannot
configure WCCP for multiple routing domains (introduced in version 6.6.2.x).
781
Advanced Secure Gateway Administration Guide
Service Groups
A service group unites one or more routers/switches with one or more Advanced
Secure Gateway appliances in a transparent redirection scheme governed by a
common set of rules. The service group members agree on these rules by
announcing their specific capabilities and configuration to each other in WCCP
protocol packets. When creating a service group on the Advanced Secure
Gateway appliance, you define the following:
❐ "Home Router Address" on page 782
❐ "Service Group Authentication" on page 783
❐ "Packet Forward and a Return Methods" on page 783
❐ "Router Affinity" on page 784
❐ "Assignment Types" on page 784
❐ "WCCP Load Balancing" on page 785
782
Service Group Authentication
If you are using WCCP v2, you can secure a service group by configuring an MD5
authentication between the Advanced Secure Gateway appliances and the routers
in the group. To configure authentication, you must define the same password on
all routers and all Advanced Secure Gateway appliances in the service group.
When authentication is enabled, a Advanced Secure Gateway appliance is not
allowed to join the service group unless it knows the password.
783
Advanced Secure Gateway Administration Guide
Note: The Advanced Secure Gateway appliance does not support GRE
forwarding and L2 packet return. If you configure this combination, the
Advanced Secure Gateway appliance will generate a capability mismatch error. To
view the errors and warnings, click the WCCP Status button in the Configuration>
Network> WCCP tab or use the CLI command show wccp status.
Router Affinity
By default, the Advanced Secure Gateway appliance uses the configured return
method to return bypassed traffic to the router that redirected it and uses regular
routing table lookups to determine the next hop for intercepted traffic. With
router affinity, the Advanced Secure Gateway appliance also uses the configured
return method to return intercepted client- and/or server-bound traffic to the
WCCP router that redirected it, bypassing the routing table lookup. This is a
useful feature if you have routing policies that may prevent your client- and/or
server-bound traffic from reaching its destination and simplifies the Advanced
Secure Gateway appliance configuration process by eliminating the need to
replicate these policies on the Advanced Secure Gateway appliance. It is also
useful in configurations where you have multiple home routers or where your
WCCP router is multiple hops away from the Advanced Secure Gateway
appliance because it ensures that the traffic is always returned to the same WCCP
router that redirected it. Keep in mind, however, that enabling this feature
unnecessarily when using GRE return does add additional CPU overhead on the
router due to the need to decapsulate the GRE packets. In addition, the Advanced
Secure Gateway appliance and the router use a reduced maximum transmission
unit (MTU) for GRE packets, which reduces the amount of data that can be
transferred per packet.
Assignment Types
For every service group, you must configure the way the router determines the
Advanced Secure Gateway appliance to which to redirect a given packet, by
setting an assignment type on the Advanced Secure Gateway appliance. When the
service group is formed, the Advanced Secure Gateway appliance with the lowest
IP address automatically becomes the designated cache (and if there is only one
Advanced Secure Gateway appliance in the service group, it is automatically the
designated cache). The designated cache is responsible for communicating the
assignment settings to the router, that is which Advanced Secure Gateway
appliance should be assigned a particular packet.
The Advanced Secure Gateway appliance supports two assignment types:
784
❐ Hash Assignment (Default): With hash assignment, the designated cache
assigns each Advanced Secure Gateway appliance in the service group a
portion of a 256-bucket hash table and communicates the assignment to the
routers in the group. When the router receives a packet for redirection, it runs
the hashing algorithm against one or more of the fields in the packet header to
determine the hash value. It then compares the value to the hash assignment
table to see which Advanced Secure Gateway appliance is assigned to the
corresponding bucket and then forwards the packet to that appliance. When
you configure the service group on the Advanced Secure Gateway appliances,
you specify which field(s)—destination IP address, destination port, source IP
address, and/or source port—should be used to calculate the hash value.
In some cases, since all of the packets are hashed using the same fields and
algorithm, it is possible that one of the caches in the group can become
overloaded. For example, if you have a large proportion of traffic that is
directed to the same server and you are using the destination IP address to
run the hashing function, it is possible that the bulk of the traffic will be
redirected to the same Advanced Secure Gateway appliance. Therefore, you
can configure an alternate field or group of fields to use to run the hashing
algorithm. The router will then use this alternate hashing algorithm if the
number of GRE packets or MAC addresses (depending on the forwarding
method you’re using) redirected to a given Advanced Secure Gateway
appliance exceeds a certain number.
For details on configuring a hash-weight value to adjust the proportion of the
hash table that gets assigned to a Advanced Secure Gateway appliance, see
"WCCP Load Balancing" below.
❐ Mask Assignment: With mask assignment, each router in the service group
has a table of masks and values that it uses to distribute traffic across the
Advanced Secure Gateway appliances in the service group. When the router
receives a packet, it performs a bitwise AND operation between the mask
value and the field of the packet header that is designated in the Advanced
Secure Gateway appliance mask assignment configuration. It then compares
the result against its list of values for each mask; each value is assigned to a
specific Advanced Secure Gateway appliance in the service group.
785
Advanced Secure Gateway Administration Guide
786
Section 1 Configuring WCCP on the Advanced Secure Gateway
Appliance
You must configure the required WCCP settings on the participating routers
before proceeding with this section.
Use the procedures in this section to perform the following tasks:
❐ "Creating the WCCP Configuration on the Advanced Secure Gateway
Appliance" on page 787.
❐ "Modifying the WCCP Configuration" on page 792.
❐ "Disabling WCCP" on page 793.
787
Advanced Secure Gateway Administration Guide
Note: If you select version 1.0, you can only configure a single web-cache
service group. The web-cache service group is a well-defined service group
that intercepts all TCP traffic on destination port 80. When configuring a
web-cache service group, you must select an interface to which apply the
service group and define a single home router. You can optionally enable
router affinity. See "Router Affinity" on page 784 for more information on this
setting.
5. To create a service group, click New. The New Service dialog displays.
788
7. Apply the service group to one or more physical or a virtual interfaces.
a. Select a value from the Interface drop-down menu. Virtual interfaces
are depicted as adapter:interface.vlan id, for example, 0:0.3.
b. (Optional) Enter the Weight value for this interface. This value
determines the proportion of traffic that the router redirects to this
interface. The weight value can range from 1 to 255 inclusive.
Use this field only if you are redirecting traffic in the same service
group to multiple interfaces or to multiple Advanced Secure Gateway
appliances and you want to allocate the percentage of traffic redirected
to each Advanced Secure Gateway appliance and/or interface in the
service group.
c. To add additional interfaces on this Advanced Secure Gateway
appliance to the service group, click Add Interface and then repeat steps
a and b.
789
Advanced Secure Gateway Administration Guide
9. Define how the router and the Advanced Secure Gateway appliance handle
packet forwarding and return:
a. Select a Forwarding Type — Generic Routing Encapsulation (GRE) or
Layer 2 forwarding (L2). For a description of these options, see "Packet
Forward and a Return Methods" on page 783.
b. Select a Returning Type. Only applicable if you select L2 forwarding. For
the GRE forwarding method, the Advanced Secure Gateway appliance
only supports GRE return.
c. (Optional) If you want to ensure that intercepted traffic is always
routed through the WCCP router that redirected it, select a Router
affinity value:
790
• If you select the Hash assignment type (the default), you can select one or
more fields to use as the Primary Hash. Additionally, you can optionally
select one or more fields to use as the Alternate Hash The alternate hashing
function is used to distribute traffic when a particular Advanced Secure
Gateway appliance exceeds a given number of redirected packets.
• If you select the Mask assignment type, select which field in the packet header
to use to run the mask function. Enter a Mask Value in either decimal or, when
prefixed by 0x, a hexadecimal value. The default value for this field is 0x3f.
The following Cisco Web page describes the Mask Value in detail:
http://www.cisco.com/en/US/prod/collateral/switches/ps5718/
ps708/white_paper_c11-629052.html
1. Click OK to save the service group settings. If you want to add another service
group, repeat Steps 5 through 1.
2. To save the WCCP settings, click Apply.
3. In the Install WCCP Settings panel, select the location of the configuration file: a
remote URL, a local file, or use the text editor on the system.
791
Advanced Secure Gateway Administration Guide
4. Click Install.
If you selected Remote URL or Local File, a dialog opens that allows you to enter
the complete path, and the file is retrieved. If you selected Text Editor, the text
editor displays with the current settings. You can copy and paste the contents
of an existing configuration file or you can enter new text and click Install
when finished.
The following shows an example WCCP configuration:
wccp enable
wccp version 2
service-group 9
forwarding-type L2
returning-type GRE
router-affinity both
assignment-type mask
mask-scheme source-port
priority 1
protocol 6
service-flags ports-defined
ports 80 21 1755 554 0 0 0 0
interface 0:0
home-router 10.16.18.2
end
For descriptions of the settings in the configuration file, refer to the WCCP
Reference Guide.
5. (Optional): View the WCCP settings that are currently on the system or view
the text file with the current settings by clicking WCCP Settings or WCCP Source.
6. Click Apply to save the changes.
792
2. Select the service group to modify.
3. Click Edit. The Edit Service dialog displays.
4. Perform the changes. You can edit any value except for the service group
number.
5. Click OK.
6. Click Apply to save your changes.
Disabling WCCP
To exclude a Advanced Secure Gateway appliance from receiving traffic or from
participating in any of the services groups configured on it, you can disable
WCCP on the Advanced Secure Gateway appliance. Disabling WCCP does not
delete the WCCP configuration settings, it places them out-of-service until WCCP
is re-enabled on the Advanced Secure Gateway appliance.
793
Advanced Secure Gateway Administration Guide
Statistic Description
Last Refresh The date and time the displayed statistics were last refreshed. Click Refresh
WCCP Statistics to refresh them now.
GRE Redirected Packets The number of packets that have been redirected using GRE forwarding.
Layer-2 Redirected The number of packets that have been redirected using L2 forwarding.
Packets
Services Groups Lists the service groups that have been configured on this Advanced
Secure Gateway appliance. If the group has successfully formed, you can
click the arrow next to the group to see a list of the caches (Advanced
Secure Gateway appliances) and routers that have joined the group.
State Shows the service group state. See Table 17–1 for a description of each state.
Here I Am Sent The number of HERE_I_AM messages that this Advanced Secure Gateway
appliance has sent to the routers in the group.
I See You Received The number of I_SEE_YOU messages that this Advanced Secure Gateway
appliance has received from the routers in the group.
Redirect Assign Sent The number of REDIRECT_ASSIGN messages that this Advanced Secure
Gateway appliance has sent to the routers in the group. The
REDIRECT_ASSIGN message contains the hash table or mask values table
that the router will use to determine which Advanced Secure Gateway
appliance to redirect packets to. Only the designated cache—the cache with
the lowest IP address—sends REDIRECT_ASSIGN messages.
794
Monitoring the Service Group States
The Advanced Secure Gateway appliance maintains state information on the
configured service groups. The state of a service group helps you monitor
whether the service group was configured properly and on how it is functioning.
To view the state of the service groups you have configured, see Statistics > Network
> WCCP
Table 17–1 lists and describes each service group state.
Table 32–1 WCCP Service Group States
State Description
Assignment The router does not support the assignment type (hash or mask) that is
mismatch configured for the service group.
Bad router id The home-router specified in the service group configuration does not match
the actual router ID.
Bad router view The list of Advanced Secure Gateway appliances in the service group does not
match.
Capability mismatch The WCCP configuration includes capabilities that the router does not support.
Initializing WCCP was just enabled and the Advanced Secure Gateway appliance is getting
ready to send out its first HERE_I_AM message.
Interface link is down The Advanced Secure Gateway appliance cannot send the HERE_I_AM
message because the interface link is down.
Negotiating The Advanced Secure Gateway appliance received the I_SEE_YOU message
assignment from the router but has not yet negotiated the service group capabilities.
Negotiating The Advanced Secure Gateway appliance sent the HERE_I_AM message and is
membership waiting for an I_SEE_YOU message from the router.
Packet forwarding The router does not support the forwarding method (GRE or L2) that is
mismatch configured for the service group.
Packet return The router does not support the return method (GRE or L2) that is configured
mismatch for the service group. Note that on the Advanced Secure Gateway appliance,
the return method is always the same as the forwarding method.
Ready The service group formed successfully and the Advanced Secure Gateway
appliance sent the REDIRECT_ASSIGN message to the router with the hash or
mask values table.
Service group The router and the Advanced Secure Gateway appliance have a mismatch in
mismatch port, protocol, priority, and/or other service flags.
Security mismatch The service group passwords on the router and the Advanced Secure Gateway
appliance do not match.
795
Advanced Secure Gateway Administration Guide
796
Chapter 33: TCP/IP Configuration
This chapter describes the TCP/IP configuration options, which enhance the
performance and security of the Advanced Secure Gateway appliance. Except
for IP Forwarding, these commands are only available through the CLI.
797
Advanced Secure Gateway Administration Guide
RFC-1323
The RFC-1323 TCP/IP option enables the Advanced Secure Gateway appliance to
use a set of extensions to TCP designed to provide efficient operation over large
bandwidth-delay-product paths and reliable operation over very high-speed
paths, including satellite environments. RFC-1323 support can be configured
through the CLI and is enabled by default.
TCP NewReno
NewReno is a modification of the Reno algorithm. TCP NewReno improves TCP
performance during fast retransmit and fast recovery when multiple packets are
dropped from a single window of data. TCP NewReno support is enabled by
default.
798
For example, disabling the ICMP timestamp echo commands prevents an attack
that occurs when the Advanced Secure Gateway appliance responds to an ICMP
timestamp request by accurately determining the target's clock state, allowing an
attacker to more effectively attack certain time-based pseudo-random number
generators (PRNGs) and the authentication systems on which they rely.
This setting is disabled by default.
799
Advanced Secure Gateway Administration Guide
800
2. Determine the behavior of the concentrator proxy when a branch proxy
requests client IP reflection (sending the client's IP address instead of the
ProxySG IP address to the upstream server).
This setting is based on whether the concentrator was installed inline. If the
concentrator proxy is inline and can do IP reflection, you can allow client IP
address reflection requests from clients. If not, set this option to either Reject
the Request or Allow the request but connect using a local IP to accept the requests
but ignore the client IP address and use a local IP address.
3. TCP window size is the number of bytes that can be buffered on a system before
the sending host must wait for an acknowledgement from the receiving host.
The TCP window size for ADN optimization tunnel connections is set and
updated automatically, based on current network conditions and on the
receiving host’s acknowledgement. In most situations, the TCP Settings option
should be left as Automatically adjusted.
Only use the Manual override setting if your network environment has
intervening network equipment that makes the delay appear lower than it
actually is. These environments are sometimes found on satellite links that
have high bandwidth and high delay requirements. In this case, the
automatically adjusted window size would be smaller than optimal.
The configurable range is between 8 Kb and 4 MB (8192 to 4194304),
depending on your bandwidth and the round-trip delay. Setting sizes below
64Kb are not recommended.
801
Advanced Secure Gateway Administration Guide
Note: If you know the bandwidth and round-trip delay, you can compute
the value to use as, roughly, 2 * bandwidth * delay. For example, if the
bandwidth of the link is 8 Mbits/sec and the round-trip delay is 0.75
seconds:
window = 2 * 8 Mbits/sec * 0.75 sec = 12 Mbits = 1.5 Mbytes
The setting in this example would be 1500000 bytes. This number goes up
as either bandwidth or delay increases, and goes down as they decrease.
You can decrease or increase the window size based on the calculation;
however, decreasing the window size below 64Kb is not recommended..
The window-size setting is a maximum value; the normal TCP/IP
behaviors adjust downward as necessary. Setting the window size to a
lower value might result in an artificially low throughput.
where seconds is the length of time you chose for the 2MSL value. Valid
values are 1 to 16380 inclusive.
802
The TCP loss recovery mode is set to Normal by default. Blue Coat recommends
that you consider non-normal loss modes — enhanced or aggressive, only when
you experience packet losses of 0.5% or greater. For quickly estimating packet
losses between two endpoints in your network, you can run a continuous, non-
flooding, ping for a couple minutes and record the reported loss.
Blue Coat does not recommend modifying the loss recovery mode to Aggressive
unless your network has demonstrated an improvement in the Enhanced mode.
Aggressive mode may not provide further improvement, and in some instances it
could worsen network performance. For additional information and guidance,
contact Blue Coat Technical Support.
If you reconfigure the TCP loss recovery mode, you must configure the TCP
window size that is appropriate for the link. A good rule is to set the window size
to bandwidth times round-trip delay. For example, a 1.544Mbps link with a 100ms
round-trip time would have a window size of 19,300 bytes.
The bandwidth and round-trip times can be determined from link characteristics
(such as from the ISP) or observations (such as ping usage).
803
Advanced Secure Gateway Administration Guide
804
Chapter 34: Routing on the Advanced Secure Gateway
Appliance
This chapter explains how the Advanced Secure Gateway appliance delivers
packets and describes the features you can use to optimize packet delivery.
805
Advanced Secure Gateway Administration Guide
806
Section 1 Distributing Traffic Through Multiple Default Gateways
You can distribute traffic originating at the Advanced Secure Gateway appliance
through multiple default gateways and fine tune how the traffic is distributed.
This feature works with any routing protocol.
By using multiple gateways, an administrator can assign a number of available
gateways into a preference group and configure the load distribution to the
gateways within the group. Multiple preference groups are supported.
In a mixed IPv4/IPv6 environment, you need to define two default gateways: one
for IPv4 and one for IPv6.
The specified gateway applies to all network adapters in the system.
Note: Load balancing through multiple gateways is independent from the per-
interface load balancing the Advanced Secure Gateway appliance automatically
does when more than one network interface is installed.
807
Advanced Secure Gateway Administration Guide
808
Configuring IP Forwarding
IP Forwarding is a special type of transparent proxy. The Advanced Secure
Gateway appliance is configured to act as a gateway and is configured so that if a
packet is addressed to the Advanced Secure Gateway appliance adapter, but not
its IP address, the packet is forwarded toward the final destination. If IP
forwarding is disabled, the packet is rejected as being mis-addressed.
By default, IP forwarding is disabled to maintain a secure network.
To enable IP forwarding:
1. Select Configuration > Network > Routing > Gateways.
2. Select the Enable IP forwarding check box at the bottom of the pane.
3. Click OK; click Apply.
809
Advanced Secure Gateway Administration Guide
Outbound Routing
By default, the Advanced Secure Gateway appliance sends outbound traffic to the
default gateway unless one of the following is used (in order of precedence):
❐ The Trust Destination MAC feature, which is used when the Advanced Secure
Gateway appliance is in transparent bridging mode (unless certain other
conditions are true—see "About Trust Destination MAC" on page 810).
❐ A static route, if one is defined.
For more information, see "About Static Routes" on page 811.
❐ The outbound Return-to-Sender (RTS) feature.
For more information, see "Using Return-to-Sender (RTS)" on page 813.
❐ An interface route, if the device is on the same subnet as the Advanced Secure
Gateway appliance.
The appliance automatically adds an interface route to the routing table for
hosts on the same subnet as the Advanced Secure Gateway appliance
interface. The interface route maps the subnet to the interface. The Advanced
Secure Gateway appliance can then do an ARP lookup for those hosts and
send the packets directly to the client’s MAC address.
Inbound Routing
By default, the Advanced Secure Gateway appliance sends inbound traffic to the
default gateway unless one of the following is used (in order of precedence):
❐ A static route, if one is defined.
For more information, see "About Static Routes" on page 811.
❐ The inbound RTS feature. Inbound RTS is enabled by default.
For more information, see "Using Return-to-Sender (RTS)" on page 813.
❐ An interface route, if the device is on the same subnet as the Advanced Secure
Gateway appliance.
810
appliance. This feature is called Trust Destination MAC. It is enabled by default
when the Advanced Secure Gateway appliance is in transparent bridging mode
and cannot be disabled.
Trust Destination MAC eliminates the need to create static routes and circumvents
any routing issues encountered when the information in a packet is not sufficient
for the Advanced Secure Gateway appliance to make a routing decision.
Note: Trust Destination MAC uses only the first client SYN packet to determine
the MAC address and outgoing interface and continues to use this information
even if the destination MAC address is not responding. To work around this
limitation, enable outbound RTS, as described in "Using Return-to-Sender (RTS)"
on page 813.
811
Advanced Secure Gateway Administration Guide
Note that a routing table can contain a combination of IPv4 and IPv6 entries, but
the gateway for each destination must be on the appropriate network type. For
example, an IPv6 destination must use an IPv6 gateway.
When a routing table is installed, all requested URLs are compared to the list and
routed based on the best match.
You can install the routing table several ways.
❐ Using the Text Editor, which allows you to enter settings (or copy and paste
the contents of an already-created file) directly onto the appliance.
❐ Creating a local file on your local system; the Advanced Secure Gateway
appliance can browse to the file and install it. See "Installing a Routing Table"
on page 812.
❐ Using a remote URL, where you place an already-created file on an FTP or
HTTP server to be downloaded to the Advanced Secure Gateway appliance.
Use the static-routes path command to set the path and the load static-
route-table command to load the new routing table.
812
Note: If you use URL host rewrite functionality in your policies, mismatches can
occur between the client-provided IP address and the resolved, rewritten
hostname. In these cases, a routing lookup is performed and an interface route,
static route, or default route is used.
Routing Domains
(Introduced in version 6.6.2.1) Routing Domains provide a facility to segregate
source and gateway networks on a single appliance. For more information on this
CLI-based configuration option, refer to the document Creating Multiple Logical
Networks on a Single Appliance with Routing Domains.
813
Advanced Secure Gateway Administration Guide
RTS can be configured in two ways, inbound or outbound. These two options can
be enabled at the same time.
Inbound RTS affects connections initiated to the Advanced Secure Gateway
appliance by clients and is enabled by default. Inbound RTS configures the
Advanced Secure Gateway appliance to send SYN-ACK packets to the same
interface that the SYN packet arrived on. All subsequent TCP/IP response
packets are also sent to the same interface that received the request packet.
RTS inbound applies only to clients who are on a different subnet than the
Advanced Secure Gateway appliance. If clients are on the same subnet, interface
routes are used.
814
Phase One Phase Two
Inbound RTS
Process Flow
1. Client A sends SYN to Server C across the WAN. The SYN is intercepted on the appliance B
interface 0:1.
2. The Advanced Secure Gateway appliance maps Client A to interface 0:1. All packets to Client
A will now go to interface 0:1.
3. When a packet arrives for Client A, the appliance checks its interface mapping and sends the
packet to the client over interface 0:1.
815
Advanced Secure Gateway Administration Guide
Enabling Return-to-Sender
To enable RTS, use the return-to-sender command. For example:
#(config) return-to-sender inbound {disable | enable}
816
DNS Verification
In transparent deployments, the Advanced Secure Gateway appliance verifies the
destination IP addresses provided by the client. This is known as L2/L3
transparency.
Note: The Trust Destination IP option overrides DNS verification. This option is
recommended for acceleration deployments only. For more information about
this option, see "About Trusting the Destination IP Address Provided by the
Client" on page 144.
For hostname-less protocols such as CIFS and FTP, the IP address can always be
trusted. For other protocols, such as HTTP, RTSP, and MMS, which have a
hostname that must be resolved, verification can be an issue. URL rewrites that
modify the hostname also can cause verification to fail.
L2/L3 transparency is not supported in explicit proxy deployments, or if the
destination IP addresses cannot be verified by the Advanced Secure Gateway
appliance. In these cases, you must configure static routes to hosts that are only
accessible through gateways other than the default gateway.
Note: IM is not supported with trust client addressing. To support IM, proper
routes must be configured for Internet access and IM client-to-client
communication.
817
Advanced Secure Gateway Administration Guide
818
Chapter 35: Configuring Failover
Using IP address failover, you can create a redundant network for any explicit
proxy configuration. If you require transparent proxy configuration, you can
create software bridges to use failover. For information on creating software
bridges, see "Configuring a Software Bridge" on page 1312.
Note: If you use the Pass-Through adapter for transparent proxy, you must
create a software bridge rather than configuring failover. For information on
using the Pass-Through adapter, see "About the Pass-Through Adapter" on
page 1310.
About Failover
Failover allows a second machine to take over if a first machine (not just an
interface card) fails, providing redundancy to the network through a master/
slave relationship. In normal operations, the master (the machine whose IP
address matches the group name) owns the address. The master sends keep
alive messages (advertisements) to the slaves. If the slaves do not receive
advertisements at the specified interval, the slave with the highest configured
priority takes over for the master. When the master comes back online, the
master takes over from the slave again.
The Blue Coat failover implementation resembles the Virtual Router
Redundancy Protocol (VRRP) with the following exceptions:
❐ A configurable IP multicast address is the destination of the
advertisements.
❐ The advertisement interval is included in protocol messages and is learned
by the slaves.
❐ A virtual router identifier (VRID) is not used.
❐ Virtual MAC addresses are not used.
❐ MD5 is used for authentication at the application level.
819
Advanced Secure Gateway Administration Guide
820
Section 1 Configuring Failover Groups
Configuring failover groups is necessary to enable network redundancy on the
Advanced Secure Gateway appliance.
Failover is enabled by completing the following tasks:
❐ Creating virtual IP addresses on each Advanced Secure Gateway appliance.
❐ Creating a failover group.
❐ Attach the failover group to the bridge configuration.
❐ Selecting a failover mode (parallel or serial - this can only be selected using
the CLI).
Important: Configuring failover groups will not, in and of itself, enable failover
in your Advanced Secure Gateway appliance deployment. For additional
information on configuring failover as well as conceptual information, see
Chapter 35: "Configuring Failover" on page 819.
You also must decide which machine is the master and which machines are the
slaves, and whether you want to configure explicit proxy or transparent proxy
network.
When configuring the group, the master and all the systems in the group must
have exactly the same failover configuration except for priority, which is used to
determine the rank of the slave machines. If no priority is set, a default priority of
100 is used. If two appliances have equal priority, the one with the highest local IP
address ranks higher.
To configure failover:
1. Select the Configuration > Network > Advanced > Failover tab.
2. Click New. The Add Failover Group dialog displays.
821
Advanced Secure Gateway Administration Guide
4a
4b
4c
4d
822
Section 2 Viewing Failover Statistics
At any time, you can view statistics for any failover group you have configured
on your system.
823
Advanced Secure Gateway Administration Guide
Troubleshooting
An indication that there may be issues with the election of a master is if
advertisements are not being sent or received by either of the systems in a failover
group.
To troubleshoot, view statistics in the command line interface:
#(config)failover
#(config failover)view statistics
Failover Statistics
Advertisements Received : 0
Advertisements Sent : 0
States Changes : 0
Bad Version : 0
Bad Packet : 0
Bad Checksum : 0
Packet Too Short : 0
Bad Packet Header : 0
Invalid Group : 0
#(config failover)
If the statistics illustrate there may be a potential issue, debug further by running
a PCAP on each Advanced Secure Gateway appliance to verify the multicast
packets are actually being sent. If not, verify the multicast address is configured
correctly (Configuration > Network > Advanced > Failover). If both proxies are sending
the multicast packets but not receiving them, it is possible that a switch/router is
blocking multicast packets.
824
Chapter 36: Configuring DNS
About DNS
A hierarchical set of DNS servers comprises a Domain Name System. For each
domain or sub-domain, one or more authoritative DNS servers publish
information about that domain and the name servers of any domains that are
under it.
Note: The DNS servers are configured in groups. For more information, see
"About Configuring DNS Server Groups" on page 827.
825
Advanced Secure Gateway Administration Guide
Note: Servers are always contacted in the order in which they appear in a group
list.
❐ The Advanced Secure Gateway appliance first checks all the DNS groups for a
domain match, using domain-suffix matching to match a request to a group.
• If there is a match, the servers in the matched group are queried until a
response is received; no other DNS groups are queried.
• If there is no match, the Advanced Secure Gateway appliance selects the
Primary DNS group.
❐ The Advanced Secure Gateway appliance sends requests to DNS servers in
the Primary DNS server group in the order in which they appear in the list. If
a response is received from one of the servers in the Primary group, no
attempts are made to contact any other Primary DNS servers.
❐ If none of the servers in the Primary group resolve the host name, the
Advanced Secure Gateway appliance sends requests to the servers in the
Alternate DNS server group. (If no Alternate servers have been defined, an
error is returned to the client.)
• If a response is received from a server in the Alternate group list, there are
no further queries to the Alternate group.
• If a server in the Alternate DNS server group is unable to resolve the host
name, an error is returned to the client, and no attempt is made to contact
any other DNS servers.
Note: The Alternate DNS server is not used as a failover DNS server. It
is only used when DNS resolution of the Primary DNS server returns a
name error. If the query to each server in the Primary list times out, no
alternate DNS server is contacted.
826
If the DNS server response does not contain an A record with an IP address but
instead contains authoritative server information (a referral), the Advanced
Secure Gateway appliance follows all referrals until it receives an answer. If the
Advanced Secure Gateway appliance follows more than eight referrals, it assumes
there is a recursion loop, aborts the request, and sends an error to the client.
827
Advanced Secure Gateway Administration Guide
After you add DNS servers to a group, we recommend that you check the DNS
server health check configurations and edit them as required. For complete details
about configuring DNS server health checks, see "About DNS Server Health
Checks" on page 1437.
828
Section 1 Adding DNS Servers to the Primary or Alternate Group
This section discusses how to add DNS servers to a primary or alternate group.
When you installed the Advanced Secure Gateway, you configured a Primary
DNS server. If your deployment makes use of more than one DNS server, you can
them to the Primary or Alternate server group; you can also delete DNS servers
from the Primary group, but you cannot delete the group or change the domain or
add additional domains—the group is defined at initial configuration.
If you are using the Advanced Secure Gateway appliance in a mixed IPv4/IPv6
environment, you should configure both IPv4 and IPv6 DNS servers.
2. Select a group (primary or alternate) and click Edit. The Management Console
displays the Edit DNS Forwarding Group dialog.
3. Enter the IPv4 or IPv6 address of each additional DNS server and click OK.
4. Click Apply.
See Also
❐ "About DNS"
❐ ""Promoting DNS Servers in a List""
829
Advanced Secure Gateway Administration Guide
Notes:
❐ You can create a maximum of 8 custom groups , and each custom group can
contain a maximum of four DNS servers and eight domains.
❐ Groups do not accept wild cards, such as:
*.example.com
Further more:
exam.com
3. Enter a name for the DNS group; use commas to separate multiple groups.
830
4. Enter the servers (IPv4 or IPv6 addresses) and the domains for the group, and
click OK. The custom group displays in the DNS Groups list.
5. Click Save.
See Also
❐ "About DNS"
❐ "About Configuring DNS Server Groups"
❐ "Adding DNS Servers to the Primary or Alternate Group"
❐ ""Promoting DNS Servers in a List""
❐ "Promoting DNS Servers in a List"
Deleting Domains
If a domain becomes defunct, you can easily delete it from a DNS group. In
addition, you need to delete all domains associated with the last server in any
DNS group before you can delete the server.
To delete domains:
1. Select Configuration > Network > DNS > Groups. The Management Console
displays the list of DNS groups.
2. Select the DNS group in the list and click Edit. The Management Console
displays the Edit DNS Forwarding Group dialog.
3. Delete domains, and click OK.
4. Click Apply.
See Also
"Deleting DNS Groups and Servers"
831
Advanced Secure Gateway Administration Guide
See Also
❐ "Deleting Domains"
❐ "Promoting DNS Servers in a List"
This promotes the specified server IP address in the DNS server list the
number of places indicated. You must use a positive number. If the number is
greater than the number of servers in the list, the server is promoted to the
first entry in the list.
See Also
❐ "Adding DNS Servers to the Primary or Alternate Group"
❐ ""Promoting DNS Servers in a List""
❐ "Creating a Custom DNS Group"
❐ "Deleting DNS Groups and Servers"
832
Section 2 Resolving Hostnames Using Name Imputing Suffixes
The Advanced Secure Gateway appliance queries the original hostname before
checking imputing suffixes unless there is no period in the hostname. If there is no
period in the hostname, imputing is applied first.
The Advanced Secure Gateway appliance uses name imputing to resolve
hostnames based on a partial name specification (DNS name imputing suffix).
When the Advanced Secure Gateway appliance submits a hostname to the DNS
server, the DNS server resolves the hostname to an IP address.
The Advanced Secure Gateway appliance then tries each entry in the name-
imputing suffixes list until the name is resolved or it reaches the end of the list. If
by the end of the list the name is not resolved, the Advanced Secure Gateway
appliance returns a DNS failure.
For example, if the name-imputing list contains the entries example.com and com,
and a user submits the URL http://www.eedept, the Advanced Secure Gateway
appliance resolves the host names in the following order.
www.eedept
www.eedept.example.com
www.eedept.com
833
Advanced Secure Gateway Administration Guide
Note: This functionality is only available through the Management Console. You
cannot configure it using the CLI.
Note: The Advanced Secure Gateway appliance generates more DNS requests
when negative caching is disabled.
The Advanced Secure Gateway appliance supports caching of both type A and
type PTR DNS negative responses.
This functionality is only available through the CLI. You cannot configure DNS
negative caching through the Management Console.
834
Chapter 37: Virtual IP Addresses
This chapter discusses the uses of Virtual IP (VIP) addresses and how to create
them.
Virtual IP addresses are addresses assigned to a system (but not an interface)
that are recognized by other systems on the network. Up to 255 VIPs can be
configured on each Advanced Secure Gateway appliance.
Uses of a VIP
VIP addresses have several uses:
❐ Assign multiple identities to a system on the same or different network,
partitioning the box in to separate logical entities for resource sharing or
load sharing.
❐ Create an HTTPS Console to allow multiple, simultaneous, secure
connections to the system.
❐ Direct authentication challenges to different realms.
❐ Set up failover among multiple Advanced Secure Gateway appliances on
the same subnet.
835
Advanced Secure Gateway Administration Guide
Note: You cannot create a VIP address that is the IP address used by the
origin content server. You must assign a different address on the Advanced
Secure Gateway, and use DNS or forwarding to point to the origin content
server's real IP address.
4. Click OK.
5. Click Apply.
The VIP address can now be used.
836
Section 2 Deleting a VIP
To delete a VIP:
1. In the Management Console, select Configuration > Network > Advanced > VIPs.
2. Select a VIP to delete.
3. Click Delete.
4. Click OK on the Confirm Delete dialog.
837
Advanced Secure Gateway Administration Guide
838
Chapter 38: Configuring Private Networks
This chapter describes how the Advanced Secure Gateway appliance interacts
in internal, or private, networks.
839
Advanced Secure Gateway Administration Guide
The Advanced Secure Gateway appliance allows you to delete subnets from this
list or add private subnets to this list, see "Configuring Private Subnets" on page
841 to configure private subnets. To configure private domains, see "Configuring
Private Domains" on page 842.
840
Section 1 Configuring Private Subnets
A private subnet consists of IP addresses that are generally not directly accessible
from the Internet.
See Also
"Configuring Private Networks"
"Default Private Subnets on the Advanced Secure Gateway Appliance"
"Using Policy On Configured Private Networks"
841
Advanced Secure Gateway Administration Guide
See Also
❐ "Configuring Private Networks"
❐ "Default Private Subnets on the Advanced Secure Gateway Appliance"
❐ "Configuring Private Subnets"
842
❐ "Using Policy On Configured Private Networks"
843
Advanced Secure Gateway Administration Guide
a. Create a list with the define condition gesture. Definitions allow you
to bind a set of conditions or actions to your list.
b. For the list defined, assign the file types that you regard as low risk for
viruses.
c. Create a condition for web content, in the <cache> layer, that specifies
the ICAP response service to fail open for the low-risk file types as
defined in the extension_low_risk list, while all other files will fail
closed until the scan is completed.
d. Create an exception that in the <cache> layer that exempts scanning of
all responses from internal hosts, since internal hosts are considered
secure.
For more information on using policy and for details on CPL gestures, refer to the
Content Policy Language Guide.
844
Chapter 39: Managing Routing Information Protocols (RIP)
845
Advanced Secure Gateway Administration Guide
Note: When entering RIP settings that affect current settings (for example, when
switching from ripv1 to ripv2), disable RIP before you change the settings; re-
enable RIP when you have finished.
3. In the Install RIP Setting from drop-down list, select the method used to install
the routing table; click Install.
• Remote URL:
Enter the fully-qualified URL, including the filename, where the routing
table is located. To view the file before installing it, click View. Click Install.
To view the installation results, click Results; close the window when you
are finished. Click OK.
• Local File:
Click Browse to display the Local File Browse window. Browse for the file
on the local system. Open it and click Install. When the installation is
complete, a results window opens. View the results and close the window.
• Text Editor:
The current configuration is displayed in installable list format. You can
customize it or delete it and create your own. Click Install. When the
installation is complete, a results window opens. View the results, close
the window, and click OK.
4. Click Apply.
5. Select Enable RIP.
6. Click Apply.
846
Where group_number defaults to 1, and weight_number defaults to 100, the same
as the static default route set by the ip-default-gateway command.
2. (Optional) To view the default advertising routes, enter:
#(config) show rip default-route
RIP default route settings:
Enabled: Yes
Preference group: 3
Weight: 30
RIP Commands
You can place any of the commands below into a Routing Information Protocol
(RIP) configuration text file. You cannot edit a RIP file through the command line,
but you can overwrite a RIP file using the inline rip-settings command.
After the file is complete, place it on an HTTP or FTP server accessible to the
Advanced Secure Gateway and download it.
Note: RIP parameters are accepted in the order that they are entered. If a RIP
parameter is added, it is appended to the default RIP parameters. If a subsequent
parameter conflicts with a previous parameter, the most recent one is used.
net
net Nname[/mask] gateway Gname metric Value {passive | active |
external}
Parameters Description
Nname Name of the destination network. It can be a symbolic
network name, or an Internet address specified in dot
notation.
/mask Optional number between 1 and 32 indicating the netmask
associated with Nname.
Gname Name or address of the gateway to which RIP responses
should be forwarded.
Value The hop count to the destination host or network. A net
Nname/32 specification is equivalent to the host Hname
command.
passive | active | Specifies whether the gateway is treated as passive or active,
external or whether the gateway is external to the scope of the RIP
protocol.
host
host Hname gateway Gname metric Value {passive | active | external}
847
Advanced Secure Gateway Administration Guide
Parameters Description
Hname Name of the destination network. It can be a symbolic
network name, or an Internet address specified in dot
notation.
Gname Name or address of the gateway to which RIP responses
should be forwarded. It can be a symbolic network name, or
an Internet address specified in dot notation.
Value The hop count to the destination host or network. A net
Nname/32 specification is equivalent to the host Hname
command.
passive | active | Specifies whether the gateway is treated as passive or active,
external or whether the gateway is external to the scope of the RIP
protocol.
RIP Parameters
Lines that do not start with net or host commands must consist of one or more of
the following parameter settings, separated by commas or blank spaces:
Parameters Description
if=[0|1|2|3] Specifies that the other parameters on the line apply to the interface
numbered 0,1,2, or 3 in SGOS terms.
passwd=XXX Specifies an RIPv2 password included on all RIPv2 responses sent and
checked on all RIPv2 responses received. The password must not contain any
blanks, tab characters, commas or ‘#’ characters.
no_ag Turns off aggregation of subnets in RIPv1 and RIPv2 responses.
no_super_ag Turns off aggregation of networks into supernets in RIPv2 responses.
passive Marks the interface to not be advertised in updates sent through other
interfaces, and turns off all RIP and router discovery through the interface.
no_rip Disables all RIP processing on the specified interface.
no_ripv1_in Causes RIPv1 received responses to be ignored.
no_ripv2_in Causes RIPv2 received responses to be ignored.
ripv2_out Turns off RIPv1 output and causes RIPv2 advertisements to be multicast
when possible.
ripv2 Is equivalent to no_ripv1_in and no_ripv1_out. This parameter is set by
default.
no_rdisc Disables the Internet Router Discovery Protocol. This parameter is set by
default.
848
Table 39–3 RIP Parameters (Continued)
Parameters Description
no_solicit Disables the transmission of Router Discovery Solicitations.
send_solicit Specifies that Router Discovery solicitations should be sent, even on point-to-
point links, which by default only listen to Router Discovery messages.
no_rdisc_adv Disables the transmission of Router Discovery Advertisements.
rdisc_adv Specifies that Router Discovery Advertisements should be sent, even on
point-to-point links, which by default only listen to Router Discovery
messages.
bcast_rdisc Specifies that Router Discovery packets should be broadcast instead of
multicast.
rdisc_pref=N Sets the preference in Router Discovery Advertisements to the integer N.
rdisc_interval=N Sets the nominal interval with which Router Discovery Advertisements are
transmitted to N seconds and their lifetime to 3*N.
trust_gateway=rname Causes RIP packets from that router and other routers named in other
trust_gateway keywords to be accept, and packets from other routers to be
ignored.
redirect_ok Causes RIP to allow ICMP Redirect messages when the system is acting as a
router and forwarding packets. Otherwise, ICMP Redirect messages are
overridden.
849
Advanced Secure Gateway Administration Guide
Parameters Description
supply_routing_info -s option:
-or- Supplying this option forces routers to supply routing
advertise_routes information whether it is acting as an Internetwork router
or not. This is the default if multiple network interfaces are
present or if a point-to-point link is in use.
-g option:
This flag is used on Internetwork routers to offer a route to
the `default' destination. This is typically used on a
gateway to the Internet, or on a gateway that uses another
routing protocol whose routes are not reported to other
local routers.
-h option:
Suppress_extra_host_routes advertise_host_route
-m option:
Advertise_host_route on multi-homed hosts
-A option:
Ignore_authentication //
no_supply_ -q option:
routing_info opposite of -s.
no_rip_out Disables the transmission of all RIP packets. This setting is
the default.
no_ripv1_out Disables the transmission of RIPv1 packets.
no_ripv2_out Disables the transmission of RIPv2 packets.
rip_out Enables the transmission of RIPv1 packets.
ripv1_out Enables the transmission of RIPv1 packets.
rdisc Enables the transmission of Router Discovery
Advertisements.
ripv1 Causes RIPv1 packets to be sent.
ripv1_in Causes RIPv1 received responses to be handled.
850
Using Passwords with RIP
The first password specified for an interface is used for output. All passwords
pertaining to an interface are accepted on input. For example, with the following
settings:
if=0 passwd=aaa
if=1 passwd=bbb
passwd=ccc
Interface 0 accepts passwords aaa and ccc, and transmits using password aaa.
Interface 1 accepts passwords bbb and ccc, and transmits using password bbb. The
other interfaces accept and transmit the password ccc.
851
Advanced Secure Gateway Administration Guide
852
Chapter 40: SOCKS Gateway Configuration
853
Advanced Secure Gateway Administration Guide
See Also
❐ "Adding a SOCKS Gateway" on page 855
❐ "Creating SOCKS Gateway Groups" on page 857
❐ "Configuring Global SOCKS Defaults" on page 860
❐ "Configuring the SOCKS Gateway Default Sequence" on page 862
854
Section 1 Adding a SOCKS Gateway
To configure a SOCKS gateway:
1. Select the Configuration > Forwarding > SOCKS Gateways > SOCKS Gateways tab.
2. Click New to create a new SOCKS gateway.
b. Host: Add the IP address or the host name of the gateway where traffic
is directed. The host name must DNS resolve.
c. Port: The default is 1080.
d. SOCKS version: Select the version that the SOCKS gateway can support
from the drop-down list. Version 5 is recommended.
e. Username (Optional, and only if you use version 5) The username of the
user on the SOCKS gateway. The username already must exist on the
gateway. If you have a username, you must also set the password.
855
Advanced Secure Gateway Administration Guide
856
Section 2 Creating SOCKS Gateway Groups
To create groups:
An existing gateway can belong to none, one, or more groups as desired (it can
only belong once to a single group, however).
1. Select the Configuration > Forwarding > SOCKS Gateways > SOCKS Gateway Groups
tab.
857
Advanced Secure Gateway Administration Guide
3. To create an alias group, highlight the hosts and groups you want grouped,
and click Add.
4. Give the new group a meaningful name.
5. In the Load Balancing and Host Affinity section, select the load balancing method
from the drop-down list. Global default (configured on the Configuration >
Forwarding > SOCKS Gateways > Global Defaults tab), sets the default for all
forwarding hosts on the system. You can also specify the load balancing
method for this system: Least Connections, Round Robin, Domain Hash, URL Hash,
or you can disable load balancing by selecting None.
858
6. In the Host affinity methods drop-down lists, select the method you want to use.
Refer to the previous procedure for details on methods.You are selecting
between the resolved IP addresses of all of the hosts in the group, not the
resolved IP addresses of an individual host.
• HTTP: The default is to use the Global Defaults. Other choices are None, which
disables host affinity, Accelerator Cookie, which places a cookie in the
response to the client, and Client IP Address, which uses the client IP
address to determine which group member was last used.
• SSL: The default is to use the Global Defaults. Other choices are None, which
disables host affinity, Accelerator Cookie, which places a cookie in the
response to the client, and Client IP Address, which uses the client IP
address to determine which group member was last used. In addition, you
can select SSL Session ID, used in place of a cookie or IP address, which
extracts the SSL session ID name from the connection information.
• Other. Applies to any traffic that is not HTTP, terminated HTTPS, or
intercepted HTTPS. You can attempt load balancing of any of the
supported traffic types in forwarding and this host affinity setting can be
applied as well. For example, you could load balance a set of TCP tunnels
and apply the Other host affinity (client IP only).
The default is to use Global Defaults. Other choices are None, which disables
host affinity, and Client IP Address, which uses the client IP address to
determine which group member was last used.
7. Click OK to close the dialog.
8. Click Apply.
859
Advanced Secure Gateway Administration Guide
2. Determine how you want connections to behave if the health checks fail:
Connect Directly (fail open) or Deny the request (fail closed). Note that failing open is
an insecure option. The default is to fail closed. This option can be overridden
by policy, if it exists.
3. In the Global Load Balancing and Host Affinity area:
a. Configure Load Balancing methods:
• SOCKS hosts: Specify the load balancing method for all forwarding
hosts unless their configuration specifically overwrites the global
settings. You can choose Least Connections or Round Robin, or you can
disable load balancing by selecting None. Round Robin is specified by
default.
• SOCKS groups: Specify the load balancing method for all forwarding
groups unless their configuration specifically overwrites the global
settings. You can choose to hash the domain or the full URL. You can
also choose Least Connections, Round Robin, Domain Hash, URL Hash, and
you can disable load balancing by selecting None. Round Robin is
specified by default.
860
b. Configure Global Host Affinity methods:
• HTTP: The default is to use None, which disables host affinity. Other
choices are Accelerator Cookie, which places a cookie in the response to
the client, and Client IP Address, which uses the client IP address to
determine which group member was last used.
• SSL: The default is to use None, which disables host affinity. Other
choices are Accelerator Cookie, which places a cookie in the response to
the client, and Client IP Address, which uses the client IP address to
determine which group member was last used, and SSL Session ID,
used in place of a cookie or IP address, which extracts the SSL session
ID name from the connection information.
• Other: Otherapplies to any traffic that is not HTTP, terminated HTTPS,
or intercepted HTTPS. You can attempt load balancing of any of the
supported traffic types in forwarding and this host affinity setting can
be applied as well. For example, you could load balance a set of TCP
tunnels and apply the Other host affinity (client IP only).
The default is to use None, which disables host affinity. You can also
choose Client IP Address, which uses the client IP address to determine
which group member was last used.
c. Host Affinity Timeout: This is the amount of time a user's IP address, SSL
ID, or cookie remains valid. The default is 30 minutes, meaning that
the IP address, SSL ID or cookie must be used once every 30 minutes to
restart the timeout period.
4. Click Apply.
861
Advanced Secure Gateway Administration Guide
Note: Traffic is forwarded to the first member of the list until it fails, then traffic is
sent to the second member of list until it fails or the first member becomes healthy
again, and so on.
1. Select the Configuration > Forwarding > SOCKS Gateways > Default Sequence tab.
2. The available aliases (host and group) display in the Available Aliases pane. To
select an alias, highlight it and click Add.
862
Note: Any host or group in the default sequence is considered in use by
policy. As a result, if you try to delete a host or group while it is in the default
sequence, you receive an error message. You must remove the host/group
from the sequence first, then delete the host or group.
3. You can use the Promote and Demote buttons to change the order of the hosts
and groups in the sequence after you add them to the Selected Aliases pane.
4. Click Apply.
Statistics
SOCKS gateways statistics are available through the Statistics > Advanced > SOCKS
Gateways menu item.
863
Advanced Secure Gateway Administration Guide
Directive Meaning
gateway Specifies the gateway alias and name, SOCKS port, version
supported, usernames and password.
group Creates a forwarding group directive and identifies member of
the group.
host_affinity Directs multiple connections by a single user to the same group
member.
load_balance Manages the load among SOCKS gateways in a group, or
among multiple IP addresses of a gateway.
sequence Adds a space-separated list of one or more SOCKS gateways
alias_list and group aliases. (The default sequence is the default
forwarding rule, used for all requests lacking policy instructions
socks_fail In case connections cannot be made, specifies whether to abort
the connection attempt or to connect to the origin content server.
864
load_balance group {none | domain-hash | url-hash | round-robin |
least-connections} [group_alias]
load_balance gateway {none | round-robin | least-connections}
[gateway_alias]
sequence alias_list
socks_fail {open | closed}
For more information on SOCKS gateway directives, continue with the next
section. For information on:
❐ group directives, continue with "Creating SOCKS Gateways Groups Using
Directives" on page 866
❐ load_balance directives, continue with "Configuring Load Balancing
Directives" on page 866
❐ host_affinity directives, continue with "Configuring Host Affinity
Directives" on page 867
❐ socks_fail directives, continue with "Setting Fail Open/Closed" on page 866
❐ sequence directives, continue with "Creating a Default Sequence" on page 868
865
Advanced Secure Gateway Administration Guide
Example
gateway Sec_App1 10.25.36.47 1022 version=5 user=username
password=password
where the value determines whether the SOCKS gateways should fail open or
fail closed if an operation does not succeed. Fail open is a security risk, and
fail closed is the default if no setting is specified. This setting can be
overridden by policy, using the SOCKS_gateway.fail_open(yes|no) property.
Examples
socks_fail open
866
Table 40–3 Load Balancing Directives
Example
load_balance gateway least_connections
867
Advanced Secure Gateway Administration Guide
Example
host_affinity ssl accelerator-cookie 10.25.36.48
host_affinity timeout 5
Note: Set up sequences using policy. The default sequence (if present) is applied
only if no applicable command is in policy.
For information on using VPM, refer to the Visual Policy Manager Reference; for
information on using CPL, refer to the Content Policy Language Guide.
868
Section 5 Creating a SOCKS Gateway Installable List
You can create and install the SOCKS gateway installable list with the following
methods:
❐ Use the Text Editor, which allows you to enter directives (or copy and paste
the contents of an already-created file) directly onto the Advanced Secure
Gateway.
❐ Create a local file on your local system; the Advanced Secure Gateway can
browse to the file and install it.
❐ Use a remote URL, where you place an already-created file on an FTP or
HTTP server to be downloaded to the Advanced Secure Gateway appliance.
When the SOCKS gateway installable list is created, it overwrites any previous
SOCKS gateway configurations on the Advanced Secure Gateway. The installable
list remains in effect until it is overwritten by another installable list; it can be
modified or overwritten using Management Console or CLI commands.
Note: During the time that a SOCKS gateways installable list is being compiled
and installed, SOCKS gateways might not be available. Any transactions that
come into the appliance during this time might not be forwarded properly.
2. If you use a SOCKS gateway server for the primary or alternate forwarding
gateway, you must specify the ID for the Identification (Ident) protocol used
by the SOCKS gateway in SOCKS server handshakes. The default is BLUECOAT
SYSTEMS.
3. From the drop-down list, select the method used to install the SOCKS
gateway configuration; click Install.
• Remote URL:
Click Browse to bring up the Local File Browse window. Browse for the file
on the local system. Click Install. When the installation is complete, a
results window opens. View the results, close the window, click Close.
869
Advanced Secure Gateway Administration Guide
• Text Editor:
870
Chapter 41: TCP Connection Forwarding
871
Advanced Secure Gateway Administration Guide
1: The client makes a request; Advanced Secure Gateway 1 intercepts the connection.
2: Advanced Secure Gateway 1 terminates the client connection and invokes an outbound
connection to the server (with the client source IP address).
3: Based on its internal routing policies, the server believes ISP 2 provides a viable path
back to the client.
4: Advanced Secure Gateway 2 intercepts the response with the originating client IP
address; however, it does not recognize the connection from the client and attempts to
reset the connection.
5: The client connection ultimately times out with a connection timeout error for the user.
Figure 41–1 Multiple Advanced Secure Gateway appliances in an asymmetric routing environment
After a connection occurs (either intercepted or bypassed) through any Advanced
Secure Gateway in the connection forwarding cluster, future packets of any such
recorded flow that is subject to asymmetric routing are properly handled. The
Advanced Secure Gateway also recognizes self-originated traffic (from any of the
peers of the connection forwarding cluster), so any abnormal internal routing
loops are also appropriately processed.
872
About Bidirectional Asymmetric Routing
To solve the asymmetric routing problem, at least one Advanced Secure Gateway
on each network segment must be configured to perform the functionality of an
L4 switch. These selected appliances form a cluster. With this peering
relationship, the connection responses are able to be routed to the network
segment where the originating client resides.
Cluster membership is manual; that is, Advanced Secure Gateway appliances
must be added to a cluster by enabling connection forwarding and adding a list of
other peers in the cluster. After a peer joins a cluster, it begins sending and
receiving TCP connections, and notifies the other peers about its connection
requests.
1: The client makes a request; Advanced Secure Gateway 1 intercepts the connection.
2: Because Advanced Secure Gateway 1 and Advanced Secure Gateway 2 are peers in the TCP
forwarding cluster, Advanced Secure Gateway 1 informs Advanced Secure Gateway 2 about the
connection request.
3: Advanced Secure Gateway 1 terminates the client connection and invokes an outbound
connection to the server (with the client source IP address).
4: Based on its internal routing policies, the server believes ISP 2 provides a viable path
back to the client.
5: Advanced Secure Gateway 2 intercepts the response with the originating client IP address.
6: Advanced Secure Gateway 2 routes the response back up to the internal network.
7: Advanced Secure Gateway 1 receives the response and serves the client.
Figure 41–2 Advanced Secure Gateway appliances share TCP connection information
873
Advanced Secure Gateway Administration Guide
Figure 41–3 A Advanced Secure Gateway appliance serving in-path as a load balancer
In the above network topography, Advanced Secure Gateway SG 1 is deployed in-
path to receive all traffic (by way of a switch) originating from the clients to the
servers and servers to the clients and serves as a load balancer to the other four
Advanced Secure Gateway appliances. Appliances 2 through 5 also have
independent connectivity to the clients and the servers. When all appliances
belong to the same peering cluster and have connection forwarding enabled,
appliance SG 1 knows which of the other appliances made a specific connection
and routes the response to that appliance.
In this deployment, a TCP acknowledgement is sent and retransmitted, if
required, to ensure the information gets there, but each new connection message
is not explicitly acknowledged. However, if the Advanced Secure Gateway
receives packets for a connection that is unrecognized, the appliance retains those
packets for a short time before deciding whether to forward or drop them, which
allows time for a new connection message from a peer to arrive.
While adding more peers to a cluster increases the connection synchronization
traffic, the added processing power all but negates that increase. You can have
multiple peer clusters, and if you are cognoscente of traffic patterns to and from
each cluster, you can create an effective cluster strategy. The only limitation is that
a Advanced Secure Gateway can only be a peer in one cluster.
The Blue Coat load balancing solution is discussed in greater detail in earlier
sections.
874
TCP Configuration Forwarding Deployment Notes
When configuring your network for TCP connection forwarding, consider the
following:
❐ Peers can be added to clusters at any time without affecting the performance
of the other peers. A Advanced Secure Gateway that joins a peer cluster
immediately contacts every other peer in the cluster. Likewise, a peer can
leave a cluster at anytime. This might be a manual drop or a forced drop
because of a hardware or software failure. If this happens, the other peers in
the cluster continue to process connection forwarding requests.
❐ Connections between peers are not encrypted and not authenticated. If you do
not assign the correct local IP address on a Advanced Secure Gateway with
multiple IP addresses, traffic sent peer to peer might be routed through the
Internet, not the intranet, exposing your company-sensitive data.
❐ The peering port—the connection between Advanced Secure Gateway
connection forwarding peers—cannot be configured with bypass services.
This means a Advanced Secure Gateway cannot be deployed in transparent
mode between two Advanced Secure Gateway appliances that are peers.
❐ The Advanced Secure Gateway does not enforce a maximum number of
appliances a peer cluster supports, but currently the deployment is designed
to function with up to 20 Advanced Secure Gateway appliances.
❐ Because TCP connection forwarding must function across different network
segments, employing multicasting, even among Advanced Secure Gateway
peers on the same network, is not supported.
❐ There might be a slight overall performance impact from enabling TCP
connection forwarding, especially in deployments where traffic is largely
already being routed to the correct Advanced Secure Gateway. If a substantial
amount of traffic requires forwarding, the performance hit is equitable to
processing the same amount of bridging traffic.
875
Advanced Secure Gateway Administration Guide
4
2
3b
3a
2. From the Local IP drop-down list, select the IP address that is routing traffic to
this Advanced Secure Gateway.
Specify the port number (the default is 3030) that the Advanced Secure
Gateway uses to communicate with all peers, which includes listening and
sending out connection forwarding cluster control messages to all peers in the
group. All peers in the group must use the same port number (when
connection forwarding is enabled, you cannot change the port number).
3. Add the cluster peers:
a. Click Add.
b. In the Peer IPs field, enter the IP addresses of the other peers in the
cluster that this Advanced Secure Gateway is to communicate
connection requests with; click OK.
4. Select Enable Connection Forwarding.
876
5. Click Apply.
This Advanced Secure Gateway joins the peer cluster and immediately begins
communicating with its peers.
Removing a Peer
A network change or other event might require you to remove a peer from the
cluster. Highlight a peer IP address and click Remove. The peer connection is
terminated and all connections associated with the peer are removed from the
local system.
You can also remove all peers from the cluster by clicking the Remove... button. A
dialog appears, asking you to confirm your choice to remove all peers.
877
Advanced Secure Gateway Administration Guide
878
Chapter 42: Configuring the Upstream Network Environment
The following topics in this chapter discuss how to configure the Advanced
Secure Gateway to interact with both the local network and with the upstream
network environment:
❐ Section A: "Overview" on page 880
❐ Section B: "About Forwarding" on page 881
❐ Section C: "Configuring Forwarding" on page 889
❐ Section D: "Using Forwarding Directives to Create an Installable List" on
page 899
879
Advanced Secure Gateway Administration Guide
Section A: Overview
To control upstream interaction, the Advanced Secure Gateway supports the
following:
❐ The Advanced Secure Gateway forwarding system—Allows you to define the
hosts and groups of hosts to which client requests can be redirected. Those
hosts can be servers or proxies. Rules to redirect requests are set up in policy.
❐ SOCKS gateways—SOCKS servers provide application-level firewall
protection for an enterprise. The SOCKS protocol provides a generic way to
proxy HTTP and other protocols. For information on configuring SOCKS
gateways, see Chapter 40: "SOCKS Gateway Configuration" on page 853.
880
Section B: About Forwarding
Forwarding creates a proxy hierarchy, which consists of a set of proxies (including
Advanced Secure Gateway appliances that are configured as proxies (Configuration
> Proxy Services)). Appliances close to the origin server perform object caching for
server content and distribute the content to the object caches of other proxies that
are farther away from the origin server. If forwarding is set up in an organized
manner, the load involved with object caching is distributed throughout the proxy
hierarchy, which avoids sending any piece of content across any given WAN link
more than once.
For more information, see one of the following topics:
❐ "About the Forwarding System"
❐ "Example of Using Forwarding" on page 881
❐ "About Load Balancing and Health Checks" on page 886
❐ "About Host Affinity" on page 887
❐ "Using Load Balancing with Host Affinity" on page 888
To get started configuring forwarding, see Section C: "Configuring Forwarding"
on page 889.
Note: The Advanced Secure Gateway forwarding system directly supports the
forwarding of HTTP, HTTPS, FTP, MMS, RTSP, Telnet, and TCP tunnels.
881
Advanced Secure Gateway Administration Guide
See Also
"About the Forwarding System" on page 881
882
Advanced Secure Gateway 4 uses Advanced Secure Gateway 2 as its forwarding
host, and Advanced Secure Gateway 2 uses Advanced Secure Gateway 1 as its
forwarding host. Similarly, Advanced Secure Gateway 5 uses Advanced Secure
Gateway 3 as its forwarding host and Advanced Secure Gateway 3 uses Advanced
Secure Gateway 1 as its forwarding host.
This means that, for example, any piece of content in Advanced Secure Gateway
1’s object cache can be distributed to Advanced Secure Gateway 2 or Advanced
Secure Gateway 3’s object cache without having to send the content over the
Internet.
Continue with "Example Network" .
Example Network
The following figure shows a more detailed view of the example network.
883
Advanced Secure Gateway Administration Guide
In Figure 42–2, Advanced Secure Gateway 1 (located in the central data center)
acts as a gateway to the Internet; in other words, all Internet access goes through
Advanced Secure Gateway 1. Two regional data centers accept requests from four
branch offices or sites, each with Advanced Secure Gateway appliances
configured as a proxies.
Because Advanced Secure Gateway 1 is the gateway to the Internet, it is upstream
of all other Advanced Secure Gateways shown in Figure 42–2. Because load-
balanced Advanced Secure Gateway 2 and Advanced Secure Gateway 3 are
configured to use Advanced Secure Gateway 1 as their forwarding host, they are
downstream of Advanced Secure Gateway 1. And because Advanced Secure
Gateway 4 is configured to use the load-balanced group of Advanced Secure
Gateways labeled 2 as its forwarding host, Advanced Secure Gateway 4 is
downstream of both Advanced Secure Gateway 2 and Advanced Secure Gateway
1. Finally, Advanced Secure Gateway 5 is downstream of Advanced Secure
Gateway 3 and Advanced Secure Gateway 1.
Another way of stating this, using Advanced Secure Gateway 4 as an example, is
that any request to the Internet goes through Advanced Secure Gateway 2 and
then Advanced Secure Gateway 1 instead of going directly to the host specified in
the URL of the request.
Continue with "How the Example Uses Object Caching" .
884
Figure 42–3 How forwarding can leverage object caching to prevent multiple requests to the
Internet and over WAN links
In Figure 42–3, a user connected to Advanced Secure Gateway 4 requests content
located on a Web server in the Internet. The content—which might be a
spreadsheet or multimedia—is in the object cache of load-balanced Advanced
Secure Gateway 2, and therefore is retrieved from the object cache. Neither the
WAN links nor the origin server are used to retrieve the content. The content is
then cached on Advanced Secure Gateway 4’s object cache so the next time a user
requests the same content, it is retrieved from Advanced Secure Gateway 4’s
object cache.
If a user connected to Advanced Secure Gateway 5 requests the same content—
and the content is in neither Advanced Secure Gateway 5’s nor Advanced Secure
Gateway 3’s object cache—load-balanced Advanced Secure Gateway 3 gets the
885
Advanced Secure Gateway Administration Guide
content from Advanced Secure Gateway 1 and object caches it. Subsequently,
Advanced Secure Gateway 5 gets the content from Advanced Secure Gateway 3
and object caches it.
Because the content is in Advanced Secure Gateway 1’s object cache, the content is
not retrieved from the origin server. In this scenario, only the WAN links are used;
the Internet link is not used to retrieve the content.
Note: In Figure 42–2 and Figure 42–3, each Advanced Secure Gateway is
assumed to use one IP address for forwarding. You could achieve similar results
using load balancing if you configure a DNS host name as a forwarding host and
used DNS load balancing to forward requests to more than one Advanced Secure
Gateway. For more information, see "About Load Balancing and Health Checks" .
See Also
"About Load Balancing and Health Checks"
"About Host Affinity" on page 887
"About the Forwarding System" on page 881
886
• Domain hash—Requests are hashed based on the domain name in the
request.
Continue with "Health Checks" .
Health Checks
The availability of a proxy to participate in load balancing depends on the status
of the proxy’s health check (Statistics > Health Checks). The name of a forwarding
hosts or group starts with fwd.; any host or group whose health status is
Unhealthy is excluded from forwarding.
If a proxy has a health check of Unhealthy, the proxy is assumed to be down and
cannot participate in load balancing. If this happens, verify the following:
❐ The proxy or proxies are all intercepting traffic on the same ports you
configured in your forwarding host or group.
If the health check for a downstream proxy is shown as unhealthy on the
upstream proxy, verify that the downstream proxy intercepts traffic on the
specified port in the forwarding host on the upstream proxy.
For example, if you set up forwarding for HTTP traffic on port 80, make sure
the forwarding proxy or proxies are set to intercept HTTP traffic on port 80
(Services > Proxy Services).
❐ The proxy or proxies are available. Use the ping command from a downstream
proxy to verify upstream proxies are available.
❐ Verify the proxies’ health status and take corrective action if necessary.
For more information, see Chapter 72: "Verifying the Health of Services
Configured on the Advanced Secure Gateway" on page 1411.
In the event no load balancing host is available, global defaults determine whether
the connection fails open (that is, goes directly to its destination) or fails closed
(that is, the connection fails). For more information, see "Configuring Global
Forwarding Defaults" on page 895.
887
Advanced Secure Gateway Administration Guide
❐ Use the client IP address to determine which group member was last used.
When the same client IP sends another request, the host makes the connection
to that group member.
❐ Place a cookie in the response to the client. When the client makes future
requests, the cookie data is used to determine which group member the client
last used. The host makes the connection to that group member.
❐ For HTTPS, extract the SSL session ID name from the connection information.
The host uses the session ID in place of a cookie or client IP address to
determine which group member was last used. The host makes the connection
to that group member.
888
Section C: Configuring Forwarding
High-level steps to configure forwarding are:
❐ Create the forwarding hosts and groups, including parameters such as
protocol agent and port.
❐ Set load balancing and host affinity values.
See Also
"Creating Forwarding Hosts and Groups" on page 890
"About the Forwarding System" on page 881
"Example of Using Forwarding" on page 881
889
Advanced Secure Gateway Administration Guide
890
.
3a
3b
3c
3d
3e
Note: Because the forwarding host alias is used in policy, the alias
cannot be a CPL keyword, such as no, default, or forward.
b. In the Host field, enter the forwarding host’s fully qualified domain
name or IPv4/IPv6 address.
c. For Type, click one of the following:
• Server should be used for reverse proxy deployments. Choosing Server
means you will use the relative path for URLs in the HTTP header
because the next hop is a Web server, not a proxy server. HTTPS, TCP
tunnels, and Telnet can be forwarded to a server only; they cannot be
forwarded to a proxy.
• Proxy should be used in forward proxy deployments.
891
Advanced Secure Gateway Administration Guide
See Also
❐ "Creating Forwarding Groups"
❐ Section D: "Using Forwarding Directives to Create an Installable List" on page
899
❐ "About the Forwarding System" on page 881
❐ "Example of Using Forwarding" on page 881
892
3. In the Alias field, enter a unique name to identify the forwarding group.
Note: Because the forwarding group alias is used in policy, the alias
cannot be a CPL keyword, such as no, default, or forward.
4. To add members to a group, click the name of the hosts you want grouped and
click Add.
5. Choose load balancing and host affinity methods:
• From the Load balancing method list, click one of the following:
• Global default (configured on the Configuration > Forwarding > Global
Defaults tab), which sets the default for all forwarding hosts on the
system.
• Round Robin,which causes the request to be forwarded to the next
forwarding host or group in the sequence.
• Least Connections,
which causes requests to be sent to the forwarding
host or group that currently has the least number of connections.
• Url Hash, which hashes requests based on the request URL.
893
Advanced Secure Gateway Administration Guide
• Domain Hash, which hashes requests based on the domain name in the
request.
• None, which means load balancing will not be used.
• From the Host affinity methods list (see Table 42–1, "Host Affinity Methods"),
click the method you want to use.
6. Click OK.
7. Click Apply.
See Also
❐ "Creating Forwarding Hosts"
❐ Section D: "Using Forwarding Directives to Create an Installable List" on page
899
❐ "About the Forwarding System" on page 881
❐ "Example of Using Forwarding" on page 881
894
Section 2 Configuring Global Forwarding Defaults
The global defaults apply to all forwarding hosts and groups that are configured
for Use Global Default. For example, if you choose Use Global Default for Load
Balancing Method in the definition of a forwarding host or group, this section
discusses how to configure those default settings.
895
Advanced Secure Gateway Administration Guide
896
Section 3 Configuring the Forwarding Default Sequence
The default sequence is the forwarding sequence used when there is no matching
forwarding rule in policy.
Following is an example of forwarding policy:
<Forward>
url.domain=bluecoat.com forward(FWGrp2, FWGrp1)
In the example, requests that match the URL domain bluecoat.com are sent to a
forwarding group named FWGrp2 unless all of the members in FWGrp2 are down, in
which case requests are sent to FWGrp1. Health checks are performed continually
to minimize the possibility that requests are sent to a forwarding host or group
that is known to be down.
The default sequence (and any sequence specified in policy) works by allowing
healthy hosts to take over for an unhealthy host or group (one that is failing its
DNS resolution or its health check). If more than one member is in the sequence,
the sequence specifies the order of failover, with the second host or group taking
over for the first one, the third taking over for the second, and so on.
If all of the hosts in the sequence are down, the request either fails open or fails
closed (that is, the connection is denied). Blue Coat recommends you set this
behavior in policy as follows:
forward.fail_open(yes|no)
However, you can also configure it using global defaults as discussed in
"Configuring Global Forwarding Defaults" on page 895.
For information on using VPM, refer to the Visual Policy Manager Reference; for
information on using CPL, refer to the Content Policy Language Guide. For
information on using forwarding with policy, see Chapter 43: "Using Policy to
Manage Forwarding" on page 909.
897
Advanced Secure Gateway Administration Guide
2. To select an alias, click its name in the Available Aliases area and click Add.
3. Click Promote or Demote to change the order of the hosts in the default
sequence.
4. Click Apply.
Statistics
To view forwarding statistics, select the Statistics > Advanced > Forwarding tab.
898
Section D: Using Forwarding Directives to Create an Installable List
The information in this section is provided for backward compatibility only.
You can use directives instead of using the Management Console or CLI to
configure forwarding. Using directives, you can:
❐ Create the forwarding hosts and groups
❐ Provide load balancing and host affinity
This section discusses the following topics:
❐ "Creating Forwarding Host and Group Directives"
❐ "Setting Special Parameters" on page 902
❐ "Creating a Forwarding Default Sequence" on page 904
❐ "Creating a Forwarding Installable List" on page 906
899
Advanced Secure Gateway Administration Guide
900
Table 42–3 Commands to Create Forwarding Host and Group Directives (Continued)
ssl-verify- =yes | =no Sets SSL to specify that the Advanced Secure
server Gateway checks the CA certificate of the
upstream server.
The default for ssl-verify-server is yes. This
can be overridden in the SSL layer in policy.
To disable this feature, you must specify ssl-
verify-server=no in the installable list or CLI.
In other words, you can configure ssl-verify-
server=yes in three ways: do nothing (yes is the
default), specify ssl-verify-server=no, or
specify ssl-verify-server=yes.
group =group_name Specifies the group (or server farm or group of
proxies) to which this host belongs. If this is the
first mention of the group group_name then that
group is automatically created with this host as its
first member.
The Advanced Secure Gateway uses load
balancing to evenly distribute forwarding
requests to the origin servers or group of proxies.
server | proxy server specifies to use the relative path for URLs
in the HTTP header because the next hop is a Web
server, not a proxy server. The default is proxy.
Example
fwd_host www.bluecoat1.com 10.25.36.48 ssl-verify-server=no
group=bluecoat
See Also
"Creating Forwarding Groups Using Directives"
See Also
"Creating Forwarding Hosts Using Directives" on page 900
901
Advanced Secure Gateway Administration Guide
Table 42–4 Commands to Set Fail Open/Closed and Host Timeout Values
Examples
fwd_fail open
integrated_host_timeout 90
See Also
"Configuring Load-Balancing Directives"
"Configuring Host Affinity Directives" on page 903
902
Configuring Load-Balancing Directives
Load balancing shares the load among a set of IP addresses, whether a group or a
host with multiple IP addresses.
The syntax is:
load_balance group {none | domain-hash | url-hash | round-robin |
least-connections} [group_alias]
load_balance host {none | round-robin | least-connections}
[host_alias]
Example
load_balance host least_connections
See Also
"Configuring Host Affinity Directives"
"Creating a Forwarding Default Sequence" on page 904
"Creating a Forwarding Installable List" on page 906
903
Advanced Secure Gateway Administration Guide
Example
host_affinity ssl_method 10.25.36.48
host_affinity timeout 5
See Also
"Creating a Forwarding Default Sequence"
"Creating a Forwarding Installable List" on page 906
A default forwarding sequence works by allowing healthy hosts to take over for
an unhealthy host (one that is failing its DNS resolution or its health check). The
sequence specifies the order of failover, with the second host taking over for the
first host, the third taking over for the second, and so on).
If all hosts are unhealthy, the operation fails either open or closed, depending
upon your settings.
904
This configuration is generally created and managed through policy. If no
forwarding policy applies, you can create a default sequence using the VPM or
CPL.
See Also
"Creating a Forwarding Installable List"
905
Advanced Secure Gateway Administration Guide
Note: During the time that a forwarding installable list is being compiled and
installed, forwarding might not be available. Any transactions that come into the
Advanced Secure Gateway during this time might not be forwarded properly.
Note: A message is written to the event log when you install a list through
the SGOS software.
• Remote URL:
Click Browse to display the Local File Browse window. Browse for the
installable list file on the local system. Open it and click Install. When the
installation is complete, a results window opens. View the results, close
the window, click Close.
906
• Text Editor:
3. Click Apply.
Note: You can create forwarding settings using the CLI #inline forwarding
command. You can use any of the forwarding directives.
For more information on using inline commands, refer to the Command Line
Interface Reference.
Note: Any host or group in the default sequence (or the WebPulse service
configuration) is considered in use by policy. As a result, if you try to delete a
host or group while it is in the default sequence or WebPulse service
configuration, you will receive an error message. You must remove the host/
group from the sequence or service first, then delete.
907
Advanced Secure Gateway Administration Guide
908
Chapter 43: Using Policy to Manage Forwarding
After forwarding and the SOCKS gateways are configured, use policy to create
and manage forwarding rules. Create forwarding and SOCKS gateway rules in
the <Forward> layer of the Forwarding Policy file or the VPM Policy file (if you
use the VPM).
The separate <Forward> layer is provided because the URL can undergo URL
rewrites before the request is fetched. This rewritten URL is accessed as a
server_url and decisions about upstream connections are based on the
rewritten URL, requiring a separate layer. All policy commands allowed in the
<Forward> layer are described below.
Forward Description
Conditions
client_address= Tests the IP address of the client. Can also be used in
<Exception> and <Proxy> layers.
909
Advanced Secure Gateway Administration Guide
Forward Description
minute[.utc]=month[.utc]= Tests if the minute of the hour is in the specified range or
an exact match. Can be used in all layers.
proxy.address= Tests the IP address of the network interface card (NIC) on
which the request arrives. Can also be used in <Admin>
and <Proxy> layers.
proxy.card= Tests the ordinal number of the network interface card
(NIC) used by a request. Can also be used in <Admin> and
<Proxy> layers.
910
Table 43–1 Policy Commands Allowed in the <Forward> Layer (Continued)
Forward Description
server_url.port= Tests if the port number of the requested URL is within the
specified range or an exact match.
server_url.query.regex= Tests if the regex matches a substring of the query string
component of the request URL.
server_url.regex= Tests if the requested URL matches the specified pattern.
server_url.scheme= Tests if the scheme of the requested URL matches the
specified string.
socks= This condition is true whenever the session for the current
transaction involves SOCKS to the client.
socks.version= Switches between SOCKS 4/4a and 5. Can also be used in
<Exception> and <Proxy> layers.
streaming.client= yes | no. Tests the user agent of a Windows, Real Media,
or QuickTime player.
time[.utc]= Tests if the time of day is in the specified range or an exact
match. Can be used in all layers.
tunneled= yes | no. Tests TCP tunneled requests, HTTP CONNECT
requests, and unaccelerated SOCKS requests
weekday[.utc]= Tests if the day of the week is in the specified range or an
exact match. Can be used in all layers.
year[.utc]= Tests if the year is in the specified range or an exact match.
Can be used in all layers.
Properties
access_server() Determines whether the client can receive streaming
content directly from the OCS. Set to no to serve only
cached content.
ftp.transport() Determines the upstream transport mechanism.
This setting is not definitive. It depends on the capabilities
of the selected forwarding host.
forward() Determines forwarding behavior.
There is a box-wide configuration setting
(config>forwarding>failure-mode) for the forward
failure mode. The optional specific settings can be used to
override the default.
forward.fail_open() Controls whether the Advanced Secure Gateway
appliance terminates or continues to process the request if
the specified forwarding host or any designated backup or
default cannot be contacted.
911
Advanced Secure Gateway Administration Guide
Forward Description
http.refresh.recv.timeout() Sets the socket timeout for receiving bytes from the
upstream host when performing refreshes. Can also be
used in <Cache> layers.
http.server.connect_attempts() Sets the number of attempts to connect performed per-
address when connecting to the upstream host.
http.server.recv.timeout() Sets the socket timeout for receiving bytes from the
upstream host. Can also be used in <Proxy> layers.
im.transport() Sets the type of upstream connection to make for IM
traffic.
integrate_new_hosts() Determines whether to add new host addresses to health
checks and load balancing. The default is no. If it is set to
yes, any new host addresses encountered during DNS
resolution of forwarding hosts are added to health checks
and load balancing.
reflect_ip() Determines how the client IP address is presented to the
origin server for explicitly proxied requests. Can also be
used in <Proxy> layers.
socks_gateway() The socks_gateway() property determines the gateway
and the behavior of the request if the gateway cannot be
contacted.
There is a box-wide configuration setting for the SOCKS
failure mode. The optional specific settings can be used to
override the default.
socks_gateway.fail_open() Controls whether the Advanced Secure Gateway
terminates or continues to process the request if the
specified SOCKS gateway or any designated backup or
default cannot be contacted.
streaming.transport() Determines the upstream transport mechanism. This
setting is not definitive. The ability to use
streaming.transport() depends on the capabilities of
the selected forwarding host.
trace.request() Determines whether detailed trace output is generated for
the current request. The default value is no, which
produces no output.
trace.destination() Used to change the default path to the trace output file. By
default, policy evaluation trace output is written to an
object in the cache accessible using a console URL of the
following form:
http://Proxy_ip_address:8082/Policy/
Trace/path
912
Table 43–1 Policy Commands Allowed in the <Forward> Layer (Continued)
Forward Description
Actions
notify_email() Sends an e-mail notification to the list of recipients
specified in the Event Log mail configuration. Can be used
in all layers.
notify_snmp() The SNMP trap is sent when the transaction terminates.
Can be used in all layers.
log_message Writes the specified string to the event log.
Definitions
define server_url.domain condition Binds a user-defined label to a set of domain suffix
name patterns for use in a condition= expression.
913
Advanced Secure Gateway Administration Guide
914
Chapter 44: About Security
915
Advanced Secure Gateway Administration Guide
916
Chapter 45: Controlling Access to the Internet and Intranet
The following sections describe how to limit user access to the Internet and
intranet:
❐ Section A: "Managing Users" on page 918
❐ Section B: "Using Authentication and Proxies" on page 925
❐ Section C: "Using SSL with Authentication and Authorization Services" on
page 938
❐ Section D: "Creating a Proxy Layer to Manage Proxy Operations" on page
940
❐ Section E: "Forwarding BASIC Credentials" on page 949
917
Advanced Secure Gateway Administration Guide
918
Section 1 Viewing Logged-In Users
You can browse all users logged into the Advanced Secure Gateway appliance.
You can also filter the displayed users by Glob-username pattern, by IP address
subnet, and by realm.
The glob-based username pattern supports three operators:
❐ * : match zero or more characters
❐ ? : match exactly one character
❐ [x-y]: match any character in the character range from x to y
The IP address subnet notation is based on Classless Inter-Domain Routing
(CIDR), a way of interpreting IP addresses, as follows:
❐ 1.2.3.4: the IP address 1.2.3.4
❐ 1.2.3.0/24: the subnet 1.2.3.0 with netmask 255.255.255.0
The realm selection allows an exact realm name or All realms to be selected.
You can use a combination of these filters to display only the users you are
interested in.
To browse users:
1. Select the Statistics > Authentication tab.
2. Select a single realm or All realms from the Realm drop-down list.
3. (Optional) Enter a regular expression in the User pattern field to display the
usernames that match the pattern.
4. (Optional) Enter an IP address or subnet in the IP prefix field to display the IP
addresses that match the prefix.
5. Click Display by user to display the statistic results by user, or Display by IP to
display the results by IP address.
919
Advanced Secure Gateway Administration Guide
Note: The Challenge user after logout option only works when cookie-surrogate
credentials are used. If this setting is enabled, the user is explicitly challenged
for credentials after logging out.
Inactivity Timeout
Each realm has a new inactivity-timeout setting, used in conjunction with the last
activity- time value for a particular login. Each time that a login is completed, this
activity time is updated. If the time since the last activity time for a specific login
exceeds the inactivity-timeout value, the user is logged out.
Administrator Action
The administrator can explicitly log out a set of users using the Logout link at the
bottom of the user login information pages. See "Viewing Logged-In Users" on
page 919 for information about displaying user login information. For
information about using the CLI to logout users, see "Related CLI Syntax to
Manage Users" on page 923.
Policy
Policy has three properties and three conditions to manage user logouts. These
properties and conditions can be used to dynamically log out users. For example,
you can create a logout link for users.
For information about using policy, refer to the Visual Policy Manager Reference and
the Content Policy Language Guide.
New Properties
Policy has three properties for logging out users.
❐ user.login.log_out(yes)
This property logs out the user referenced by the current transaction.
❐ user.login.log_out_other(yes)
If a user is logged in at more than one IP address, this property logs the user
out from all IP addresses except the current IP address.
❐ client.address.login.log_out_other(yes)
If more than one user is logged in at the IP address of the current transaction,
this property logs out all users from the current IP address except the current
user.
920
New Conditions
Several conditions support different logout policies.
❐ user.login.count
This condition matches the number of times that a specific user is logged in
with the current realm. You can use this condition to ensure that a user can be
logged in only at one workstation. If the condition is combined with the
user.login.log_out_other property, old login sessions on other workstations
are automatically logged out.
❐ client.address.login.count
This condition matches the number of different users who are logged into the
current IP address, and you can use it to limit the user number.
❐ user.login.time
This condition matches the number of seconds since the current login started,
and you can use it to limit the length of a login session.
Note: The local realm uses Basic credentials but does not need to cache them
since they are stored already on the Advanced Secure Gateway appliance.
921
Advanced Secure Gateway Administration Guide
One-Time Passwords
One-time passwords are trusted for the credential refresh time. Only when the
credential refresh time expires is the user challenged again.
922
For more information about using cookie and IP address surrogate credentials,
see "About Authentication Modes" on page 927.
Policy
Policy has three properties for setting the refresh times for individual
transactions.
❐ authenticate.authorization_refresh_time(x)
where x is the number of seconds to use for the authorization refresh time
during this transaction. The refresh time cannot exceed the time configured in
the realm; policy can be used only to reduce the authorization refresh time.
You can use this property to dynamically force the user's authorization data to
be refreshed.
❐ authenticate.credential_refresh_time(x)
where x is the number of seconds to use for the credential refresh time during
this transaction. The refresh time cannot exceed the time configured in the
realm; policy can be used only to reduce the credential refresh time. You can
use this property to dynamically force the user's credentials to be refreshed.
❐ authenticate.surrogate_refresh_time(x)
where x is the number of seconds to use for the surrogate refresh time during
this transaction. The refresh time cannot exceed the time configured in the
realm; policy can be used only to reduce the surrogate refresh time. You can
use this property to dynamically force the user's surrogate to be refreshed.
For information about using policy, refer to the Visual Policy Manager Reference and
the Content Policy Language Guide.
923
Advanced Secure Gateway Administration Guide
924
Section B: Using Authentication and Proxies
The Advanced Secure Gateway appliance performs authentication to obtain proof
of user identity and then make decisions based on the identity. The appliance
obtains proof of identity by sending the client (a browser, for example) a
challenge—a request to provide credentials. Once the client supplies the
credentials, the appliance authenticates (verifies or rejects) them.
Browsers can respond to different kinds of credential challenges:
❐ Proxy-style challenges—Sent from proxy servers to clients that are explicitly
proxied. In HTTP, the response code is 407.
An authenticating explicit proxy server sends a proxy-style challenge (407/
Proxy-Authenticate) to the browser. The browser knows it is talking to a
proxy and that the proxy wants proxy credentials. The browser responds to a
proxy challenge with proxy credentials (Proxy-Authorization: header). The
browser must be configured for explicit proxy in order for it to respond to a
proxy challenge.
❐ Origin-style challenges—Sent from origin content servers (OCS), or from
proxy servers impersonating a OCS. In HTTP, the response code is 401
Unauthorized.
In transparent proxy mode, the Advanced Secure Gateway appliance uses the
OCS authentication challenge (HTTP 401 and WWW-Authenticate)—acting as
though it is the location from which the user initially requested a page. A
transparent proxy, including a reverse proxy, must not use a proxy challenge,
because the client might not be expecting it.
❐ Client certificate challenges—Sent from servers to initiate an exchange of
certificates. In mutual SSL authentication, an SSL connection between a client
and a server is established only if the client and server validate each other’s
identity during the SSL handshake. Both parties must have their own valid
certificate and the associated private key in order to authenticate.
You might have to configure mutual SSL authentication for an HTTPS reverse
proxy service, or the HTTPS-Console service for Common Access Card (CAC)
authentication. For information, see "About Mutual SSL Authentication" on
page 319.
Terminology
❐ authentication modes: The various ways that the Advanced Secure Gateway
appliance interacts with the client for authentication. For more information,
see "About Authentication Modes" on page 927.
❐ challenge type: The kind of authentication challenge that is issues (for
example, proxy or origin-ip-redirect).
❐ guest authentication: Allowing a guest to login with limited permissions.
❐ impersonation: The proxy uses the user credentials to connect to another
computer and access content that the user is authorized to see.
925
Advanced Secure Gateway Administration Guide
926
Section 2 About Authentication Modes
Specify an authentication mode to control the way the Advanced Secure Gateway
appliance interacts with the client for authentication. The mode specifies the
challenge type and the accepted surrogate credential.
❐ Auto: The default; the mode is automatically selected, based on the request.
Auto can choose any of proxy, origin, origin-ip, or origin-cookie-redirect, depending
on the kind of connection (explicit or transparent) and the transparent
authentication cookie configuration.
❐ Proxy: The Advanced Secure Gateway uses an explicit proxy challenge. No
surrogate credentials are used. This is the typical mode for an authenticating
explicit proxy. In some situations proxy challenges do not work; origin
challenges are then issued.
If you have many requests consulting the back-end authentication authority
(such as LDAP, RADIUS, or the BCAAA service), you can configure the
Advanced Secure Gateway (and possibly the client) to use persistent
connections. This dramatically reduces load on the back-end authentication
authority and improves the all-around performance of the network.
❐ Proxy-IP:The Advanced Secure Gateway appliance uses an explicit proxy
challenge and the client's IP address as a surrogate credential. Proxy-IP
specifies an insecure forward proxy, possibly suitable for LANs of single-user
workstations. In some situations proxy challenges do not work; origin
challenges are then issued.
❐ Origin:
The Advanced Secure Gateway appliance acts like an OCS and issues
OCS challenges. The authenticated connection serves as the surrogate
credential.
❐ Origin-IP: The Advanced Secure Gateway appliance acts like an OCS and issues
OCS challenges. The client IP address is used as a surrogate credential. Origin-
IP is used to support IWA authentication to the upstream device when the
client cannot handle cookie credentials. This mode is primarily used for
automatic downgrading, but it can be selected for specific situations.
❐ Origin-cookie: The Advanced Secure Gateway appliance acts like an origin
server and issues origin server challenges. A cookie is used as the surrogate
credential. Origin-cookie is used in forward proxies to support pass-through
authentication more securely than origin-ip if the client understands cookies.
Only the HTTP and HTTPS protocols support cookies; other protocols are
automatically downgraded to origin-ip.
This mode could also be used in reverse proxy situations if impersonation
(where the proxy uses the user credentials to connect to another computer.
and access content that the user is authorized to see).is not possible and the
origin server requires authentication.
927
Advanced Secure Gateway Administration Guide
❐ Origin-cookie-redirect:
The client is redirected to a virtual URL to be
authenticated, and cookies are used as the surrogate credential. The Advanced
Secure Gateway appliance does not support origin-redirects with the
CONNECT method. For forward proxies, only origin-*-redirect modes are
supported for Kerberos/IWA authentication. (Any other mode uses NTLM
authentication.)
❐ Origin-IP-redirect:
The client is redirected to a virtual URL to be authenticated,
and the client IP address is used as a surrogate credential. The Advanced
Secure Gateway appliance does not support origin-redirects with the
CONNECT method. For forward proxies, only origin-*-redirect modes are
supported for Kerberos/IWA authentication. (Any other mode uses NTLM
authentication.)
❐ SG2:
The mode is selected automatically, based on the request, and uses the
SGOS 2.x-defined rules.
❐ Form-IP: A form is presented to collect the user's credentials. The form is
presented whenever the user’s credential cache entry expires.
❐ Form-Cookie: A form is presented to collect the user's credentials. The cookies
are set on the OCS domain only, and the user is presented with the form for
each new domain. This mode is most useful in reverse proxy scenarios where
there are a limited number of domains.
❐ Form-Cookie-Redirect: A form is presented to collect the user's credentials. The
user is redirected to the authentication virtual URL before the form is
presented. The authentication cookie is set on both the virtual URL and the
OCS domain. The user is only challenged when the credential cache entry
expires.
❐ Form-IP-redirect: This is similar to form-ip except that the user is redirected to the
authentication virtual URL before the form is presented.
Note: Modes that use an IP address surrogate credential are insecure: After a
user has authenticated from an IP address, all further requests from that IP
address are treated as from that user. If the client is behind a NAT, or on a
multi-user system, this can present a serious security problem.
928
Setting the Default Authenticate Mode Property
Setting the authentication.mode property selects a challenge type and surrogate
credential combination. In auto mode, explicit IWA uses connection surrogate
credentials. In sg2 mode, explicit IWA uses IP surrogate credentials.
Note: Sharing the virtual URL with other content on a real host requires
additional configuration if the credential exchange is over SSL.
You can configure the virtual site to something that is meaningful for your
company. The default, which requires no configuration, is www.cfauth.com. See
"Configuring Transparent Proxy Authentication" on page 930 to set up a virtual
URL for transparent proxy.
929
Advanced Secure Gateway Administration Guide
<proxy>
allow http.method=CONNECT authenticate.mode(proxy)
authenticate(ldap)
allow authenticate(cert) authenticate.mode(origin-cookie-redirect)
930
2. Click Clear All, then Apply.
Permitted Errors
Authentication and authorization can be permitted to fail if policy has been
written to allow specific failures. The behavior is as follows:
❐ Authentication Failures: After an authentication failure occurs, the
authentication error is checked against the list of errors that policy specifies as
permitted.
• If the error is not on the list, the transaction is terminated.
• If the error is on the list, the transaction is allowed to proceed although the
user is unauthenticated. Because the transaction is not considered
authenticated, the authenticated=yes policy condition evaluates to false
and the user has no username, group information, or surrogate
credentials. Policy that uses the user, group, domain, or attribute
conditions does not match.
❐ Authorization Failures: After an authorization failure occurs, the
authorization error is checked against the list of errors that policy specifies as
permitted.
• If the error is not on the list, the transaction is terminated.
• If the error is on the list, the transaction is allowed to proceed and the user
is marked as not having authorization data.
• If a user is successfully authenticated but does not have authorization
data, the authenticated=yes condition evaluates to true and the user has
valid authentication credentials.
• The user.authorization_error=any is evaluate to true if user
authorization failed, the user object contains username and domain
information, but not group or attribute information. As a result, policy
using user or domain actions still match, but policy using group or
attribute conditions do not.
To view all authentication and authorization errors, use the # show security
authentication-errors CLI command.
931
Advanced Secure Gateway Administration Guide
Note: You are not limited to these conditions and properties in creating
policy. For a discussion and a complete list of policy conditions and
properties you can use, refer to the Content Policy Language Guide.
Note: You can use guest authentication with or without default groups. If you
use default groups, you can assign guest users to groups for tracking and
statistics purposes. For more information about default groups, see "Using
Default Groups" on page 934.
In the case of guest authentication, a user is not actually authenticated against the
realm, but is:
932
❐ Assigned the specified guest username
❐ Marked as authenticated in the specified realm
❐ Marked as a guest user
❐ Tracked in access logs
Since the user is not actually authenticated, the username does not have to be
valid in that realm.
Note: You are not limited to these conditions and properties in creating policy.
For a complete list of policy conditions and properties you can use, refer to the
Content Policy Language Guide.
933
Advanced Secure Gateway Administration Guide
Note: You can use default groups in conjunction with guest users (see "Using
Guest Authentication" on page 932) or it can be used with regular user
authentication.
Note: You are not limited to these conditions and properties in creating
policy. For a complete list of policy conditions and properties you can use,
refer to the Content Policy Language Guide.
934
Step 1 - Create a Web Authentication Policy Layer
Create the Web Authentication Layer and add a Combined Action Object.
1. In the Management Console, select Configuration > Policy > Visual Policy Manager.
2. Click Launch. The VPM opens.
3. Add a new Web Authentication Layer. Select Policy > Add Web Authentication Layer.
Name the layer and click OK.
4. Right click in the Action column. The VPM displays a menu.
5. On the menu, click Set. The VPM displays a Set Action Object dialog.
6. Create policy to authenticate users. Select New > Combined Action Object. The
VPM displays an Add Combined Action Object dialog.
935
Advanced Secure Gateway Administration Guide
1. On the Add Combined Action Object dialog, create policy for permitted
authentication errors.
Select New > Permit Authentication Error. The VPM displays an Add Permit
Authentication Error Object dialog.
2. Specify which authentication errors are allowed.
You can select an option beside Show to display more or fewer error types.
• Any error:Allow all authentication errors. Any authentication error results
in failover to guest authentication, and users can log in as guest.
• Selected errors:
Allow only the specified types of authentication errors.
Only the specified authentication errors fail over to guest authentication.
All other authentication errors result in the request being denied.
Note: Blue Coat recommends that you select Show > All errors to display
all errors. Then, determine exactly which errors to allow and select only
those using the Selected errors option. Do not select Any, because doing so
means that the need_credentials error (in the User Credentials Required
group) would be permitted and the appliance would not challenge users.
This could result in all users being authenticated as guests, even domain
users.
For more information on these settings, refer to the “The Visual Policy
Manager” chapter in the Visual Policy Manager Reference.
Click OK to save the settings. The dialog lists the dialog.
3. Select the object and click Add. The Selected Action Objects section displays
the action. Verify that the object is below the Authenticate object.
4. Click OK. The Set Action Objects dialog displays the Combined Action Object.
5. Select the object and click OK.
6. Click Install Policy.
936
Guest Username: A name designated for guests; access logs display this
name.Accept the defaults for the remaining settings. For more information,
settings, refer to the “The Visual Policy Manager” chapter in the Visual Policy
Manager Reference.
Click OK to save the settings. The dialog displays the object.
937
Advanced Secure Gateway Administration Guide
Using SSL Between the Client and the Advanced Secure Gateway
Appliance
To configure SSL between the client and the Advanced Secure Gateway appliance
using origin-cookie-redirect or origin-ip-redirect challenges, you must:
❐ Specify a virtual URL with the HTTPS protocol (for example,
https://virtual_address).
Note: You can use SSL between the client and the Advanced Secure Gateway
appliance for origin-style challenges on transparent and explicit connections (SSL
for explicit proxy authentication is not supported).
In addition, if you use a forward proxy, the challenge type must use redirection; it
cannot be an origin or origin-ip challenge type.
When redirected to the virtual URL, the user is prompted to accept the certificate
offered by the Advanced Secure Gateway appliance (unless the certificate is
signed by a trusted certificate authority). If accepted, the authentication
conversation between the appliance and the user is encrypted using the
certificate.
Note: If the hostname does not resolve to the IP address of the Advanced Secure
Gateway appliance, then the network configuration must redirect traffic for that
port to the appliance. Also, if you use the IP address as the virtual hostname, you
might have trouble getting a certificate signed by a CA-Certificate authority
(which might not be important).
938
Using SSL Between the Advanced Secure Gateway and the Authentication
Server
SSL communication between the Advanced Secure Gateway appliance and LDAP
and IWA authentication servers is supported. You configure the SSL
communication settings when configuring the realm:
❐ For information on configuring SSL between the Advanced Secure Gateway
appliance and an IWA realm, see "Configuring IWA Servers" on page 1052.
❐ For information on configuring SSL between the Advanced Secure Gateway
appliance and an LDAP realm, see "Configuring LDAP Servers" on page 1080.
939
Advanced Secure Gateway Administration Guide
Using CPL
Below is a table of all commands available for use in proxy layers of a policy. If a
condition, property, or action does not specify otherwise, it can be used only in
<Proxy> layers. For information about creating effective CPL, refer to the Content
Policy Language Guide.
client_address= Tests the IP address of the client. Can also be used in <Admin> layers.
client.connection. Test the cipher suite negotiated with a securely connected client. Can
negotiated_cipher= also be used in <Exception> layers.
client.connection. Test the cipher strength negotiated with a securely connected client.
negotiated_cipher. Can also be used in <Exception> layers.
strength=
client.host= Test the hostname of the client (obtained through RDNS). Can also be
used in <Admin>, <Forward>, and <Exception> layers.
client.host.has_name= Test the status of the RDNS performed to determine client.host. Can
also be used in <Admin>, <Forward>, and <Exception> layers.
client_protocol= Tests true if the client transport protocol matches the specification. Can
also be used in <Exception> layers.
condition= Tests if the specified defined condition is true. Can be used in all layers.
940
Table 45–1 CPL Commands Available in the <Proxy> Layer (Continued)
console_access= (This trigger was formerly admin=yes|no.) Tests if the current request
is destined for the admin layer. Can also be used in <Cache> and
<Exception> layers.
http.request_line.regex= Test the HTTP protocol request line. Can also be used in <Exception>
layers.
http.request.version= Tests the version of HTTP used by the client in making the request to
the Advanced Secure Gateway. Can also be used in <Cache> and
<Exception> layers.
http.response_code= Tests true if the current transaction is an HTTP transaction and the
response code received from the origin server is as specified. Can also
be used in <Cache> and <Exception> layers.
http.response.version= Tests the version of HTTP used by the origin server to deliver the
response to the Advanced Secure Gateway appliance. Can also be used
in <Cache> and <Exception> layers.
941
Advanced Secure Gateway Administration Guide
im.buddy_id= Tests the buddy_id associated with the IM transaction. Can also be
used in <Exception> layers.
im.chat_room.conference= Tests whether the chat room associated with the transaction has the
conference attribute set. Can also be used in <Exception> layers.
im.chat_room.id= Tests the chat room ID associated with the transaction. Can also be
used in <Exception> layers.
im.chat_room.invite_ Tests whether the chat room associated with the transaction has the
only= invite_only attribute set. Can also be used in <Exception> layers.
im.chat_room.type= Tests whether the chat room associated with the transaction is public or
private. Can also be used in <Exception> layers.
im.chat_room.member= Tests whether the chat room associated with the transaction has a
member matching the specified criterion. Can also be used in
<Exception> layers.
im.chat_room.voice_ Tests whether the chat room associated with the transaction is voice
enabled= enabled. Can also be used in <Exception> layers.
im.client= Test the type of IM client in use. Can also be used in <Exception>,
<Forward>, and <Cache> layers.
im.file.extension= Tests the file extension. Can also be used in <Exception> layers.
im.file.name= Tests the file name (the last component of the path), including the
extension. Can also be used in <Exception> layers.
im.file.path= Tests the file path against the specified criterion. Can also be used in
<Exception> layers.
im.file.size= Performs a signed 64-bit range test. Can also be used in <Exception>
layers.
im.message.reflected Test whether IM reflection occurred. Can also be used in <Exception>
and <Forward> layers.
im.message.route= Tests how the IM message reaches its recipients. Can also be used in
<Exception> layers.
im.message.size= Performs a signed 64-bit range test. Can also be used in <Exception>
layers.
im.message.text. Tests if the message text contains the specified text or pattern. Can also
substring= be used in <Exception> layers.
im.message.opcode= Tests the value of an opcode associated with an im.method of
unknown_send or unknown_receive.
im.message.type= Tests the message type. Can also be used in <Exception> layers.
942
Table 45–1 CPL Commands Available in the <Proxy> Layer (Continued)
im.method= Tests the method associated with the IM transaction. Can also be used
in <Cache> and <Exception> layers.
im.user_id= Tests the user_id associated with the IM transaction. Can also be used
in <Exception> layers.
live= Tests if the streaming content is a live stream. Can also be used in
<Cache> layers.
minute= Tests if the minute of the hour is in the specified range or an exact
match. Can be used in all layers.
month= Tests if the month is in the specified range or an exact match. Can be
used in all layers.
proxy.address= Tests the IP address of the network interface card (NIC) on which the
request arrives. Can also be used in <Admin> layers.
proxy.card= Tests the ordinal number of the network interface card (NIC) used by a
request. Can also be used in <Admin> layers.
proxy.port= Tests if the IP port used by a request is within the specified range or an
exact match. Can also be used in <Admin> layers.
raw_url Test the value of the raw request URL. Can also be used in
<Exception> layers.
raw_url.host Test the value of the 'host' component of the raw request URL. Can also
be used in <Exception> layers.
raw_url.path Test the value of the 'path' component of the raw request URL. Can
also be used in <Exception> layers.
raw_url.pathquery Test the value of the 'path and query' component of the raw request
URL. Can also be used in <Exception> layers.
raw_url.port Test the value of the 'port' component of the raw request URL. Can also
be used in <Exception> layers.
raw_url.query Test the value of the 'query' component of the raw request URL. Can
also be used in <Exception> layers.
realm= Tests if the authenticated condition is set to yes, the client is
authenticated, and the client has logged into the specified realm. an
also be used in <Admin> layers.
release.id= Tests the Advanced Secure Gateway appliance release ID. Can be used
in all layers.
request.header_address. Tests if the specified request header can be parsed as an IP address.
header_name= Can also be used in <Cache> layers.
request.header.header_ Tests the specified request header (header_name) against a regular
name= expression. Can also be used in <Cache> layers.
943
Advanced Secure Gateway Administration Guide
request.header.header_ Test the number of header values in the request for the given
name.count header_name. Can also be used in <Exception> layers.
request.header.header_ Test the total length of the header values for the given header_name.
name.length Can also be used in <Exception> layers.
request.header.Referer. Test whether the Referer URL has a resolved DNS hostname. Can also
url.host.has_name= be used in <Exception> layers.
request.header.Referer. Test whether the Referer URL is expressed in absolute form. Can also
url.is_absolute be used in <Exception> layers.
request.raw_headers. Test the total number of HTTP request headers. Can also be used in
count <Exception> layers.
request.raw_headers. Test the total length of all HTTP request headers. Can also be used in
length <Exception> layers.
request.raw_headers. Test the value of all HTTP request headers with a regular expression.
regex Can also be used in <Exception> layers.
request.x_header.header_ Test the number of header values in the request for the given
name.count header_name. Can also be used in <Exception> layers.
request.x_header.header_ Test the total length of the header values for the given header_name.
name.length Can also be used in <Exception> layers.
response.header.header_ Tests the specified response header (header_name) against a regular
name= expression. Can also be used in <Cache> layers.
response.x_header. Tests the specified response header (header_name) against a regular
header_name= expression. Can also be used in <Cache> layers.
server_url[.case_ Tests if a portion of the requested URL exactly matches the specified
sensitive|.no_lookup]= pattern. Can also be used in <Forward> layers.
socks.accelerated= Controls the SOCKS proxy handoff to other protocol agents.
socks.method= Tests the protocol method name associated with the transaction. Can
also be used in <Cache> and <Exception> layers.
socks.version= Switches between SOCKS 4/4a and 5. Can also be used in
<Exception> and <Forward> layers.
streaming.content= (This trigger has been renamed from streaming.) Can also be used in
<Cache>, <Exception>, and <Forward> layers.
time= Tests if the time of day is in the specified range or an exact match. Can
be used in all layers.
tunneled=
944
Table 45–1 CPL Commands Available in the <Proxy> Layer (Continued)
url.extension= Tests if the filename extension at the end of the path matches the
specified string. Can also be used in <Forward> layers.
url.host= Tests if the host component of the requested URL matches the IP
address or domain name. Can also be used in <Forward> layers.
url.host.has_name Test whether the request URL has a resolved DNS hostname. Can also
be used in <Exception> layers
url.is_absolute Test whether the request URL is expressed in absolute form. Can also
be used in <Exception> layers
url.host.is_numeric= This is true if the URL host was specified as an IP address. Can also be
used in <Forward> layers.
url.host.no_name= This is true if no domain name can be found for the URL host. Can also
be used in <Forward> layers.
url.host.regex= Tests if the specified regular expression matches a substring of the
domain name component of the request URL. Can also be used in
<Forward> layers.
945
Advanced Secure Gateway Administration Guide
always_verify( ) Determines whether each request for the objects at a particular URL
must be verified with the origin server.
authenticate( ) Identifies a realm that must be authenticated against. Can also be used
in <Admin> layers.
authenticate.force( ) Either disables proxy authentication for the current transaction (using
the value no) or requests proxy authentication using the specified
authentication realm. Can also be used in <Admin> layers.
authenticate.form( ) When forms-based authentication is in use, authenticate.form ( )
selects the form used to challenge the user.
authenticate.mode(auto) Setting the authentication.mode property selects a challenge type and
authenticate.mode(sg2) surrogate credential combination. In auto mode, explicit IWA uses
connection surrogate credentials. In sg2.mode, explicit IWA uses IP
surrogate credentials.
authenticate.redirect_ Sets whether requests stored during forms-based authentication can be
stored_requests redirected if the upstream host issues a redirecting response.
bypass_cache( ) Determines whether the cache is bypassed for a request.
check_authorization( ) In connection with CAD (Caching Authenticated Data) and CPAD
(Caching Proxy Authenticated Data) support,
check_authorization( ) is used when you know that the upstream
device will sometimes (not always or never) require the user to
authenticate and be authorized for this object. Can also be used in
<Cache> layers.
delete_on_abandonment( ) If set to yes, then if all clients requesting an object close their
connections prior to the object being delivered, the object fetch from
the origin server is abandoned. Can also be used in <Cache> layers.
deny Denies service. Can be used in all layers except <Exception> and
<Forward> layers.
946
Table 45–2 Properties Available in the <Proxy> Layer (Continued)
947
Advanced Secure Gateway Administration Guide
948
Section E: Forwarding BASIC Credentials
Forwarding BASIC credentials enables single sign on when other, more secure,
options are unavailable.
Situation
An internal reverse proxy setup. The administrator wishes to forward BASIC
credential, either user or custom credentials to a particular OCS.
949
Advanced Secure Gateway Administration Guide
7a
7b
7c
Note: For all transactions which match the Send Credentials Upstream Object,
credentials are sent even if the receiving server does not require them.
Depending upon how your policy is written, use the Do Not Send Credentials
Upstream object to manage which servers do not receive credentials. Enforce
this rule using the VPM object, Do Not Send Credentials Upstream. It is a fixed
action and requires no configuration.
950
Note: Refer to the Content Policy Language Guide for details about CPL and how
transactions trigger the evaluation of policy file layers.
951
Advanced Secure Gateway Administration Guide
952
Chapter 46: Local Realm Authentication and Authorization
Using a Local realm is appropriate when the network topology does not
include external authentication or when you want to add users and
administrators to be used by the Advanced Secure Gateway appliance only.
The Local realm (you can create up to 40) uses a Local User List, a collection of
users and groups stored locally. You can create up to 50 different Local User
Lists. Multiple Local realms can reference the same list at the same time,
although each realm can only reference one list at a time. The default list used
by the realm can be changed at any time.
Local realm authentication can be used to authenticate administrative users to
the Advanced Secure Gateway appliance management console, and is highly
recommended. Because the user details are stored on the appliance, local
authentication realms are always available.
953
Advanced Secure Gateway Administration Guide
954
Section 2 Changing Local Realm Properties
Once you have created a Local realm, you can modify the properties.
2a
2b
2c
3a
3b
3c
3d
955
Advanced Secure Gateway Administration Guide
Before the refresh time expires, if a surrogate credential (IP address or cookie)
is available and it matches the expected surrogate credential, the Advanced
Secure Gateway appliance authenticates the transaction. After the refresh time
expires, the Advanced Secure Gateway appliance verifies the user’s
credentials. Depending upon the authentication mode and the user-agent, this
may result in challenging the end user for credentials.
The main goal of this feature is to verify that the user-agent still has the
appropriate credentials.
Enter the number of seconds in the Authorization refresh time field. The
Authorization Refresh Time allows you to manage how often the
authorization data is verified with the authentication realm. It has a default
setting of 900 seconds (15 minutes). You can configure this in policy for better
control over the resources as policy overrides any settings made here.
4. In the Inactivity timeout field, enter the number of seconds to specify the amount
of time a session can be inactive before it is logged out.
5. Configure cookie options:
a. Select the Use persistent cookies check box to use persistent browser
cookies instead of session browser cookies.
b. Select the Verify the IP address in the cookie check box if you would like
the cookies surrogate credentials to only be accepted for the IP address
that the cookie was authenticated. Disabling this will allow cookies to
be accepted from other IP addresses.
6. You can specify a virtual URL. For more information on the virtual URL, see
"About Origin-Style Redirection" on page 929.
7. Select the Challenge user after logout check box if the realm requires the users to
enter their credentials after they have logged out.
8. Click Apply.
Notes
If you use guest authentication/authorization:
❐ Local realms provide split authorization, and it is possible to be successfully
authenticated but have authorization fail.
❐ If the Local realm validate authorized user command is disabled and the
user does not exist in the authorization realm, authorization is considered a
success and the user is assigned to the default group if there is one configured
and it is of interest to policy.
956
Creating a Local User List
The user list local_user_database is created on a new system or after an upgrade.
It is empty on a new system. If a password file existed on the Advanced Secure
Gateway appliance before an upgrade, then the list contains all users and groups
from the password file; the initial default user list is local_user_database. If a
new user list is created, the default can be changed to point to it instead by
invoking the security local-user-list default list list_name command. You
can create up to 50 new lists with 10,000 users each.
Lists can be uploaded or you can directly edit lists through the CLI. If you want to
upload a list, it must be created as a text file using the .htpasswd format of the
Advanced Secure Gateway appliance.
Each user entry in the list consists of:
❐ username
❐ List of groups
❐ Hashed password
❐ Enabled/disabled boolean searches
A list that has been populated looks like this:
#(config) security local-user-list edit list_name
#(config local-user-list list_name) view
list20
Lockout parameters:
Max failed attempts: 60
Lockout duration: 3600
Reset interval: 7200
Users:
admin1
Hashed Password: $1$TvEzpZE$Z2A/OuJU3w5LnEONDHkmg.
Enabled: true
Groups:
group1
admin2
Hashed Password: $1$sKJvNB3r$xsInBU./2hhBz6xDAHpND.
Enabled: true
Groups:
group1
group2
admin3
Hashed Password: $1$duuCUt30$keSdIkZVS4RyFz47G78X20
Enabled: true
Groups:
group2
Groups:
group1
group2
To create a new empty local user list:
#(config) security local-user-list create list_name
957
Advanced Secure Gateway Administration Guide
Username
The username must be case-sensitively unique, and can be no more than 64
characters long. All characters are valid, except for a colon (:).
A new local user is enabled by default and has an empty password.
List of Groups
You cannot add a user to a group unless the group has previously been created in
the list. The group name must be case-sensitively unique, and can be no more
than 64 characters long. All characters are valid, except for colon (:).
The groups can be created in the list; however, their user permissions are defined
through policies only.
Hashed Password
The hashed password must be a valid UNIX DES or MD5 password whose plain-
text equivalent cannot be more than 64 characters long.
To populate the local user list using an off-box .htpasswd file, continue with the
next section. To populate the local user list using the Advanced Secure Gateway
CLI, go to "Defining the Local User List" on page 956.
Important: Because the -c option overwrites the existing file, do not use the option if
you are adding users to an existing .htpasswd file.
After you add the users to the .htpasswd file, you can manually edit the file to add
user groups. When the .htpasswd file is complete, it should have the following
format:
user:encrypted_password:group1,group2,…
user:encrypted_password:group1,group2,…
Note: You can also modify the users and groups once they are loaded on the
Advanced Secure Gateway appliance. To modify the list once it is on the
appliance, see "Populating a Local User List through the Advanced Secure
Gateway Appliance" on page 959.
958
Uploading the .htpasswd File
When the .htpasswd file is uploaded, the entries from it either replace all entries in
the default local user list or append to the entries in the default local user list. One
default local user list is specified on the Advanced Secure Gateway appliance.
To set the default local user list use the command security local-user-list
default list list_name. The list specified must exist.
To specify that the uploaded .htpasswd file replace all existing user entries in the
default list, enter security local-user-list default append-to-default disable
before uploading the .htpasswd file.
To specify that the .htpasswd file entries should be appended to the default list
instead, enter security local-user-list default append-to-default enable.
Note: To use the set_auth.pl script, you must have Perl binaries on the system
where the script is running.
where username and password are valid administrator credentials for the
Advanced Secure Gateway appliance.
Note: To add users and groups to the list, enter the following commands,
beginning with groups, since they must exist before you can add them to a
user account.
959
Advanced Secure Gateway Administration Guide
Note: If a user has no failed logins, the statistic does not display.
960
group2
admin3
Hashed Password: $1$duuCUt30$keSdIkZVS4RyFz47G78X20
Enabled: true
Groups:
group2
Groups:
group1
group2
961
Advanced Secure Gateway Administration Guide
Note: Refer to the Content Policy Language Reference for details about CPL and
how transactions trigger the evaluation of policy file layers.
962
<Proxy>
authenticate(LocalRealm)
<Proxy>
group=”group1” allow
963
Advanced Secure Gateway Administration Guide
964
Chapter 47: CA eTrust SiteMinder Authentication
965
Advanced Secure Gateway Administration Guide
Each Advanced Secure Gateway SiteMinder realm used causes the creation of a
BCAAA process on the Windows or Solaris host computer running BCAAA. A
single host computer can support multiple Advanced Secure Gateway realms
(from the same or different Advanced Secure Gateway appliances); the number
depends on the capacity of the BCAAA host computer and the amount of activity
in the realms.
Note: The request URL is not sent to the SiteMinder policy server as the
requested resource; the requested resource is the entire Advanced Secure
Gateway realm. Access control of individual URLs is done on the Advanced
Secure Gateway appliance using CPL or VPM.
The SiteMinder realm that controls the protected resource must be configured
with a compatible authentication scheme. The supported schemes are Basic (in
plain text and over SSL), Forms (in plain text and over SSL), and X.509 certificates.
Configure the SiteMinder realm with one of these authentication schemes.
966
Note: Only the following X.509 Certificates are supported: X.509 Client Cert
Template, X.509 Client Cert and Basic Template, and X.509 Client Cert and Form
Template.
❐ In order to use off-box redirection (such as an SSO realm), all agents involved
must have the setting EncryptAgentName=no in their configurations.
967
Advanced Secure Gateway Administration Guide
❐ The Advanced Secure Gateway appliance credential cache only caches the
user's authentication information for the smaller of the time-to-live (TTL)
configured on the Advanced Secure Gateway appliance and the session TTL
configured on the SiteMinder policy server.
968
Configuring the Advanced Secure Gateway Realm
The Advanced Secure Gateway appliance realm must be configured so that it can:
❐ Find the BCAAA service that acts on its behalf (hostname or IP address, port,
SSL options, and the like).
❐ Provide BCAAA with the information necessary to allow it to identify itself as
a Web agent (agent name, shared secret).
❐ Provide BCAAA with the information that allows it to find the SiteMinder
policy server (IP address, ports, connection information.)
❐ Provide BCAAA with the information that it needs to do authentication and
collect authorization information (protected resource name), and general
options (server fail-over and off-box redirection)
For more information on configuring the Advanced Secure Gateway SiteMinder
realm, see "Creating a SiteMinder Realm" on page 971.
Note: All Advanced Secure Gateway appliance and agent configuration occurs
on the appliance. The Advanced Secure Gateway appliance sends the necessary
information to BCAAA when it establishes communication.
969
Advanced Secure Gateway Administration Guide
970
Section 1 Creating a SiteMinder Realm
To create a SiteMinder realm:
1. Select the Configuration > Authentication > CA eTrust SiteMinder > SiteMinder Realms
tab.
2. Click New. The Management Console displays the Add SiteMinder Realm
dialog.
3. In the Realm name field, enter a realm name. The name can be 32 characters
long and composed of alphanumeric characters and underscores. The name
must start with a letter. The name should be meaningful to you, but it does not
have to be the name of the SiteMinder policy server.
4. Click OK.
5. Click Apply.
971
Advanced Secure Gateway Administration Guide
b. Change the port from the default of 16101 if your SiteMinder port is
different.
c. Enter the agent name in the Agent name field. The agent name is the
name as configured on the SiteMinder policy server.
d. You must create a secret for the Agent that matches the secret created
on the SiteMinder policy server. Click Change Secret. SiteMinder secrets
can be up to 64 characters long and are always case sensitive.
4. (Optional) Enter an alternate agent host and agent name in the Alternate agent
section.
5. Configure SSL options:
a. (Optional) Click Enable SSL to enable SSL between the Advanced
Secure Gateway and the BCAAA service.
b. (Optional) Select the SSL device profile that this realm uses to make an
SSL connection to a remote system. You can choose any device profile
that displays in the drop-down list. For information on using device
profiles, see "Appliance Certificates and SSL Device Profiles" on page
1348.
6. In the Timeout Request field, enter the number of seconds the Advanced Secure
Gateway allows for each request attempt before timing out. (The default
request timeout is 60 seconds.)
7. If you want group comparisons for SiteMinder groups to be case sensitive,
select Case sensitive.
8. Click Apply.
972
Section 2 Configuring SiteMinder Servers
Once you create a SiteMinder realm, use the SiteMinder Servers page to create
and edit the list of SiteMinder policy servers consulted by the realm.
1. Select the Configuration > Authentication > CA eTrust SiteMinder > SiteMinder Servers
tab.
2. From the Realm name drop-down list, select the SiteMinder realm for which
you want to add servers or change server properties.
3. To create a new SiteMinder policy server, click New. The Management Console
displays the Add List Item dialog.
4. Enter the name of the server in the dialog. This name is used only to identify
the server in the Advanced Secure Gateway appliance’s configuration; it
usually is the real hostname of the SiteMinder policy server.
5. Click OK.
6. To edit an existing SiteMinder policy server, highlight the server and click Edit.
The Management Console displays the Edit SiteMinder Server dialog.
7a
7b
7c
7d
7e
7f
973
Advanced Secure Gateway Administration Guide
974
Section 3 Defining SiteMinder Server General Properties
The SiteMinder Server General tab allows you to specify the protected resource
name, the server mode, and whether requests should always be redirected off
box.
2a
2b
2c
Note: The server mode describes the way the agent (the BCAAA service)
interacts with the SiteMinder policy server, not the way that Advanced
Secure Gateway appliance interacts with BCAAA.
Note: All SiteMinder web agents involved must have the setting
EncryptAgentName=no in their configurations to go off-box for any reason.
975
Advanced Secure Gateway Administration Guide
4. If your Web applications need information from the SiteMinder policy server
responses, you can select Add Header Responses. Responses from the policy
server obtained during authentication are added to each request forwarded by
the Advanced Secure Gateway appliance. Header responses replace any
existing header of the same name; if no such header exists, the header is
added. Cookie responses replace a cookie header with the same cookie name;
if no such cookie header exists, one is added.
5. To enable validation of the client IP address, select Validate client IP address. If
the client IP address in the SSO cookie can be valid yet different from the
current request client IP address because of downstream proxies or other
devices, clear the Validate client IP address option for the realm. Also modify the
SiteMinder agents participating in SSO with the Advanced Secure Gateway
appliance; set the TransientIPCheck variable to yes to enable IP address
validation and no to disable it.
6. Click Apply.
976
2
4a
4b
4c
b. Select Use FQDN or to determine through search criteria, which uses the
FQDN or full username determined while identifying the user during
the authentication process. -or-
c. Select Determine by search, which enables the fields below. Specify the
following to focus the search:
• LDAP search realm name: An LDAP realm to search. In most cases,
this is the same as the LDAP realm used for authorization.
• Search filter:
Used during the LDAP search. This search filter can
contain policy substitutions including the $(cs-username)
substitution.
977
Advanced Secure Gateway Administration Guide
2. From the Realm name drop-down list, select the SiteMinder realm for which
you want to change properties.
3. If needed, change the SiteMinder realm Display name. The default value for the
display name is the realm name. The display name cannot be greater than 128
characters and it cannot be empty.
4. Configure refresh options:
978
a. Select Use the same refresh time for all if you would like to use the same
refresh time for all.
b. Enter the number of seconds in the Credential refresh time field. The
Credential Refresh Time is the amount of time Basic credentials
(username and password) are kept on the Advanced Secure Gateway
appliance. This feature allows the Advanced Secure Gateway
appliance to reduce the load on the authentication server and enables
credential spoofing. It has a default setting of 900 seconds (15
minutes). You can configure this in policy for better control over the
resources as policy overrides any settings made here. Before the
refresh time expires, the Advanced Secure Gateway appliance
authenticates the user supplied credentials against the cached
credentials. If the credentials received do not match the cached
credentials, they are forwarded to the authentication server in case the
user password changed. After the refresh time expires, the credentials
are forwarded to the authentication server for verification.
c. Enter the number of seconds in the Surrogate refresh time field. The
Surrogate Refresh Time allows you to set a realm default for how often
a user’s surrogate credentials are refreshed. Surrogate credentials are
credentials accepted in place of a user’s actual credentials. The default
setting is 900 seconds (15 minutes). You can configure this in policy for
better control over the resources as policy overrides any settings made
here.
Before the refresh time expires, if a surrogate credential (IP address or
cookie) is available and it matches the expected surrogate credential, the
Advanced Secure Gateway appliance authenticates the transaction. After
the refresh time expires, the Advanced Secure Gateway appliance verifies
the user’s credentials. Depending upon the authentication mode and the
user-agent, this may result in challenging the end user for credentials.
The main goal of this feature is to verify that the user-agent still has the
appropriate credentials.
5. Enter the number of seconds in the Inactivity timeout field to specify the amount
of time a session can be inactive before being logged out.
6. If you use Basic credentials and want to cache failed authentication attempts
(to reduce the load on the authentication service), enter the number of seconds
in the Rejected Credentials time field. This setting, enabled by default and set to
one second, allows failed authentication attempts to be automatically rejected
for up to 10 seconds. Any Basic credentials that match a failed result before its
cache time expires are rejected without consulting the back-end authentication
service. The original failed authentication result is returned for the new
request. All failed authentication attempts can be cached: Bad password,
expired account, disabled account, old password, server down. To disable
caching for failed authentication attempts, set the Rejected Credentials time field
to 0.
7. Configure cookie options:
979
Advanced Secure Gateway Administration Guide
a. Select the Use persistent cookies check box to use persistent browser
cookies instead of session browser cookies.
b. Select the Verify the IP address in the cookie check box if you would like
the cookies surrogate credentials to only be accepted for the IP address
that the cookie was authenticated. Disabling this allows cookies to be
accepted from other IP addresses.
8. Specify the virtual URL to redirect the user to when they need to be
challenged by the Advanced Secure Gateway appliance. If the appliance is
participating in SSO, the virtual hostname must be in the same cookie domain
as the other servers participating in the SSO. It cannot be an IP address or the
default, www.cfauth.com.
9. Select Challenge user after logout if the realm requires the users to enter their
credentials after they have logged out.
10. Click Apply.
Note: Refer to Content Policy Language Guide for details about CPL and how
transactions trigger the evaluation of policy file <Proxy> and other layers.
980
Configuration
1. Download and install the BCAAA service.
2. Set up the SiteMinder server; be sure to configure the SMSession cookie and
the BCSI_USERNAME variable on the SiteMinder server.
3. Configure an LDAP, XML, or Local realm that can be used to authorize users.
4. Create and define a SiteMinder realm. Specifically:
• Use the Agents tab to configure the BCAAA service and the SiteMinder
service to work with the SiteMinder server.
• Use the SiteMinder Server tab to associate the realm with the SiteMinder
server.
• Use the SiteMinder Server General tab to always redirect requests off box.
• Use the Authorization tab to set up search criteria for user IDs.
Behavior
❐ Advanced Secure Gateway appliance receives a request for a user.
• If this request does not contain an SMSession cookie (user
unauthenticated), the Advanced Secure Gateway appliance redirects the
request to the central authentication service. The URL of the service is
configured in the scheme definition on the SiteMinder policy server. When
the request returns from the central authentication service, the SMSession
cookie is extracted and sent to the BCAAA service for validation.
• If the request does contain an SMSession cookie, the Advanced Secure
Gateway appliance passes the SMSession cookie through the BCAAA
service for validation and authentication.
❐ The SiteMinder policy server authenticates the user and sends the LDAP
attribute of the user (UID) in the BCSI_USERNAME variable to the BCAAA
service, which then passes it on the Advanced Secure Gateway appliance.
❐ The Advanced Secure Gateway appliance uses the UID attribute to do an
LDAP search, identifying the user FQDN.
❐ The Advanced Secure Gateway appliance uses the FQDN to construct an
LDAP query to the authorization LDAP realm server to compare and validate
group membership.
You can use the result to check group-based policy.
981
Advanced Secure Gateway Administration Guide
982
Chapter 48: Certificate Realm Authentication
If you have a Public Key Infrastructure (PKI) in place, you can configure the
Advanced Secure Gateway appliance to authenticate users based on their X.509
certificates by creating a certificate realm. Additionally, if the users are
members of an LDAP, XML, or Local group, you can configure the certificate
realm to forward the user credentials to the LDAP, XML, or Local realm for
authorization.
X.509 Certificate authentication realms can be used to authenticate
administrative users (read only and read/write) to the management console. To
ensure that credentials are not sent in clear text, configure the Certificate realm
to use TLS to secure the communication with the authorization server.
The following topics describe how to set up and configure a certificate realm:
❐ "How a Certificate Realm Works" on page 983
❐ "Configuring Certificate Realms" on page 985
❐ "Specifying an Authorization Realm" on page 990
❐ "Revoking User Certificates" on page 991
❐ "Creating a Certificate Authorization Policy" on page 992
❐ "Tips" on page 992
❐ "Certificate Realm Example" on page 993
Note: If you authenticate with a certificate realm, you cannot also challenge for
a password.
983
Advanced Secure Gateway Administration Guide
❐ The policy works as desired when all certificate realm-authenticated users are
not in any group
984
Section 1 Configuring Certificate Realms
To configure a certificate realm, you must:
❐ Configure SSL between the client and Advanced Secure Gateway appliance.
See "Using SSL with Authentication and Authorization Services" on page 938
for more information.
❐ Enable verify-client on the HTTPS reverse proxy service to be used. See
"Creating an HTTPS Reverse Proxy Service" on page 315 for more
information.
❐ Verify that the certificate authority that signed the client's certificates is in the
Advanced Secure Gateway trusted list. See "Importing CA Certificates" on
page 1188.
❐ Create the certificate realm as described in "Creating a Certificate Realm" on
page 985.
❐ Specify the fields to extract from the client certificate as described in
"Configuring Certificate Realm Properties" on page 985.
❐ Customize the certificate realm properties as described in "Defining General
Certificate Realm Properties" on page 988.
❐ (optional) If you want to authorize users who are part of an LDAP, XML, or
Local group, configure authorization as described in "Specifying an
Authorization Realm" on page 990.
985
Advanced Secure Gateway Administration Guide
2. From the Realm name drop-down list, select the Certificate realm for which you
want to change realm properties.
3. In the username field, enter the substitution that specifies the common name in
the subject of the certificate. $(CN.1) is the default. To build complex
substitutions, you can enter multiple attributes into the field.
4. (Optional) In the Full Username field, enter the substitutions used to construct
the user's full username. For example, the user principal name (UPN) or
LDAP distinguished name (DN). The field is empty by default.
The substitutions used to construct the username use the following parser
format:
Parser Format
$([attributename=][field][.generalName[.generalNameindex]]
[.attribute[.attribute index]])
To see how the parser works, examine the client certificate example and the
resulting substitutions in the table.
986
Parser Function Format Example
5. Add or delete OIDs to enforce Extended Key Usage fields in a certificate. The
list is empty by default. For example, to enforce a Microsoft Smart Card Logon
OID, add a valid OID such as 1.3.6.1.4.1.311.20.2.2.
6. Click Apply to complete the changes.
987
Advanced Secure Gateway Administration Guide
2. From the Realm name drop-down list, select the Certificate realm to modify.
3. If necessary, change the realm’s display name.
4. Configure refresh options:
a. Select Use the same refresh time for all to use the same refresh time for all.
b. Enter the number of seconds in the Surrogate refresh time field. This
allows you to set a realm default for how often a user’s surrogate
credentials are refreshed. Surrogate credentials are credentials
accepted in place of a user’s actual credentials. The default setting is
900 seconds (15 minutes). You can configure this in policy for better
control over the resources as policy overrides any settings made here.
Before the refresh time expires, if a surrogate credential (IP address or
cookie) is available and it matches the expected surrogate credential, the
Advanced Secure Gateway appliance authenticates the transaction. After
the refresh time expires, the Advanced Secure Gateway verifies the user’s
certificate.
988
c. Enter the number of seconds in the Authorization refresh time field. This
allows you to manage how often the authorization data is verified
with the authentication realm. It has a default setting of 900 seconds
(15 minutes). You can configure this in policy for better control over
the resources as policy overrides any settings made here.
5. Enter the number of seconds in the Inactivity timeout field to specify the amount
of time a session can be inactive before being logged out.
6. Configure cookie options:
a. Select Use persistent cookies to use persistent browser cookies instead of
session browser cookies.
b. Select Verify the IP address in the cookie if you would like the cookies
surrogate credentials to only be accepted for the IP address that the
cookie was authenticated. Disabling this allows cookies to be accepted
from other IP addresses.
7. You can specify a virtual URL. For more information on the virtual URL, see
"About Origin-Style Redirection" on page 929.
8. Click Apply.
989
Advanced Secure Gateway Administration Guide
4a
4b
4c
2. Select the certificate realm for which you want to configure authorization
from the Realm name drop-down list.
3. Select the realm that to use for authorization from the Authorization realm name
drop-down list. You can use an LDAP, Local, or XML realm to authorize the
users in a certificate realm.
4. Configure authorization options. You cannot always construct the user's
authorization username from the substitutions available. If not, you can
search on a LDAP server for a user with an attribute matching the substitution
and then use the FQDN for the matched user as the authorization username.
Authorization would then be done on that authorization username.:
a. In the Authorization username field, enter the substitution to use to
identify the user. The default authorization username is $(cs-
username). You can use any policy substitutions. -or-
b. Select Use FQDN or to determine through search criteria, which uses the
FQDN or full username determined while identifying the user during
the authentication process. -or-
c. Select Determine by search, which enables the fields below. Specify the
following to focus the search:
• LDAP search realm name: An LDAP realm to search. In most cases,
this is the same as the LDAP realm used for authorization.
990
• Search filter:
Used during the LDAP search. This search filter can
contain policy substitutions, including the $(cs-username)
substitution.
• User attribute: An attribute on the entry returned in the LDAP
search results that has the value to use as the authorization
username. In most cases this is the FQDN of the user entry.
5. (Optional) Click Set Users to Ignore to add a list of users excluded from
searches.
6. Click Apply.
Note: This method of revoking user certificates is meant for those with a small
number of certificates to manage. For information on using automatically
updated lists, see "Using Certificate Revocation Lists" on page 1182.
Example
If you have only one Certificate Signing Authority signing user certificates, you
do not need to test the issuer. In the <Proxy> layer of the Local Policy file:
<proxy>
deny user.x509.serialnumber=11
deny user.x509.serialNumber=0F
If you have multiple Certificate Signing Authorities, test both the issuer and the
serial number. In the <Proxy> layer of the Local Policy file:
991
Advanced Secure Gateway Administration Guide
<proxy>
deny
user.x509.issuer="Email=name,CN=name,OU=name,O=company,L=city,ST=state
or province,C=country" user.x509.serialnumber=11\
deny user.x509.issuer="CN=name,OU=name,O=company, L=city,ST=state or
province,C=country" \
deny user.x509.serialnumber=2CB06E9F00000000000B
Note: Refer to the Content Policy Language Guide for details about CPL and how
transactions trigger the evaluation of policy file <Proxy> and other layers.
Be aware that the default policy condition for these examples is allow. On new
SGOS systems, the default policy condition is deny.
❐ Every certificate realm authenticated user is allowed access the Advanced
Secure Gateway.
<Proxy>
authenticate(CertificateRealm)
Tips
If you use a certificate realm and see an error message similar to the following
Realm configuration error for realm "cert": connection is not SSL.
This means that certificate authentication was requested for a transaction, but the
transaction was not done on an SSL connection, so no certificate was available.
This can happen in three ways:
992
❐ The authenticate mode is either origin-IP-redirect/origin-cookie-redirect
or origin-IP/origin-cookie, but the virtual URL does not have an https:
scheme. This is likely if authentication through a certificate realm is selected
with no other configuration, because the default configuration does not use
SSL for the virtual URL.
❐ In a server accelerator deployment, the authenticate mode is origin and the
transaction is on a non-SSL port.
❐ The authenticate mode is origin-IP-redirect/origin-cookie-redirect, the
user has authenticated, the credential cache entry has expired, and the next
operation is a POST or PUT from a browser that does not handle 307 redirects
(that is, from a browser other than Internet Explorer). The workaround is to
visit another URL to refresh the credential cache entry and then try the POST
again.
Configuration
1. Configure an HTTPS reverse proxy as explained in "Creating an HTTPS
Reverse Proxy Service" on page 315. Be sure to enable the Verify Client option.
2. Configure SSL between the client and Advanced Secure Gateway appliance
(for more information, see "Using SSL with Authentication and Authorization
Services" on page 938).
3. Verify that the certificate authority that signed the client's certificates is in the
Advanced Secure Gateway appliance trusted list.
4. Make sure that Advanced Secure Gateway appliance CRL is correct (for more
information, see "Using Certificate Revocation Lists" on page 1182.)
5. Create a Certificate Authority Certificate List (CCL) and add the CA that
created the certificate to the CCL. (For more information, see "Managing CA
Certificate Lists" on page 1191.)
6. Configure the certificate realm:
• Use the Configuration > Authentication > Certificate > Realms tab to name the
realm.
• Use the Configuration > Authentication > Certificate > Main tab to define the
substitutions used to retrieve the username from the certificate field:
• Username
• Full username
• Extended key usage OIDs
993
Advanced Secure Gateway Administration Guide
• Use the Configuration > Authentication > Certificate > Authorization tab to:
• Specify the LDAP realm to search
• Select the Determine by search radio button and specify a search filter to
map the username to a specific LDAP attribute, such as (email=$(cs-
username))
• Use the Configuration > Authentication > Certificate > General tab to set:
• Refresh times
• Inactivity timeout
• Cookies
• Virtual URL
Behavior
❐ The Advanced Secure Gateway appliance retrieves the end-user PKI
certificate from the browser when an HTTP request is received for the domain.
❐ The user enters the smart card and pin code information into the browser.
❐ The browser retrieves the certificate from a smart card or from within a web
browser's certificate store and sends it to the Advanced Secure Gateway
appliance.
• For a specific destination, the certificate must be a validate certificate from
a specific Certificate Authority and the certificate must not be revoked.
• The e-mail address being used as the username must be retrieved from the
certificate as a unique ID for the user.
❐ The Advanced Secure Gateway appliance does an LDAP search operation with
the retrieved username from the certificate. If only one entry in the LDAP
server exists with this e-mail address, the user is authenticated. If the user has
the correct group attributes, the user is authorized to access the website.
994
Chapter 49: Oracle COREid Authentication
995
Advanced Secure Gateway Administration Guide
The Advanced Secure Gateway supports authentication with Oracle COREid v6.5
and v7.0.
Note: Blue Coat assumes you are familiar with the configuration of the COREid
Access System and WebGates.
Important: The request URL is not sent to the Access System as the requested
resource; the requested resource is the entire Advanced Secure Gateway realm.
Access control of individual URLs is done on the Advanced Secure Gateway
using policy.
The COREid policy domain that controls the protected resource must use one of
the challenge methods supported by the Advanced Secure Gateway appliance.
Supported challenge methods are Basic, X.509 Certificates and Forms. Acquiring
the credentials over SSL is supported as well as challenge redirects to another
server.
The Advanced Secure Gateway appliance requires information about the
authenticated user to be returned as COREid authorization actions for the
associated protected resource. Because authentication actions are not returned
when a session token is simply validated, the actions must be authorization and
not authentication actions.
The following authorization actions should be set for all three authorization types
(Success, Failure, and Inconclusive):
❐ A HeaderVar action with the name BCSI_USERNAME and with the value
corresponding to the simple username of the authenticated user. For example,
with an LDAP directory this might be the value of the cn attribute or the uid
attribute.
996
❐ A HeaderVar action with the name BCSI_GROUPS and the value corresponding
to the list of groups to which the authenticated user belongs. For example,
with an LDAP directory this might be the value of the memberOf attribute.
After the COREid AccessGate, authentication scheme, policy domain, rules, and
actions have been defined, the Advanced Secure Gateway appliance can be
configured.
Note: The Advanced Secure Gateway credential cache only caches the user's
authentication information for the lesser of the two values of the time-to-live
(TTL) configured on the appliance and the session TTL configured in the Access
System for the AccessGate.
Note: All Advanced Secure Gateway and agent configuration occurs on the
appliance. The appliance sends the necessary information to BCAAA when it
establishes communication.
997
Advanced Secure Gateway Administration Guide
❐ A forward proxy must use one of the origin-redirect modes (such as origin-
cookie-redirect). When using origin-*-redirect modes, the virtual URL's
hostname must be in the same cookie domain as the other systems. It cannot
be an IP address; the default www.cfauth.com does not work either.
When using origin-*-redirect, the SSO cookie is automatically set in an
appropriate response after the Advanced Secure Gateway appliance authenticates
the user. When using origin mode (in a reverse proxy), setting this cookie must be
explicitly specified by the administrator using the policy substitution variable
$(x-agent-sso-cookie). The variable $(x-agent-sso-cookie) expands to the
appropriate value of the set-cookie: header.
Note: The Advanced Secure Gateway appliance must not attempt to authenticate
a request for the off-box authentication URL. If necessary, authenticate(no) can
be used in policy to prevent this.
998
Section 1 Creating a COREid Realm
To create a COREid realm:
1. Select the Configuration > Authentication > Oracle COREid > COREid Realms tab.
2. Click New.
3. In the Realm name field, enter a realm name. The name can be 32 characters
long and composed of alphanumeric characters and underscores. The name
must start with a letter. The name should be meaningful to you, but it does not
have to be the name of the COREid AccessGate.
4. Click OK to close the dialog.
5. Click Apply.
999
Advanced Secure Gateway Administration Guide
2. From the Realm Name drop-down list, select the COREid realm.
3. Configure the Primary Agent:
a. In the Primary agent section, enter the hostname or IP address where the
agent resides.
b. Change the port from the default of 16101 if your network has an
alternate port configured.
c. Enter the AccessGate ID, which is the ID as configured in the Access
System.
d. If an AccessGate password has been configured in the Access System,
you must specify the password on the Advanced Secure Gateway
appliance. Click Change Secret and enter the password. The passwords
can be up to 64 characters long and are always case sensitive.
4. (Optional) Enter an alternate agent host and AccessGate ID in the Alternate
agent section.
5. (Optional) Select Enable SSL to enable SSL between the Advanced Secure
Gateway appliance and the BCAAA agent. Select the SSL device profile that
this realm uses to make an SSL connection to a remote system. Select any
device profile that displays in the drop-down list. For information on using
device profiles, see "About SSL Device Profiles" on page 1349.
1000
6. Specify the length of time in the Timeout Request field, in seconds, to elapse
before timeout if a response from BCAAA is not received. (The default request
timeout is 60 seconds.)
7. If you want username and group comparisons on the Advanced Secure
Gateway appliance to be case sensitive, select Case sensitive.
8. Click Apply.
1001
Advanced Secure Gateway Administration Guide
1002
• If your web applications need information from the Authorization
Actions, select Add Header Responses. Authorization actions from the policy
domain obtained during authentication are added to each request
forwarded by the Advanced Secure Gateway. Header responses replace
any existing header of the same name; if no such header exists, the header
is added. Cookie responses replace a cookie header with the same cookie
name, if no such cookie header exists, one is added.
8. Enter the AccessGate primary Access Server information.
• Access Server ID.
• Access Server hostname.
• Access Server port.
9. Click Apply.
1003
Advanced Secure Gateway Administration Guide
2. From the Realm name drop-down list, select the COREid realm for which you
want to change properties.
3. default Display Name is the realm name. If required, change to match. The
display name cannot be greater than 128 characters and it cannot be null.
4. Select the Use the same refresh time for all option to use the same refresh time for
all.
5. Enter the number of seconds in the Credential refresh time field. The Credential
Refresh Time is the amount of time basic credentials (username and
password) are kept on the Advanced Secure Gateway appliance. This feature
allows the appliance to reduce the load on the authentication server and
enables credential spoofing. It has a default setting of 900 seconds (15
minutes). You can configure this in policy for better control over the resources
as policy overrides any settings made here.
1004
Before the refresh time expires, the Advanced Secure Gateway appliance
authenticates the user supplied credentials against the cached credentials. If
the credentials received do not match the cached credentials, they are
forwarded to the authentication server in case the user password changed.
After the refresh time expires, the credentials are forwarded to the
authentication server for verification.
6. Enter the number of seconds in the Surrogate refresh time field. The Surrogate
Refresh Time allows you to set a realm default for how often a user’s
surrogate credentials are refreshed. Surrogate credentials are credentials
accepted in place of a user’s actual credentials. The default setting is 900
seconds (15 minutes). You can configure this in policy for better control over
the resources as policy overrides any settings made here.
Before the refresh time expires, if a surrogate credential (IP address or cookie)
is available and it matches the expected surrogate credential, the Advanced
Secure Gateway authenticates the transaction. After the refresh time expires,
the appliance verifies the user’s credentials. Depending upon the
authentication mode and the user-agent, this might result in challenging the
end user for credentials.
The main goal of this feature is to verify that the user-agent still has the
appropriate credentials.
7. Type the number of seconds in the Inactivity timeout field to specify the amount
of time a session can be inactive before being logged out.
8. If you use Basic credentials and want to cache failed authentication attempts
(to reduce the load on the authentication service), enter the number of seconds
in the Rejected Credentials time field. This setting, enabled by default and set to
one second, allows failed authentication attempts to be automatically rejected
for up to 10 seconds. Any Basic credentials that match a failed result before its
cache time expires are rejected without consulting the back-end authentication
service. The original failed authentication result is returned for the new
request.
All failed authentication attempts can be cached: Bad password, expired
account, disabled account, old password, server down.
To disable caching for failed authentication attempts, set the Rejected
Credentials time field to 0.
9. Select the Use persistent cookies check box to use persistent browser cookies
instead of session browser cookies.
10. Select the Verify the IP address in the cookie check box if you would like the
cookies surrogate credentials to only be accepted for the IP address that the
cookie was authenticated. Disabling this will allow cookies to be accepted
from other IP addresses.
11. Specify the virtual URL to redirect the user to when they need to be
challenged by the Advanced Secure Gateway appliance. If the appliance is
participating in SSO, the virtual hostname must be in the same cookie domain
as the other servers participating in the SSO. It cannot be an IP address or the
default, www.cfauth.com.
1005
Advanced Secure Gateway Administration Guide
12. Select the Challenge user after logout option if the realm requires the users to
enter their credentials after they have logged out.
13. Click Apply.
Note: Refer to the Content Policy Language Guide for details about CPL and how
transactions trigger the evaluation of policy file <Proxy> and other layers.
1006
Chapter 50: SAML Authentication
SAML 2.0 was developed by the OASIS Security Services Technical Committee.
It is an industry standard for retrieving authorization and identity information
in XML documents to facilitate single sign-on (SSO) applications or services on
the Internet. In SAML authentication, the exchange of information is performed
by the following entities:
❐ Identity providers (IDPs), which are identity stores. For example, an IDP
may have a back-end directory of users. The IDP authenticates the users.
Supported IDPs are listed in "Requirements for SAML Authentication" on
page 1010.
❐ Service providers (SPs), which provide access to applications or services to
users. It is the entity that creates an authenticated session for the user. In
SGOS, the Advanced Secure Gateway appliance is the SP.
With SAML authentication, the Advanced Secure Gateway appliance acts as
the service provider.
SAML realms are not compatible with administrative authentication to the
Advanced Secure Gateway appliance management console.
Note: This document assumes that you are familiar with SAML concepts and
practices.
1007
Advanced Secure Gateway Administration Guide
Assertions
The Advanced Secure Gateway appliance and the IDP exchange data in XML
documents called assertions. After a user is authenticated, the IDP sends an
authentication assertion and the Advanced Secure Gateway appliance establishes
an authenticated session with the appropriate authorization for the user.
The Advanced Secure Gateway appliance processes SAML authentication
responses from the IDP; these responses may contain assertion attributes that
describe the authenticated user. For example, <saml:Attribute Name="mail"> is an
assertion attribute that contains the user’s email address inside the
<saml:AttributeValue> element.
You can configure the Advanced Secure Gateway appliance to use assertion
attributes in authorization decisions. For more information on attributes, see
"Configure SAML Authorization" on page 1022.
1008
Profiles and Bindings
A profile contains information about how SAML supports a defined use case. For
example, the Web Browser SSO Profile enables single sign-on authentication for
resources on the internet.
SAML 2.0 includes protocol-specific bindings, which describe how SAML data is
exchanged over those protocols. SAML authentication supports the following for
the Web Browser SSO Profile:
❐ The HTTP POST binding for authentication responses
❐ The HTTP POST binding and the redirect binding for authentication requests
1009
Advanced Secure Gateway Administration Guide
Note: To import SiteMinder and Oracle metadata, use the #(config saml
<realm-name>)inline idp-metadata <XML> CLI command. To avoid errors,
Blue Coat recommends that you import metadata through the CLI instead of
entering the information manually in the Management Console.
1010
Section 3 An Overview of the Authentication Process
After you have defined and configured a SAML realm, and both entities have
federated and exchanged metadata, authentication can occur.
The following is an overview of what happens when a user goes to a website that
requires authentication.
The Advanced Secure Gateway appliance intercepts the user’s request and
redirects the web browser to the IDP. The redirect URL includes the SAML
authentication request that should be submitted to the IDP’s SSO service. If the
Disable Client Redirect check box is checked, the Advanced Secure Gateway does
not redirect the client to the IDP.
The IDP asks the Advanced Secure Gateway for the user’s credentials, for
example by asking for valid login credentials or checking for valid session cookies
for stored credentials.
If the appliance responds with valid credentials, the IDP:
1011
Advanced Secure Gateway Administration Guide
❐ Signs an authentication response with its private signing key. If the IDP has
been configured to send encrypted assertions, the IDP encrypts the assertion
before sending it to the Advanced Secure Gateway appliance.
❐ Sends the authentication response to the Advanced Secure Gateway
appliance, which contains the user's username (however, the appliance is not
aware of the user’s credentials).
If the assertion is encrypted, the Advanced Secure Gateway appliance decrypts it.
The appliance rejects any unsigned assertions.
The Advanced Secure Gateway appliance validates the assertion and then
retrieves the user’s name and group memberships (as specified in assertion
attributes) from the assertion using the private key.
The appliance validates the user request using the corresponding public key,
which is embedded in the IDP's signing certificate. Then, the appliance redirects
the user to the website and creates an authenticated session for the user.
1012
Section 4 Set up SAML Authentication
Perform the following steps to set up a SAML realm.
Table 50–1 Steps for Setting up a SAML Realm
1 Save a local copy of the IDP's configura- "Export the IDP Metadata File" on page 1014
tion data.
2 Prepare the appliance for SAML authenti- • "Export the IDP Metadata File" on page
cation: 1014
• "Create an HTTPS Reverse Proxy Service"
❐ Import certificates to the CCL. on page 1016
❐ Set up an HTTPS reverse proxy • "Configure SAML Attributes" on page
service. 1017
Note: This is required only if the • "Create the SAML Realm" on page 1020
SAML realm is using an HTTPS POST
endpoint.
❐ Define assertion attributes.
❐ Create the SAML realm.
3 (Optional) To authorize users through one "Configure SAML Authorization" on page
or more SAML realms, specify the criteria 1022
to use when searching for users.
5 Include the SAML realm in your policy. "Add the SAML Realm to Policy" on page
1035
1013
Advanced Secure Gateway Administration Guide
Note: To ensure that the SAML realm is configured correctly, Blue Coat
recommends that you import metadata instead of entering the information
manually. If there are issues with realm configuration, the Authentication debug
log shows the following error: The SAML realm configuration is invalid.
1014
3. On the main page, select Oracle Identity Federation > Administration > Security and
Trust.
1015
Advanced Secure Gateway Administration Guide
Note: In explicit deployments, if you do not add the certificate for the CA that
issued the IDP’s certificate to the Advanced Secure Gateway appliance's CCL,
HTTPS connections to the IDP fail.
Note: Regardless of which IDP you use, Blue Coat recommends using an HTTPS
POST endpoint.
Create an HTTPS reverse proxy service to act as the SAML realm’s HTTPS POST
endpoint. The IDP redirects browsers to this service when it creates assertions.
1016
SSL connections require a certificate and a private key. Browsers must trust the
certificate that the HTTPS reverse proxy service uses, and the certificate’s Subject
value must match the Virtual host configured in the SAML realm (see "Create the
SAML Realm" on page 1020). If the names do not match, SSL hostname mismatch
errors occur.
To create the HTTPS reverse proxy service, see "Creating an HTTPS Reverse Proxy
Service" on page 315.
1017
Advanced Secure Gateway Administration Guide
Note: If the attribute you specify does not exist in the SAML realm, the
appliance issues a warning when it compiles policy.
4. In the Action column, add a Control Request Header or Control Response Header
object. Select Set Value and enter the substitution:
$(saml.attribute.<name>)
Note: You can alternatively add the substitution policy through the #inline
policy command or CPL. For information on those methods, refer to the
Command Line Interface Reference and the Content Policy Language Reference,
respectively.
1018
• Refresh Times—Do one of the following.
• Mark the Use the same refresh time for all check box to set the same
refresh time for credentials and surrogates.
• Enter different refresh times (in seconds) for credentials and
surrogates.
• Inactivity timeout—Enter the number of seconds a session can be inactive
before it times out.
• Rejected credentials time—Enter a refresh time (in seconds) for rejected
credentials.
• Cookies—Do one or both of the following:
• Use persistent cookies—Markthis to use persistent cookies; leave this
unmarked to use session cookies.
• Verify the IP address in the cookie—Mark this to enable verification of
cookies’ IP addresses.
• Challenge user after logout—Mark this to enable challenging after logout. For
example, if this setting is enabled and a user logs out of a web site, the user
must enter credentials again the next time they access the web site.
4. Click Apply to save your changes to general SAML settings.
1019
Advanced Secure Gateway Administration Guide
6. From the Encryption keyring (optional) menu, select the keyring to use for
decrypting encrypted assertions.
7. (Optional) If you require that assertions from the IDP be encrypted, mark the
Require encryption check box. If you mark the check box, the Advanced Secure
Gateway appliance rejects unencrypted assertions.
8. Specify the hostname for the SAML endpoint; in other words, point to the
HTTPS reverse proxy listener you set up. In the Virtual host field, enter the host
and port in format https://<hostname_or_IP_address>:<port_number>. The
hostname must match the name of the SSL certificate for the HTTPS reverse
proxy service. See "Create an HTTPS Reverse Proxy Service" on page 1016.
9. (Optional) Define limits for assertions’ timestamps. Assertions with
timestamps that fall outside of these limits are invalid.
• Specify an interval before the current time. Assertions stamped before this
interval are invalid. In the Not before field, specify the number of seconds.
The default value is 60.
• Specify an interval after the current time. Assertions stamped after this
interval are invalid. In the Not after field, specify the number of seconds.
The default value is 60.
10. (If applicable) If you defined your own assertion attributes ("Configure SAML
Authorization" on page 1022), select them from the following menus:
• SAML user attribute—This is the attribute containing the relative username.
If you do not specify the attribute, the Advanced Secure Gateway
appliance uses the SAML Name ID value for the username.
1020
• SAML fullname attribute—This is the attribute containing the full username.
• SAML group attribute—This is the name of the group membership attribute.
Values of this attribute match the group= policy condition.
11. (Optional) Select a configured external certificate list from Allowed Signing ECL.
For details on external certificate lists, see "Creating an External Certificate
List" on page 642.
12. (Optional) Select an SSL device profile to use to communicate with the IDP
when the redirect/POST URL uses HTTPS.
13. (Optional) If the client cannot be redirected to, or communicate directly with,
the IDP—for example, if a firewall exists between users and the IDP—select
Disable client redirects to disable the appliance’s ability to redirect the browser
to the IDP for authentication.
When you disable client redirects, the appliance handles all communication
with the IDP and OCS on behalf of the client.
14. (If you selected Disable client redirects in the previous step) Determine if you
want to prevent the appliance from adding a BCSI-SWR- prefix to IDP cookies;
this prefix prevents IDP cookies and OCS cookies from having the same name.
The Prefix IDP cookies option is available and enabled by default when you
select Disable client redirects. Clear the Prefix IDP cookies option if you do not
want to add the prefix to cookies.
15. Click OK to save the realm.
1021
Advanced Secure Gateway Administration Guide
2. From the Realm name drop-down list, select the SAML realm for which you
want to configure authorization settings.
3. (If applicable) To authorize with the current realm, mark the Self check box. If
you select Self, the Authorization username is set automatically to Use FQDN.
Note: If you use LDAP for authorization and Use FQDN is selected, ensure
that the SAML fullname attribute (see "Create the SAML Realm" on page 1020)
contains the user's distinguished name. Later, you must also configure the IDP
to send the distinguished name in assertions.
Policy Conditions
The appliance uses existing policy conditions to make authorization decisions for
the user.
❐ group=
The group= condition maps to the values of the SAML group attribute setting
specified in the realm.
❐ attribute.<name>=
1022
❐ saml.attribute.<saml_attribute_name>=
1023
Advanced Secure Gateway Administration Guide
Note: The procedures for configuring assertion attributes refer to the attribute’s
SAML name. The SAML name is the name that you specified for the attribute in
"Configure SAML Attributes" on page 1017.
Configure AD FS
The following steps comprise the minimum required settings to create trust
between the Advanced Secure Gateway and AD FS. For other settings that you
may require for your deployment, refer to the AD FS documentation.
Note: To perform the procedures in this section, you must be logged in with
administrator credentials on the AD FS server.
Note: If you do not select the Trusted Root Certification Authorities store, any
error messages that occur may be inaccurate or unintuitive.
Import Metadata to AD FS
The following procedure describes how to import Advanced Secure Gateway
metadata in AD FS:
1024
1. In the AD FS MCC, select AD FS 2.0 > Trust Relationships > Relying Party Trusts.
2. Select Relying Party Trusts, right click, and then select Add Relying Party Trust.
3. On the wizard that displays, click Start.
4. Make sure that Import data about the relying party published online or on a local
network is selected.
5. In the Federation metadata address (host name or URL) field, enter the
following URL:
https://<IP-address>:8082/saml/metadata/<realm-name>/sp
In the URL, <IP-address> is the address of the Advanced Secure Gateway, and
<realm-name> is the name of the SAML realm.
6. Click Next.
Note: If an error message displays when you click Next, ensure that the
certificate was imported correctly (see "Import the Advanced Secure Gateway
Certificate to AD FS’s Trust List " on page 1024), and then verify that the
hostname you specified in the URL in step 5 matches the certificate’s Subject
value.
In addition, if AD FS fails to validate the certificate, a generic error message
displays; the message does not indicate that the certificate is invalid.
7. Enter a display name for the relying party trust and then click Next.
8. To allow access to the Advanced Secure Gateway for all users, select Permit all
users to access this relying party. Do not select this option if you want to limit
access to the Advanced Secure Gateway to authorized users. Then, click Next.
9. Review your settings, and then click Next.
10. Make sure that Open the Edit Claim Rules is selected, and then click Close.
AD FS prompts you to edit claim rules. See "Set up Claim Rules for
Assertions" on page 1025.
5. Configure the rule. You can configure the rule to send any attribute, but this
procedure describes the following:
• "Send User Identity" on page 1026
1025
Advanced Secure Gateway Administration Guide
1026
d. For Outgoing Claim Type, select Group.
2. Click Finish, and then click OK.
3. (If required) To add another claim rule, repeat steps 2 through 4 in "Set up
Claim Rules for Assertions" on page 1025.
Configure SiteMinder
The following steps comprise the minimum required settings to create a
partnership between the Advanced Secure Gateway and SiteMinder. For other
settings that you may require for your deployment, refer to the CA SiteMinder
documentation.
Note: To perform the procedures in this section, you must be logged in with
administrator credentials on the SiteMinder server.
1027
Advanced Secure Gateway Administration Guide
2. Locate the partnership you created when you exported SiteMinder metadata
("Export Metadata from SiteMinder" on page 1014). Beside the partnership
name, select Action > Edit.
3. Specify the following:
• For Remote SP, select the remote entity you specified when you imported
Advanced Secure Gateway metadata.
• From Available Directories, select the LDAP directories you want to use. On
the right, you can move directories up or down to dictate the search order.
4. Click Next.
5. (Optional) On the Federation Users step, specify search filters or users to
exclude from accessing the Advanced Secure Gateway.
6. Click Next. The next step is Assertion Configuration; see "Configure
Assertions" on page 1028.
Configure Assertions
After you configure the partnership, you are at the Assertion Configuration step. To
send user attributes in SAML assertions:
1. In the Name ID section, for Name ID Format, select the identity format to be
passed in SAML assertions.
2. For Name ID Type, select User Attribute.
3. In the Value field, specify the primary user attribute, for example,
sAMAccountName for Active Directory.
4. In the Assertion Attributes section, click Add Row.
5. Configure attributes for the assertion. You send any attribute in assertions, but
this procedure describes the following:
• "Send User Identity" on page 1028
• "Send Distinguished Name" on page 1028
• "Send Group Membership" on page 1029
1028
1. In the Assertion Attribute field, enter the attribute’s SAML name.
2. For Type, select User Attribute.
3. For Value, enter distinguishedName.
4. Click Next or add another attribute.
To add another attribute, click Add Row in the Assertion Attributes section.
Note: If any users are members of multiple groups, change the Value to
FMATTR:memberOf. If you do not modify the attribute value, SiteMinder
incorrectly adds the attribute to the assertion, combining all attribute values in
a single XML element.
1029
Advanced Secure Gateway Administration Guide
Note: You can select the Show key pair option so that you can view and copy the
keyring as a backup. Backing up the keyring lets you easily import it again should
you need to back up the Advanced Secure Gateway configuration later.
Note: After you activate a partnership, you cannot edit it unless you
deactivate it first (Action > Deactivate). After you have edited the partnership, it
is in an inactive state until you activate it again.
Configure Oracle
The following steps comprise the minimum required settings for federation
between the Advanced Secure Gateway and Oracle. For other settings that you
may require for your deployment, refer to the Oracle documentation.
1030
Note: To perform the procedures in this section, you must be logged in with
adminstrator credentials on the Oracle server.
2. In the table of Trusted Providers, select the Provider ID you added when the
Advanced Secure Gateway metadata was imported, and then click Edit.
3. Select Update Provider Manually.
4. For Provider Types, make sure that both Service Provider and Authentication
Requester are selected.
5. On the Oracle Identity Federation Settings tab, select Enable Attributes in Single
Sign-On (SSO) .
6. In the list of attributes, select Email Address and clear all other selections.
7. Click Apply.
8. Select Oracle Identity Federation > Administration > Identity Provider.
9. On the SAML 2.0 tab, select Enable Identity Provider.
10. In the Assertion Settings section, select Send Signed Assertion.
11. Click Apply.
1031
Advanced Secure Gateway Administration Guide
2. Select the Provider ID for the Advanced Secure Gateway and then click Edit.
3. On the Oracle Identity Federation Settings tab, next to Attribute Mappings
and Filters, click Edit.
4. Configure the assertion. You can send any attribute, but this procedure
describes the following:
• "Send User Identity" on page 1032
• "Send Distinguished Name" on page 1032
• "Send Group Membership" on page 1032
1032
1. Click Add.
2. On the Add Attribute Name Mapping dialog, specify the following:
• For User Attribute Name, enter memberOf.
• For Assertion Attribute Name, enter the attribute’s SAML name.
• Select Send with SSO Assertion in order for the attribute to appear in the
assertion.
3. Click OK.
4. Click OK to save your changes. Alternatively, click Add to add another
attribute.
2. Click Wallet.
3. Click Update.
4. In the Update Wallet dialog, in the Signature section, select a keystore that
contains the certificate and private key to use for signing outgoing assertions.
2. In the table of Trusted Providers, select the Provider ID for the Advanced
Secure Gateway, and then click Edit. On the Oracle Identity Federation Settings
tab, scroll down to Identity Provider/Authority Settings.
3. Verify the following options.
• In the Assertion Settings list, select Send Encrypted Assertions.
• In the Protocol Settings list, select Include Signing Certificate in XML Signatures.
• In the Messages to Send/Require Signed list, beside Response with
Assertion - HTTP POST, clear Send Signed.
4. Click Apply.
1033
Advanced Secure Gateway Administration Guide
Configure Shibboleth
Import Shibboleth’s certificate to the Advanced Secure Gateway appliance:
1. Copy the contents of <shibboleth>/conf/idp.cert.
2. In the Management Console, seelct Configuration > SSL > CA Certificates. Click
Import.
1034
Add the SAML Realm to Policy
After completing SAML realm configuration, you can install policy using content
policy language (CPL). Be aware that the examples below are just part of a
comprehensive authentication policy.
Note: The examples below assume that the default policy condition is allow.
Refer to the Content Policy Language Reference for details about CPL and how
transactions trigger the evaluation of policy file layers.
Note: SAML realms do not work with any “form” authentication mode.
1035
Advanced Secure Gateway Administration Guide
1036
Section 11 Backing Up Configuration: Considerations for SAML
You may need to back up the Advanced Secure Gateway configuration and save
the backup file (called an archive) on a remote system, which you can restore in the
unlikely event of system failure or replacement. For more information on
configuration backups, see Chapter 5: "Backing Up the Configuration" on page
77.
2. Copy and paste the output from the command into a text editor. You will copy
and paste this text into the CLI after you restore the appliance.
1037
Advanced Secure Gateway Administration Guide
1038
Chapter 51: Integrating the Appliance with Your Windows
Domain
The following configurations require that you join your Advanced Secure
Gateway appliance to your Windows Domain:
❐ To accelerate encrypted MAPI traffic, the Advanced Secure Gateway
appliance at the branch office must join the same domain as the Exchange
server. For details on all the required steps for accelerating encrypted
MAPI, see "Optimizing Encrypted MAPI Traffic" on page 328.
❐ If you want the Advanced Secure Gateway appliance to perform Integrated
Windows Domain Authentication (IWA) by directly accessing your Active
Directory (AD) rather than using the Blue Coat Authentication and
Acceleration Agent (BCAAA), you must first join the appliance to your
Windows domain. For more information, see "Configuring a Direct
Connection to the Windows Domain" on page 1054. If you want to
authenticate users in different AD domains that do not have trust
relationships, you must join the appliance to each domain.
1039
Advanced Secure Gateway Administration Guide
1040
Join the Advanced Secure Gateway Appliance to the Windows
Domain
After you have synchronized the Advanced Secure Gateway appliance’s internal
clock with the Domain Controller, you can join the appliance to one or more
Windows domains as follows:
1. From the Advanced Secure Gateway Management Console, select
Configuration > Authentication > Windows Domain > Windows Domain.
Note: Unless you have a specific need to use a particular hostname (for
example, to ensure correct DNS lookup), Blue Coat recommends that you use
the default hostname to guarantee that each appliance’s hostname is unique.
In addition, you must use unique hostnames for multiple Advanced Secure
Gateway appliances joined to the same domain.
3. Click Apply.
4. Click Add New Domain. The Add Windows Domain dialog displays.
5. Enter a Domain name alias and then click OK.
6. To save the domain alias setting, click Apply and then click OK. You will not be
able to join the domain until you have saved the domain alias setting.
1041
Advanced Secure Gateway Administration Guide
7. Select the domain Name you created and click Join. The Add Windows Domain
dialog displays.
b. Enter the primary domain access User Name. You can either enter the
plain user name (for example, administrator) or use the
username@dnsname format ([email protected]). This account
must have rights for joining the domain.
c. Enter the Password for this user.
d. Click OK. The appliance displays a message indicating that the domain
was successfully joined and the value in the Joined field changes to Yes.
1042
The Advanced Secure Gateway administrator can also specify a preferred
Schannel DC and alternate Schannel DC for each domain. If the preferred
Schannel DC is available, the Advanced Secure Gateway will always connect to it,
even if it sees another DC that appears to be faster. That serves two purposes:
• The customer need only increase Maximum number of concurrent
Schannel connections on the preferred and alternate DCs, rather than on
every DC in the domain.
• The preferred and alternate DCs can be read-only. Some customers are
willing to deploy a read-only DC that is dedicated just to handling
authentication requests for an Advanced Secure Gateway, whereas they
would not be willing to deploy a regular “writable” DC for that purpose.
If the Advanced Secure Gateway cannot connect to either of its preferred or
alternate DCs, then it will connect to the fastest available DC. The Advanced
Secure Gateway will periodically check to see if the preferred or alternate DC
comes back online, and will reconnect if it does.
All options in the Edit Windows Domain dialog box are optional.
1. From the Advanced Secure Gateway Management Console, select
Configuration > Authentication > Windows Domain > Windows Domain.
3. Enter the preferred controller in the Preferred domain controller text box.
4. Enter an alternate domain controller in the Alternate domain controller text box.
The alternate domain controller is used if the preferred domain controller is
not available.
The preferred and alternate domain controllers can be read-only. However, if
you use a read-only domain controller, you need to replicate user passwords
to that domain controller. If the domain controller doesn’t have a copy of the
user’s password, it must forward the request to a writable domain controller
that has a copy, which will diminish performance. Consult Microsoft
documentation to figure out how to do this in your environment.
http://technet.microsoft.com/en-us/library/cc732801%28v=ws.10%29.aspx
5. Enter the Maximum number of concurrent Schannel connections. The range is 2-150.
6. Click OK.
1043
Advanced Secure Gateway Administration Guide
1044
Chapter 52: Integrating Advanced Secure Gateway
Authentication with Active Directory Using IWA
About IWA
The following sections provide the conceptual information you must
understand before configuring IWA:
❐ "About IWA Challenge Protocols" on page 1046
❐ "About IWA Failover" on page 1046
1045
Advanced Secure Gateway Administration Guide
1046
Controller to which the Advanced Secure Gateway appliance is connected goes
down, the appliance will send an LDAP ping to locate and connect to the next
closest Domain Controller.
Because communication between the Advanced Secure Gateway appliance and
the Windows Active Directory relies on DNS, you must make sure that the
appliance is configured to use more than one DNS server to ensure proper
failover. This will ensure that the Advanced Secure Gateway appliance will still be
able to communicate with AD, should the primary DNS server go offline. For
instructions, see "Adding DNS Servers to the Primary or Alternate Group" on
page 829.
1047
Advanced Secure Gateway Administration Guide
2. Ensure that client requests are directed to the DNS name for the Advanced
Secure Gateway’s Active Directory machine account:
• Explicit deployments—Configure the client browser explicit proxy
settings to point to this DNS name.
1048
• Transparent deployments—Set the Virtual URL in the realm configuration
(on the IWA General tab) to this DNS name. In addition, make sure that the
DNS name for the Advanced Secure Gateway appliance's Active Directory
domain is either included in the workstation's list of imputing DNS
suffixes or explicitly specified as part of IE's local intranet zone. For
example, if your AD domain DNS name is blue9.acme.com, then you
would add *.blue9.acme.com to IE's local intranet zone. See Step 6 on page
1059 in "Defining IWA Realm General Properties" .
After you create the DNS mapping, make sure you can ping the appliance
using the FQDN.
2. Create a domain user account for the BCAAA service in the Windows Active
Directory (AD).
3. Install BCAAA. Refer to the BCAAA Service Requirements document for
installation instructions. The BCAAA Service Requirements document is
posted at the BTO download portal.
4. Configure the BCAAA Windows service on the system where you just
installed BCAAA to log on using the domain user account you created for it in
Step 2 rather than using the local system account.
5. In the Local Security Policy of the server on which BCAAA is running, modify
the user rights assignment for the BCAAA domain user to have the following
rights:
• Full access to the directory where you installed BCAAA
• Act as part of the operating system (not required for BCAAA 6.0)
• Log on as a service
6. Register the Kerberos Service Principal Name (SPN) for the Advanced Secure
Gateway appliance:
a. Log in to the Domain Controller using an account with administrative
access and open a command prompt.
b. Enter the following case-sensitive command:
1049
Advanced Secure Gateway Administration Guide
Note: Do not assign the same SPN to multiple Active Directory accounts
or the browser will fall back to NTLM without providing any warning or
explanation. To list all SPNs that are currently registered on an account,
use the setspn -L <AD Account Name> command. If you find a duplicate,
remove the extraneous SPN using the setspn -D <SPN> command.
1050
❐ BCAAA—The Advanced Secure Gateway appliance will contact the BCAAA
server when it needs to authenticate a user. To use this option, you must first
install BCAAA on a dedicated server in your Windows domain and configure
it to communicate with both the DC and with the appliance as an
authentication agent. Use this option if you do not want to allow the
Advanced Secure Gateway appliance to join your Windows domain. Refer to
the BCAAA Service Requirements document for more information. The
BCAAA Service Requirements document is posted at the BTO download portal.
3. Enter a Realm name. The name can be 32 characters long and composed of
alphanumeric characters and underscores. The name must start with a letter.
4. Select the type of Active Directory Connection you are using and then provide the
appropriate configuration information as follows:
• Direct—Select this option if you want the appliance to connect directly to
the Windows Domain to obtain authentication information. If you have not
yet joined the Advanced Secure Gateway appliance to at least one
Windows domain, you will not be able to select this option.
• BCAAA—In the Primary server host field, enter the hostname or IP address of
the server where you installed BCAAA. In addition, if you configured
BCAAA to use a port other than the default (16101), change the value in
the Port field to match what you configured on BCAAA.
1051
Advanced Secure Gateway Administration Guide
2. From the Realm name drop-down list, select the IWA realm you want to
configure. If you have not yet created a realm, see "Creating an IWA Realm"
on page 1050.
3. If you have not yet installed a primary BCAAA server and, optionally, a
secondary BCAAA server, you must do so before proceeding. Use the Click
here to download BCAAA link to download BCAAA now. For instructions on
installing BCAAA, refer to the BCAAA Service Requirements document posted
at the BTO download portal..
4. (Optional) If you have installed and configured a second BCAAA server for
failover, enter the Alternate server host and Port values in the Servers section.
1052
Note: If you plan to secure communication between the appliance and
BCAAA, use a host name rather than an IP address. The DNS server that the
appliance is configured to use must be able to resolve the hostname.
5. (Optional) In the SSL Options area, select SSL enable to enable SSL. Select the
SSL device profile that this realm uses to make an SSL connection to the
BCAAA server. You can choose any device profile that displays in the drop-
down list. For information on using device profiles, see "Appliance
Certificates and SSL Device Profiles" on page 1348.
6. Specify the type of credentials to accept from the browser/user agent. By
default, all credential types are allowed and the Advanced Secure
Gateway appliance will try to use Kerberos (the default authentication
method for Windows clients), but will automatically downgrade to a different
challenge type depending on the browser/user agent capabilities.
• Allow Basic credentials—Prompts the user for a username and password to
authenticate the user against the Windows Active Directory. Because the
username and password are sent in plaintext, it is important to enable SSL
between BCAAA and the Advanced Secure Gateway appliance if you
allow Basic.
Note: Basic credentials cannot be disabled in the IWA realm if the IWA
realm is part of a sequence realm but is not the first realm in the sequence
with try IWA authentication only once enabled.
1053
Advanced Secure Gateway Administration Guide
7. (Optional) To change the amount of time the appliance will wait for an
authentication response from BCAAA before timing out, enter a new value in
the Timeout request after x seconds field (default 60 seconds).
8. click Apply.
9. To verify that you have configured the realm successfully:
a. Click Test Configuration.
b. When prompted, enter the username and password of a user in the
Windows domain and then click OK.
c. The appliance sends an authentication request to the configured server
and then displays a message indicating whether the authentication
succeeded or failed. If the test failed, go back and make sure you have
configured the realm properly. If the test succeeds, the message also
displays a list of any groups of interest (that is, groups that are
referenced in policy) to which the user belongs.
1054
2. From the Realm name drop-down list, select the IWA realm you want to
configure. If you have not yet created a realm, see "Creating an IWA Realm"
on page 1050.
3. Specify the type of credentials to accept from the browser/user agent. By
default, all credential types are allowed and the Advanced Secure
Gateway appliance will try to use Kerberos (the default authentication
method for Windows clients), but will automatically downgrade to a different
challenge type depending on the browser/user agent capabilities.
• Allow Basic credentials—Prompts the user for a username and password to
authenticate the user against the Windows Active Directory.
Note: Basic credentials cannot be disabled in the IWA realm if the IWA
realm is part of a sequence realm but is not the first realm in the sequence
with try IWA authentication only once enabled.
1055
Advanced Secure Gateway Administration Guide
4. (Optional) If you are sharing a service principal name (SPN) across multiple
Advanced Secure Gateway appliances in a load balancing configuration, click
Set credentials, enter the User name and Password for an Active Directory
account, and then click OK. For details, see "Using IWA Direct in an Explicit
Kerberos Load Balancing/Failover Scenario" on page 1066.
5. (Optional) To change the amount of time the appliance will wait for an
authentication response before timing out, enter a new value in the Timeout
request after x seconds field (default 60 seconds).
6. Click Apply.
7. To verify that you have configured the realm successfully:
a. Click Test Configuration.
b. When prompted, enter the username and password of a user in the
Windows domain and then click OK.
c. The appliance sends an authentication request to the configured server
and then displays a message indicating whether the authentication
succeeded or failed. If the test failed, go back and make sure you have
configured the realm properly. If the test succeeds, the message also
displays a list of groups to which the user belongs.
1056
Defining IWA Realm General Properties
Use the IWA General tab to configure the behavior of the authentication
transaction, such as timeout and refresh intervals and cookie usage. You also use
this tab to configure the Virtual URL for transparent authentication requests.
1. Select Configuration > Authentication > IWA > IWA General.
2. From the Realm name drop-down list, select the IWA realm you want to
configure. If you have not yet created a realm, see "Creating an IWA Realm"
on page 1050.
3. (Optional) By default, the Advanced Secure Gateway appliance displays the
authentication realm name when prompting the user for authentication
credentials. To change the name that is displayed when the Advanced Secure
Gateway appliance challenges the user for credentials from the default realm
name, enter a new value in the Display name field, up to a maximum of 128
characters. This field cannot be left empty.
4. (Optional) If you want to change how often the appliance reauthenticates a
client, modify the refresh and timeout values as follows:
• Credential refresh time—(Basic credentials only) Specifies the amount of time
the appliance will cache Basic credentials (username and password) and
use these cached credentials to authenticate the user rather than sending
another request to the authentication server. By default, basic credentials
are good for 900 seconds (15 minutes).
1057
Advanced Secure Gateway Administration Guide
Note: If the Challenge user after logout option is selected, the appliance will
automatically challenge the client for credentials when the session
becomes inactive. If you are using a challenge method that prompts the
user for credentials, you may want to deselect this option.
1058
6. (Transparent proxy only) Specify the URL to which to redirect client requests
that require authentication in the Virtual URL field. For best results, the virtual
URL you specify must:
• Contain a simple hostname that does not contain any dots (for example,
use http://myproxy rather than http://myproxy.acme.com. This allows IE
to recognize the URL as part of the Intranet zone rather than the Internet
zone so that the browser will automatically return credentials when
challenged rather than prompting the user.
• Resolve to the IP address of the Advanced Secure Gateway appliance. To
accomplish this, you must add an "A" record to your internal DNS server
that associates the Virtual URL with the IP address of the Advanced
Secure Gateway appliance.
• (IWA Direct Kerberos only) If you’re using Kerberos in a non-load
balancing IWA Direct realm, the Virtual URL must be the DNS name of the
Advanced Secure Gateway appliance in the Active Directory domain.
Typically this will be the DNS name of the Active Directory domain
prefixed with the Advanced Secure Gateway appliance machine account
name. For example, proxy.blue9.local. If you do not use the Active
Directory DNS name of the Advanced Secure Gateway appliance as the
Virtual URL, all authentication transactions will be downgraded to
NTLM.
7. (Optional) If you want to prompt the client for authentication credentials
whenever the inactivity timeout expires, select the Challenge user after logout
check box.
8. Click Apply.
1059
Advanced Secure Gateway Administration Guide
b. Click Launch.
2. Create the policy rule that enables the appliance to authenticate client
requests:
a. Select Policy > Add Web Authentication Layer.
b. Enter a Layer Name or accept the default name and then click OK. The
first policy rule displays with default settings.
3. Configure the authentication policy settings:
a. In the Action column of the first row, right-click and then select Set. The
Set Action Object dialog displays.
b. Click New and then select one of the following authentication objects:
• Authenticate—Use this option if you do not need to log user IDs for
denied requests. With this option, if policy causes a request to be
denied before the user is authenticated, the user ID associated with the
request will not be available for access logging.
• Force Authenticate—Use this option to ensure that user IDs are available
for access logging (including denied requests).
1060
• Transparent deployments—Select Origin Cookie Redirect. This mode
redirects the client to the Virtual URL for authentication and uses a
cookie surrogate to reauthenticate clients that have already
successfully authenticated. The appliance will automatically
downgrade to the Origin IP Redirect mode for user agents that do not
support cookies.
f. Click OK to close the Add Authenticate Object or Add Force
Authenticate object dialog.
g. Click OK to close the Set Action Object dialog.
4. (optional) Restrict authentication to a subset of client requests, based on
source or destination request attributes. The default settings in the policy rule
will cause the Advanced Secure Gateway appliance to authenticate all client
requests. You can set the Source and/or Destination columns to restrict
authentication to a specified subset of requests. For example:
a. In the Source or Destination column of the first row, right-click and then
select Set. The Set Source Object or Set Destination object dialog
displays.
b. Click New and then select an object that represents the subset of
requests you want to authenticate. After you select an object, you will
be prompted to provide details. For example, if you choose the Client
IP Address/Subnet object, you will be prompted for an IP address and
subnet mask/prefix to which this rule will apply.When you first
deploy your authentication policy, you may want to limit
authentication to the source address of a test workstation or subnet.
This allows you to identify and troubleshoot any configuration issues
before rolling the policy out into production.
5. (optional) Add additional policy rules to refine your authentication policy. A
single Web Authentication Layer rule with the authenticate action is all you
need to enable authentication. However, there may be some cases where you
want to bypass authentication for certain requests and enable it for others. For
example, you may have a certain client, subnet, or URL on which you do not
require authentication or you may have some custom applications that do not
know how to handle authentication requests. In this case, you would add an
additional rule to your Web Authentication Layer policy to instruct the
Advanced Secure Gateway appliance how to handle the exceptions. For
example:
a. Click Add Rule. A new row appears in the Web Authentication Layer.
b. Specify which client requests this rule applies to by setting the Source
or Destination columns.
c. Specify what the Advanced Secure Gateway appliance should do with
requests that match the source and/or destination setting you have
defined by right-clicking in the Action column of the row, selecting Set.
• If you want to authenticate requests that match the specified source
and/or destination request settings you have defined, click New and
select Authenticate and click OK.
1061
Advanced Secure Gateway Administration Guide
d. Arrange the rules according to how you want the Advanced Secure
Gateway appliance to enforce them by selecting the rule you want to
move and clicking Move up or Move down. The Advanced Secure
Gateway appliance evaluates the rules in the order in which they
appear in the policy layer. As soon as it finds a rule that matches the
request, it will enforce the specified action (in this case, either to
authenticate or not authenticate the request). Therefore, you should
put more specific rules in front of general rules. For example, if you
have a two rules in your policy—one that is set to authenticate
requests from any source or destination and one that is set to not
authenticate requests from a specific subnet—you would put the one
that bypasses authentication in front of the general rule that matches
all requests.
6. Install the authentication policy:
a. Click Install policy.
b. Click OK to acknowledge that the policy was successfully installed.
b. Click Launch.
2. Create a Web Authentication Layer for authenticating client requests for your
domain users as described in "Creating an IWA Authentication Policy" on
page 1060.
3. Create a second Web Authentication Layer to provide guest access:
a. Select Policy > Add Web Authentication Layer.
b. Enter a Layer Name to distinguish this layer from the previous layer (for
example, Guest Authentication) and then click OK. The first policy rule
displays with default settings.
1062
4. Configure the source:
a. In the Source column of the first row, right-click and then select Set. The
Set Source Object dialog displays.
b. Click New and then select User Authentication Error. The Add User
Authentication Error Object dialog displays.
c. Select Any errors and click OK twice to save the source object and close
the dialogs.
5. Configure the action:
a. In the Action column of the first row, right-click and then select Set. The
Set Action Object dialog displays.
b. Click New and then select the Authenticate Guest object. The Add
Authenticate Guest object dialog displays.
c. Select Use realm and then select your IWA realm from the drop-down
list.
d. Enter a Guest Username. This will be the name that appears in your
access log whenever guest access is granted; it does not correlate to an
Active Directory user account.
e. Click OK twice to save the Action object and close the dialogs.
6. Make sure that the Web Authentication Layer for your guest policy is
positioned after the your main Web Authentication Layer. To re-order the
layers, select Edit > Reorder Layers.
7. Install the authentication policy:
a. Click Install policy.
b. Click OK to acknowledge that the policy was successfully installed.
b. Click Launch.
2. Create a Web Access Layer:
a. Select Policy > Add Web Access Layer.
b. Enter a Layer Name or accept the default name and then click OK.
1063
Advanced Secure Gateway Administration Guide
e. Click OK to close the Add Group Object or Add User Object dialog.
f. Click OK to close the Set Source Object dialog.
4. Specify whether to allow or deny requests from the specified user or group:
a. Right-click the Action column.
b. Select one of the following options:
• Allow—Select this option if the default proxy policy for the appliance is
set to deny proxy access through the Advanced Secure Gateway
appliance. (This is the default in a secure web gateway deployment.)
• Deny—Select this option of the default proxy policy for the appliance is
set to allow proxy transactions. (This is the default in an acceleration
deployment.)
If you aren't sure what the default proxy policy is set to on your appliance,
go to Configuration > Policy > Policy Options.
5. (optional) Define any additional parameters that you want this rule to enforce.
6. To create additional authorization rules, repeat Steps 3 through 5.
7. Click Install policy.
8. Click OK to acknowledge that the policy was successfully installed.
1064
Configuring Client Systems for Single Sign-On
One of the main benefits of IWA is that it can provide a single sign-on experience
for users because it uses the workstation login to authenticate users. When
configured properly, the browser will provide the credentials to the Advanced
Secure Gateway appliance transparently when challenged for NTLM or Kerberos
credentials (the user will always be prompted for Basic authentication
credentials).
IWA only works with Windows domain credentials. If users log in to the
workstation using local credentials instead of domain credentials, they will
always be prompted whenever the Advanced Secure Gateway appliance returns
an authentication challenge.
Both Internet Explorer (IE) and Firefox can be configured to provide
authentication credentials to the Advanced Secure Gateway appliance
transparently. By default, IE will automatically provide authentication credentials
to any site in the local Intranet zone. If the Virtual URL for your Advanced Secure
Gateway appliance contains a single hostname (that is, http://myproxy instead
of http://myproxy.acme.com) you will not have to configure IE for IWA. If your
Virtual URL does not fall within the Intranet zone, you will need to configure the
IE to trust the URL. Firefox does not provide a single sign-on user experience for
IWA by default and will therefore always need to be configured for single sign-on.
For explicit proxy deployments, you must also make sure the browser is
configured to send requests to the Advanced Secure Gateway appliance. See
"About the Explicit Proxy" on page 111 for details.
The procedure for configuring the browser to automatically provide login
credentials to the Advanced Secure Gateway appliance is browser specific:
❐ "Configure Internet Explorer for Single Sign-On" on page 1065
❐ "Configure Firefox for Single Sign-On" on page 1066
5. Select the Advanced tab and make sure the Security > Enable Integrated Windows
Authentication option is selected.
6. Click OK to save your changes and close the Internet Options dialog.
1065
Advanced Secure Gateway Administration Guide
a. Locate the option you want to set by scrolling or entering the option
name in the Filter field.
b. Double-click the option to open the Enter string value dialog.
c. Enter the fully qualified domain name of the Advanced Secure
Gateway appliance (for explicit deployments) or the Virtual URL (for
transparent deployments). If you have more than one Advanced
Secure Gateway appliance that will challenge users for authentication
credentials, separate the entries with commas.
4. Click OK to save your settings.
1066
4. Use the Active Directory account you just created to create an SPN for the load
balancing group as follows:
a. Open a command prompt as administrator on the Domain Controller.
b. Enter the following command:
setspn –A HTTP/<Load_Balancer_FQDN> <AD_Account_Name>
Note: Do not assign the same SPN to multiple Active Directory accounts
or the browser will fall back to NTLM without providing any warning or
explanation. To list all SPNs that are currently registered on an account,
use the setspn -L <AD Account Name> command. If you find a duplicate,
remove the extraneous SPN using the setspn -D <SPN> command.
6. Configure the client browser explicit proxy settings to point to the FQDN of
the load balancing device.
1067
Advanced Secure Gateway Administration Guide
1068
Chapter 53: Kerberos Constrained Delegation
1069
Advanced Secure Gateway Administration Guide
PROCESS FLOW:
1: The user requests a service from a Windows Server that is marked for KCD.
2: The proxy challenges the user for their identity.
3: The user provides identification and authenticates to the proxy.
4: The proxy queries the BCAAA for a ticket to the OCS on behalf of the authenticated user.
5. BCAAA goes to the Ticket Granting Server (which runs on the Active Directory server)
and retrieves a ticket.
6. BCAAA sends the ticket to the proxy.
7: Proxy now caches the ticket for future requests to this OCS from this user.
8: Proxy requests page from the OCS with the ticket attached to authenticate the user.
9: OCS responds to the Proxy with the page
10: Proxy responds to the client with the page.
1070
Note: Kerberos Constrained Delegation does not have CLI commands. Refer to
the CLI commands for the relevant authentication realms in the Command Line
Interface Reference.
Requirements
Kerberos authentication requires two names to function: the user name (user
principal name) and the service name (service principal name of the OCS). By
default the Advanced Secure Gateway appliance autogenerates SPNs in a similar
manner to how Microsoft Internet Explorer autogenerates the SPN of the server it
is attempting to authenticate to. You can override default behavior by setting the
SPN using the VPM object: Add Kerberos Constrained Delegation Object.
Kerberos Constrained Delegation requires running the Windows domain at a
Windows 2003 functional level. Although Windows Server 2000 supports the
Kerberos protocol, it does not support constrained delegation and the protocol
transition extensions, both of which are necessary.
1. Create and configure an Configuration > Authentication For general information about
authentication realm. > Authentication Realm realms, see "Controlling User
• KCD requires a full Access with Identity-based
username (user principal Access Controls" on page 916.
name) to function. For information about a specific
• (Optional) Determine a authentication realms, see the
user’s authorization data. corresponding section.
2. Create and configure an IWA Configuration > Authentication "Creating an IWA Realm" on
realm to handle Kerberos. > IWA page 1050
• IWA Realm must use SSL
to connect to the BCAAA Configuration > SSL > Device "Appliance Certificates and SSL
server. Profiles > Profiles Device Profiles" on page 1348
• IWA Realm must provide a
certificate that BCAAA can
verify.
1071
Advanced Secure Gateway Administration Guide
3. Configure BCAAA to use BCAAA (You can download Refer to the BCAAA Service
Kerberos Constrained the Blue Coat Requirements document is posted
Delegation Authentication and at the BTO download portal.
• Configure BCAAA to run Authorization Agent at
under the Local System https://bto.bluecoat.com)
account (default).
• The BCAAA server must
be trusted to delegate to
specified services using an
authentication protocol.
The SPNs for the services
must be specified.
• Select Require the
Advanced Secure Gateway
to provide a valid certificate
in order to connect during
BCAAA installation. If
using an existing
installation, edit
bcaaa.ini and set the
value of VerifySG to 1.
4. Create policy to enable VPM: Under Web Visual Policy Manager Reference
constrained delegation. Authentication "Creating Kerberos Constrained
Layer>Action>Kerberos Delegation Policies" on page
Constrained Delegation 1072
Note: Refer to the Visual Policy Manager Reference for complete details about the
VPM.
There are two VPM objects that enable Kerberos Constrained Delegation: Add
Kerberos Constrained Delegation Object and Do not use Kerberos Constrained Delegation.
Both objects exist in the Web Authentication Layer as an Action. Do not use Kerberos
Constrained Delegation is a fixed action and needs no configuration.
The following example policy enables Kerberos Constrained Delegation and
shows configurable options.
1072
To create KCD policies:
1. Select the Configuration > Policy > Visual Policy Manager tab.
2. Click Launch. The VPM launches in a separate window.
3. Select Policy > Add Web Authentication Layer. An Add New Layer dialog displays.
4. Enter a name that is easily recognizable and click OK. A new policy tab and
rule display in the VPM manager window.
5. Select Action under the new rule. Right click Any > Set. The Set Action Object
window displays.
6. Select New > Kerberos Constrained Delegation to add a new Kerberos object.
1073
Advanced Secure Gateway Administration Guide
7a
7b
7c
7d
7. The Add Kerberos Constrained Delegation Object window allows you to configure
KCD implementation.
a. In the Name field, enter a name for the object or leave as is to accept the
default.
b. From the Authentication Type drop-down list, select origin or proxy. If you
are authenticating to an upstream origin server, select origin. If you are
authenticating to a proxy server, select proxy.
c. In the IWA Realm field, enter a valid IWA realm to use for Kerberos
authentication.
d. (Optional) Enter the Service Principal Name to use for the OCS. The
default SPN for the service is set to http/<hostname>. If a non-standard
port is used for a service, use http/<hostname>:<port>
8. Click OK.
9. Click OK to return to the VPM.
10. Click the Install Policy button when finished adding policies.
Note: Refer to the Content Policy Language Guide for details about CPL and how
transactions trigger the evaluation of policy file layers.
1074
url.host.exact="proxy.company.com" \
server.authenticate.constrained_delegation(proxy, iwa_realm_2)
1075
Advanced Secure Gateway Administration Guide
1076
Chapter 54: LDAP Realm Authentication and Authorization
LDAP Overview
Lightweight Directory Access Protocol (LDAP) is a client protocol used to
access information stored in an LDAP-compatible directory service. It is the
vehicle by which LDAP-enabled applications speak to one another. As a shared
protocol, LDAP integrates compatible applications in your network to a single
authentication interface. Any additions or changes made to information in the
directory are available to authorized users, directory-enabled applications,
devices, and Advanced Secure Gateway appliances. This central control gives
administrators simplified application management.
LDAP authentication realms can be used to authenticate administrative users
(read only and read/write) to the management console. To ensure that
credentials are not sent in clear text, configure the LDAP realm to use TLS to
secure the communication with the LDAP server.
1077
Advanced Secure Gateway Administration Guide
Note: To ensure that only TLS is used to communicate with the LDAP Server,
check Enable SSL in the LDAP Server configuration page and edit the SSL device
profile configured on the LDAP Server configuration page in the management
console.
1078
About LDAP Realms
An LDAP authentication realm authenticates and authorizes users to access
services using either explicit proxy or transparent proxy mode. These realms
integrate third-party vendors, such as LDAP, Windows, and Novell, with the Blue
Coat operating system.
4a
4b
3c
3. In the Realm Name field, enter a realm name. The name can be 32 characters
long and composed of alphanumeric characters and underscores. The name
must start with a letter.
4. Configure the realm options:
a. From the Type of LDAP server drop-down list, select the specific LDAP
server.
b. Specify the host and port for the primary LDAP server. The host must
be entered. The default port number is 389.
c. (Optional) The Advanced Secure Gateway appliance automatically
retrieves the default User attribute type when the user specifies the
LDAP server type.
You can manually specify the user attribute type for a particular LDAP
server. The following list shows which attribute each directory server uses
to form a username:
1079
Advanced Secure Gateway Administration Guide
2a
2b
2c
3
5
6
1080
a. From the Realm Name drop-down list, select the LDAP realm for which
you want to change server properties.
b. From the Type of LDAP server drop-down list, select the specific LDAP
server.
c. From the LDAP Protocol Version drop-down list, select v2 for LDAP v2
support. LDAP v3 is the default.
If you use LDAP v3, you can select Follow referrals to allow the client to
follow referrals to other servers. (This feature is not available with LDAP
v2.) The default is Disabled.
3. Specify the host and port for the primary LDAP server. The host must be
entered. The default port number is 389. If you enable SSL, change the port to
an SSL listening port, such as port 636.
(Optional) Specify the host and port for the alternate LDAP server.
4. (Optional) Configure SSL options:
a. Under SSL Options, select Enable SSL to enable SSL. This option if valid
only for LDAP v3.
b. Select the SSL device profile that this realm uses to make an SSL
connection to a remote system. You can choose any device profile that
displays in the drop-down list. For information on using device
profiles, see "Appliance Certificates and SSL Device Profiles" on page
1348.
5. (Optional) Change the timeout request for the server from its default of 60
seconds.
6. If the LDAP server is configured to expect case-sensitive usernames and
passwords, select Case sensitive.
7. Click Apply.
8. Verify the LDAP configuration as follows:
a. Click Test Configuration. The Test Configuration dialog displays.
b. Enter the Username and Password of a client in your LDAP realm and
then click OK. The Advanced Secure Gateway appliance will use
configuration you supplied to send an authentication request to the
LDAP server and return the results as follows:
• If the LDAP server settings are configured properly, a dialog will
display indicating that the test succeeded.
1081
Advanced Secure Gateway Administration Guide
• If the test does not succeed, check that the settings on the LDAP Servers
tab are configured properly and then test the configuration again.
Note: You can also look up LDAP users and groups from the CLI using the
lookup-user and lookup-group commands. Refer to the Command Line
Interface Reference for details.
9. Repeat the above steps for additional LDAP realms, up to a total of 40.
1082
Table 54–1 Distinguished Name Attributes (Continued)
2. From the Realm name drop-down list, select the LDAP realm for which you
want to change DN properties.
3. In the User attribute type field, the Advanced Secure Gateway appliance has
entered the default user attribute type for the type of LDAP server you
specified when creating the realm.
• Microsoft Active Directory Servers: sAMAccountName=
• Novell NDS/eDirectory Server/Other: cn=
• Netscape/iPlanet Directory Server: uid=
If you entered information correctly when creating the realm, you do not need
to change the User attribute type in this step. If you do need to change or edit
the entry, do so directly in the field.
1083
Advanced Secure Gateway Administration Guide
4. Enter as many Base DNs as required for the realm. Assume, for example, that
Example Corp has offices in New York and Lisbon, each with its own Base
DN. A simplified directory information tree is illustrated below.
To specify entries for the Base DNs field, click New, enter the Base DN, and click
OK. Repeat for multiple Base DNs. To search all of Sample_Company, enter o
values:
You can add, edit, and delete Base DNs for an Advanced Secure Gateway
appliance to search. The Advanced Secure Gateway appliance searches
multiple DNs in the order listed, starting at the top and working down. Select
an individual DN and move it up or down in the list with the Promote and
Demote buttons.
5. Click Apply.
1084
Note: Authorization decisions are completely handled by policy. The groups that
the appliance looks up and queries are derived from the groups specified in
policy in group= conditions, attribute= conditions, ldap.attribute= conditions
and has_attribute conditions. If you do not have any of those conditions, then
Blue Coat does not look up any groups or attributes to make policy decisions
based on authorization.
2. From the Realm name drop-down list, select an LDAP realm for which you
want to specify authorization information.
3. To permit users to anonymously bind to the LDAP service, select Anonymous
Search Allowed. For example, with Netscape/iPlanet Directory Server, when
anonymous access is allowed, no username or password is required by the
LDAP client to retrieve information.
1085
Advanced Secure Gateway Administration Guide
4. The Dereference level field has four values—always, finding, never, searching—that
allow you to specify when to search for a specific object rather than search for
the object’s alias. The default is Always.
5. Click Apply.
Note: For Microsoft Active Directory, you must use the full name and not the
login name.
3
4
5
6
2. From the Realm name drop-down list, select an LDAP realm for which you
want to specify authorization information.
3. To enforce user authentication before binding to the LDAP service, deselect
Anonymous Search Allowed.
4. Enter a user distinguished name in the Search User DN field. This username can
identify a single user or a user object that acts as a proxy for multiple users (a
pool of administrators, for example). A search user distinguished name can be
up to 512 characters long.
5. You can set or change the search user password by clicking Change Password.
The password can be up to 64 alphanumeric characters long.
Note: You might want to create a separate user (such as Blue Coat, for
example) instead of using an Administrator distinguished name and
password.
1086
6. The Dereference level field has four values—always, finding, never, searching—that
allow you to specify when to search for a specific object rather than search for
the object’s alias. The default is Always.
7. Click Apply.
4
5
6
7
2. From the Realm name drop-down list, select an LDAP realm for which you
want to specify authorization information.
3. Enter Membership type and Membership attribute: The Advanced Secure
Gateway appliance enters defaults for the following LDAP directories:
• Microsoft Active Directory:
Membership type: user
Membership attribute type: memberOf
• Netscape/Sun iPlanet:
Membership type:group
Membership attribute type:uniqueMember
• Novell NDS eDirectory
Membership type:group
Membership attribute type:member
• Other
Membership type:user
Membership attribute type:member
4. Username type to lookup: Select either FQDN or Relative. Only one can be
selected at a time.
• Relative can only be selected in the membership type is Group.
• FQDN indicates that the lookup is done only on the user object. FQDN can be
selected when the membership type is either Group or User.
1087
Advanced Secure Gateway Administration Guide
5. Nested LDAP: If the LDAP server you use does not natively support group
membership tests of nested groups, you can select the Nested LDAP checkbox.
Note: When a group of interest referenced within policy is part of a loop, User
Authorization results in Access Denied(policy_denied). For example, a loop forms
if the group member Testgroup has the nested group member Testgroup2, which
in turn has the aforementioned Testgroup as a nested member.
When loops are removed from an LDAP server, the Nested Groups Support
option must be disabled and then re-enabled for the Advanced Secure
Gateway appliance to re-fetch the correct group structure.
6. Nested group attribute: For other, ad and nds, the default attribute is member.
For iPlanet, the attribute is uniqueMember.
7. Group constraint filter: Enter a search limiting clause to reduce the number of
groups returned for an LDAP search. This feature is generally used only when
the user wishes to limit the scope of a comparison due to a very large number
of groups. Constraints must be valid LDAP search filters and are AND’d to
the search filter when performing a group search.
Example 1: If you enter (cn=p*) into the Group constraint filter field, only groups
starting with the letter P are returned.
Example 2: If you enter (cn=proxy) into the Group constraint filter field, only the
proxy group is returned.
Note: The Group constraint filter functions only for local comparisons. To enable
local group comparisons, go to "Defining LDAP General Realm Properties" on
page 1089.
8. Click Apply.
1088
2
2. From the Realm name drop-down list, select the LDAP realm whose
objectclasses you want to modify.
3. From the Object type drop-down list, select the type of object: container, group, or
user.
4. To create or edit an object for the specified objectclass, click New or Edit. (The
only difference is whether you are adding or editing an objectclass value.)
5. Enter or edit the objectclass, and click OK.
6. Click Apply.
1089
Advanced Secure Gateway Administration Guide
1090
c. Enter the number of seconds in the field. The Surrogate Refresh Time
allows you to set a realm default for how often a user’s surrogate
credentials are refreshed. Surrogate credentials are credentials
accepted in place of a user’s actual credentials. The default setting is
900 seconds (15 minutes). You can configure this in policy for better
control over the resources as policy overrides any settings made here.
Before the refresh time expires, if a surrogate credential (IP address or
cookie) is available and it matches the expected surrogate credential, the
Advanced Secure Gateway appliance authenticates the transaction. After
the refresh time expires, the Advanced Secure Gateway appliance verifies
the user’s credentials. Depending upon the authentication mode and the
user-agent, this may result in challenging the end user for credentials.
The main goal of this feature is to verify that the user-agent still has the
appropriate credentials.
d. Enter the number of seconds in the Authorization refresh time field. The
Authorization Refresh Time allows you to manage how often the
authorization data is verified with the authentication realm. It has a
default setting of 900 seconds (15 minutes). You can configure this in
policy for better control over the resources as policy overrides any
settings made here.
4. Enter the number of seconds in the Inactivity timeout field to specify the amount
of time a session can be inactive before being logged out.
5. If you use Basic credentials and want to cache failed authentication attempts
(to reduce the load on the authentication service), enter the number of seconds
in the Rejected Credentials time field. This setting, enabled by default and set to
one second, allows failed authentication attempts to be automatically rejected
for up to 10 seconds. Any Basic credentials that match a failed result before its
cache time expires are rejected without consulting the back-end authentication
service. The original failed authentication result is returned for the new
request. All failed authentication attempts can be cached: Bad password,
expired account, disabled account, old password, server down. To disable
caching for failed authentication attempts, set the Rejected Credentials time field
to 0.
6. Configure the cookies option:
a. Select the Use persistent cookies check box to use persistent browser
cookies instead of session browser cookies.
b. Select the Verify the IP address in the cookie check box if you would like
the cookies surrogate credentials to only be accepted for the IP address
that the cookie was authenticated. Disabling this will allow cookies to
be accepted from other IP addresses.
7. You can specify a virtual URL. For more information on the virtual URL, see
"About Origin-Style Redirection" on page 929.
8. Select the Challenge user after logout check box if the realm requires the users to
enter their credentials after they have logged out.
1091
Advanced Secure Gateway Administration Guide
9. Select the group comparison search method. There are two compare methods:
• Local—The local method performs compare operations on the Advanced
Secure Gateway appliance after retrieving the appropriate entries. Because
the compares are performed locally, this method typically reduces load on
the LDAP server.
• Server—The server method queries the LDAP server for each compare
operation. If there are a large number of compares to perform, it can result
in significant server load.
Note: There is a minute possibility that local compares can produce differing
results from server compares. If you suspect erroneous compare results, set to
server.
1092
3. Add a valid policy layer. The LDAP Attribute Object exists in the Admin Access,
SSL Access, Web Access, and Forwarding layers as Source objects. For example, to
add an SSL Access layer, select Policy > Add SSL Access Layer. An Add New Layer
dialog box appears.
4. Enter a name that is easily understandable and click OK. A new policy tab and
rule will displays.
5. Select source for the new rule. Right click on Any and select Set. The Set Source
Object window displays.
6. Select New > LDAP Attribute to create a new LDAP attribute object.
7. In the Name field, enter a name for the object or leave as is to accept the default.
1093
Advanced Secure Gateway Administration Guide
8. From the Authentication Realm drop-down list, select a specific LDAP realm or
<ALL>. The default setting for this field is <ALL>.
Note: A list count check and numeric check are only available through CPL.
For information about these checks, refer to the Content Policy Language Guide.
Note: Refer to the Content Policy Language Guide for details about CPL and how
transactions trigger the evaluation of policy file layers.
Be aware that the default policy condition for these examples is allow. The default
policy condition on new SGOS 5.x or later systems running the Proxy Edition is
deny.
1094
10.0.0.0/24
End subnet HRSubnet
[Rule] client_address=HRSubnet
url.domain=monster.com
url.domain=hotjobs.com
deny
.
.
.
[Rule]
deny
You can use the substitution to provide the value of an attribute in a header that is
sent to an upstream server as well as within exception pages.
Notes
If you use guest authentication/authorization, note that:
❐ LDAP realms provide split authorization, and it is possible to be successfully
authenticated but have authorization fail.
1095
Advanced Secure Gateway Administration Guide
❐ If the LDAP realm validate authorized user command is disabled and the
user does not exist in the authorization realm, authorization is considered a
success and the user is assigned to the default group if there is one configured
and it is of interest to policy.
❐ Returned attributes that are stored within the user’s authentication data must
not exceed 7680 bytes, or an authorization error occurs.
1096
Chapter 55: Novell Single Sign-on Authentication and
Authorization
This section discusses the Novell Single Sign-on (SSO) realm, which is an
authentication mechanism that provides single sign-on authentication for users
that authenticate against a Novell eDirectory server.
1097
Advanced Secure Gateway Administration Guide
Note: The Novell SSO realm works reliably only in environments where one IP
address maps to one user. If an IP address cannot be mapped to a single user,
authentication fails. Those with NAT systems, which uses one set of IP addresses
for intranet traffic and a different set for Internet traffic, may need to use a
different realm for authentication.
When a user logs into the Novell network, the user entry in Novell eDirectory is
updated with the login time and the IP address that the user logged in from and
the login time. The Advanced Secure Gateway appliance uses BCAAA to do
LDAP searches and monitoring of the configured Novell eDirectory servers to
obtain the user login information and maintain a user IP address to user FQDN
map.
To create the initial IP/FQDN map, the BCAAA service searches the configured
master eDirectory server for all user objects within the configured base DNs that
have a Network Address attribute. For each user entry returned, BCAAA parses
the Network Address attribute and adds the IP/FQDN entry to the map. If an
existing entry exists for that IP address, it is overwritten.
A user entry can have more than one Network Address entry in which case an
entry for each IP address is added to the map. Since service accounts can login
using the same IP address and subsequently overwrite entries for actual users, the
BCAAA service has a configurable list of the Service names to ignore. Users can
be added or removed from the list in the sso.ini file. (see "Modifying the sso.ini
File for Novell SSO Realms" on page 1108.)
Once the initial map has been created it is kept current by monitoring all of the
eDirectory servers that contain unique partition data for the eDirectory tree. By
default, the search server defined by the LDAP realm is monitored. If other
servers contain data that is not replicated to the search server, they must be
individually monitored. When a server is being monitored, each time a user logs
in or logs out, an event message is sent to BCAAA to update its mapping of
FQDNs to IP addresses.
Multiple Advanced Secure Gateway devices can talk to the same BCAAA service
and can reference the same eDirectory servers. To avoid multiple queries to the
same server, the LDAP hostname and port combination uniquely identifies an
eDirectory configuration and should be shared across devices.
To ensure that BCAAA has complete map of FQDNs to IP addresses, the realm
can be configured to do a full search of the configured master eDirectory server
up to once per day.
1098
The BCAAA service must be version 120 or higher and must be installed on a
machine that can access the eDirectory server. The BCAAA machine does not
need to have a Windows trust relationship with the eDirectory server.
1099
Advanced Secure Gateway Administration Guide
3. In the Realm name field, enter a realm name. The name can be 32 characters
long and composed of alphanumeric characters and underscores. The name
must start with a letter.
4. Click OK to close the dialog.
5. Click Apply.
1100
Section 2 Novell SSO Agents
You must configure the Novell realm so that it can find the Blue Coat
Authentication and Authorization Agent (BCAAA).
Novell SSO Agent Prerequisite
You must have defined at least one Novell SSO realm (using the Novell SSO
Realms tab) before attempting to configure the BCAAA agent. If the message
Realms must be added in the Novell SSO Realms tab before editing this tab is displayed in
red at the bottom of this page, you do not currently have any Novell SSO realms
defined.
1. Select the Configuration > Authentication > Novell SSO > Agents tab.
1101
Advanced Secure Gateway Administration Guide
The primary and alternate BCAAA server must work together to support fail-
over. If the primary BCAAA server fails, the alternate server should be able to
search and monitor the same set of eDirectory servers.
5. (Optional) Configure SSL options:
a. Click Enable SSL to enable SSL between the Advanced Secure Gateway
appliance and the BCAAA.
b. (Optional) Select the SSL device profile that this realm uses to make an
SSL connection to a remote system. You can choose any device profile
that displays in the drop-down list. For information on using device
profiles, see "Appliance Certificates and SSL Device Profiles" on page
1348.
Note: The Enable SSL setting only enables SSL between the Advanced
Secure Gateway appliance and BCAAA. To enable SSL between
BCAAA and the eDirectory server, the Enable SSL setting must be set in
the LDAP search realm.
6. In the Timeout Request field, enter the number of seconds the Advanced Secure
Gateway appliance allows for each request attempt before timing out. (The
default request timeout is 60 seconds.)
7. Click Apply.
8. Verify the Novell SSO configuration as follows:
a. Click Test Configuration. The Test Configuration dialog displays.
b. Enter the IP address of a client system in your Novell Directory and
then click OK. The Advanced Secure Gateway appliance will use
configuration you supplied to send an authentication request to
BCAAA and return the results as follows:
• If the Advanced Secure Gateway appliance and the BCAAA server are
configured properly, BCAAA will return the LDAP DN of the user
associated with the IP address you provided.
• If the test does not succeed, check that the settings on the Agents tab as
well as the BCAAA settings are configured properly and then test the
configuration again.
1102
Section 3 Adding LDAP Servers to Search and Monitor for Novell SSO
The BCAAA service searches and monitors specified eDirectory servers to
determine which users are logged in and their Network Address attribute value.
Those attribute values are converted into IP addresses, and BCAAA maintains a
map of IP addresses to LDAP FQDNs.
If the eDirectory tree is partitioned across multiple servers, the realm must
monitor every eDirectory server that has unique user information.
4b
4a
1103
Advanced Secure Gateway Administration Guide
1104
Section 4 Querying the LDAP Novell SSO Search Realm
You can specify the time and days that a full search of the eDirectory tree is
repeated in order to ensure that the mappings maintained by BCAAA are up to
date.
1105
Advanced Secure Gateway Administration Guide
Authorization Prerequisite
You must have defined at least one Novell SSO realm (using the Novell SSO
Realms tab) before attempting to configure authorization. If the message Realms
must be added in the Novell SSO Realms tab before editing this tab is displayed in red at
the bottom of this page, you do not currently have any Novell SSO realms
defined.
2. From the Realm Name drop-down list, select the Novell SSO realm to edit.
3. By default, the Novell SSO realm is selected to authorize against itself by
default. To select another realm, clear the Self check box and select an
authorization realm from the drop-down list.
4. The LDAP FQDN is selected as the Authorization user name, by default. Change
this if the user's authorization information resides in a different root DN. To
select a different authorization name, clear the Use FQDN option and enter a
different name. For example:
cn=$(user.name),ou=partition,o=company
5. Click Apply.
1106
Section 6 Defining Novell SSO Realm General Properties
The Novell SSO General tab allows you to specify the refresh times, an inactivity
timeout value, and cookies, and a virtual URL.
Novell SSO realms default to the origin-ip authentication mode when no
authentication mode or the auto authentication mode is specified in policy. After a
user has first successfully authenticated to the Advanced Secure Gateway
appliance, all subsequent requests from that same IP address for the length of the
surrogate credential refresh time are authenticated as that user. If the first user is
allowed or denied access, subsequent users during that same time coming from
the same IP address are allowed or denied as that first user. This is true even if
policy would have treated them differently if they were authenticated as
themselves.
If multiple users often log in from the same IP address, it is recommended to use a
shorter surrogate credential refresh timeout than the default or an authentication
mode that does not use IP surrogate credentials.
Novell SSO Prerequisite
You must have defined at least one Novell SSO realm (using the Novell SSO
Realms tab) before attempting to set Novell SSO general properties. If the
message Realms must be added in the Novell SSO Realms tab before editing this tab is
displayed in red at the bottom of this page, you do not currently have any Novell
SSO realms defined.
2. From the Realm name drop-down list, select the Novell SSO realm for which
you want to change properties.
3. Configure refresh options:
a. Select the Use the same refresh time for all option to use the same refresh
time for all.
1107
Advanced Secure Gateway Administration Guide
b. Enter the number of seconds in the Surrogate refresh time field. The
Surrogate Refresh Time allows you to set a realm default for how often
a user’s surrogate credentials are refreshed. Surrogate credentials are
credentials accepted in place of a user’s actual credentials. The default
setting is 900 seconds (15 minutes). You can configure this in policy for
better control over the resources as policy overrides any settings made
here.
Before the refresh time expires, if a surrogate credential (IP address or
cookie) is available and it matches the expected surrogate credential, the
Advanced Secure Gateway appliance authenticates the transaction. After
the refresh time expires, the Advanced Secure Gateway appliance
determines which user is using the current IP address, and update the
surrogate credential to authenticate with that user.
c. Enter the number of seconds in the Authorization refresh time field. The
Authorization Refresh Time allows you to manage how often the
authorization data is verified with the authentication realm. It has a
default setting of 900 seconds (15 minutes). You can configure this in
policy for better control over the resources as policy overrides any
settings made here.
4. Type the number of seconds in the Inactivity timeout field to specify the amount
of time a session can be inactive before being logged out.
5. Configure cookie options:
a. Select the Use persistent cookies check box to use persistent browser
cookies instead of session browser cookies.
b. Select the Verify the IP address in the cookie check box if you would like
the cookies surrogate credentials to only be accepted for the IP address
that the cookie was authenticated. Disabling this allows cookies to be
accepted from other IP addresses.
6. You can specify a virtual URL. For more information on the virtual URL, see
"About Origin-Style Redirection" on page 929.
7. Click Apply.
Note: The changes to the sso.ini file have no effect until the BCAAA service is
restarted.
1108
To modify Novell SSO realms parameters:
1. Open the file in a text editor.
2. In the Novell Setup section, modify the parameters as needed (the default
values are as follows):
• MonitorRetryTime=30
• SearchRetryTime=30
• TrustedRootCertificateEncoding=der
• PublicCertificateEncoding=der
• PrivateKeyFile=
• PrivateKeyEncoding=der
3. If the LDAP realm used by the Novell SSO realm requires that the identity of
the server be verified, add the paths to the Trusted root certificate files in
the NovellTrustedRootCertificates section.
4. In the SSOServiceUsers section, list the names of users who can log in with
eDirectory credentials on behalf of the service and mask the identity of the
logged-on user.
Listing these users here forces the BCAAA service to ignore them for
authentication purposes.
5. Save the sso.ini file.
Note: The examples below assume the default policy condition is allow.
Refer to the Content Policy Language Guide for details about CPL and how
transactions trigger the evaluation of policy file layers.
❐ Every Novell SSO-authenticated user is allowed access the Advanced Secure
Gateway appliance.
<Proxy>
authenticate(NSSORealm)
1109
Advanced Secure Gateway Administration Guide
Notes
❐ The Novell SSO realm works reliably only in environments where one IP
address maps to one user. NAT environments are not supported.
❐ Novell SSO realms are not supported in IPX environments.
❐ Event monitoring of eDirectory is only compatible with eDirectory 8.7+.
❐ Upgrade to Novell client 4.91 SP1 or later if you experience issues with the
Network Address attribute not being updated during login.
❐ Novell SSO realms do not use user credentials so they cannot spoof
authentication information to an upstream server.
❐ If an upstream proxy is doing Novell SSO authentication, all downstream
proxies must send the client IP address.
❐ There can be response time issues between the BCAAA service and the
eDirectory servers during searches; configure the timeout for LDAP searches
to allow the eDirectory server adequate time to reply.
1110
Chapter 56: Policy Substitution Realm
1111
Advanced Secure Gateway Administration Guide
The realm is configured the same way as other realms, except that the realm uses
policy substitutions to construct the username and full username from
information available in and about the request. Any policy substitution whose
value is available at client logon can be used to provide information for the name.
Note: The user field and username field must include at least one
substitution that successfully evaluates in order for the user to be considered
authenticated.
If no policy substitutions exist that map directly to the user's simple and full
usernames but there are substitutions that map to attributes on the user on the
LDAP server, the user's identity can be determined by searching the LDAP server.
The following fields are used to determine the user's identity by LDAP search:
❐ LDAP search realm: The LDAP realm on the Advanced Secure Gateway
appliance that corresponds to the LDAP server where the user resides
❐ Search filter: An LDAP search filter as defined in RFC 2254 to be used in the
LDAP search operation. Similar to the explicitly defined username and full
username fields, the search filter string can contain policy substitutions that
are available based on the user's request. The search filter string must be
escaped according to RFC 2254. The policy substitution modifier
escape_ldap_filter is recommended to use with any policy substitutions that
could contain characters that need to be escaped. It will escape the policy
substitution value per RFC 2254.
Note: The search filter must include at least one substitution that successfully
evaluates before the LDAP search will be issued and the user authenticated.
1112
❐ User attribute: The attribute on the search result entry that corresponds to the
user's full username. If the search result entry is a user entry, the attribute is
usually the FQDN of that entry. The user's full username is the value of the
specified attribute. If the attribute value is an FQDN, the user's simple
username is the value of the first attribute in the FQDN. If the attribute value
is not an FQDN, the simple username is the same as the full username.
Note: If all the policy substitutions fail, authentication fails. If any policy
substitution works, authentication succeeds in the realm.
Example
The following is an example of how to use substitutions with Policy Substitution
realms.
Assumptions:
❐ The user susie.smith is logged in to a Windows client computer at IP address
10.25.36.47.
where username is the name of the user, and computer_domain is the domain to
which the user's computer belongs.
❐ A login script that runs on the client computer updates a DNS server so that a
reverse DNS lookup for 10.25.36.47 results in
susie.smith.authteam.location.company.com.
1113
Advanced Secure Gateway Administration Guide
Results:
Under these circumstances, the following username and full username attributes
might be used:
❐ Username: $(netbios.messenger-username)@$(client.address).
Example
The following is an example of how to determine the user's identity by search.
Assumptions:
❐ The user susie.smith is logged in to a Windows client computer.
❐ The customer has an LDAP directory in which group information is stored.
The FQDN for Susie Smith is cn=Susie Smith, cn=Users, dc=Eng,
dc=company, dc=com.
Results:
Under these circumstances the login username can not be explicitly mapped to
the user's FQDN, so a search of the LDAP server for the user's login identity is
required instead. The following values can be used:
❐ Search filter: (sAMAccountName=$(netbios.messenger-
username:escape_ldap_filter))
1114
Section 1 Creating a Policy Substitution Realm
To create a Policy Substitution realm:
1. Select the Configuration > Authentication > Policy Substitution > Policy Substitution
Realms tab.
3. In the Realm name field, enter a realm name. The name can be up to 32
characters long and composed of alphanumeric characters and underscores.
The name must start with a letter.
4. Click OK to close the dialog.
5. Click Apply.
1115
Advanced Secure Gateway Administration Guide
Prerequisites
You must have defined at least one Policy Substitution realm (using the Policy
Substitution Realms tab) before attempting to set Policy Substitution realm
properties. If the message Realms must be added in the Policy Substitutions
Realms tab before editing this tab is displayed in red at the bottom of this
page, you do not currently have any Policy Substitution realms defined.
1116
To Define Policy Substitution User Information:
1. Select the Configuration > Authentication > Policy Substitution > User Information tab.
-or-
2. From the Realm name drop-down list, select the Policy Substitution realm for
which you want to change realm properties.
3. To determine username by definition, select Determine username by definition
and specify the username and full username strings. Remember that the
Username and Full username attributes are character strings that contain policy
substitutions. When authentication is required for the transaction, these
character strings are processed by the policy substitution mechanism, using
the current transaction as input. The resulting string becomes the user's
identity for the current transaction. For an overview of usernames and full
usernames, see "About Policy Substitution Realms" on page 1111.
-or-
4. To determine username by search, select Determine username by search.
• From the drop-down list, select the LDAP realm to use as a search realm.
• The search filter must be a valid LDAP search filter per RFC 2254. The
search filter can contain any of the policy substitutions that are available
based on the user's request (such as IP address, netbios query result, and
ident query result).
• The user attribute is the attribute on the LDAP search result that
corresponds to the user's full username. The LDAP search usually results
in user entries being returned, in which case the user attribute is the
FQDN. If the LDAP search was for a non-user object, however, the
username might be a different attribute on the search result entry.
5. Click Apply.
1117
Advanced Secure Gateway Administration Guide
Prerequisite
You must have defined at least one Policy Substitution realm (using the Policy
Substitution Realms tab) before attempting to set Policy Substitution realm
properties. If the message Realms must be added in the Policy Substitutions
Realms tab before editing this tab is displayed in red at the bottom of this
page, you do not currently have any Policy Substitution realms defined.
1. Select Configuration > Authentication > Policy Substitution > Ignore Users.
2. From the Realm Name drop-down list, select the Policy Substitution realm for
which you want to change realm properties.
3. Click New to add a username to be ignored during the username search. The
username format depends on what the LDAP search is looking for but will
most often be an LDAP FQDN.
4. Click OK to close the dialog; repeat the previous step to add other users.
5. Click Apply.
1118
Section 4 Configuring Authorization
Policy Substitution realms do not require an authorization realm. If the policy
does not make any decisions based on groups, you need not specify an
authorization realm.
Prerequisite
You must have defined at least one Policy Substitution realm (using the Policy
Substitution Realms tab) before attempting to set Policy Substitution realm
properties. If the message Realms must be added in the Policy Substitutions
Realms tab before editing this tab is displayed in red at the bottom of this
page, you do not currently have any Policy Substitution realms defined.
2. From the Realm Name drop-down list, select the Policy Substitution realm for
which you want to change realm properties.
3. From the Authorization Realm Name drop-down list, select the authorization
realm you want to use to authorize users.
4. Click Apply.
1119
Advanced Secure Gateway Administration Guide
Prerequisite
You must have defined at least one Policy Substitution realm (using the Policy
Substitution Realms tab) before attempting to set Policy Substitution general
properties. If the message Realms must be added in the Policy Substitution
Realms tab before editing this tab is displayed in red at the bottom of this
page, you do not currently have any Policy Substitution realms defined.
2. From the Realm name drop-down list, select the Policy Substitution realm for
which to change properties.
3. Configure refresh options:
a. Select the Use the same refresh time for all check box if you would like to
use the same refresh time for all.
b. Enter the number of seconds in the Surrogate refresh time field. The
Surrogate Refresh Time allows you to set a realm default for how often
a user’s surrogate credentials are refreshed. Surrogate credentials are
credentials accepted in place of a user’s actual credentials. The default
setting is 900 seconds (15 minutes). You can configure this in policy for
better control over the resources as policy overrides any settings made
here.
Before the refresh time expires, if a surrogate credential (IP address or
cookie) is available and it matches the expected surrogate credential, the
Advanced Secure Gateway appliance authenticates the transaction. After
the refresh time expires, the Advanced Secure Gateway appliance
reevaluates the user’s credentials.
1120
c. Enter the number of seconds in the Authorization refresh time field. The
Authorization Refresh Time allows you to manage how often the
authorization data is verified with the authentication realm. It has a
default setting of 900 seconds (15 minutes). You can configure this in
policy for better control over the resources as policy overrides any
settings made here.
4. Enter the number of seconds in the Inactivity timeout field to specify the amount
of time a session can be inactive before being logged out.
5. Configure cookie options:
a. Select the Use persistent cookies option to use persistent browser cookies
instead of session browser cookies.
b. Select the Verify the IP address in the cookie option if you would like the
cookies surrogate credentials to only be accepted for the IP address
that the cookie was authenticated. Disabling this will allow cookies to
be accepted from other IP addresses.
6. You can specify a virtual URL. For more information on the virtual URL, see
"About Origin-Style Redirection" on page 929.
7. Click Apply.
Notes
❐ Following are examples of how to configure four different types of Policy
Substitution realms. For a list of available substitutions, see the Content Policy
Language Guide.
• Identity to be determined by sending a NetBIOS over TCP/IP query to the
client computer, and using LDAP authorization
#(config) security policy-substitution create-realm netbios
#(config) security policy-substitution edit-realm netbios
#(config policy-substitution netbios) username \
$(netbios.messenger-username)
#(config policy-substitution netbios) full-username \
cn=$(netbios.messenger-username),cn=users,dc=company,dc=com
#(config policy-substitution netbios) authorization-realm-name
ldap
1121
Advanced Secure Gateway Administration Guide
❐ If you need to change the NetBIOS defaults of 5 seconds and 3 retries, use the
nbstat requester option from the netbios command submode. (For more
information on using the NetBIOS commands, refer to the Command Line
Interface Reference.)
❐ If you need to change the Ident defaults of 30 second timeout, treating
username whitespace as significant and querying Ident port 113, use the client
commands in the identd command submode. (For more information on using
the Ident commands, refer to the Command Line Interface Reference.)
1122
Section 6 Creating the Policy Substitution Policy
When you complete Policy Substitution realm configuration, you must create CPL
policies for the policy-substitution realm to be used. Be aware that the example
below is just part of a comprehensive authentication policy. By themselves, they
are not adequate.
For policy substitution realms, the username and group values are case-sensitive.
Note: Refer to the Content Policy Language Guide for details about CPL and how
transactions trigger the evaluation of policy file <Proxy> and other layers.
Be aware that the default policy condition for this example is allow. On new SGOS
5.x or later systems running the Proxy Edition, the default policy condition is deny.
Every Policy Substitution realm authenticated user is allowed to access the
Advanced Secure Gateway.
<Proxy>
authenticate(PolicySubstitutionRealm)
1123
Advanced Secure Gateway Administration Guide
1124
Chapter 57: RADIUS Realm Authentication and Authorization
About RADIUS
RADIUS is often the protocol of choice for ISPs or enterprises with very large
numbers of users. RADIUS is designed to handle these large numbers through
centralized user administration that eases the repetitive tasks of adding and
deleting users and their authentication information. RADIUS also inherently
provides some protection against sniffing.
Some RADIUS servers support one-time passwords. One-time passwords are
passwords that become invalid as soon as they are used. The passwords are
often generated by a token or program, although pre-printed lists are also used.
Using one-time passwords ensures that the password cannot be used in a
replay attack.
The Advanced Secure Gateway’s one-time password support works with
products such as Secure Computing SafeWord synchronous and asynchronous
tokens and RSA SecurID tokens.
The Advanced Secure Gateway supports RADIUS servers that use challenge/
response as part of the authentication process. SafeWord asynchronous tokens
use challenge/response to provide authentication. SecurID tokens use
challenge/response to initialize or change PINs.
1125
Advanced Secure Gateway Administration Guide
1126
Section 1 Creating a RADIUS Realm
To create a RADIUS realm:
You can create up to 40 RADIUS realms.
1. Select the Configuration > Authentication > RADIUS > RADIUS Realms tab.
2. Click New. The Add RADIUS Realm dialog displays.
1127
Advanced Secure Gateway Administration Guide
1128
The client maintains an average response time from the server; the retry
interval is initially twice the average. If that retry packet fails, then the next
packet waits twice as long again. This increases until it reaches the timeout
value. The default number of retries is 10.
7. If you are using one-time passwords, select the One-time passwords option.
You must enable one-time passwords if you created a challenge/response
realm.
8. If the RADIUS server is configured to expect case-sensitive usernames and
passwords, make sure the Case sensitive option is selected.
9. Click Apply.
10. Verify the RADIUS configuration as follows:
a. Click Test Configuration. The Test Configuration dialog displays.
b. Enter the Username and Password of a client in your RADIUS realm and
then click OK. The Advanced Secure Gateway appliance will use
configuration you supplied to send an authentication request to the
RADIUS server and return the results as follows:
• If the RADIUS server settings are configured properly, a dialog will
display indicating that the test succeeded. It will also display a list of
groups to which the user belongs.
• If the test does not succeed, check that the settings on the RADIUS
Servers tab are configured properly and then test the configuration
again.
1129
Advanced Secure Gateway Administration Guide
1130
b. Enter the number of seconds in the Credential refresh time field.
The Credential Refresh Time is the amount of time basic credentials
(username and password) are kept on the Advanced Secure Gateway. This
feature allows the Advanced Secure Gateway to reduce the load on the
authentication server and enables credential spoofing. It has a default
setting of 900 seconds (15 minutes). You can configure this in policy for
better control over the resources as policy overrides any settings made
here.
Before the refresh time expires, the Advanced Secure Gateway
authenticates the user supplied credentials against the cached credentials.
If the credentials received do not match the cached credentials, they are
forwarded to the authentication server in case the user password changed.
After the refresh time expires, the credentials are forwarded to the
authentication server for verification.
c. Enter the number of seconds in the Surrogate refresh time field.
The Surrogate Refresh Time allows you to set a realm default for how
often a user’s surrogate credentials are refreshed. Surrogate credentials are
credentials accepted in place of a user’s actual credentials. The default
setting is 900 seconds (15 minutes). You can configure this in policy for
better control over the resources as policy overrides any settings made
here.
Before the refresh time expires, if a surrogate credential (IP address or
cookie) is available and it matches the expected surrogate credential, the
Advanced Secure Gateway authenticates the transaction. After the refresh
time expires, the Advanced Secure Gateway verifies the user’s credentials.
Depending upon the authentication mode and the user-agent, this may
result in challenging the end user for credentials.
The main goal of this feature is to verify that the user-agent still has the
appropriate credentials.
4. Type the number of seconds in the Inactivity timeout field to specify the amount
of time a session can be inactive before being logged out.
5. If you use Basic credentials and want to cache failed authentication attempts
(to reduce the load on the authentication service), enter the number of seconds
in the Rejected Credentials time field.
This setting, enabled by default and set to one second, allows failed
authentication attempts to be automatically rejected for up to 10 seconds. Any
Basic credentials that match a failed result before its cache time expires are
rejected without consulting the back-end authentication service. The original
failed authentication result is returned for the new request.
All failed authentication attempts can be cached: Bad password, expired
account, disabled account, old password, server down.
To disable caching for failed authentication attempts, set the Rejected
Credentials time field to 0.
1131
Advanced Secure Gateway Administration Guide
Note: RADIUS groups can only be configured through policy. This feature is not
available through either the Management Console or the CLI.
1132
Use the following CLI commands to create user-defined RADIUS attributes:
t
Note: The remove command will not remove attributes that are currently part of
the session-monitor’s configuration.
Example 1
The following example shows an enum mapping an integer value to a string
value:
#(config radius attributes) add radius-attribute 205 sample-enum enum
1="string for value 1" 2=string2 3="string for value 3"
The integer values are sent on the wire from the RADIUS server. However, an
admin can also refer to a value using either an integer or a string in CPL using
the following expressions:
session-monitor.attribute.sample-enum=3
session-monitor.attribute.sample-enum="string for value 3"
Example 2
The following example shows octet string value:
#(config radius attributes) add radius-attribute 206 sample-octet-
string octet-string 30
An octet string functions similarly to a string, but it can contain binary data.
Example 3
The following example show a tag data type:
#(config radius attributes) add radius-attribute 205 sample-tag-
string tag-string 25
1133
Advanced Secure Gateway Administration Guide
Tag data types differ from non-tag counterparts because they include an extra
byte in the value sent from the RADIUS server, which identifies a VPN tunnel.
The Advanced Secure Gateway skips this extra value to get to the actual value
when parsing the value sent from the RADIUS server.
Example 4
The following example shows a vendor attribute with a fictional vendor ID
value of 21234:
#(config radius attributes) add radius-attribute 21234 1 sample-
vendor-integer integer.
CPL Example
The examples below are just part of a comprehensive authentication policy. By
themselves, they are not adequate.
Note: Refer to the Content Policy Language Guide for details about CPL and how
transactions trigger the evaluation of policy file layers.
1134
Troubleshooting
One of five conditions can cause the following error message:
Your request could not be processed because of a configuration error: "The request
timed out while trying to authenticate. The authentication server may be busy or offline."
Notes
If you use guest authentication, remember that RADIUS realms retrieve
authorization data at the same time as the user is authenticated. In some cases, the
system can distinguish between an authentication and authorization failure.
Where the system cannot determine if the error was due to authentication or
authorization, both the authentication and authorization are considered to be
failed.
1135
Advanced Secure Gateway Administration Guide
1136
Chapter 58: Configuring the Advanced Secure Gateway as a
Session Monitor
This chapter discusses how you can configure the SGOS software to monitor
RADIUS accounting messages and to maintain a session table based on the
information in these messages. The session table can then be used for logging
or authentication.
You can also, optionally, configure multiple appliances to act as a session
monitor cluster. When enabled, the session table is replicated to all members of
the cluster to provide failover support.
After you configure and enable the session monitor, it maintains a session table
that records which sessions are currently active and the user identity for each
session. User information can be extracted from the session table by the
Advanced Secure Gateway and used to make policy decisions.
1137
Advanced Secure Gateway Administration Guide
and
#(config) session-monitor attributes
1138
Note: Any changes made to the Session-Monitor’s attribute configuration will
reinitialize the session table, resulting in the removal of all existing entries.
1139
Advanced Secure Gateway Administration Guide
Note: When using a session monitor cluster, the RADIUS client must be
configured to send the RADIUS accounting messages to the failover group's
virtual IP address.
1140
Table 58–2 Session Monitor Cluster Command Descriptions
2. (Optional) To view the session-monitor configuration, you can either use the
session-monitor view command or the config show session-monitor
command.
#(config) show session-monitor
General:
Status: enabled
Entry timeout: 120 minutes
Maximum entries: 500000
Cluster support: enabled
Cluster port: 55555
Cluster group address: 10.9.17.159
Synchronization delay: 0
Synchronization grace period: 30
1141
Advanced Secure Gateway Administration Guide
All session-monitor attributes can use the following string comparison functions:
• .prefix
• .suffix
• .substring
• .regex
1142
❐ IPv4: session-monitor.attribute.NAS-IP-Address=1.2.3.4
❐ IPv6: session-monitor.attribute.NAS-IPv6-
Address=2001:db8:85a3::8a2e:370:7334
❐ Enum: session-monitor.attribute.Service-type=3
session-monitor.attribute.Service-type="Callback-Login"
Note: The enum data type maps a string to an integer, and either can be used in
comparisons. You can see a listing of the possible values for Service-Type (and
other enum attributes) in the security radius attributes sub-mode.
Note: Refer to the Content Policy Language Guide for details about CPL and how
transactions trigger the evaluation of policy file layers.
❐ In the following example, the Advanced Secure Gateway is using the session
table maintained by the session monitor to extract user information for
authentication.
<proxy>
allow authenticate(session)
Access Logging
The Blue Coat Advanced Secure Gateway uses the following ELFF field syntax for
access logging.
x-cs-session-monitor-radius(<attribute_name>)
When a user is authenticated by the Advanced Secure Gateway, the named
attribute is fetched and recorded. When access log records are created, this field
will be substituted with the value of the named attribute.
Access Logging is enabled on the Configuration > Access Logging > General page.
For information about customizing access logs, see Chapter 30: "Access Log
Formats" on page 671.
1143
Advanced Secure Gateway Administration Guide
Notes
❐ The session table is stored entirely in memory. The amount of memory needed
is roughly 40MB for 500,000 users.
❐ The session table is kept in memory. If the system goes down, the contents of
the session table are lost. However, if the system is a member of a failover
cluster, the current contents of the session table can be obtained from another
machine in the cluster. The only situation in which the session table is entirely
lost is if all machines in the cluster go down at the same time.
❐ The session replication protocol replicates session information only;
configuration information is not exchanged. That means each Advanced
Secure Gateway in the cluster must have identical RADIUS attribute settings
in order to properly share information.
❐ The session replication protocol is not secured. The failover group should be
on a physically secure network to communicate with each other.
❐ The session monitor requires sufficient memory and at least 100Mb-per-
second network links among the cluster to manage large numbers of active
sessions.
❐ The username in the session table is obtained from the Calling-Station-ID
attribute in the RADIUS accounting message and can be a maximum of 19
bytes.
1144
Chapter 59: Sequence Realm Authentication
About Sequencing
After a realm is configured, you can associate it with other realms to allow the
Advanced Secure Gateway appliance to search for the proper authentication
credentials for a specific user. That is, if the credentials are not acceptable to the
first realm, they are sent to the second, and so on until a match is found or all
the realms are exhausted. This is called sequencing.
For example, if a company has one set of end-users authenticating against an
LDAP server and another using NTLM, a sequence realm can specify to
attempt NTLM authentication first; if that fails because of a user-correctable
error (such as credentials mismatch or a user not in database) then LDAP
authentication can be specified to try next. You can also use sequences to fall
through to a policy substitution realm if the user did not successfully
authenticate against one of the earlier realms in the sequence.
Note: Errors such as server down do not fall through to the next realm in the
sequence. Those errors result in an exception returned to the user. Only errors
that are end-user correctable result in the next realm in the sequence being
attempted.
1145
Advanced Secure Gateway Administration Guide
❐ If an IWA realm is in a realm sequence and the IWA realm does not support
Basic credentials, the realm must be the first realm in the sequence and try
IWA authentication once must be enabled.
❐ Multiple Basic realms are allowed.
❐ Multiple Windows SSO realms are allowed.
❐ Connection-based realms, such as Certificate, are not allowed in the realm
sequence.
❐ A realm can only exist once in a particular realm sequence.
❐ A realm sequence cannot have another realm sequence as a member.
❐ If a realm is down, an exception page is returned. Authentication is not tried
against the other later realms in the sequence.
1146
Section 1 Creating a Sequence Realm
To create a sequence realm:
1. Select the Configuration > Authentication > Sequences > Sequence Realms tab.
2. Click New. The Add Sequence Realm dialog displays.
3. In the Realm name field, enter a realm name. The name can be 32 characters
long and composed of alphanumeric characters and underscores. The name
must start with a letter.
4. Click OK.
5. Click Apply.
1147
Advanced Secure Gateway Administration Guide
2a
2b
1148
5
5. To change the order that the realms are checked, use the promote/demote
buttons. When you add an IWA realm, it is placed first in the list and you can
allow the realm sequence to try IWA authentication only once. If you demote the
IWA entry, it becomes last in the sequence and the default of checking IWA
multiple times is enabled.
6. If you permit authentication or authorization errors, you can select the Try next
realm on tolerated error checkbox to specify that the next realm on the list should
be attempted if authentication in the previous realm has failed with a
permitted error. The default value is to not attempt the next realm and fall out
of the sequence. (For information on using permitted errors and guest
authentication, see "Permitting Users to Log in with Authentication or
Authorization Failures" on page 931.)
7. Click Apply.
1149
Advanced Secure Gateway Administration Guide
2. From the Realm name drop-down list, select the Sequence realm for which you
want to change properties.
3. (Optional) If required, change the Sequence realm name in the Display Name
field. The default value for the display name is the realm name. The display
name cannot be longer than 128 characters and it cannot be null.
4. You can specify a virtual URL based on the individual realm sequence. For
more information on the virtual URL, see "Sequence Realm Authentication"
on page 1145.
5. Click Apply.
1150
Tips
❐ Explicit Proxy involving a sequence realm configured with an NTLM/IWA
realm and a substitution realm.
Internet Explorer (IE) automatically sends Windows credentials in the Proxy-
Authorization: header when the Advanced Secure Gateway appliance issues a
challenge for NTLM/IWA. The prompt for username/password appears only
if NTLM authentication fails. However, in the case of a sequence realm
configured with an NTLM/IWA realm and a substitution realm, the client is
authenticated as a guest in the policy substitution realm, and the prompt
allowing the user to correct the NTLM credentials never appears.
❐ Transparent Proxy setup involving a sequence realm configured with an
NTLM/IWA realm and a substitution realm.
The only way the Advanced Secure Gateway appliance differentiates between
a domain and non-domain user is though the NTLM/IWA credentials
provided during the authentication challenge.
IE does not offer Windows credentials in the Proxy-Authorization: header
when the Proxy issues a challenge for NTLM/IWA unless the browser is
configured to do so. In this case, the behavior is the same as for explicit proxy.
If IE is not configured to offer Windows credentials, the browser issues a
prompt for username/password, allowing non-domain users to be
authenticated as guests in the policy substitution realm by entering worthless
credentials.
1151
Advanced Secure Gateway Administration Guide
1152
Chapter 60: Managing X.509 Certificates
1153
Advanced Secure Gateway Administration Guide
Certificates
Certificates are encrypted files that contain a public/private keypair. They can be
used to verify the identity of a server, a website or to encrypt files.
The SGOS software uses:
❐ SSL Certificates.
❐ CA Certificates.
❐ External Certificates.
❐ Certificate Chains.
You can also use wildcard certificates during HTTPS termination. Microsoft’s
implementation of wildcard certificates is as described in RFC 2595, allowing an *
(asterisk) in the leftmost-element of the server's common name only. For
information on wildcards supported by Internet Explorer, refer to article 258858 at
the Microsoft Knowledge Base. Any SSL certificate can contain a common name
with wildcard characters.
1154
SSL Certificates
SSL certificates are used to authenticate the identity of a server or a client. A
certificate is confirmation of the association between an identity (expressed as a
string of characters) and a public key. If a party can prove they hold the
corresponding private key, you can conclude that the party is who the certificate
says it is. The certificate contains other information, such as its expiration date.
The association between a public key and a particular server is done by
generating a certificate signing request using the server's or client’s public key. A
certificate signing authority (CA) verifies the identity of the server or client and
generates a signed certificate. The resulting certificate can then be offered by the
server to clients (or from clients to servers) who can recognize the CA's signature.
Such use of certificates issued by CAs has become the primary infrastructure for
authentication of communications over the Internet.
The Advanced Secure Gateway appliance trusts all root CA certificates trusted by
Internet Explorer and Firefox. The list is updated periodically to be in sync with
the latest versions of IE and Firefox.
CA certificates installed on the Advanced Secure Gateway appliance are used to
verify the certificates presented by HTTPS servers and the client certificates
presented by browsers. Browsers offer a certificate if the server is configured to
ask for one and an appropriate certificate is available to the browser.
For information on creating certificates, see"Add Certificates to the Advanced
Secure Gateway Appliance" on page 1168
CA Certificates
CA certificates are certificates that belong to certificate authorities. CA certificates
are used by Advanced Secure Gateway devices to verify X.509 certificates
presented by a client or a server during secure communication.
Advanced Secure Gateway appliances are pre-installed with the most common
CA certificates.You can review these certificates using the Management Console
or the CLI. You can also add your own root and intermediate CA certificates for
your own internal certificate authorities.
External Certificates
An external certificate is any X.509 certificate for which the Advanced Secure
Gateway appliance does not have the private key. The certificate can be used to
encrypt data, such as access logs, with a public key so that it can only be
decrypted by someone who has the corresponding private key. See "Encrypting
the Access Log" on page 640 for information about encrypting access logs.
Certificate Chains
A certificate chain requires that certificates form a chain where the next certificate
in the chain validates the previous certificate, going up the chain to the root,
which is a trusted CA certificate.
1155
Advanced Secure Gateway Administration Guide
Every certificate in the chain is checked for expiration as part of the certificate
validation process. All certificates within this chain must be valid in order for the
chain to be considered valid.
You can import certificate chains by creating a keyring and adding certificates to
it. When creating certificate chains in the keyring, keep in mind that the keyring
has a maximum character count of 7999. If you exceed the maximum, an error will
appear on screen informing you that you have exceeded the character count limit.
In order for the Advanced Secure Gateway to present a valid certificate chain for
deployments such as HTTPS SSL Forward Proxy and HTTPS Reverse Proxy, the
following measures must be taken:
❐ Add the server certificate to the keyring you created.
Following the server certificate, load any associated intermediate certificates in
the certificate chain to the keyring. For detailed steps to create a certificate chain,
see "Importing a Server Certificate" on page 1180.
Keyrings
A keyring contains a public/private keypair and can also contain a certificate
signing request, a signed certificate and/or a certificate chain. Each keyring must
have a name upon creation. You can view as well as delete a keyring. Some
keyrings are already built-in for specified purposes. For information on managing
keyrings, see "Using Keyrings and SSL Certificates" on page 1161.
Note: You can disable cipher suites that you do not trust. However, SGOS does
not provide any mechanism to change the ordering of the ciphers used.
All cipher suites supported by the Advanced Secure Gateway appliance use the
RSA key exchange algorithm, which uses the public key encoded in the server's
certificate to encrypt a piece of secret data for transfer from the client to server.
This secret is then used at both endpoints to compute encryption keys.
General support of a particular cipher suite does not guarantee availability in
your configuration.
By default, the Advanced Secure Gateway appliance is configured to allow
TLSv1, TLSv1.1, and TLSv1.2 traffic; the default set for all signatures is SHA256.
Table 60–1, "Cipher Suites Shipped with the Appliance" on page 1157 shows the
list of cipher suites that are shipped with the appliance and that are available by
default. The cipher suites available for use depend on the protocols you select.
1156
Note: Because they contain known vulnerabilities, Blue Coat recommends that
you do not use the SSLv3 and SSLv2 protocols; however, if you do select the
SSLv2 protocol, additional cipher suites are available: DES-CBC3-MD5 (High, 168-
bit), RC2-CBC-MD5 (Medium, 128-bit), and DES-CBC-MD5 (Low, 56-bit).
The appliance supports HTTPS interception in forward and reverse proxy modes when sites use
ECDHE ciphers. The following variants of ECDHE-RSA are available:
ECDHE-RSA-AES128- 0xC0,0x27 TLS_ECDHE_RSA_WITH_ High Yes 128
SHA256 AES_128_CBC_SHA256
The appliance supports HTTPS interception in forward proxy mode when sites use the following
DHE-DSS ciphers. These ciphers are available in upstream connections in forward proxy mode:
DHE-DSS-AES128-SHA 0x00,0x32 TLS_DHE_DSS_WITH_AE Medium No 128
S_128_CBC_SHA
The appliance supports HTTPS interception in forward proxy mode when sites use ECDHE ciphers.
The following variants of ECDHE-ECDSA are only available in upstream connections in forward
proxy mode:
1157
Advanced Secure Gateway Administration Guide
1158
For information on cipher suite configuration, see "Changing the Cipher Suite of
the SSL Client" on page 1216.
Note: ECDHE ciphers are more CPU-intensive than RSA ciphers. DHE ciphers
(disabled by default) are even more CPU-intensive.
1159
Advanced Secure Gateway Administration Guide
1160
Section B: Using Keyrings and SSL Certificates
Keyrings are virtual containers. Each keyring holds a public/private key pair and
a customized key length. You can associate certificates, certificate chains or
certificate signing requests with keyrings.
In general, SSL certificates involve three parties:
❐ The subject of the certificate.
❐ The Certificate Authority (CA), which signs the certificate, attesting to the
binding between the public key in the certificate and the subject.
❐ The relying party, which is the entity that trusts the CA and relies on the
certificate to authenticate the subject.
Keyrings and certificates are used in:
❐ Encrypting data.
❐ Digitally Signing Access Logs.
❐ Authenticating end users.
❐ Authenticating a Advanced Secure Gateway.
The steps in creating keyrings and certificates include:
❐ Create a keyring. A default keyring is shipped with the system and is used for
accessing the Management Console, although you can use others. You can also
use the default keyring for other purposes. You can create other keyrings for
each SSL service. (See "Creating a Keyring" on page 1163.)
Note: You can also import keyrings. For information on importing keyrings,
see "Importing an Existing Keypair and Certificate" on page 1187.
Note: You can also associate a certificate chain with a keyring. For
information on importing a certificate chain see, "Importing a Server
Certificate" on page 1180
1161
Advanced Secure Gateway Administration Guide
Note: These steps must be done using a secure connection such as HTTPS, SSH,
or a serial console.
1162
Section 1 Creating a Keyring
You can create additional keyrings for each HTTPS service defined.
The Advanced Secure Gateway ships with several keyrings already created:
❐ default:
The default keyring contains a certificate and an automatically-
generated keyring and a self signed certificate which can be used for accessing
the Advanced Secure Gateway through HTTPS. As demonstrated by the
Advanced Secure Gateway appliance Management Console.
❐ configuration-passwords-key: The configuration-passwords-key keyring contains a
keypair but does not contain a certificate. This keyring is used to encrypt
passwords in the show config command and should not be used for other
purposes.
❐ appliance-key: The appliance-key keyring contains an internally-generated
keypair. If the Advanced Secure Gateway appliance is authenticated (has
obtained a certificate from the Blue Coat CA appliance-certificate server), that
certificate is associated with this keyring, which is used to authenticate the
device. (For more information on authenticating the Advanced Secure
Gateway appliance, see Chapter 70: "Authenticating an Advanced Secure
Gateway Appliance" on page 1347.)
❐ passive-attack-protection-only-key: The passive-attack-protection-only-key keyring
allows data to be encrypted, but with no endpoint authentication. Although
the traffic cannot be sniffed, it can be intercepted with a man-in-the-middle
attack. The passive-attack-protection-only-key keyring is NOT considered secure;
therefore, it should not be used on production networks.
If an origin content server requires a client certificate and no keyring is associated
with the Advanced Secure Gateway SSL client, the HTTPS connections fails. For
information on using the SSL client, see Chapter 61: "Managing SSL Traffic" on
page 1213.
To create a keyring:
1. Select the Configuration > SSL > Keyrings > Keyrings tab.
1163
Advanced Secure Gateway Administration Guide
Note: Spaces in keyring names are not supported. Including a space can
cause unexpected errors while using such keyrings.
1164
• Do not show keypair prevents the keypair from being viewed or
exported.
c. Enter the key length in the Create a new ______ -bit keyring field. The
length range is 384-4096 bits. For deployments reaching outside the
U.S., determine the maximum key length allowed for export.
Click OK. The keyring is created with the name you chose. It does not have
a certificate associated with it yet. To associate a certificate or a certificate
chain with a keyring, see "Importing a Server Certificate" on page 1180.
-or-
d. Select Import keyring. The grayed-out Keyring field becomes enabled,
allowing you to paste in an already existing private key. Any certificate
or certificate request associated with this private key must be imported
separately. For information on importing a certificate, see "Importing a
Server Certificate" on page 1180.
e. If the private key that is being imported has been encrypted with a
password, select Keyring Password and enter the password into the
field.
Note: The only way to retrieve a keyring's private key from the
Advanced Secure Gateway appliance is by using the command line —it
cannot be exported through the Management Console.
1165
Advanced Secure Gateway Administration Guide
Notes
❐ To view the keypair in an encrypted format, you can optionally specify des or
des3 before the keyring_id, along with an optional password. If the optional
password is provided on the command line, the CLI does not prompt for a
password.
❐ If the optional password is not provided on the command line, the CLI asks
for the password (interactive). If you specify either des or des3, you are
prompted.
❐ To view the keypair in unencrypted format, select either the optional
keyring_id or use the unencrypted command option.
❐ You cannot view a keypair over a Telnet connection because of the risk that it
could be intercepted.
1166
Section 2 Providing Client Certificates in Policy
Sometimes, when a user navigates to a secured Web address in a browser, the
server hosting the site requests a certificate to authenticate the user. The client
certificate authentication feature allows the Advanced Secure Gateway to store
client certificates and present the appropriate certificate to the Web server upon
request. This feature is only applicable to intercepted SSL traffic.
TheAdvanced Secure Gateway stores individual client certificates and keys in
individual keyrings. You can then write policy that instructs the appliance which
client certificate to use, and when to use it.
For convenience, you can also group client certificates and keyrings into a keylist
that contains all of the client certificates for a specific purpose, such as certificates
for a specific website or certificates for users in a particular group. If your policy
references a keylist rather than an individual keyring, you must specify how to
determine which certificate to use. This is done by matching the value of a
substitution variable defined in the policy against a specified certificate field
attribute value within the certificate. The Advanced Secure Gateway appliance
determines what certificate field attribute to use based on an extractor string you
supply when you create the keylist.
When a certificate is requested, if the policy selects a client certificate, the
appliance presents the certificate to the requesting server. If no certificate is
specified in policy, an empty certificate is presented.
To provide a client certificate to a requesting Web address, you must complete the
following tasks.
Task # Reference
1167
Advanced Secure Gateway Administration Guide
where:
• keyring_id - the name of the keyring.
• visibility - how the keyring is displayed in the show configuration
output. Options include:
• show:Private keys associated with keyrings created with this attribute
can be displayed in the CLI or included as part of a profile or overlay
pushed by Director.
• show-director: Private keys associated with keyrings created with this
attribute are part of the show configuration output if the CLI
connection is secure (SSH/RSA) and the command is issued from
Director.
• no-show: Private keys associated with keyrings created with this
attribute are not displayed in the show configuration output and
cannot be part of a Director profile. The no-show option is provided
as additional security for environments where the keys will never be
used outside of the particular Advanced Secure Gateway appliance.
• Private Key, Certificate, and CSR - Paste the contents of the key,
certificate or CSR into the text file, including the ---Begin and ---End tags.
In the following example, the private key and certificate has been truncated.
#keyring:Keyring1
#visibility:no-show
-----BEGIN RSA PRIVATE KEY-----
1168
MIIEpAIBAAKCAQE...KvBgDmSIw6dTXxAT/mMUHGRd7cRew==
-----END RSA PRIVATE KEY-----
-----BEGIN CERTIFICATE-----
MIIDdjCCAl4CCQC...TjUwxwboMEyL60z/tixM=
-----END CERTIFICATE-----
#keyring:Keyring2
where:
• keylist_name - Type the name of the keylist.
• extractor - Enter a string that identifies which certificate field attribute
value to extract to determine a policy match, using the
$(field.attribute) syntax. Substitutions from all attributes of Subject,
Issuer, SubjectAltName, IssuerAltName, and SerialNumber certificate
fields are supported.
• keyring_id - List any keyrings to include in the keylist. The keyrings may
be included in the keydata file, or may be keyrings that already exist on
the Advanced Secure Gateway appliance.
For example:
#keylist:mylist
#extractor: $(Subject.CN)
Keyring1
Keyring2
4. Save the file as .txt on a web server that can be accessed by the Advanced
Secure Gateway appliance.
1169
Advanced Secure Gateway Administration Guide
5. Click Apply.
1170
Section 4 Group Related Client Keyrings into a Keylist
To easily reference client certificate keyrings in policy, use keylists to group them
together. For example it is often useful to group certificates into keylists bundled
by:
• all client certificates for a specific web address,
• all client certificates for a group of users,
• all client certificates for a specific user.
All keyrings in the keylist must have the same extractor, but each certificate must
have a unique value for the extractor. The evaluation of the keylist extractor string
must be unique across the client certificates in the keylist, otherwise changes
being applied to the keylist will fail with an error.
1. Select Configuration > SSL > Keyrings > Keylists.
2. Click Create.
3. In the Name field, type a name for the new keylist.
4. In the Extractor field enter a string that identifies which certificate field
attribute value to extract to determine a policy match. Enter the string using
the $(field.attribute) syntax. For example, to extract the value of the CN
attribute from the Subject field of the certificate, you would enter
$(subject.CN).
Alternatively, select values from the Field, Attribute, and Group Name drop down lists
to build an extractor string, and click Add to extractor. The new extractor string is
appended to any existing text in the Extractor field. The Group Name drop down list
only appears for IssuerAltName and SubjectAltName fields. The Extractor field can
have a maximum of 255 characters.
The extractor supports substitutions from all attributes of Subject, Issuer,
SubjectAltName, IssuerAltName, and SerialNumber certificate fields. The default
extractor value is $(Subject.CN); many other subject attributes are recognized,
among them OU, O, L, ST, C, and DC. Field indexes can be used in substitutions on a
group name or attribute; for example $(SubjectAltName.DNS.1).
5. From the Available Keyrings list, select the keyrings to be included in this keylist
and click Add.
To remove a keyring from the list of Included Keyrings, select the keyring and click
Remove.
If any errors are noted in the Included Keyrings list, the keylist cannot be
created. Possible causes for errors are:
• The included keyring does not contain the specified extractor pattern or
substitution variable.
• Multiple keyrings have the same value for the specified extractor.
1171
Advanced Secure Gateway Administration Guide
The extracted value in the keyring allows the policy action object to find the
appropriate keyring certificate to use. Only one keyring can be utilized by each policy
transaction. Therefore, the extractor string evaluation must be unique across the
certificates in the keylist. A keyring whose extractor value matches the extractor value
of any existing keyring in the keylist will not be added to the keylist. For example, if
the extractor $(Subject.DC) is selected, and all keyrings have the same value in the
certificate for that extractor, the policy would not be able to determine which keyring
to select.
6. To save the keylist click OK.
7. Click Apply.
1172
Section 1 Specify the Client Certificates to be Used in Policy
You can now reference the keyrings and keylists in your policy.
To use a keyring
1. In the Name field, enter a name for the object or leave as is to accept the default.
2. Select Keyring.
3. From the drop-down, select the keyring to use in policy.
4. Click OK.
To use a keylist
1. In the Name field, enter a name for the object or leave as is to accept the default.
2. Select Keylist.
3. From the drop-down, select the keylist to use in policy.
4. In the Selector field, type a substitution variable.
1173
Advanced Secure Gateway Administration Guide
Keyring Examples
❐ Use the certificate from <keyring> as the client certificate for user <user>
connecting to a specific website <url>.
url=<url> user=<user> server.connection.client_keyring(<keyring>)
❐ Use the certificate from <keyring> as the client certificate for user <user>
connecting to any website that requires a client certificate.
user=<user> server.connection.client_keyring(<keyring>)
❐ Use the certificate from <keyring> as the client certificate for all users of group
<group> connecting to a specific website <url>.
url=<url> group=<group> server.connection.client_keyring(<keyring>)
Keylist Examples
❐ Select a keyring or certificate from the keylist <keylist> whose extractor value
is equal to the user of the connection, for a specific website <url>.
1174
<SSL>
url = <url> server.connection.client_keyring(<keylist>, \
"$(user)")
❐ For connections to a website <url>, this will select a keyring or certificate from
keylist <keylist> whose extractor value is equal to the group of the
connection.
<SSL>
url = <url> group = (<group>, <group>) \
server.connection.client_keyring(<keylist>, "$(group)")
1175
Advanced Secure Gateway Administration Guide
Creating a CSR
To create a CSR:
1. Select the Configuration > SSL > Keyrings tab.
2. Select the keyring for which you need a signed certificate and click Edit. The
Edit Keyring dialog displays.
1176
3. In the Certificate Signing Request area, click Create. The Create Certificate Signing
Request dialog displays.
1177
Advanced Secure Gateway Administration Guide
Note: Most field limits are counted in terms of bytes rather than characters.
The number of non-ASCII characters a field can accommodate will be less
than the size limit because non-ASCII characters can occupy more than one
byte, depending on the encoding. The only exception is the Challenge field,
which is counted in terms of characters.
5. Click OK to close the dialog. The Certificate Signing Request area displays the
certificate information.
6. Click OK to close the dialog. The CSR column for the keyring displays Yes.
1178
Section 1 Managing SSL Certificates
SSL certificates can be obtained two ways:
❐ Created on the Advanced Secure Gateway appliance as a self-signed
certificate
To create a SSL self-signed certificate on the Advanced Secure Gateway
appliance using a Certificate Signing Request, continue with the next section.
❐ Imported after receiving the certificate from the signing authority.
If you plan to use SSL certificates issued by Certificate Authorities, the
procedure is:
• Obtain the keypair and Certificate Signing Requests (CSRs), either off box
or on box, and send them to the Certificate Authority for signing.
• After the signed request is returned to you from the CA, you can import
the certificate into the Advanced Secure Gateway appliance. To import a
certificate, see "Importing a Server Certificate" on page 1180.
1179
Advanced Secure Gateway Administration Guide
1180
Repeat step 7 until you have copied and pasted all associated intermediate
certificates.
8. Click OK.
9. Click Apply.
The SSL Certificate Pane, displays the certificate(s) and it’s associated keyring.
1181
Advanced Secure Gateway Administration Guide
To import a CRL:
You can choose from among four methods to install a CRL on the Advanced
Secure Gateway appliance:
❐ Use the Text Editor, which allows you to enter the installable list (or copy and
paste the contents of an already-created file) directly onto the Advanced
Secure Gateway.
❐ Create a local file on your local system.
❐ Enter a remote URL, where you placed an already-created file on an FTP or
HTTP server to be downloaded to the Advanced Secure Gateway appliance.
1182
❐ Use the CLI inline command. Refer to the Command Line Interface Reference for
more information.
To update a CRL:
1. Select the Configuration > SSL > CRLs tab.
2. Click New or highlight an existing CRL and click Edit.
3. Give the CRL a name.
4. From the drop-down list, select the method to use to install the CRL; click
Install.
• Remote URL:
Enter the fully-qualified URL, including the filename, where the CRL is
located. To view the file before installing it, click View. Click Install.
The Install CRL dialog displays. Examine the installation status that
displays; click OK.
• Local File:
Click Browse to display the Local File Browse window. Browse for the CRL
file on the local system. Open it and click Install. When the installation is
complete, a results window opens. View the results, close the window,
click Close.
• Text Editor:
Copy a new CRL file into the window, and click Install.
When the installation is complete, a results window opens. View the
results, close the window, click Close.
Note: The Management Console text editor can be used to enter a CRL
file. You cannot use it to enter CLI commands.
1183
Advanced Secure Gateway Administration Guide
This commonly occurs when you use the HTTPS-Console service on port
8082, which uses a self-signed certificate by default. When you access the
Management Console over HTTPS, the browser displays a pop-up that says
that the security certificate is not trusted and asks if you want to proceed. If
you select No instead of proceeding, the browser sends an unknown CA alert to
the Advanced Secure Gateway appliance.
You can eliminate the error message one of two ways:
• If this was caused by the Blue Coat self-signed certificate (the certificate
associated with the default keyring), import the certificate as a trusted
Certificate Signing Authority certificate. See "Importing a Server
Certificate" on page 1180 for more information.
• Import a certificate on the Advanced Secure Gateway appliance for use
with HTTPS-Console that is signed by a CA that a browser already trusts.
❐ If the Advanced Secure Gateway appliance’s certificate is not accepted
because of a host name mismatch or it is an invalid certificate, you can correct the
problem by creating a new certificate and editing the HTTPS-Console service
to use it. For information on editing the HTTPS-Console service, see
"Managing the HTTPS Console (Secure Console)" on page 1326.
1184
Section D: Using External Certificates
External certificates are certificates for which Blue Coat does not have the private
key. The first step in using external certificates is to import the certificates onto the
Advanced Secure Gateway.
4. Enter the name of the external certificate into the External Cert Name field and
paste the certificate into the External Certificate field. You must include the
“-----BEGIN CERTIFICATE-----” and “-----END CERTIFICATE-----“
statements.
5. Click OK.
6. Click Apply.
1185
Advanced Secure Gateway Administration Guide
3. Click Delete.
4. Click OK in the Confirm Delete dialog that displays.
5. Click Apply.
1186
Section E: Advanced Configuration
This section includes the following topics:
❐ "Importing an Existing Keypair and Certificate" on page 1187
❐ "Importing CA Certificates" on page 1188
❐ "Managing CA Certificate Lists" on page 1191
To Import a keyring:
1. Copy the already-created keypair onto the clipboard.
2. Select the Configuration > SSL > Keyrings > SSL Keyrings tab.
3. If the keyring already exists, select the keyring and click Delete and Apply.
4. Click Create. The Create Keyring dialog displays.
1187
Advanced Secure Gateway Administration Guide
Importing CA Certificates
The Advanced Secure Gateway is preinstalled with and trusts all root CA
certificates trusted by Internet Explorer and Firefox. This certificate list is updated
periodically to be in sync with the latest versions of IE and Firefox.
You can also import non-standard third party CA certificates into the Advanced
Secure Gateway appliance CA certificate store, including root and intermediate
CA certificates. By adding CA certificates to the CA certificate store, these will be
available for use by the CA certificate lists (CCL) for validating the security of
connections.
To Import a CA Certificate:
1. Click Import. The Import CA Certificate dialog displays.
2. Name the certificate.
.
1188
4. Click OK.
5. Click Apply.
1189
Advanced Secure Gateway Administration Guide
7. Click OK.
8. Click Apply.
To view a CA certificate:
1. Select the Configuration > SSL > CA Certificates > CA Certificates tab.
2. Select the certificate you want to view.
3. Click View. Examine the contents and click Close.
To delete a CA certificate:
1. Select the Configuration > SSL > CA Certificates > CA Certificates tab.
2. Select the certificate to delete.
3. Click Delete.
4. Click OK.
1190
Section 3 Managing CA Certificate Lists
A CA certificate list (CCL), which contains some of the CA Certificates available
on the Advanced Secure Gateway appliance, allows the administrator to control
the set of CA certificates trusted for a particular set of SSL connections. A CCL
contains a subset of the available CA certificates on the Advanced Secure
Gateway appliance, and restricts trust to those certificates. The CCL referenced by
the profile or service configuration is used when an SSL connection is established
to that service or using that profile.
Three CCLs are created by default on the Advanced Secure Gateway appliance:
❐ appliance-ccl:This CCL is used for authenticating connections among
devices manufactured by Blue Coat Systems. By default it contains the Blue
Coat ABRCA root certificate (ABRCA_root).
This list is used by default in the bluecoat-appliance-certificate SSL device profile.
This CCL can be edited but not deleted.
For more information on device authentication, see Chapter 70:
"Authenticating an Advanced Secure Gateway Appliance" on page 1347.
❐ browser-trusted: This CCL includes most of the well-known CAs trusted by
common browsers such as Internet Explorer and Firefox. This CCL can be
edited but not deleted. You can manually add CAs to this list. In addition, the
Advanced Secure Gateway automatically retrieves an updated browser-
trusted CCL from Blue Coat every seven days. For information on how to
customize the automatic update behavior, see "Configure Automatic Updates"
on page 1194 The browser-trusted CCL is used by default during certificate
verification by the SSL client and by the default SSL device profile.
❐ image-validation: This CCL is used to validate signed SGOS images.
Note: For information on using the SSL client or SSL device profiles, see
Chapter 61: "Managing SSL Traffic" on page 1213.
You can customize the CCLs available on the Advanced Secure Gateway to ensure
that the appliance has the CA certificates it needs to handle HTTPS requests. You
can create your own CA certificate lists or modify the default CCLs by adding or
removing trusted CAs:
❐ "Creating a CA Certificate List:" on page 1191
❐ "Updating a CA Certificate List" on page 1193
❐ "Configuring Download of CCL Updates from Blue Coat" on page 1193
1191
Advanced Secure Gateway Administration Guide
d. Click OK
3. Click Apply.
1192
Updating a CA Certificate List
Because the list of trusted CAs changes over time, you may want to update your
CCLs to ensure that they contain the most up-to-date list of CA certificates. You
can manually edit the default appliance-ccl and browser-trusted CCLs as well
as any custom-produced CCL. The bluecoat-services and image-validation
CCLs are read-only and cannot be modified by the user; however, you can still
view the contents.
Keep in mind that if you plan to add a CA to a CCL, you must first import the
corresponding CA certificate as described in "Importing CA Certificates" on page
1188.
For the browser-trusted CCL, you also have the option to configure the appliance
to download an updated browser-trusted list of CAs on demand or automatically
on a schedule. This smart download compares the existing browser-trusted list on
the appliance to the new list and only adds those CA certificates that are new
since the last update. Any manual changes that you have made to the file are
preserved.
b. Click OK.
3. Click Apply.
1193
Advanced Secure Gateway Administration Guide
Note: The Advanced Secure Gateway can only download and install a
trust_package.bctp trust package created by Blue Coat Systems, Inc.
where <days> is the number of days between updates. This value can be from
1 to 30 inclusive. For example, to set the auto-update interval to 10 days, you
would enter the following command:
#(config) security trust-package auto-update interval 10
1194
Load the Trust Package
If you want to manually download and install the trust package—either because
you have disabled automatic updates or you want to force an update before the
next automatic update—enter the following command:
#load trust-package
Downloading from "http://appliance.bluecoat.com/sgos/
trust_package.bctp"
The trust package has been successfully downloaded.
trust package successfully installed
Download log:
Downloaded at: Tuesday October 11 2011 00:26:27 Success
1195
Advanced Secure Gateway Administration Guide
Note: The Advanced Secure Gateway appliance does not allow automatic
retrieval of issuing certificates for Intermediate certificates that include an
AIA (Authority Information Access) entry.
1196
• General—Includes top level information about a digital certificate,
including the DN (distinguished name) identifying the owner and issuer,
the dates when the certificate is valid, and the public key fingerprints
using MD5 and SHA-1 cryptographic hash functions.
• Details—Includes certificate field information as defined in the ITU-T X.509
public key certificate standard.
• PEM (Privacy-enhanced mail)—Displays the certificate contents in a Base64
encoded format. You can copy the contents of the certificate to your
clipboard by clicking on Copy To Clipboard.
3. Click Close when you have finished examining the contents.
1197
Advanced Secure Gateway Administration Guide
Note: The Advanced Secure Gateway appliance retains the list of cached
intermediate CA certificates even after the appliance is shutdown and
restarted. The only way to delete the cache is to manually clear or turn off
certificate caching.
1198
Section F: Checking Certificate Revocation Status in Real Time
(OCSP)
This section describes how to use the Blue Coat Advanced Secure Gateway
appliance for performing real time certificate revocation checks using the Online
Certificate Status Protocol (OCSP).
See Also
❐ "About OCSP" on page 1199
❐ "How Blue Coat Advanced Secure Gateway Appliance Uses OCSP" on page
1199
❐ "OCSP CPL Policy Configuration" on page 1209
❐ "OCSP Listed Exceptions" on page 1209
❐ "OCSP Access Log Fields" on page 1210
About OCSP
OCSP (RFC 2560) allows you to obtain the revocation status of an X.509 digital
certificate. OCSP provides the same revocation functionality as the local
Certificate Revocation List (CRL) configured on the Advanced Secure Gateway
appliance.
Managing large CRLs poses scalability challenges. This is due to high memory
consumption on the Advanced Secure Gateway appliance associated with storing
revocation lists. OCSP overcomes these limitations by checking certificate status
in real time using off-box OCSP responders.
1199
Advanced Secure Gateway Administration Guide
appliance acts as an OCSP client and sends OCSP queries to an OCSP responder
for the given certificate. An OCSP responder is a server for OCSP request
processing and response building functions.
The OCSP responder sends status of the certificate back to the Advanced Secure
Gateway appliance (OCSP client). Status can be good, revoked or unknown. Good
means that the certificate is not revoked and valid at the time of the query. Revoked
means that the certificate has been revoked either permanently or temporarily.
Unknown means that the responder does not know about the revocation status of
the certificate being requested.
The Advanced Secure Gateway appliance can also cache OCSP responses and has
the ability to respect, override or ignore the timestamps related to cacheability in
the OCSP response.
If the certificate status is valid, the end user (in cases of SSL proxy or HTTPS
reverse proxy) can access the secure website. If the status is revoked, an error is
flagged and the end user is denied access to the secure website. If status is
unknown, the Advanced Secure Gateway appliance has the ability to treat it as an
error or ignore it based on the administrator’s discretion.
Scenario A
The OCSP response is signed by a root CA that also issued the subject certificate.
1200
Scenario B
The OCSP response is signed by a delegated certificate and both the responder
certificate and the subject certificate are issued by the same root CA. The root CA
in this scenario delegates the job of the signing OCSP responses to the OCSP
responder by adding the OCSP signing purpose to the extendedKeyUsage
extension of the responder's certificate (See section 4.2.2.2 of RFC 2560).This
denotes that the certificate has been delegated for the purpose of signing OCSP
responses by the root CA certificate.
Scenario C
The OCSP response is signed by a certificate having no common issuer with the
subject certificate. Thus, the root CA certificates signing the subject certificate and
OCSP response are different. This only works if the responder certificate’s root
CA is trusted by the administrator for the OCSP signing. The administrator can
denote this trust by adding the OCSP Signing trust setting in the Trusted Uses
section of the root CA. OpenSSL provides a command line tool to add this trust
setting to a traditional root CA certificate.
1201
Advanced Secure Gateway Administration Guide
Here is an example of how to create a root CA trusted for OCSP signing from an
existing root:
openssl x509 -in <root CA file> -addtrust OCSPSigning -out
<trusted root CA>
A trusted certificate is an ordinary certificate that has several additional pieces of
information attached to it. Information can include the permitted and prohibited
uses of the certificate and an alias. Trust settings are a non-standard way to
override the purposes present in the keyUsage or extendedKeyUsage extensions of a
certificate.
By default, a trusted certificate must be stored locally and must be a root CA.
Trust settings currently are only used with a root CA. They allow finer control
over the purposes for which the root CA can be used for. For example, a CA may
be trusted for an SSL client but not SSL server use. Other trust values that are
supported by OpenSSL include:
❐ clientAuth (SSL client use)
❐ serverAuth (SSL server use)
❐ emailProtection (S/MIME email)
Notes
❐ The keyword TRUSTED is denoted in the certificate header and footer:
-----BEGIN TRUSTED CERTIFICATE-----
-----END TRUSTED CERTIFICATE-----
❐ The Ignore OCSP signing purpose check option (see Step 5 on page 1207 in
"Creating and Configuring an OCSP Responder" ) lists the errors that are
related to the OCSP signing delegation. This applies to Scenarios B and C only.
1202
Data Flow
1. The user accesses a secure website that is fronted by an Advanced Secure Gateway
appliance.
2. The Advanced Secure Gateway appliance requests a client certificate from the
browser.
3. The browser sends a client certificate, based on the user’s choice, to the Advanced
Secure Gateway appliance.
4. The Advanced Secure Gateway sends an OCSP query for the revocation status of the
client certificate to the responder.
5. The responder returns the revocation status in an OCSP response.
1203
Advanced Secure Gateway Administration Guide
2. Click New to create a new OCSP responder. The Create OCSP responder dialog
displays.
1204
b. URL—Indicates the location of the OCSP responder. The Advanced
Secure Gateway appliance needs this URL to locate the responder. This
location can be obtained from the certificate’s Authority Information
Access (AIA) extension or from a user-defined configuration. The
default is to use the URL from the certificate.
• Use URL from certificate—Select this option if you want the Advanced
Secure Gateway appliance to look up the OCSP server location from
the subject certificate’s AIA extension.
• Use URL:—Select this option if the location of the designated OCSP
responder is known to you. Enter a specific responder HTTP or HTTPS
URL.
c. Issuer CCL—This option is used to decide which responder is contacted
for a given client or server certificate. Typically each certificate issuer
uses a designated OCSP responder for all the certificates it issues. The
issuer CCL attribute allows the administrator to specify the certificate
authorities (issuers) for which the responder in question is the
designated responder. This means that when a certificate is signed by
one of the CAs in this CCL, the OCSP query for that certificate will be
sent to this responder.
In the section "Basic OCSP Setup Scenarios" on page 1200, the entire
certificate chain shown on the left-hand side (including the root CA
certificate) in each figure (except for the certificate appearing lowest in the
chain) must be part of the issuer CCL. The left-hand side certificate chain
represents the subject certificate chain, that is, certificates on which an
OCSP query is done. OCSP revocation check happens for each certificate
in the chain, including the root CA. If any CA in that chain is absent from
the issuer CCL this responder will not be used to query the missing CA's
OCSP status.
From the drop-down list, select a CA Certificate List (CCL) that contains
the CA certificate names for which this is the designated responder. Each
CA may only appear in one responder’s Issuer CCL. The default is None.
Thus, for a given certificate, this CCL is used to determine which
responder to use when doing an OCSP check.
1205
Advanced Secure Gateway Administration Guide
1206
4a
4b
1207
Advanced Secure Gateway Administration Guide
• The responder URL is HTTPS and an error occurs while analyzing the
response. Any other error not caught is covered by the following
ignore settings.
• The OCSP responder returns an error message that is described in
section 2.3 of RFC 2560. For instance, when an OCSP query is sent to a
responder that is not authorized to return an OCSP status for that
certificate, the responder returns and unauthorized error, that appears
as Responder error (unauthorized) in event-log of the Advanced
Secure Gateway appliance. Enabling this setting causes this error to be
ignored as well as other errors described in the RFC.
• The OCSP responder returns a response that is not a basic OCSP
response (see section 4.2.1 of RFC 2560).
• Ignore expired responder certificate—This setting ignores invalid dates in the
responder certificate. By default, invalid responder certificate dates cause
the subject certificate verification to fail.
• Ignore untrusted responder certificate—Thissetting ignores the response
validation error that occurs when the responder's certificate cannot be
trusted. By default, any untrusted certificate failure is an error and causes
subject certificate verification to fail.
• Ignore OCSP signing purpose check—This setting ignores errors which are
related to the OCSP signing delegation and applies only to Scenarios B
and C. (See"Basic OCSP Setup Scenarios" on page 1200.) The errors might
occur in one of two ways:
• Scenario B—The response signer certificate is not delegated for the
OCSP signing. The event log records this error as missing ocspsigning
usage.
• Scenario C—The root CA does not have the trust setting enabled for
the OCSP Signing. The event log records this error as root ca not
trusted.
1208
2
2. From the Default Responder drop-down list, select the responder you want to be
designated as the default responder. If a responder has not been previously
created then <None> is the only option.
If the subject certificate is not associated with any responder (using Issuer
CCL option) then the OCSP request for this certificate is sent to the default
responder.
3. Click Apply.
1209
Advanced Secure Gateway Administration Guide
For detailed information about defining exceptions, refer to the Visual Policy
Manager Reference.
Note: See Chapter 29: "Creating Custom Access Log Formats" on page 663 for
detailed information about creating and editing log formats.
The following table lists and describes the OCSP access log fields:
Table 60–2 Access Log Substitutions
ELFF Description
x-rs-ocsp-error An error was observed during the OCSP check for a server
certificate.
x-cs-ocsp-error An error was observed during the OCSP check for a client
certificate.
1210
Table 60–3 Access Log Field Descriptions
1211
Advanced Secure Gateway Administration Guide
1212
Chapter 61: Managing SSL Traffic
This section describes how to configure the SSL client and devices profiles,
which are required for secure connections. These profiles are configured to
group together the collection of settings required for an SSL connection. The
profiles themselves include:
❐ Keyrings
❐ CA certificates
❐ CA Certificate List (CCL)
❐ Cipher Suite
CA certificates, keyrings, CCLs and cipher suites must be configured
individually before being added to an SSL client profile or an SSL device
profile. Except for cipher suites, discussed in "Changing the Cipher Suite of the
SSL Client" on page 1216, these settings are discussed in greater detail in
Chapter 60: "Managing X.509 Certificates" on page 1153.
This section discusses the following topics:
❐ Section A: "SSL Client Profiles" on page 1214.
❐ Section B: "SSL Device Profiles" on page 1218.
❐ Section C: "Notes and Troubleshooting" on page 1219.
1213
Advanced Secure Gateway Administration Guide
Note: The SSL proxy, also known as the SSL forward proxy, uses parameters
taken from the SSL connection made by the client when originating SSL
connections to the server. As a result, settings in the default SSL client profile are
not applied to these connections.
To modify any parameters for SSL connections, change the corresponding SSL
device-profile. You will need to modify the SSL client profile settings in the
reverse proxy scenario only. This is because the reverse proxy uses the SSL client,
instead of the SSL device profile, when connecting to the upstream OCS using
HTTPS.
1214
Section 1 Editing an SSL Client
The SSL client settings are global, affecting all services that use it. Unless required
by your environment, you do not need to change any settings.
To change the protocol, the cipher suite, the keyring or the CCL associated with
the SSL client, continue with "Associating a Keyring, Protocol, and CCL with the
SSL Client" on page 1215 or "Changing the Cipher Suite of the SSL Client" on page
1216.
2a
2b
2c
1215
Advanced Secure Gateway Administration Guide
3. Click Apply.
1216
To change the cipher suite non-interactively:
Enter the following commands:
#(config) ssl
#(config ssl) edit ssl-client default
#(config ssl ssl-client default) cipher-suite cipher
Notes:
❐ If you do not specify any attributes, the cipher suite cannot be used.
❐ Multiple ciphers can be specified on the command line, separated by blank
spaces.
Example
#(config ssl ssl-client default) cipher-suite rc4-sha
ok
#(config ssl ssl-client default) view
SSL-Client: default
Keyring: <None>
CCL: browser-trusted
Protocol: tlsv1 tlsv1.1 tlsv1.2
Cipher suite: rc4-sha
1217
Advanced Secure Gateway Administration Guide
Note: Non-proxy traffic uses an SSL device profile. Proxy traffic uses the SSL
client profile. For proxy traffic, see Section A: "SSL Client Profiles" on page 1214.
1218
Section C: Notes and Troubleshooting
The following topics apply to both the SSL Client and the SSL device profiles.
1219
Advanced Secure Gateway Administration Guide
1220
1221
Advanced Secure Gateway Administration Guide
1222
Chapter 62: Windows Single Sign-on Authentication
This section describes how to configure the Windows Single Sign-on (SSO)
realm, which is an authentication mechanism available on Windows networks.
It includes the following topics:
❐ "How Windows SSO Realms Work" on page 1223
❐ "Creating a Windows SSO Realm" on page 1227
❐ "Configuring Windows SSO Agents" on page 1228
❐ "Configuring Windows SSO Authorization" on page 1230
❐ "Defining Windows SSO Realm General Properties" on page 1232
❐ "Modifying the sso.ini File for Windows SSO Realms" on page 1233
❐ "Creating the CPL" on page 1235
❐ "Notes" on page 1235
Note: The Windows SSO realm works reliably only in environments where
one IP address maps to one user. If an IP address cannot be mapped to a single
user, authentication fails. Those with NAT systems, which uses one set of IP
addresses for intranet traffic and a different set for Internet traffic, should use a
different realm for authentication
To authenticate a user, the Windows SSO realm uses two methods, either
separately or together:
❐ Domain Controller Querying: The domain controller is queried to identify
which users are connecting to, or authenticating with, the domain
controller. This can be used to infer the identity of the user at a particular
workstation.
1223
❐ Client Querying: The client workstation is queried to determine who the client
workstation thinks is logged in.
❐ When Domain Controller Querying and Client Querying are both used, the
Domain Controller Query result is used if it exists and is still within the valid
time-to-live as configured in the sso.ini file. If the Domain Controller Query
result is older than the configured time-to-live, the client workstation is
queried.
For the most complete solution, an IWA realm could be configured at the same
time as the Windows SSO realm and both realms added to a realm sequence.
Then, if the Windows SSO realm failed to authenticate the user, the IWA realm
could be used. For information on using a sequence realm, see Chapter 59:
"Sequence Realm Authentication" on page 1145.
Administrative authentication with Windows SSO is insecure, as the user is not
challenged to authenticate when accessing the Advanced Secure Gateway
appliance management console. For this reason, Blue Coat recommends Local or
Certificate realms, or IWA with BCAAA secured over TLS for administrative
authentication.
1224
When the Windows SSO realm is configured to do Client Querying, the user that
BCAAA runs under must be an authenticated user of the domain. For failover
purposes, a second BCAAA can be installed and configured to act as an alternate
BCAAA in the Windows SSO realm. The alternate BCAAA service is used in the
event of a failure with the primary BCAAA service configured in the realm.
BCAAA Synchronization
Optionally, when using Domain Controller Querying, you can configure a
BCAAA service to use another BCAAA service as a synchronization server.
Whenever a BCAAA service restarts, it contacts its synchronization server and
updates the logon state. Two given BCAAA services can use each other as their
synchronization server. Thus, each BCAAA service can act as a synchronization
server to provide logon state to other BCAAA services, as well as acting as a
synchronization client to update its logon state from another BCAAA service.
Each BCAAA service has a synchronization priority that determines
synchronization behavior. If the client BCAAA has the same or higher priority
than the server BCAAA, synchronization is done once at restart to update the
client state. Once synchronization is complete the client BCAAA drops the
synchronization connection and begins querying the domain controllers.
However, if the server BCAAA has higher priority, then the client BCAAA keeps
the synchronization link open and continuously updates its logon state from the
higher priority BCAAA. The client BCAAA does not query the domain controllers
itself unless the synchronization link fails.
This makes it possible to manage the query load on the domain controllers. If
there is no issue with load, then the default configuration (without
synchronization), with all BCAAA agents querying the domain controllers is
acceptable. However, if load on the domain controllers is an issue,
synchronization can be used to minimize this load while still providing fail-over
capabilities.
By default, all BCAAA agents have the same synchronization priority, meaning
that they synchronize on startup and then do their own domain controller
querying. To change the synchronization settings, see "To configure the sso.ini file
for synchronization:" on page 1234.
Note: For information on configuring the BCAAA service as an authenticated
user of the domain, refer to the BCAAA Service Requirements document posted at
the BTO download portal.
1225
Note: Windows SSO realms never challenge for credentials. If the authorization
username cannot be determined from the configured substitutions, authorization
in the Windows SSO realm fails.
1226
Section 1 Creating a Windows SSO Realm
This section describes how to create an SSO realm.
3. In the Realm name field, enter a realm name. The name can be 32 characters
long and composed of alphanumeric characters and underscores. The name
must start with a letter.
4. Click OK.
5. Click Apply.
1227
Section 2 Configuring Windows SSO Agents
You must configure the Windows realm so that it can find the Blue Coat
Authentication and Authorization Agent (BCAAA).
1. Select Configuration > Authentication > Windows SSO > Agents.
1228
If all of the client computers can be queried directly, then the most accurate
results can be provided by the Query Clients option.
By default the Windows SSO realm is configured for Domain Controller Querying.
Client Querying is blocked by the Windows XP SP2 firewall. This can be
overridden through domain policy. If the firewall setting Allow remote
administration exception or Allow file and printer sharing exception or Define port
exceptions (with port 445) is enabled, then the query will work.
8. Click Apply.
9. Verify the Windows SSO configuration as follows:
a. Click Test Configuration. The Test Configuration dialog displays.
b. Enter the IP address of a client system in your Active Directory and
then click OK. The Advanced Secure Gateway appliance will use
configuration you supplied to send an authentication request to
BCAAA and return the results as follows:
• If the Advanced Secure Gateway appliance and the BCAAA server are
configured properly, BCAAA will return the username associated with
the IP address you provided.
• If the test does not succeed, check that the settings on the Agents tab as
well as the BCAAA settings are configured properly and then test the
configuration again.
1229
Section 3 Configuring Windows SSO Authorization
After the Windows SSO realm is created, you can use the Windows SSO
Authorization tab to configure authorization for the realm.
Prerequisite
You must have defined at least one Windows SSO realm (using the Windows SSO
Realms tab) before attempting to set Windows SSO realm properties. If the
message Realms must be added in the Windows SSO Realms tab before editing this tab is
displayed in red at the bottom of this page, you do not currently have any
Windows SSO realms defined.
1. Select the Configuration > Authentication > Windows SSO > Authorization tab.
3. Click Apply.
1230
Table 62–1 Common Substitutions Used in the Authorization username Field
1231
Section 4 Defining Windows SSO Realm General Properties
The Windows SSO General tab allows you to specify the display name, the refresh
times, an inactivity timeout value, cookies, and a virtual URL.
Windows SSO realms default to the origin-ip authentication mode when either no
authentication mode or the auto authentication mode is specified in policy. After a
user has first successfully authenticated to the Advanced Secure Gateway
appliance, all subsequent requests from that same IP address for the length of the
surrogate credential refresh time are authenticated as that user. If the first user is
allowed or denied access, subsequent users during that same time coming from
the same IP address are allowed or denied as that first user. This is true even if
policy would have treated them differently if they were authenticated as
themselves.
If multiple users often log in from the same IP address, it is recommended to use a
shorter surrogate credential refresh timeout than the default or an authentication
mode that uses cookie surrogate credentials.
Prerequisite
You must have defined at least one Windows SSO realm (using the Windows SSO
Realms tab) before attempting to set Windows SSO general properties. If the
message Realms must be added in the Windows SSO Realms tab before editing this tab
displays in red at the bottom of this page, you do not currently have any
Windows SSO realms defined.
2. From the Realm name drop-down list, select the Windows SSO realm for which
you want to change properties.
3. Configure refresh options:
a. Select the Use the same refresh time for all check box if you would like to
use the same refresh time for all.
1232
b. Enter the number of seconds in the Surrogate refresh time field. The
Surrogate Refresh Time allows you to set a realm default for how often
a user’s surrogate credentials are refreshed. Surrogate credentials are
credentials accepted in place of a user’s actual credentials. The default
setting is 900 seconds (15 minutes). You can configure this in policy for
better control over the resources as policy overrides any settings made
here. Before the refresh time expires, if a surrogate credential (IP
address or cookie) is available and it matches the expected surrogate
credential, the Advanced Secure Gateway appliance authenticates the
transaction. After the refresh time expires, the Advanced Secure
Gateway appliance determines which user is using the current IP
address, and update the surrogate credential to authenticate with that
user.
c. Enter the number of seconds in the Authorization refresh time field. The
Authorization Refresh Time allows you to manage how often the
authorization data is verified with the authentication realm. It has a
default setting of 900 seconds (15 minutes). You can configure this in
policy for better control over the resources as policy overrides any
settings made here.
4. Enter the number of seconds in the Inactivity timeout field to specify the amount
of time a session can be inactive before being logged out.
5. Configure cookie options:
a. Select the Use persistent cookies check box to use persistent browser
cookies instead of session browser cookies.
b. Select the Verify the IP address in the cookie check box if you would like
the cookies surrogate credentials to only be accepted for the IP address
that the cookie was authenticated. Disabling this allows cookies to be
accepted from other IP addresses.
6. You can specify a virtual URL. For more information on the virtual URL, see
"About Origin-Style Redirection" on page 929.
7. Click Apply.
1233
Note: The changes to the sso.ini file have no effect until the BCAAA service is
restarted.
Note: Before you use the Windows SSO realm, you must change the BCAAA
service to run as a domain user, and, if using XP clients, update the domain policy
to allow the client query to pass through the firewall.
For information on installing and configuring the BCAAA service, refer to the
BCAAA Service Requirements document posted at the BTO download portal.
1234
2. Update the section SSOSyncSetup (the defaults are listed below). Note that
explanations of each setting are provided in the sso.ini file.
• ServerPriority=100
• EnableSyncServer=1
• SyncPortNumber=16102
• UseSSL=0
• VerifyCertificate=0
• QueryDelta=10
• RetrySyncTime=60
Note: Refer to the Content Policy Language Guide for details about CPL and how
transactions trigger the evaluation of policy file layers.
Notes
❐ The Windows SSO realm works reliably only in environments where one IP
address maps to one user.
❐ This realm never uses a password.
1235
❐ When doing domain controller querying, the Windows SSO realm can lose the
logon if the NetBIOS computer name cannot by determined through a DNS
query or a NetBIOS query. The DNS query can fail if the NetBIOS name is
different than the DNS host name or if the computer is in a different DNS
domain than the BCAAA computer and the BCAAA computer is not set up to
impute different DNS domains.
The NetBIOS query can fail because the NetBIOS broadcast does not reach the
target computer. This can happen if the computer is behind a firewall that is
not forwarding NetBIOS requests or if the computer is on a subnet that is not
considered to be local to the BCAAA server.
To prevent this issue, the BCAAA machine must be configured to be able to
query the NetBIOS name of any computer of interest and get the correct IP
address.
One workaround is to use a WINS server. This works like a DNS server but
handles NetBIOS lookups.
1236
Chapter 63: Using XML Realms
This section discusses XML realms, which are used to integrate SGOS with the
authentication/authorization protocol. If you use an authentication or
authorization protocol that is not natively supported by Blue Coat, you can use
the XML realm.
1237
Advanced Secure Gateway Administration Guide
1238
Section 1 Creating an XML Realm
To create an XML realm:
Before you create an XML realm, be sure to complete the tasks in "Before Creating
an XML Realm" on page 1238.
1. In the Management Console, select the Configuration > Authentication > XML > XML
Realms tab.
2. Click New.
3. In the Realm Name field, enter a realm name. The name can be 32 characters
long, composed of alphanumeric characters and underscores. The name must
start with a letter.
4. Click OK to close the dialog.
5. Click Apply.
1239
Advanced Secure Gateway Administration Guide
3a
3b
3c
3d
2. From the Realm Name drop-down list, select the XML realm.
3. Configure the Responder options:
a. Responder: Select the XML responder service to configure—Primary or
Alternate—from the drop-down list. Primary is the default. You can
configure both responder services before clicking Apply.
b. Host: This is the hostname or IP address of the HTTP server that has
the XML service. You must specify a host. The port defaults to port 80.
c. Authenticate request path: Enter the XML responder path for
authentication requests.
d. Authorize request path: Enter the XML responder path for authorization
requests.
4. In the timeout request fields, enter the number of seconds for the system to wait
for a request and the number of times for the system to retry a request. The
default is not to retry a request.
5. Specify the maximum number of connections to the responder. The default is five
connections.
6. (Optional) Select One-time passwords to integrate with a non-Blue Coat
supported authentication service that uses one-time passwords.
1240
Note: One-time passwords are passwords that become invalid as soon
as they are used. The passwords are often generated by a token or
program, although pre-printed lists are also used. Using one-time
passwords ensures that the password cannot be used in a replay attack.
7. Click Apply.
8. Repeat the above steps for additional XML realms, up to a total of 40.
1241
Advanced Secure Gateway Administration Guide
2. From the Realm name drop-down list, select the XML realm.
3. Select the HTTP request method: GET or POST.
4. Select a user credential option:
• If the HTTP server is integrated with the authentication system, the HTTP
server can authenticate the credentials. Select the Put user credentials for
authentication in the HTTP header radio button. However, if this does not
provide enough flexibility, the XML responder can do authentication.
• To have the XML responder service handle both authentication and
authorization, select the Put user credentials for authentication in the request
radio button.
5. Enter the username parameter in the Username parameter field. The default is
username.
6. Click Apply.
1242
Section 4 Configuring XML Realm Authorization
You do not need to change these values if the default settings are acceptable.
After you have created the XML realm, you still must take into consideration how
you will use authentication and authorization:
❐ Use an XML realm for both authorization and authentication.
The realm is used for authentication and uses itself for authorization.
❐ Use an XML realm for authentication another realm for authorization.
An XML realm can be used for authentication and use another realm for
authorization. The authorization realm can be a Local realm, an LDAP realm
or another XML realm.
❐ Use an XML realm as an authorization realm for another realm.
An XML realm can be used as an authorization realm for another realm that is
doing authentication. The authentication realm can be a Certificate realm, a
Policy Substitution realm, a Novell SSO realm, a Windows SSO realm or
another XML realm.
In all cases, you must write policy to authenticate and authorize the users. For
information on writing policy for an XML realm, see "Creating the CPL" on page
1248.
2a
2b
2d
2e
2. From the Realm name drop-down list, select the XML realm.
a. Authorization realm name: If the XML realm is not doing authorization,
select an authorization realm from the drop-down list. By default, the
authorization realm name is Self.
1243
Advanced Secure Gateway Administration Guide
b. Authorization username: The default is Use full username. Clear the Use full
username option to use a different name or to use a policy substitution
that generates a username.
c. Default group: The default is no groups are selected.
d. The send the groups and attributes of interest in the request option is
selected by default. These are the groups and attributes that are used
in policy.
3. Click Apply.
1244
Section 5 Configuring XML General Realm Properties
The XML General page allows you to indicate the realm’s display name, the
refresh times, an inactivity timeout value, cookies, and a virtual URL for this
realm.
1245
Advanced Secure Gateway Administration Guide
settings made here. Before the refresh time expires, the Advanced
Secure Gateway authenticates the user supplied credentials against the
cached credentials. If the credentials received do not match the cached
credentials, they are forwarded to the authentication server in case the
user password changed. After the refresh time expires, the credentials
are forwarded to the authentication server for verification.
c. Enter the number of seconds in the Surrogate refresh time field. The
Surrogate Refresh Time allows you to set a realm default for how often
a user’s surrogate credentials are refreshed. Surrogate credentials are
credentials accepted in place of a user’s actual credentials. The default
setting is 900 seconds (15 minutes). You can configure this in policy for
better control over the resources as policy overrides any settings made
here.
Before the refresh time expires, if a surrogate credential (IP address or
cookie) is available and it matches the expected surrogate credential, the
Advanced Secure Gateway authenticates the transaction. After the refresh
time expires, the Advanced Secure Gateway verifies the user’s credentials.
Depending upon the authentication mode and the user-agent, this may
result in challenging the end user for credentials.
The main goal of this feature is to verify that the user-agent still has the
appropriate credentials.
d. Enter the number of seconds in the Authorization refresh time field. The
Authorization Refresh Time allows you to manage how often the
authorization data is verified with the authentication realm. It has a
default setting of 900 seconds (15 minutes). You can configure this in
policy for better control over the resources as policy overrides any
settings made here.
4. Enter the number of seconds in the Inactivity timeout field to specify the amount
of time a session can be inactive before being logged out.
5. If you use Basic credentials and want to cache failed authentication attempts
(to reduce the load on the authentication service), enter the number of seconds
in the Rejected Credentials time field. This setting, enabled by default and set to
one second, allows failed authentication attempts to be automatically rejected
for up to 10 seconds. Any Basic credentials that match a failed result before its
cache time expires are rejected without consulting the back-end authentication
service. The original failed authentication result is returned for the new
request.
All failed authentication attempts can be cached: Bad password, expired
account, disabled account, old password, server down.
To disable caching for failed authentication attempts, set the Rejected
Credentials time field to 0.
6. Select the Use persistent cookies check box to use persistent browser cookies
instead of session browser cookies.
1246
7. Select the Verify the IP address in the cookie check box if you would like the
cookies surrogate credentials to only be accepted for the IP address that the
cookie was authenticated. Disabling this allows cookies to be accepted from
other IP addresses.
8. You can specify a virtual URL. For more information on the virtual URL, see
"About Origin-Style Redirection" on page 929.
9. Click Apply.
1247
Advanced Secure Gateway Administration Guide
Note: For information on using policy, refer to the Visual Policy Manager Reference
or Content Policy Language Guide.
<proxy>
authenticate(eng_users)
<proxy>
realm=eng_users group=waterloo allow
Viewing Statistics
To view statistics for XML realms, select Statistics > Authentication > User Logins.
Select an XML realm from the Realm drop-down list.
1248
Chapter 64: Forms-Based Authentication and Validation
1249
Advanced Secure Gateway Administration Guide
If the user does not successfully authenticate against the Advanced Secure
Gateway appliance and the error is user-correctable, the user is presented with the
authentication form again.
Note: You can configure and install an authentication form and several
properties through the Management Console and the CLI, but you must use
policy to dictate the authentication form’s use.
To create and put into use forms-based authentication, you must complete the
following steps:
❐ Create a new form or edit one of the existing authentication form exceptions
❐ Set storage options
❐ Set policies
Three authentication forms are created initially:
❐ authentication_form: Enter Proxy Credentials for Realm $(cs-realm). This is the
standard authentication form that is used for authentication with the
Advanced Secure Gateway appliance.
❐ new_pin_form: Create New PIN for Realm $(cs-realm). This form is used if you
created a RADIUS realm using RSA SecurID tokens. This form prompts the
user to enter a new PIN. The user must enter the PIN twice in order to verify
that it was entered correctly.
❐ query_form: Query for Realm $(cs-realm). This form is used if you created a
RADIUS realm using RSA SecurID tokens. The form is used to display the
series of yes/no questions asked by the SecurID new PIN process.
You can customize any of the three initial authentication form exceptions or you
can create other authentication forms. (You can create as many authentication
form exceptions as needed. The form must be a valid HTML document that
contains valid form syntax.)
Each authentication form can contain the following:
❐ and sentence instructing the user to enter Advanced Secure Gateway
Title
appliance credentials for the appropriate realm.
❐ Domain:Text input with maximum length of 64 characters The name of the
input must be PROXY_SG_DOMAIN, and you can specify a default value of $(x-
cs-auth-domain) so that the user's domain is prepopulated on subsequent
attempts (after a failure).
The input field is optional, used only if the authentication realm is an IWA
realm. If it is used, the value is prepended to the username value with a
backslash.
❐ Username: Text input with maximum length of 64 characters. The name of the
input must be PROXY_SG_USERNAME, and you can specify a default value of
$(cs-username) so the username is prepopulated on subsequent attempts
(after a failure).
1250
❐ Password: The password should be of type PASSWORD with a maximum length
of 64 characters. The name of the input must be PROXY_SG_PASSWORD.
❐ Request ID:
If the request contains a body, then the request is stored on the
Advanced Secure Gateway appliance until the user is successfully
authenticated.
The request ID should be of type HIDDEN. The input name must be
PROXY_SG_REQUEST_ID, and the value must be $(x-cs-auth-request-id). The
information to identify the stored request is saved in the request id variable.
❐ Challenge State:
The challenge state should be of type HIDDEN. If a RADIUS
realm is using a response/challenge, this field is used to cache identification
information needed to correctly respond to the challenge.
The input name must be PROXY_SG_PRIVATE_CHALLENGE_STATE, and the value
must be $(x-auth-private-challenge-state).
❐ Submit button.
The submit button is required to submit the form to the
Advanced Secure Gateway appliance.
❐ Clear form button. The clear button is optional and resets all form values to their
original values.
❐ Form action URI: Thevalue is the authentication virtual URL plus the query
string containing the base64 encoded original URL $(x-cs-auth-form-action-
url).
❐ Form METHOD of POST. The form method must be POST. The Advanced
Secure Gateway appliance does not process forms submitted with GET.
The Advanced Secure Gateway appliance only parses the following input fields
during form submission:
❐ PROXY_SG_USERNAME (required)
❐ PROXY_SG_PASSWORD (required)
❐ PROXY_SG_REQUEST_ID (required)
❐ PROXY_SG_PRIVATE_CHALLENGE_STATE (required)
❐ PROXY_SG_DOMAIN(optional) If specified, its value is prepended to the
username and separated with a backslash.
Authentication_form
The initial form, authentication_form, looks similar to the following:
<HTML>
<HEAD>
<TITLE>Enter Proxy Credentials for Realm $(cs-realm)</TITLE>
</HEAD>
<BODY>
<H1>Enter Proxy Credentials for Realm $(cs-realm)</H1>
<P>Reason for challenge: $(exception.last_error)
<P>$(x-auth-challenge-string)
<FORM METHOD="POST" ACTION=$(x-cs-auth-form-action-url)>
1251
Advanced Secure Gateway Administration Guide
$(x-cs-auth-form-domain-field)
<P>Username: <INPUT NAME="PROXY_SG_USERNAME" MAXLENGTH="64"
VALUE=$(cs-username)></P>
<P>Password: <INPUT TYPE=PASSWORD NAME="PROXY_SG_PASSWORD"
MAXLENGTH="64"></P>
<INPUT TYPE=HIDDEN NAME="PROXY_SG_REQUEST_ID" VALUE=$(x-cs-auth-
request-id)>
<INPUT TYPE=HIDDEN NAME="PROXY_SG_PRIVATE_CHALLENGE_STATE"
VALUE=$(x-auth-private-challenge-state)>
<P><INPUT TYPE=SUBMIT VALUE="Submit"> <INPUT TYPE=RESET></P>
</FORM>
<P>$(exception.contact)
</BODY>
</HTML>
If the realm is an IWA realm, the $(x-cs-auth-form-domain-field) substitution
expands to:
<P>Domain: <INPUT NAME=PROXY_SG_DOMAIN MAXLENGTH=64 VALUE=$(x-cs-auth-
domain)>
If you specify $(x-cs-auth-form-domain-field), you do not need to explicitly add
the domain input field.
For comparison, the new_pin_form and query_form look similar to the following:
New_pin_form
<HTML>
<HEAD>
<TITLE>Create New PIN for Realm $(cs-realm)</TITLE>
<SCRIPT LANGUAGE="JavaScript"><!--
function validatePin() {
var info;
var pin = document.pin_form.PROXY_SG_PASSWORD;
if (pin.value != document.pin_form.PROXY_SG_RETYPE_PIN.value) {
info = "The PINs did not match. Please enter them again.";
} else {
// Edit this regular expression to match local PIN
definition
var re=/^[A-Za-z0-9]{4,16}$/
var match=re.exec(pin.value);
if (match == null) {
info = "The PIN must be 4 to 16 alphanumeric
characters";
} else {
return true;
}
}
alert(info);
pin.select();
pin.focus();
return false;
}// -->
</script>
</HEAD>
1252
<BODY>
<H1>Create New PIN for Realm $(cs-realm)</H1>
<P>$(x-auth-challenge-string)
<FORM NAME="pin_form" METHOD="POST" ACTION=$(x-cs-auth-form-action-
url)ONSUBMIT="return validatePin()">
$(x-cs-auth-form-domain-field)
<P> Enter New Pin: <INPUT TYPE=PASSWORD NAME="PROXY_SG_PASSWORD"
MAXLENGTH="64"></P>
<P>Retype New Pin: <INPUT TYPE=PASSWORD NAME="PROXY_SG_RETYPE_PIN"
MAXLENGTH="64"></P>
<INPUT TYPE=HIDDEN NAME="PROXY_SG_USERNAME" VALUE=$(cs-username)>
<INPUT TYPE=HIDDEN NAME="PROXY_SG_REQUEST_ID" VALUE=$(x-cs-auth-
request-id)>
<INPUT TYPE=HIDDEN NAME="PROXY_SG_PRIVATE_CHALLENGE_STATE" VALUE=$(x-
auth-private-challenge-state)>
<P><INPUT TYPE=SUBMIT VALUE="Submit"></P>
</FORM>
<P>$(exception.contact)
</BODY>
</HTML>
Query_form
<HTML>
<HEAD>
<TITLE>Query for Realm $(cs-realm)</TITLE>
</HEAD>
<BODY>
<H1>Query for Realm $(cs-realm)</H1>
<P>$(x-auth-challenge-string)
<FORM METHOD="POST" ACTION=$(x-cs-auth-form-action-url)>
$(x-cs-auth-form-domain-field)
<INPUT TYPE=HIDDEN NAME="PROXY_SG_USERNAME" VALUE=$(cs-username)>
<INPUT TYPE=HIDDEN NAME="PROXY_SG_REQUEST_ID" VALUE=$(x-cs-auth-
request-id)>
<INPUT TYPE=HIDDEN NAME="PROXY_SG_PRIVATE_CHALLENGE_STATE" VALUE=$(x-
auth-private-challenge-state)>
<INPUT TYPE=HIDDEN NAME="PROXY_SG_PASSWORD"">
<P><INPUT TYPE=SUBMIT VALUE="Yes"
ONCLICK="PROXY_SG_PASSWORD.value='Y'">
<INPUT TYPE=SUBMIT VALUE="No" ONCLICK="PROXY_SG_PASSWORD.value='N'"></
P>
</FORM>
<P>$(exception.contact)
</BODY>
</HTML>
1253
Advanced Secure Gateway Administration Guide
x-auth-private-challenge-
state
Note: Any substitutions that are valid in CPL and in other exceptions are valid in
authentication form exceptions. There is no realm restriction on the number of
authentication form exceptions you can create. You can have an unlimited
number of forms, but make them as generic as possible to cut down on
maintenance.
Storage Options
When a request requiring the user to be challenged with a form contains a body,
the request is stored on the Advanced Secure Gateway appliance while the user is
being authenticated. Storage options include:
❐ the maximum request size
❐ the expiration of the request
❐ whether to verify the IP address of the client requesting against the original
request
❐ whether to allow redirects from the origin server
The storage options are global, applying to all form exceptions you use.
The global allow redirects configuration option can be overridden on a finer
granularity in policy using the authenticate.redirect_stored_requests(yes|no)
action.
1254
Creating and Editing a Form
You can create a new form or you can edit one of the existing ones as described in
the following sections:
❐ "Creating a New Form" on page 1255
❐ "Editing an Existing Form" on page 1255
1255
Advanced Secure Gateway Administration Guide
Note: View in the Authentication Forms panel and View in the Default
Definitions panel have different functions. View in the Authentication
Forms panel allows you to view the form you highlighted; View in the
Default Definitions panel allows you view the original, default settings
for each form. This is important in an upgrade scenario; any forms
already installed will not be changed. You can compare existing forms to
the default version and decide if your forms need to be modified.
3. Select one of the following installation options from the Install Authentication
Form from drop-down list:
2. In the Maximum request size to store (Megabytes) field, enter the maximum POST
request size allowed during authentication. The default is 50 megabytes.
1256
3. In the Request object expiry time (seconds) field, enter the amount of time before
the stored request expires. The default is 300 seconds (five minutes). The
expiry time should be long enough for the user to fill out and submit the
authentication form.
4. If you do not want the Advanced Secure Gateway appliance to Verify the IP
address against the original request, deselect that option. The default is to verify
the IP address.
5. To Allow redirects from the origin servers, select the check box. The default is to
not allow redirects from origin servers. Enable this option if you know that the
redirects are going to a known server.
6. Click Apply.
These conditions override the use of the initial forms for the cases where a
new pin form needs to be displayed or a query form needs to be displayed. All
three of the conditions verify that the form name has the correct type.
Note: Each of these conditions can be used with the form authentication
modes only. If no form is specified, the form defaults to the CPL condition for
that form. That is, if no name is specified for authenticate.form(form_name),
the default is authentication_form; if no name is specified for
authenticate.new_pin_form(form_name), the default is
authenticate.new_pin_form, and if no name is specified for
authenticate.query_form(form_name), the default is
authenticate.query_form.
1257
Advanced Secure Gateway Administration Guide
1258
❐ Because forms only support Basic authentication, authentication-form
exceptions cannot be used with a Certificate realm. If a form is in use and the
authentication realm is or a Certificate realm, you receive a configuration
error.
❐ User credentials are sent in plain text. However, they can be sent securely
using SSL if the virtual URL is HTTPS.
❐ Because not all user requests support forms (such as WebDAV and streaming),
create policy to bypass authentication or use a different authentication mode
with the same realm for those requests.
1259
Advanced Secure Gateway Administration Guide
1260
Configure CAPTCHA validation:
1. Establish an SSH connection to the appliance, log in to the CLI, and enter
configuration mode:
>en
#conf t
where <form_name> is the name of the CAPTCHA form and <eof> is a unique
string of end-of-file characters.
Record the name of the form; in step 8, you use this name in policy.
5. Press ENTER and paste the form HTML. Press ENTER and enter the end-of-
file string you specified in the previous step.
6. Press ENTER.
If there are no errors in the command syntax or form content, the CLI
responds ok. If the CLI reports an error, correct any issues and repeat the
previous steps to specify the form.
7. Include the validator in policy using the following action:
validate(<validator_name>)
1261
Advanced Secure Gateway Administration Guide
Note: For CPL usage examples, refer to the Content Policy Language Reference.
When the appliance proxies client requests, users must correctly answer the
CAPTCHA. The following is an example of a CAPTCHA challenge-response test
using a modified form:
Figure 64–1 Example of a CAPTCHA challenge
Special Considerations
In some situations or deployments, you might have to use specific CPL to prevent
undesirable behavior. See the following examples and refer to the Content Policy
Language Reference for syntax and usage details.
1262
Display Validation Form in Explicit Deployments
When the appliance is in an explicit proxy deployment and CAPTCHA validation
policy is installed, the browser does not present the CAPTCHA validation form to
users. In some cases, the browser displays an error message.
When the proxy opens HTTPS connections, browsers configured for explicit
proxy send a CONNECT message. The message contains the origin content server
(OCS) hostname and informs the proxy that the client is about to open a tunnel to
that host. What happens next depends on the authentication mode specified in
policy:
❐ If form-cookie mode is in use (or when no authentication mode is specified),
the proxy does not return a redirect. The browser does not present the
CAPTCHA form, and users cannot complete validation.
❐ If form-cookie-redirect is in use, the proxy returns a redirect; however,
browsers do not follow redirects sent in response to a CONNECT message.
The browser displays an error message, and users cannot complete validation.
See "Using CPL with Forms-Based Authentication" on page 1257 for details on the
form-cookie mode and form-cookie-redirect modes.
Note: Because CONNECT messages are meant for the proxy and not the OCS,
they do not contain cookies.
Note: Copy and paste the following sample into a text editor and replace the title
text and headings with your own content. You can specify your own HTML
formatting and styles, but doing so is not necessary. Do not edit the substitution
names or the <form> tags.
<html>
<head>
<title>Your_title_here</title>
1263
Advanced Secure Gateway Administration Guide
</head>
<body>
<script type="text/javascript">
function Refresh()
{
location.reload();
}
</script>
<h1 id="heading1">Your_top_level_heading_here</h1>
<p/>
<h2>Your_next_level_heading_here</h2>
<p/>Your_text_here<p/>
<table cellspacing="0" border="0" cellpadding="8">
<tr style="background-color:#000088; vertical-align:bottom;">
<td>
<a href="#" onclick="return Refresh();"><span style="font-
size:14px;color:#ffffff">Reload</span></a><br />
<img src="data:image/png;base64,$(validator.challenge)"/>
</td>
</tr>
</table>
<form method="post" action=$(x-cs-validator-form-action-url)>
<p/>Solution: <input type="text" name="PROXY_SG_VALIDATOR_ANSWER"/
>
<input type="hidden" name="PROXY_SG_VALIDATOR_CHALLENGE_ID"
value="$(validator.challenge.id)"/>
<p/><input type="submit" value="Submit"/>
</form>
</body>
</html>
1264
<p/>Please enter the following characters in the <b>Solution</b>
field:<p/>
<table cellspacing="0" border="0" cellpadding="8">
<tr style="background-color:#000088; vertical-align:bottom;">
<td>
<a href="#" onclick="return Refresh();"><span style="font-
size:14px;color:#ffffff">Reload</span></a><br />
<img src="data:image/png;base64,$(validator.challenge)"/>
</td>
</tr>
</table>
<form method="post" action=$(x-cs-validator-form-action-url)>
<p/>Solution: <input type="text" name="PROXY_SG_VALIDATOR_ANSWER"/
>
<input type="hidden" name="PROXY_SG_VALIDATOR_CHALLENGE_ID"
value="$(validator.challenge.id)"/>
<p/><input type="submit" value="Submit"/>
</form>
</body>
</html>
Substitutions
The following substitutions must be present in the CAPTCHA validation form:
❐ $(x-cs-validator-form-action-url)
❐ $(validator.challenge)
❐ $(validator.challenge.id)
1265
Advanced Secure Gateway Administration Guide
1266
Chapter 65: Authentication and Authorization Errors
Following is the list of all groups and individual errors that can be permitted
during authentication and authorization. The first table lists the groups and the
individual errors within each group. The second table lists all of the individual
errors along with descriptions of the errors.
1267
Advanced Secure Gateway Administration Guide
1268
Table 65–1 Groups and Individual Errors (Continued)
1269
Advanced Secure Gateway Administration Guide
1270
Table 65–1 Groups and Individual Errors (Continued)
1271
Advanced Secure Gateway Administration Guide
1272
Table 65–1 Groups and Individual Errors (Continued)
1273
Advanced Secure Gateway Administration Guide
1274
Table 65–1 Groups and Individual Errors (Continued)
1275
Advanced Secure Gateway Administration Guide
1276
Table 65–2 Individual Errors (Continued)
1277
Advanced Secure Gateway Administration Guide
1278
Table 65–2 Individual Errors (Continued)
1279
Advanced Secure Gateway Administration Guide
1280
Table 65–2 Individual Errors (Continued)
1281
Advanced Secure Gateway Administration Guide
1282
Table 65–2 Individual Errors (Continued)
1283
Advanced Secure Gateway Administration Guide
1284
Chapter 66: Configuring Adapters and Virtual LANs
How Do I...?
Identify the task to perform and click the link:
Verify the Advanced Secure Gateway "About WAN and LAN Interfaces" on
appliance is connected properly based on page 1286
the basic deployment type, such as
bridging and in-path?
Change the settings for default link "About Link Settings" on page 1288
speeds for interfaces?
1285
Advanced Secure Gateway Administration Guide
Verify that traffic is flowing through the "Viewing Interface Statistics" on page
interfaces and see what type of traffic it 1305
is?
Figure 66–1 Connecting WAN and LAN interfaces in-path with bridging.
1286
❐ Clients and WAN links connect to the Advanced Secure Gateway appliance
transparently through a router with WCCP.
1287
Advanced Secure Gateway Administration Guide
The default intercept option depends on the type of license on this Advanced
Secure Gateway appliance:
❐ Proxy Edition: The default is Bypass transparent interception.
❐ Mach 5 Edition: The default is Allow transparent interception. The Advanced
Secure Gateway appliance performs normal proxy interception, as configured
in Configuration > Services, for traffic on the interface. If you require this
Advanced Secure Gateway appliance to perform interception of traffic on
specific interface(s), set the other interfaces to either bypass (bridge/forward,
but do not intercept traffic on it) or firewall it (drop all traffic not related to
established proxy connections).
Note: When the 100 Mbps Ethernet interfaces on the Advanced Secure Gateway
appliance 210 are connected to Gigabit Ethernet capable devices, they might
incorrectly auto-negotiate when fail-open pass-through is used.
If both the interfaces on these Advanced Secure Gateway appliances are
connected to Gigabit capable switches or hubs, Blue Coat recommends that you
configure the link settings manually to 100 Mbps. To configure the link settings,
see Step 3 in "To configure a network adapter:" on page 1294.
1288
The following table lists the results of various Advanced Secure Gateway
appliance and router link settings for 100 Mbps speeds. The values are listed in
the format: speed/duplex.
Table 66–2 Results for 100 Mbps link speed settings on the Advanced Secure Gateway appliance
and the switch
Table 66–3 Results for 1Gbps link speed settings on the Advanced Secure Gateway appliance
and switch
See Also
❐ Chapter 72: "Verifying the Health of Services Configured on the Advanced
Secure Gateway" on page 1411
1289
Advanced Secure Gateway Administration Guide
VLAN segments are defined on the switch. The network administrator specifies
which ports belong to which VLANs. The following diagram illustrates a port-
based VLAN configuration. Clients on network segments attached to switch ports
1 and 2 belong to VLAN 1, which has the network address 10.0.1.x; network
segments attached to switch ports 14 and 15 belong to VLAN 2, which has the
network address 10.0.2.x.
1290
Figure 66–4 Two switches connected by a trunk
The trunk link carries both the native VLAN and all other VLAN (tagged)
packets, as illustrated in the following diagram.
Figure 66–5 A switch broadcasting native and regular VLAN traffic over a trunk
In this example, the client attached to port 7 belongs to VLAN 2. Even though port
7 is part of VLAN 2, it does not set tags or receive VLAN-tagged packets. The
switch associates the traffic with VLAN 2 and tags it accordingly when
appropriate. Conversely, it strips the VLAN 2 tag on the response. The trunk link
carries VLAN 1 (the native) and 2 traffic to a router that forwards traffic for those
VLANs.
Deployment complications arise when a device (other than a router) is required
between switches. Any network device without VLAN-tagging support might
drop or misinterpret the traffic.
As a best practice, do not deploy a device that is not configured to recognize
VLAN-tagged traffic in-path of a trunk link.
1291
Advanced Secure Gateway Administration Guide
Figure 66–6 Advanced Secure Gateway appliance deployed between two switches
Based on this deployment:
❐ If configuration and policy allow, the Advanced Secure Gateway appliance
accepts all packets regardless of their VLAN tag and passes them from one
interface to the other with the original VLAN tag preserved.
❐ If a packet arrives on one interface tagged for VLAN 2, it remains on VLAN 2
when it is forwarded out on another interface. If a packet arrives untagged
and the destination interface has a different native VLAN configured, the
Advanced Secure Gateway appliance adds a tag to ensure the VLAN ID is
preserved. Similarly, if a tagged packet arrives and the VLAN ID matches the
native VLAN of the destination interface, the Advanced Secure Gateway
Gateway appliance removes the tag before transmitting the packet.
1292
❐ The Advanced Secure Gateway appliance strips the native VLAN tag on all
outgoing traffic.
1293
Advanced Secure Gateway Administration Guide
1294
Note: Different Advanced Secure Gateway appliance models have different
adapter configurations.
2a: Select
an
adapter
2c
2d
2b
• FDX/HDX:
1295
Advanced Secure Gateway Administration Guide
3. To change a setting or name the interface, click Configure interface #:#. The
Configure Interface dialog displays.
1296
Dialog Area Option
Link settings:
• Automatically sense link settings
(default, recommended): The
Advanced Secure Gateway
appliance auto-negotiates the link
settings for this interface.
• Manually configure link settings:
Select the options that meet your
network requirements. This
method requires a consistent
configuration on the router or
switch connected to this Advanced
Secure Gateway appliance.
1297
Advanced Secure Gateway Administration Guide
7a
7b
7c
7d
1298
8a
8b
9a
9b
9c
9d
1299
Advanced Secure Gateway Administration Guide
Note: If you attempt to edit a VLAN with an IP address being used by the
Management Console you will see a message warning of loss of connectivity.
If you lose connection to the Management Console, reconnect with an active
IP address.
1300
Link aggregation is accomplished using the industry-standard IEEE 802.1AX Link
Aggregation standard. Switch support and switch configuration are required. The
switch and appliance must be cabled port-to-port.
1301
Advanced Secure Gateway Administration Guide
Note: LACP (Link Aggregation Control Protocol) standby link selection and
dynamic key management are not supported.
1302
Remove a Member Interface:
1. On the Aggregate Interfaces tab, click Configure interface aggr:x.
2. On the Configure Aggregate Interface aggr:x window which displays, clear each
interface you want to remove from the aggregate group.
3. Click OK.
4. Click Apply.
Note: A removed member will maintain the common settings it inherited from
the aggregate interface.
Notes
• The VLAN information on the Aggregate Interfaces tab is for viewing only.
Configure VLANs on the Interfaces tab.
• See the Statistics > Network > Interface History tab to view statistics on an
aggregate interface.
• Disabling the aggregate link interface will disable the physical interface of
each member of the aggregate group. Individual physical interfaces within
the group can be enabled or disabled.
• Packets for any given connection will always be transmitted over the same
physical link, limiting the burst speed for the connection to the capacity of
that specific link rather than the sum of all the links.
1303
Advanced Secure Gateway Administration Guide
Switch Configuration
Link aggregation should work on any switch configured to use LACP. Consult the
documentation from your switch vendor when configuring link aggregation.
1304
Section 1 Viewing Interface Statistics
As traffic flows to and from the Advanced Secure Gateway appliance, you can
review statistics for each interface (including VLAN traffic). This allows you to
verify your deployment is optimized. For example, if you notice that traffic
flowing through the LAN interface is consistently near capacity, you might
consider routing traffic differently or spreading the load to another Advanced
Secure Gateway appliance.
Mouse-over
for exact data
1305
Advanced Secure Gateway Administration Guide
Input The number of input and output errors that occurred on the interface
Errors (not applicable on VLANs). This information provides details that
Blue Coat Technical Support uses to troubleshoot issues.
Output
Errors
See Also
❐ Chapter 71: "Monitoring the Advanced Secure Gateway Appliance" on page
1359
1306
Chapter 67: Software and Hardware Bridges
About Bridging
A bridge is a network device that interconnects multiple computer networks.
Unlike a hub, a bridge uses the Ethernet frame’s destination MAC address to
make delivery decisions. Because these decisions are based on MAC
addressing, bridges are known as Layer 2 devices. This Layer 2 functionality is
similar to that used by switches. Bridging is especially useful in smaller
deployments in which explicit proxies or L4 switches are not feasible options.
Bridging functionality allows each appliance Advanced Secure Gateway to be
easily deployed as a transparent redirection device, without requiring the
additional expense and maintenance of L4 switches or WCCP-capable routers.
Transparent bridges are deployed in-path between clients and routers—all
packets must pass through them, though clients are unaware of their presence.
1307
Advanced Secure Gateway Administration Guide
1308
Traffic Handling
Bridges are used to segment Ethernet collision domains, thus reducing frame
collisions. To make efficient delivery decisions, the bridge must discover the
identity of systems on each collision domain. The bridge uses the source MAC
address of frames to determine the interface that the device can be reached from
and stores that information in the bridge forwarding table. When packets are
received, the bridge consults the forwarding table to determine which interface to
deliver the packet to. The only way to bypass the bridge forwarding table lookup
is to define a static forwarding entry. For more information on static forwarding
entries, see "Adding Static Forwarding Table Entries" on page 1319.
1309
Advanced Secure Gateway Administration Guide
After power is restored to the appliance Advanced Secure Gateway, the bridge
comes back online and network traffic is routed to the appliance and thus is
subject to that appliance’s configured features, policies, content scanning, and
redirection instructions. Bridging supports only failover; it does not support load
balancing.
Note: The adapter state is displayed on Configuration > Network > Adapters.
Deployment Recommendations
Blue Coat recommends racking and cabling the Advanced Secure Gateway
appliance Advanced Secure Gateway while it is powered off. This enables you to
confirm that the pass-through adapter is functioning and that traffic is passing
through the appliance. If traffic is not being passed, confirm that you have used
the correct cabling (crossover or straight).
1310
Note: This feature is only applicable to a two-interface hardware or software
bridge. The propagation-failure option sets itself to disabled in any other
scenario.
If the link goes down while propagation-failure is disabled, the previous link
state is immediately reflected to the other interface if propagation-failure is
enabled during this time.
1311
Advanced Secure Gateway Administration Guide
3a
3b
3c
1312
4a
4b
4c
1313
Advanced Secure Gateway Administration Guide
Note: If you create a software bridge, the programmable bridge card mode is
implicitly Fail Closed (if the appliance fails, the software bridge is non-functional).
4a
4b
4c
1314
b. If you have a two-interface bridge and want to enable link error
propagation, select the Propagate Failure check box.
c. (Optional) Click Clear Bridge Statistics to reset the traffic history of the
bridge, which includes packet and byte counts, to 0.
d. Click OK to save your changes and close the Edit Bridge dialog.
5. Click Apply.
Note: This setting only controls the bandwidth class used by bypassed traffic
on this bridge. To manage intercepted traffic, you must define a Manage
Bandwidth policy (using VPM or CPL).
1315
Advanced Secure Gateway Administration Guide
3. Click Apply.
Configuring Failover
In failover mode, two appliances are deployed, a master and a slave. The master
sends keepalive messages (advertisements) to the slave appliance. If the slave does
not receive advertisements at the specified interval, the slave takes over for the
master. When the master comes back online, the master takes over from the slave
again.
The SGOS bridging feature allows two different types of failover modes, parallel
and serial. Hardware and software bridges allow different failover modes:
❐ Software bridges allow serial or parallel failover. However, note that if the
Advanced Secure Gateway appliance fails, serial failover also fails.
❐ Hardware bridges allow serial or parallel failover.
Parallel Failover
In parallel failover mode, two systems are deployed side by side on redundant
paths. In parallel failover, the slave does not actively bridge any packets unless
the master fails. If the master fails, the slave takes over the master IP address and
begins bridging. A parallel failover configuration is shown in the following
figure.
Because of the redundant paths, you must enable Spanning Tree to avoid bridge
loops. See "Bridging Loop Detection" on page 1318 for more information about
STP.
Serial Failover
In serial failover mode, the slave is in-path and continuously bridges packets, but
does not perform any other operations to the bridged traffic unless the master
fails. If the master fails, the slave takes over the master IP address and applies
policy, etc. A serial configuration is shown in the following figure.
If you are relying on a hardware bridge for serial failover, you must configure the
pass-through bridge to be in fail open mode. See "Configuring Programmable
Pass-Through/NIC Adapters" on page 1313 for more information about
configuring bridge modes.
1316
Configuring Failover
Failover is accomplished by doing the following:
❐ Creating virtual IP addresses on each proxy.
❐ Creating a failover group.
❐ Attach the failover group to the bridge configuration.
❐ Selecting a failover mode (parallel or serial - this can only be selected using
the CLI).
Both proxies can have the same priority (for example, the default priority). In that
case, priority is determined by the local IP address—the Advanced Secure
Gateway with the highest local IP will assume the role of master.
Example
The following example creates a bridging configuration with one bridge on
standby.
Note: This deployment requires a hub on both sides of the bridge or a switch
capable of interface mirroring.
The preceding commands create a failover group called 10.0.0.4. The priority
is automatically set to 254 and the failover interval is set to 40.
❐ Advanced Secure Gateway B—software bridge IP address: 10.0.0.3. Create a
virtual IP address and a failover group.
B#(config) virtual-ip address 10.0.0.4
B#(config) failover
B#(config failover) create 10.0.0.4
B#(config failover) edit 10.0.0.4
B#(config failover 10.0.0.4) enable
In the bridge configuration on each SG, attach the bridge configuration
to the failover group:
A#(config bridge bridge_name) failover group 10.0.0.4
B#(config bridge bridge_name) failover group 10.0.0.4
1317
Advanced Secure Gateway Administration Guide
4. Select the interface to configure and click Edit. The Edit Bridge Interface dialog
displays.
1318
5
1319
Advanced Secure Gateway Administration Guide
3a 3c
3d
3b
1320
❐ When the Advanced Secure Gateway appliance is installed as a router or
external layer 4 load balancers are used to redirect traffic to the Advanced
Secure Gateway appliance, routing is used for bypass, but only if IP
Forwarding is enabled.
Otherwise, traffic is dropped instead of being bypassed.
❐ When the Advanced Secure Gateway appliance is installed in a WCCP
deployment, either Generic Route Encapsulation (GRE) or Layer 2 (L2)
redirection is used for bypass. SGOS uses WCCP packet return to redirect
bypassed traffic back to the router, supporting the following combination of
packet forwarding and return options:
GRE GRE
L2 GRE
L2 L2
1321
Advanced Secure Gateway Administration Guide
1322
Chapter 68: Configuring Management Services
1323
Advanced Secure Gateway Administration Guide
1324
Section 1 Creating a Management Service
Management services are used to manage the Advanced Secure Gateway
appliance. As such, bypass entries are ignored for connections to console services.
For more information, see "Overview of Management Services" on page 1323.
7b
7c
7d
7a
1325
Advanced Secure Gateway Administration Guide
6. From the Console drop-down list, select the console that is used for this
service.
7. Configure the new listener options:
a. Click New to view the New Listener dialog. A listener defines the fields
where the console service will listen for traffic.
b. Select a destination option:
• All Advanced Secure Gateway IP addresses—indicates that service listens
on all addresses (IPv4 and IPv6).
• IP Address—indicates that only destination addresses match the IP
address. IPv4 or IPv6 addresses can be specified. Note that when IPv6
addresses are specified, they must be global (not linklocal).
c. Port–Identifies the port you want this service to listen on. Port 8081 is
the default port.
d. Enabled—Select this option to enable the listener.
e. Click OK to close the New Listener dialog.
8. Click OK to close the New Service dialog.
9. Click Apply.
1326
Administrative access to the appliance for the HTTPS console can be controlled
with the following authentication types:
❐ The predefined admin account
❐ Local authentication realm
❐ Certificate authentication realm (refer to the Common Access Card Solutions
Guide for information)
❐ IWA authentication realm (with basic authentication, secured with TLS)
❐ LDAP authentication realm (secured with TLS)
Creating a new HTTPS Console service requires three steps, discussed in the
following sections:
❐ Selecting a keyring (a key pair and a certificate that are stored together)
❐ Selecting an IP address and port on the system that the service will use,
including virtual IP addresses
❐ Enabling the HTTPS Console Service
Selecting a Keyring
The Advanced Secure Gateway appliance ships with a default keyring that can be
reused with each secure console that you create. You can also create your own
keyrings.
To use the default keyring, accept the default keyring through the Management
Console. If using the CLI, the default keyring is automatically used for each new
HTTPS Console that is created.To use a different keyring you must edit the
console service and select a new keyring using the attribute keyring command.
Note: If you get “host mismatch” errors or if the security certificate is called out
as invalid, create a different certificate and use it for the HTTPS Console. For more
information on keyrings and certificates, see Chapter 60: "Managing X.509
Certificates" on page 1153.
For information on creating a key pair and a certificate to make a keyring, see
Chapter 60: "Managing X.509 Certificates" on page 1153.
Selecting an IP Address
You can use any IPv4 or IPv6 address on the Advanced Secure Gateway appliance
for the HTTPS Console service, including virtual IP addresses. Note that when
IPv6 addresses are specified, they must be global (not linklocal). For information
on how to create a virtual IP address, see "Creating a VIP" on page 836.
1327
Advanced Secure Gateway Administration Guide
5b
5c
5a
5d
3. From the Keyring drop-down list, which displays a list of existing keyrings on
the system, select a keyring. The system ships with a default keyring that is
reusable for each HTTPS service.
1328
6. Configure the new listener options:
a. Click New to view the New Listener dialog. A listener defines the fields
where the console service will listen for traffic.
b. Select a destination option:
• All Advanced Secure Gateway IP addresses—Indicates that service listens
on all addresses (IPv4 and IPv6).
• IP Address—Indicates that only destination addresses match the IP
address. You can enter an IPv4 or an IPv6 address. Note that when
IPv6 addresses are specified, they must be global (not linklocal).
c. Port—Identifies the port you want this service to listen on. Port 8081 is
the default port.
d. Enabled—Select this option to enable the listener.
e. Click OK to close the New Listener dialog.
7. Click OK to close the Edit Service dialog.
8. Click Apply.
1329
Advanced Secure Gateway Administration Guide
Note: By default, SSHv2 is enabled and assigned to port 22. You do not need to
create a new host key unless you want to change the existing configuration.
SSHv1 is disabled by default.
1330
To delete a host key pair:
Click the Delete button for the appropriate version of SSH.
The key pair is deleted and that version of SSH is disabled.
Note: If you disable both SSHv1 and SSHv2, you could be locked out of the CLI,
requiring you to re-create an SSH key pair using the terminal console. (You can re-
create the SSH keys through the Management Console.)
Note: If you receive an error message when attempting to log in to the system
after regenerating the host key pair, locate the ssh known hosts file and delete the
system’s IP address entry.
1331
Advanced Secure Gateway Administration Guide
Note: The Advanced Secure Gateway appliance cannot create client keys.
You must use your SSH client to create a key.
2. Select the Configuration > Authentication > Console Access > SSH Client tab.
1332
3
4a
4b
5. Click Apply.
1333
Advanced Secure Gateway Administration Guide
Note: If you enable the Telnet console, be aware that you cannot use Telnet to
access all options available in the CLI. Some modules, such as SSL, respond with
the error message:
Telnet sessions are not allowed access to ssl commands.
By default a Telnet shell proxy service exists on the default Telnet port (23). Since
only one service can use a specific port, you must delete the shell service if you
want to create a Telnet console. Be sure to apply any changes before continuing. If
you want a Telnet shell proxy service in addition to the Telnet console, you can re-
create it later on a different port. For information on the Telnet service, see
Chapter 14: "Managing Shell Proxies" on page 307.
To create a new Telnet console service or edit an existing one, see "Creating a
Management Service" on page 1325.
Note: To use the Telnet shell proxy (to communicate with off-proxy systems)
and retain the Telnet Console, you must either change the Telnet shell proxy to
use a transparent Destination IP address, or change the destination port on
either the Telnet Console or Telnet shell proxy. Only one service is permitted
on a port. For more information on the Telnet shell proxy, see Chapter 14:
"Managing Shell Proxies" on page 307.
1334
Chapter 69: Preventing Denial of Service Attacks
This section describes how the Advanced Secure Gateway appliance prevents
attacks designed to prevent Web services to users.
1335
Advanced Secure Gateway Administration Guide
This feature is only available through the CLI. You cannot use the Management
Console to enable attack detection.
Note: If you edit an existing client’s limits to a smaller value, the new value only
applies to new connections to that client. For example, if the old value was 10
simultaneous connections and the new value is 5, existing connections above 5 are
not dropped.
1336
#(config client) enable-limits | disable-limits
#(config client) interval minutes
#(config client) block ip_address [minutes] | unblock ip_address
#(config client) default block-action drop | send-tcp-rst
#(config client) default connection-limit integer_between_1_and_65534
#(config client) default concurrent-request-limit
integer_between_1_and_2147483647
#(config client) default failure-limit integer_between_1_and_500
#(config client) default monitor-only
#(config client) no default monitor-only
#(config client) default request-limit
integer_between_1_and_2147483647
#(config client) default unblock-time minutes_between_1_and_1440
#(config client) default warning-limit integer_between_1_and_100
:
1337
Advanced Secure Gateway Administration Guide
default failure- integer Indicates the maximum number of failed requests a client
limit is allowed before the proxy starts issuing warnings. Default
is 50. This limit can be modified on a per-client basis.
By default, failed requests (with regard to attack detection)
are defined as the following:
• Connection failures (DNS lookup errors,
connection refused, connection timed out, host
unreachable, and so on)
• 4xx (excluding 401 and 407) and 5xx HTTP
response codes returned from the Advanced
Secure Gateway appliance or origin content server.
• Each failure request event adds a count of one
failure by default.
The default definition for both the response code and the
associated value per failed request event can be overridden
via the CPL
If the appliance serves an exception page to the client
instead of serving a page returned by the server, the
response code associated with the exception is used to
decide if it was a failure or not.
default monitor- Enables monitor-only mode, which logs the defined
only thresholds that have been exceeded, but does not enforce
the rules. The default value is disabled. This limit can be
modified on a per-client basis.
Note: The monitor-only mode setting has a higher pre-
cedence level than the default enforce mode. Enabling
monitor-only mode disables rule enforcement.
no default Disables monitor-only mode. The default value is disabled.
monitor-only This limit can be modified on a per-client basis.
default request- integer Indicates the maximum number of HTTP requests that IP
limit sources are allowed to make during a one-minute interval.
The default value is unlimited. This limit can be applied on
a per-client basis.
default unblock- minutes Indicates the amount of time a client is locked out when the
time client-warning-limit is exceeded. By default, the client is
blocked until explicitly unblocked. The default is
unlimited. This limit can be modified on a per-client basis.
default warning- integer Indicates the number of warnings sent to the client before
limit the client is blocked and the administrator is notified. The
default is 10; the maximum is 100. This limit can be
modified on a per-client basis.
1338
#(config) attack-detection
#(config attack-detection) client
#(config client)
2. Create a client.
#(config client) create {ip_address | ip_prefix}
block-action drop | send-tcp-rst Indicates the behavior when the client is at the
maximum number of connections: drop the connections
that are over the limit or send TCP RST for the
connection over the limit. The default is drop.
concurrent- integer Indicates the maximum number of simultaneous
request-limit requests that effective client IP sources (with
client.effective_address policy) or explicit client IP
sources (without client.effective_address policy)
are allowed to make. The default value is unlimited.
connection-limit integer Indicates the number of simultaneous connections
between 1 and 65534. The default is 100.
failure-limit integer Indicates the maximum number of failed requests a
client is allowed before the proxy starts issuing
warnings. The default is 50 and the maximum is 500.
monitor-only Enables monitor-only mode, which logs the defined
thresholds that have been exceeded, but does not enforce
the rules. The default value is disabled.
Note: The monitor-only mode setting has a higher
precedence level than the default enforce mode. En-
abling monitor-only mode disables rule enforcement.
request-limit integer Indicates the maximum number of HTTP requests that
IP sources are allowed to make during a one-minute
interval. The default value is unlimited. This limit can be
applied on a per-client basis.
1339
Advanced Secure Gateway Administration Guide
unblock-time minutes Indicates the amount of time a client is locked out when
the client-warning-limit is exceeded. By default, the
client is blocked until explicitly unblocked. The default is
unlimited.
warning-limit integer Indicates the number of warnings sent to the client
before the client is locked out and the administrator is
notified. The default is 10; the maximum is 100.
1340
To view the number of simultaneous connections to the Advanced Secure
Gateway appliance:
#(config client) view connections
Client IP Connection Count
127.0.0.1 1
10.9.16.112 1
10.2.11.133 1
Note: Refer to the Visual Policy Manager Reference for complete details about the
VPM.
1341
Advanced Secure Gateway Administration Guide
Note: Refer to the Content Policy Language Guide for details about CPL and how
transactions trigger the evaluation of policy file layers.
❐ Set the Advanced Secure Gateway appliance to extract the first IP address
presented in the X-Forwarded-For header variable as the effective IP address.
<Proxy>
client.address=<ip_address> \
client.effective_address("$(request.header.X-Forwarded-For)")
where:
1342
ip_address Specifies the HTTP proxy or load balancer IP address.
("$(request.header.X- The effective IP address.
Forwarded-For)")
Notes
• Concurrent request limiting thresholds count requests from effective IP
addresses (if client.effective_address() is present in policy) or explicit
IP addresses (if client.effective_address() is not present policy) when
using the concurrent-request-limit CLI command. connection-limit
does not take effective IP clients into account and should not be used.
• Blue Coat recommends replacing all instances of client.address in existing
policy with client.effective_address for all policies referencing the actual
client IP instead of the IP of the downstream proxy or load balancer.
1343
Advanced Secure Gateway Administration Guide
Note: Refer to the Content Policy Language Guide for details about CPL and how
transactions trigger the evaluation of policy file layers.
❐ Set the failure weight value for a specific HTTP response code.
<proxy>
http.response.code=<CODE> attack_detection.failure_weight(<N>)
where:
N Failure Sets the failure weight value for the specified HTTP
weight response code per failed request event. If set to 0, the
response code is not counted as a failure.
2. Create the first host in a server group, using the fully qualified domain name:
#(config server) create hostname
1344
#(config server hostname) {add | remove} hostname
#(config server hostname) concurrent-request-limit
integer_from_1_to_65535
where:
1345
Advanced Secure Gateway Administration Guide
1346
Chapter 70: Authenticating an Advanced Secure Gateway
Appliance
1347
Advanced Secure Gateway Administration Guide
1348
About SSL Device Profiles
An SSL device profile contains the information required for device authentication:
❐ The name of the keyring that contains the private key and certificate this
device uses to authenticate itself. The default keyring is appliance-key. (For
information on private and public keys, see "Public Keys and Private Keys" on
page 1154.)
❐ The name of the CA Certificate List (CCL) that contains the names of
certificates of CAs trusted by this profile. If another device offers a valid
certificate signed by an authority in this list, the certificate is accepted. The
default is appliance-ccl. For information on CCLs, see "Managing CA
Certificate Lists" on page 1191.
❐ Verification of the peer certificate.
When the Advanced Secure Gateway appliance is participating in device
authentication as an SSL client, the peer certificate verification option controls
whether the server certificate is validated against the CCL. If verification is
disabled, the CCL is ignored.
When the Advanced Secure Gateway appliance is participating in device
authentication as an SSL server, the peer certificate verification option controls
whether to require a client certificate. If verification is disabled, no client
certificate is obtained during the SSL handshake. The default is verify-peer-
certificate enabled.
Note: If you do not want to use peer verification, you can use the built-in passive-
attack-detection-only profile in place of the bluecoat-appliance-certificate profile.
This profile uses a self-signed certificate and disables the verify-peer option, so
that no authentication is done on the endpoints of the connection. The traffic is
encrypted, but is vulnerable to active attacks.
This profile can be used only when there is no threat of an active man-in-the-
middle attack. Like the bluecoat-appliance certificate profile, the passive-attack-
detection-only profile cannot be edited or deleted.
1349
Advanced Secure Gateway Administration Guide
If you create your own profile, it must contain the same kind of information that is
contained in the Blue Coat profile. To create your own profile, skip to "Creating an
SSL Device Profile for Device Authentication" on page 1356.
1350
Section 1 Obtaining a Advanced Secure Gateway Appliance Certificate
In many cases, if you have Internet connectivity, an appliance certificate is
automatically fetched by the Advanced Secure Gateway appliance, and no human
intervention is required. In other cases, if the Internet connection is delayed or if
you do not have Internet access, you might have to manually initiate the process
of obtaining an appliance certificate.
How you obtain an appliance certificate depends upon your environment:
❐ If the device to be authenticated has Internet connectivity and can reach the
Blue Coat CA server, continue with "Automatically Obtaining an Appliance
Certificate" on page 1351.
❐ If the device to be authenticated cannot reach the Blue Coat CA server, you
must acquire the certificate manually; continue with "Manually Obtaining an
Appliance Certificate" on page 1351.
1351
Advanced Secure Gateway Administration Guide
To generate a CSR:
1. Select the Configuration > SSL > Appliance Certificates > Request Certificate tab.
2. Select Create CSR. The Appliance Certificate Signing Request dialog displays.
1352
6. Paste the CSR and signature into the CSR panel.
7. Click Generate Cert.
The signed certificate displays, and can be pasted into the appliance-key
keyring.
-----BEGIN CERTIFICATE-----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Advanced Secure Gateway Administration Guide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-----END CERTIFICATE-----
Note: You cannot put a Blue Coat appliance certificate into a keyring you
create yourself.
1354
3. Create a CA certificate list. For information on creating a CCL, see "Managing
CA Certificate Lists" on page 1191.
a. Import the CA's root certificate.
b. Add the certificate to the CCL.
4. Create a device profile. For information on creating a profile, see "Appliance
Certificates and SSL Device Profiles" on page 1348.
5. Associate the device profile with the keyring and CCL. The keyring and CCL
must already exist.
6. Adjust other parameters, including authorization data extractor (if the
certificate is to be used for authorization), as needed.
7. Configure each application that uses device authentication to reference the
newly created profile.
For more information, see "About SSL Device Profiles" on page 1349.
1355
Advanced Secure Gateway Administration Guide
3. Name: Give the profile a meaningful name. (If you are editing the default
profile, this field is grayed out.) The only valid characters are alphanumeric,
the underscore, and hyphen, and the first character must be a letter.
4. SSL protocol versions: Change the default from TLS1.2, TLS1.1, TLSv1 to any other
protocol listed as required.
5. Keyring: If the server in question requires a client certificate, then select the
keyring used to negotiate with origin content servers through an encrypted
connection. Only keyrings with certificates can be associated with the SSL
client, displayed in the Keyring drop-down list.By default, no keyring is
selected.
Note: You must create a new keyring for device authentication if you do not use
the appliance-key keyring. The other keyrings shipped with the Advanced
Secure Gateway appliance are dedicated to other purposes. For information on
creating a new keyring, see "Creating a Keyring" on page 1163.
1356
6. CCL: From the drop-down list, select the CA Certificate List you want to use.
The browser-trusted CCL is the default.
7. Device ID extractor: The field describes how device ID information is extracted
from a presented certificate. The string contains references to the attributes of
the subject or issuer in the form $(subject.attr[.n]) or $(issuer.attr[.n]),
where attr is the short-form name of the attribute and n is the ordinal
instance of that attribute, counting from 1 when the subject is in LDAP (RFC
2253) order. If n is omitted, it is assumed to be 1.
The default is $(subject.CN); many other subject attributes are recognized,
among them OU, O, L, ST, C, and DC.
8. Verify peer: This setting determines whether a client certificate is requested on
incoming SSL connections and verified against the specified CCL. This is
enabled by default.
1357
Advanced Secure Gateway Administration Guide
1358
Chapter 71: Monitoring the Advanced Secure Gateway
Appliance
This section describes the methods you can use to monitor your Advanced
Secure Gateway appliances, including disk management, event logging,
monitoring network devices (SNMP), and health monitoring.
Topics
❐ Section A: "Monitoring the System and Disks" on page 1360
❐ Section B: "Configuring Event Logging and Notification" on page 1366
❐ Section C: "Monitoring Network Devices (SNMP)" on page 1377
❐ Section D: "Configuring Health Monitoring" on page 1393
1359
Advanced Secure Gateway Administration Guide
Enables you to perform systems tasks, such as restarting the system and
clearing the DNS or object cache. See "Performing Maintenance Tasks" on
page 1458 for information about these tasks.
❐ Environment
Displays details about the installed disks and enables you take them offline.
❐ SSL Cards
1360
Section 3 System Configuration Summary
To view the system configuration summary, select Maintenance > System and Disks >
Summary.
❐ Configuration area:
• Model—The model number of this Advanced Secure Gateway appliance.
• Disks Installed—The number of disk drives installed in the Advanced
Secure Gateway appliance. The Disks tab displays the status of each drive.
• Memory installed—The amount of RAM installed in the Advanced Secure
Gateway appliance.
• CPUs installed—The number of CPUs installed in the Advanced Secure
Gateway appliance.
• IP Address—The IP address assigned to this Advanced Secure Gateway
appliance.
• Software version—The SGOS image name.
• Serial release ID—The SGOS image version number.
• NIC 0 MAC—The MAC address assigned to the connected interface(s).
• Serial number—The Advanced Secure Gateway serial number.
❐ General Status area:
• System started—The most recent time and date that the Advanced Secure
Gateway appliance was started.
• CPU utilization—The current percent of CPU usage.
1361
Advanced Secure Gateway Administration Guide
Note: This displayed contents of this tab varies depending on the type of
Advanced Secure Gateway appliance. Systems with multiple disks display
environmental information for each disk.
1362
If any disk statistics display statuses other than OK, the Advanced Secure
Gateway appliance is experiencing environmental stress, such as higher than
advised heat. Ensure the area is properly ventilated.
1363
Advanced Secure Gateway Administration Guide
Note: The name and displayed contents of this tab differs, depending on the
range of disks available to the Advanced Secure Gateway model you use.
1364
Section 6 Viewing SSL Accelerator Card Information
Selecting the Maintenance > System and disks > SSL Cards tab allows you to view
information about any SSL accelerator cards in the system. If no accelerator cards
are installed, that information is stated on the pane.
Note: You cannot view statistics about SSL accelerator cards through the CLI.
1365
Advanced Secure Gateway Administration Guide
1366
Section 7 Selecting Which Events to Log
All events are logged to the event log. However, the events displayed in the event
log (when viewed from the CLI, MC, or syslog) correspond to the configured
event logging levels. Select an event logging level to view; deselect to omit. When
you select an event level, all levels above the selection are included. For example,
if you select Verbose, all event levels are included.
The event logging level options are listed from the most to least important events.
3. Click Apply.
1367
Advanced Secure Gateway Administration Guide
2. In the Event log size field, enter the maximum size of the event log in
megabytes. The default is 10 MB.
3. Select the action that occurs when the event log reaches maximum size:
• Overwrite earlier events—The Advanced Secure Gateway appliance
overwrites the older half of the event entries, replacing it with the most
recent events. There is no way to recover the overwritten events.
• Stop logging new events—The Advanced Secure Gateway appliance retains
all of the entries to date, but new events are not recorded.
4. Click Apply.
1368
Section 9 Enabling Event Notification
You can configure the Advanced Secure Gateway appliance to send event
notifications to individuals in your organization using SMTP. To do this, you
require either the hostname or IP address and port of the SMTP server, as well as
the email addresses of the recipients.
You can also send event notifications directly to Blue Coat for support purposes.
The Blue Coat SMTP gateway sends mail only to Blue Coat; it does not forward
mail to other domains. For information on configuring diagnostic reporting, see
see Chapter 74: "Diagnostics".
3
4
1369
Advanced Secure Gateway Administration Guide
5. (Optional) Specify the sender’s email address in the The “From:” field for the
email field. For example, enter the e-mail address of the lab manager
responsible for administering Advanced Secure Gateway appliances.
If you do not specify an email address here, event notifications display the
name of the appliance for the sender’s address. For information on
configuring the appliance name, see "Configuring the Advanced Secure
Gateway Appliance Name" on page 44.
6. Click Apply. The console confirms your changes.
Note: The email subject field states “Advanced Secure Gateway appliance”
and is not configurable.
Note: When a host is removed from the active syslog host list, a message
indicating that syslog has been deactivated is sent to the host(s). This message
alerts administrators that this host will no longer be receiving logs from this
Advanced Secure Gateway appliance.
1370
6
Note: Event log messages are automatically sent to all syslog servers in the
loghost list.
1371
Advanced Secure Gateway Administration Guide
Note: This example is not intended to be used for a real-world scenario; it could
be inadequate for your purposes. This example is meant for demonstration
purposes only.
The following is an example of using cURL to retrieve event log data over HTTPS
every 50 seconds.
1372
#!/bin/sh
#
# This script will create a file called Eventlog
# and in this file, will maintain a copy of the eventlog that is present on a
specific appliance
#
# usage: eventlog-fetch <IP_address> [ refresh-time-in-seconds ]
#
# Example use:
#
# In one window, execute the command: eventlog-fetch 198.0.2.0 10
# and in a second window, execute the command:
# tail -f Eventlog
#
# Now from second window you can watch the new eventlog messages as they are
generated.
#
touch Eventlog
#
# Every $time seconds, fetch a new eventlog in '.junk1',
# then diff against 'Eventlog' and figure out which entries are new.
# Ensure to strip off all the formatting crud that 'diff' generated.
#
1373
Advanced Secure Gateway Administration Guide
while true; do
sleep "$time"
curl https://${sg_addr}:8082/eventlog/fetch=0xffffffff -k --user
<admin_name>:<admin_pass> > .junk1 2> /dev/null
done
1374
Section 10 Viewing Event Log Configuration and Content
You can view the event log configuration, from show or from view in the event-log
configuration mode.
Note: The results displayed include events only for the configured event
logging levels. For more information, see "Selecting Which Events to Log" on
page 1367.
1375
Advanced Secure Gateway Administration Guide
Note: If the notation includes a space, such as between the start date and the start
time, the argument in the CLI should be quoted.
Example
# show event-log start "2009-10-22 9:00:00" end "2009-10-22 9:15:00"
2009-10-22 09:00:02+00:00UTC "Snapshot sysinfo_stats has fetched /
sysinfo-stats " 0 2D0006:96 ../Snapshot_worker.cpp:183
2009-10-22 09:05:49+00:00UTC "NTP: Periodic query of server
ntp.bluecoat.com, system clock is 0 seconds 682 ms fast compared to NTP
time. Updated system clock. " 0 90000:1 ../ntp.cpp:631
1376
Section C: Monitoring Network Devices (SNMP)
This section discusses the following topics:
❐ "Introduction to SNMP"
❐ "About SNMP Traps and Informs" on page 1378
❐ "About Management Information Bases (MIBs)" on page 1380
❐ "Adding and Enabling an SNMP Service and SNMP Listeners" on page 1380
❐ "Configuring SNMP Communities" on page 1383
❐ "Configuring SNMP for SNMPv1 and SNMPv2c" on page 1385
❐ "Configuring SNMP for SNMPv3" on page 1389
Introduction to SNMP
Simple Network Management Protocol (SNMP) is used in network management
systems to monitor network devices for health or status conditions that require
administrative attention. The Advanced Secure Gateway appliance supports
SNMPv1, SNMPv2c, and SNMPv3.
This section discusses the following topics:
❐ "Typical Uses of SNMP"
❐ "Types of SNMP Management" on page 1377
❐ "Components of an SNMP Managed Network" on page 1378
1377
Advanced Secure Gateway Administration Guide
See Also
❐ "About Management Information Bases (MIBs)"
1378
❐ warmStart—The SNMP entity, supporting a notification originator application,
is reinitializing itself such that its configuration is unaltered. This MIB is
described in SNMPv2-MIB.txt.
❐ linkUp—The SNMP entity, acting in an agent role, has detected that the
ifOperStatus object for one of its communication links left the down state and
transitioned into some other state (but not into the notPresent state). This
other state is indicated by the included value of ifOperStatus. This MIB is
described in IF-MIB.txt.
❐ linkDown—The SNMP entity, acting in an agent role, has detected that the
ifOperStatus object for one of its communication links is about to enter the
downstate from some other state (but not from the notPresentstate). This
other state is indicated by the included value of ifOperStatus. This MIB is
described in IF-MIB.txt.
The following traps require additional configuration:
❐ Authentication failure traps first must be enabled. See "Configuring SNMP
Communities" on page 1383.
❐ The attack trap occurs if attack detection is set up. See Chapter 69:
"Preventing Denial of Service Attacks" on page 1335.
❐ The disk/sensor traps are driven by the health monitoring settings (as is the
health monitoring trap). See "Changing Threshold and Notification Settings"
on page 1406.
❐ The health check trap occurs if it is set up in the health check configuration.
See "Configuring Health Check Notifications" on page 1429.
❐ The policy trap goes off if there is policy to trigger it. Refer to the Visual Policy
Manager Reference or the Content Policy Language Guide. Many of the feature
descriptions throughout this guide also include information about setting
policy.
See Also
❐ "Configuring SNMP Communities" on page 1383
❐ "Changing Threshold and Notification Settings" on page 1406
❐ "Adding Community Strings for SNMPv1 and SNMPv2c"
❐ "Configuring SNMP Traps for SNMPv1 and SNMPv2c"
❐ "Configuring SNMP for SNMPv3"
❐ "Configuring SNMP Traps and Informs for SNMPv3"
1379
Advanced Secure Gateway Administration Guide
Note: Some common MIB types, such as 64-bit counters, are not supported by
SNMPv1. We recommend using either SNMPv2c or, for best security, SNMPv3.
The Advanced Secure Gateway appliance uses both public MIBs and Blue Coat
proprietary MIBs. You can download the MIB files from the Blue Coat Web site.
1. Go to https://bto.bluecoat.com
2. Log in. The Downloads tab will not display unless you are logged in.
3. Select Downloads.
4. Select Blue Coat Product Downloads.
5. Select your product.
6. Select your appliance model (if applicable).
7. Select a software version.
8. Accept the Software Terms and Conditions.
9. Download the MIB by clicking the file name links.
Note: To load the Blue Coat MIBs on an SNMP network manager, also load the
dependent MIBs. Most commercial SNMP-based products load these MIBs when
the software starts.
1380
To add and enable an SNMP service and listeners:
1. Select the Configuration > Services > Management Services tab.
2. Click Add. The New Service dialog displays.
6a
6b
6c
1381
Advanced Secure Gateway Administration Guide
d. Click OK to close the New Listener dialog, then click OK again to close
the New Service dialog.
7. Click Apply.
See Also
❐ "Managing Proxy Services" on page 121
1382
Section 11 Configuring SNMP Communities
For the Advanced Secure Gateway appliance to listen for SNMP commands, you
must enable at least one SNMP listener. After you add and enable an SNMP
service (see "Adding and Enabling an SNMP Service and SNMP Listeners" on
page 1380), you are ready to configure SNMP communities and users and enable
traps and informs (see "About SNMP Traps and Informs" on page 1378).
To configure SNMP:
1. Select the Maintenance > SNMP > SNMP General tab.
2. In the Protocols area, SNMPv1, SNMPv2, and SNMPv3 are all enabled by default.
Select the specific versions that match the configuration of your SNMP
manager.
Note: Only SNMPv3 uses the Engine ID, which is required to be unique
among SNMP agents and systems that are expected to work together.
The Engine ID is set by default to a value that is derived from the
Advanced Secure Gateway appliance serial number and the Blue Coat
SNMP enterprise code. This is a unique hexadecimal identifier that is
associated with the Advanced Secure Gateway appliance. It appears in
each SNMP packet to identify the source of the packet. The configured
bytes must not all be equal to zero or to 0FFH (255).
If you reset the engine ID and want to return it to the default, click Set to
Default. You do not need to reboot the system after making configuration
changes to SNMP.
3. In the Traps and Informs area, enable traps and informs, as required.
a. Select Enable use of traps and informs to enable SNMP traps (for
SNMPv1, SNMPv2c, and SNMPv3) or informs (for SNMPv2c and
SNMPv3 only).
1383
Advanced Secure Gateway Administration Guide
Note: For SNMPv1 and SNMPv2c, this happens when the community
string in the SNMP packet is not correct (does not match one that is
supported). For SNMPv3, this happens when the authentication hash of
an SNMP packet is not correct for the specified user.
c. To perform a test trap, click Perform test trap, enter the trap data (string)
to be sent, and click Execute Trap. This sends a policy notification, as
defined in the BLUECOAT-SG-POLICY-MIB, to all configured trap and
inform recipients, and it is intended as a communications test.
4. In the sysContact field, enter a string that identifies the person responsible for
administering the appliance.
5. In the sysLocation field, enter a string that describes the physical location of the
appliance.
6. Click Apply.
See Also
❐ "Monitoring Network Devices (SNMP)"
❐ "Adding and Enabling an SNMP Service and SNMP Listeners"
❐ "Adding Community Strings for SNMPv1 and SNMPv2c"
❐ "Configuring SNMP Traps for SNMPv1 and SNMPv2c"
❐ "Configuring SNMP for SNMPv3"
❐ "Configuring SNMP Traps and Informs for SNMPv3"
1384
Section 12 Configuring SNMP for SNMPv1 and SNMPv2c
Community strings are used for SNMPv1 and SNMPv2c only. SNMPv3 replaces
the use of a community string with the ability to define a set of users. See
"Configuring SNMP for SNMPv3" on page 1389.
1385
Advanced Secure Gateway Administration Guide
See Also
❐ "Adding and Enabling an SNMP Service and SNMP Listeners"
❐ "Configuring SNMP for SNMPv1 and SNMPv2c"
❐ "Configuring SNMP Users for SNMPv3"
❐ "Monitoring Network Devices (SNMP)"
1386
3
See Also
❐ "Monitoring Network Devices (SNMP)"
❐ "About SNMP Traps and Informs"
❐ "Adding and Enabling an SNMP Service and SNMP Listeners"
1387
Advanced Secure Gateway Administration Guide
1388
Section 13 Configuring SNMP for SNMPv3
For SNMPv v3, you configure users instead of community strings. You then
configure the traps and informs by user rather than by community string.
This section discusses the following topics:
❐ "About Passphrases and Localized Keys"
❐ "Configuring SNMP Users for SNMPv3" on page 1389
❐ "Configuring SNMP Traps and Informs for SNMPv3" on page 1391
1389
Advanced Secure Gateway Administration Guide
4a
4b
4c
5a
5b
5c
1390
a. To set up the privacy mode, select DES (Data Encryption Standard) or
AES (Advanced Encryption Standard).
To edit a user:
1. Select Maintenance > SNMP > SNMPv3 Users.
2. Select the user to edit and click Edit. The Edit (user name) dialog displays.
3. Edit the parameters as required, then click OK.
4. Click Apply.
For a complete list of the CLI commands to edit an SNMPv3 user, refer to
“Privileged Mode Commands” in the Command Line Interface Reference.
See Also
❐ "Configuring SNMP Communities"
❐ "Adding Community Strings for SNMPv1 and SNMPv2c"
❐ "Configuring SNMP Traps for SNMPv1 and SNMPv2c"
❐ "Configuring SNMP Traps and Informs for SNMPv3"
1391
Advanced Secure Gateway Administration Guide
See Also
❐ "About SNMP Traps and Informs"
❐ "Configuring SNMP Communities"
❐ "Adding Community Strings for SNMPv1 and SNMPv2c"
❐ "Configuring SNMP Traps for SNMPv1 and SNMPv2c"
1392
Section D: Configuring Health Monitoring
The health monitor records the aggregate health of the Advanced Secure Gateway
appliance, by tracking status information and statistics for select resources, and
aids in focusing attention when a change in health state occurs. On the Advanced
Secure Gateway appliance, the health monitor tracks the status of key hardware
components (such as the thermal sensors, and CPU use), and the health status for
configured services. When the health monitor detects deviations in the normal
operating conditions of the device, the health status changes.
Note: The change is health status is displayed in the Management Console and
by the status LED on the appliance.
A change in health status does not always indicate a problem that requires
corrective action; it indicates that a monitored metric has deviated from the
normal operating parameters. The health monitor aids in focusing attention to the
possible cause(s) for the change in health status.
In Figure 71–1 below, the Health: monitor displays the overall health of the
Advanced Secure Gateway appliance in one of three states, OK, Warning, or Critical.
Click the link to view the Statistics > Health Monitoring page, which lists the status of
the system’s health monitoring metrics.
Health Click
monitor Status
See Also
❐ "About Health Monitoring"
1393
Advanced Secure Gateway Administration Guide
1394
5. At time 50, the state transitions to OK. This transition occurs because the
monitored value has remained below the Warning threshold for the
configured interval of 20 seconds.
0 5 10 15 20 25 30 35 40 45 50 55 60
Time 20 seconds below the Warning threshold an
OK notification is sent
Legend:
Configured threshold interval, 20 seconds
Figure 71–2 Relationship between the threshold value and threshold interval
Note: A change in health status does not always indicate a problem that requires
corrective action; it indicates that a monitored metric has deviated from the
normal operating parameters.
The Health: indicator is always visible in the Management Console, and the color
and text reflect the most severe health state for all metrics— red for Critical, yellow
for Warning, and green for OK. In the Health Monitoring > Statistics panel, the tabs for
1395
Advanced Secure Gateway Administration Guide
General, License, and Status, and Subscription metrics change color to reflect the
most severe state of the metrics they contain. You might click the tabs to view the
problem and assess the information. Based on the cause for the alert, the
administrator might take diagnostic action or redefine the normal operating
parameters for the metric and restore the health state of the Advanced Secure
Gateway appliance.
For example, if the revolutions per minute for Fan 1 Speed falls below the warning
threshold, the appliance’s health transitions to Warning. Because Fan 1 Speed is a
metric in the Status tab, the Statistics > Health Monitoring > Status tab turns yellow. By
clicking the Health: link and navigating to the yellow tab, you can view the alert.
You might then examine the fan to determine whether it needs to be replaced (due
to wear and tear) or if something is obstructing its movement.
To facilitate prompt attention for a change in the health state, you can configure
notifications on the appliance.
1396
Section 1 About the Health Monitoring Metric Types
The Advanced Secure Gateway appliance monitors the status of the following
metrics:
Note: Unless otherwise specified, thresholds are configurable, meaning that you
can specify the threshold levels that trigger an alert.
1397
Advanced Secure Gateway Administration Guide
Subsequently, even if fwd.test reports healthy, the health check status remains
critical as auth.service reports unhealthy.
The health check status transitions to OK only if both fwd.test and auth.service
report healthy.
Table 71–1 Health Check Status Metric — Combines the Health Check Result and the Severity Option
You can configure the default Severity for all health checks in the Configuration >
Health Checks > General > Default Notifications tab. For more information on
configuring the severity option for health checks, see Chapter 72: "Verifying the
Health of Services Configured on the Advanced Secure Gateway" on page 1411.
1398
Table 71–2 General Health Monitoring Metrics (Continued)
CPU Utilization 95% / 120 seconds 80% / 120 seconds Measures the value of the
primary CPU on multi-
processor systems — not the
average of all CPU activity.
Memory 95% / 120 seconds 90% / 120 seconds Measures memory use and
Utilization tracks when memory
resources become limited,
causing new connections to
be delayed.
Interface 90% / 120 seconds 60% / 120 seconds Measures the traffic (in and
Utilization out) on the interface to
determine if it is
approaching the maximum
capacity. (bandwidth
maximum)
See Also:
❐ "Changing Threshold and Notification Settings" on page 1406
❐ "Quick Reference: Default Threshold Values and States" on page 1404
❐ "Health Monitoring Cycle" on page 1395
❐ "Health Monitoring Example" on page 1394
1399
Advanced Secure Gateway Administration Guide
value. For example, if you set the Warning threshold to 45, an alert is sent when
there are 45 days remaining in the license period. The Critical threshold would be
less than 45 days, for example 5 days.
For license expiration metrics, the threshold interval is irrelevant and is set to 0.
Refer to Table 71–3 for an overview of the licensing metrics. To view the current
state of these metrics, see "Viewing Health Monitoring Statistics" on page 1408.
Table 71–3 Licensing Health Monitoring Metrics
User License 90% / 120 seconds 80% / 120 seconds Monitors the number of
Utilization users using the Advanced
Secure Gateway appliance.
1400
Table 71–3 Licensing Health Monitoring Metrics (Continued)
See Also
❐ "About User Limits" on page 136
❐ "Tasks for Managing User Limits" on page 138
❐ Chapter 3: "Licensing" on page 57
1401
Advanced Secure Gateway Administration Guide
Voltage — Bus Voltage, CPU Voltage, Threshold states and values vary by
Power Supply Voltage Advanced Secure Gateway models
1402
Table 71–4 Status Health Monitoring Metrics (Continued)
1403
Advanced Secure Gateway Administration Guide
Refer to Table 71–5 for an overview of the metrics. To view the current state of
these metrics, see "Viewing Health Monitoring Statistics" on page 1408.
Table 71–5 Subscription Health Monitoring Metrics
1404
Table 71–7 Licensing metrics
1405
Advanced Secure Gateway Administration Guide
Health Check No health checks with One or more health One or more
Status Severity: Warning or checks with Severity: health checks
Critical are failing. Warning has failed. with
A health check with Severity: Critical
Severity: No-effect might has failed.
be failing.
1406
1. Select the Maintenance > Health Monitoring tab.
2. Select the tab for the metric you wish to modify.
• To change the system resource metrics, select General.
• To change the hardware, ADN status and health check status metrics,
select Status.
• To change the licensing metrics, select Licensing.
• To change the communication status for all subscription services, select
Subscription.
4a
4b
4c
4d
1407
Advanced Secure Gateway Administration Guide
1408
See Also:
❐ "Thresholds and Notifications for General Metrics" on page 1398
❐ "Thresholds and Notifications for Licensing Metrics" on page 1399
❐ "Notifications for Status Metrics" on page 1401
❐ "Thresholds and Notifications for Subscription Metrics" on page 1403
See Also:
❐ "About Health Monitoring" on page 1393
❐ "Planning Considerations for Using Health Monitoring" on page 1396
❐ "About the Health Monitoring Metric Types" on page 1397
❐ "Thresholds and Notifications for General Metrics" on page 1398
❐ "Thresholds and Notifications for Licensing Metrics" on page 1399
❐ "Notifications for Status Metrics" on page 1401
❐ "Thresholds and Notifications for Subscription Metrics" on page 1403
❐ "Quick Reference: Default Threshold Values and States" on page 1404
1409
Advanced Secure Gateway Administration Guide
1410
Chapter 72: Verifying the Health of Services Configured on
the Advanced Secure Gateway
This section discusses Blue Coat health checks, which enable you to determine
the availability of external networking devices and off-box services.
Topics
Refer to the following topics:
❐ Section A: "Overview" on page 1412
❐ Section B: "About Blue Coat Health Check Components" on page 1415
❐ Section C: "Configuring Global Defaults" on page 1421
❐ Section D: "Forwarding Host and SOCKS Gateways Health Checks" on
page 1433
❐ Section E: "DNS Server Health Checks" on page 1437
❐ Section F: "Authentication Health Checks" on page 1440
❐ Section G: "Virus Scanning and Content Filtering Health Checks" on page
1442
❐ Section H: "Managing User-Defined Health Checks" on page 1445
❐ Section I: "Health Check Topics" on page 1452
❐ Section J: "Using Policy" on page 1456
1411
Advanced Secure Gateway Administration Guide
Section A: Overview
The Advanced Secure Gateway performs health checks to test for network
connectivity and to determine the responsiveness of external resources. Examples
of external resources include: DNS servers, forwarding hosts, SOCKS gateways,
authentication servers, and ICAP services (for example, anti-virus scanning
services).
The Advanced Secure Gateway automatically generates health checks based on:
❐ Forwarding configuration
❐ SOCKS gateways configuration
❐ DNS server configuration
❐ ICAP service configuration
❐ Authentication realm configuration
❐ Whether Dynamic Real-Time Rating (WebPulse) is enabled
You also can create user-defined health checks, including a composite health
check that combines the results of multiple other health check tests. For
information on health check types, see "About Blue Coat Health Check
Components" on page 1415.
Health checks fall into three broad categories:
❐ Determining if the IP address can be reached. Health check types that fall into
this category are:
• Forwarding hosts
• SOCKS gateways
• User-defined host health checks
❐ Determining if a service is responsive. Health check types that fall into this
category are:
• Authentication servers
• DNS server
• Dynamic Real-Time Rating (WebPulse) service
• ICAP services
1412
❐ Determining if a group is healthy. Group tests are compilations of individual
health checks, and the health of the group is determined by the status of the
group members. Health check types that fall into this category are:
• Forwarding groups
• SOCKS gateway groups
• ICAP service groups
• User-defined composite health checks
Information provided by health checks allows you to accomplish the following:
❐ Detect potential network issues before they become critical. For example, if
the health check for an individual host fails, the Advanced Secure Gateway
sends an alert (using e-mail, SNMP, or by writing to an event log) to the
designated recipients, if configured. To configure recipients, see "Configuring
Health Check Notifications" on page 1429.
❐ Track response times and report failures. For example, if the DNS server
performance suffers a reduction, the users experience response time delays.
The DNS health check records the average response time (in milliseconds) and
allows you to interpret the reason for the performance reduction. Should the
DNS server become unavailable, the failed health check triggers an alert.
Furthermore, the Advanced Secure Gateway uses health check information to
accomplish the following:
❐ When combined with failover configurations, health checks redirect traffic
when a device or service failure occurs. For example, a health check detects an
unhealthy server and a forwarding rule redirects traffic to a healthy server or
proxy.
❐ Monitor the impact of health check states on the overall health of the
appliance. Health check status is a metric in calculating the overall health of
the Advanced Secure Gateway and is reflected in the health monitor, which is
located at the upper right hand corner of the Management Console. For
example, if a health check fails, the health monitor displays Health: Warning.
You can click on the health monitor link to navigate and view the cause for the
warning.
1413
Advanced Secure Gateway Administration Guide
1414
Section B: About Blue Coat Health Check Components
Health checks have two components:
❐ Health check type: The kind of device or service the specific health check tests.
The following types are supported:
• Forwarding host and forwarding group
• SOCKS gateway and SOCKS gateway group
• DNS servers
• External Authentication servers
• ICAP service and ICAP service group
• Dynamic Real-Time Rating Service
• User-defined host and composite health checks
❐ Health check tests: The method of determining network connectivity, target
responsiveness, and basic functionality.
• Health checks (external targets)
• Authentication
• Internet Control Message Protocol (ICMP)
• DNS
• TCP
• SSL
• HTTP
• HTTPS
• ICAP
• WebPulse
• Health checks (group targets)
• Groups
• Composite
Some health check types only have one matching test, while others have a
selection. For more information about health check types and tests, see Table 72–1
on page 1417.
1415
Advanced Secure Gateway Administration Guide
Note: Although a host health check tests an upstream server, it can also be
used to test whether a proxy is working correctly. To test HTTP/HTTPS
proxy behavior, for example, you can set up a host beyond the proxy, and
then use forwarding rules so the health check passes through the proxy to the
host, allowing the proxy to be tested.
User-defined health checks allow you to test for attributes that the Advanced
Secure Gateway does not test automatically. For example, for a forwarding host,
you could perform three user-defined tests — an HTTP test, an HTTPS test, and a
TCP test of other ports. Then, you can set up a composite health check that
combines the results of these user-defined tests to represent the health of the
forwarding host. The Advanced Secure Gateway reports the status of the (user-
defined) composite health check as the forwarding host's health, instead of the
default forwarding host health check.
All health check types are given standardized names, based on the name of the
target. For example:
❐ Forwarding hosts and groups have a prefix of fwd
❐ DNS servers have a prefix of dns
❐ SOCKS gateways and gateway groups have a prefix of socks
❐ Authentication realms have a prefix of auth
❐ Content Analysis services have prefixes of icap, and WebPulse
❐ User-defined or composite health checks have a prefix of user
1416
Section 2 Health Check Tests
Based on the health check type, the Advanced Secure Gateway periodically tests
the health status, and thus the availability of the host. You can configure the time
interval between tests. If the health check test is successful, the appliance
considers the host available.
The health check tests are described in the table below.
ICMP Test (Layer The basic connection between the Advanced Forwarding
3) Secure Gateway and the origin server is hosts, SOCKS
confirmed. The server must recognize ICMP gateways, or
echoing, and any intervening networking user-defined
equipment must support ICMP. The Advanced hosts
Secure Gateway appliance sends a ping (three
ICMP echo requests) to the host.
ICMP tests do not support policy for SOCKS
gateways or forwarding.
1417
Advanced Secure Gateway Administration Guide
1418
Table 72–1 Health Check Tests (Continued)
Content The tests for content analysis are specialized ICAP, WebPulse
AnalysisTests tests devised for each particular kind of content services.
analysisservice. The health check system
conducts by sending requests to the configured
services, which reports back a health check
result.
Group Individual tests that are combined for any of the Forwarding
four different available groups (forwarding, groups, SOCKS
SOCKS gateways, and ICAP services). If any of gateways
the members is healthy, then the group as a groups, and
whole is considered healthy. ICAP external
Note: Blue Coat supports a composite test, used service groups.
only with composite (user-defined) health
checks, that is similar to a group test except that,
by default, all members must be healthy for the
result to be healthy.
These settings are configurable.
By default, group health tests are used for two
purposes:
• Monitoring and notification
• Policy
DNS Server The DNS server maps the hostname, default is DNS
www.bluecoat.com, to an IP address. The health
check is successful if the hostname can be
resolved to an IP address by the DNS server.
1419
Advanced Secure Gateway Administration Guide
See Also
❐ "To edit forwarding and SOCKS gateways health checks:" on page 1434
❐ "To edit forwarding or SOCKS gateway group health checks:" on page 1435
❐ "To edit a DNS server health check:" on page 1438
❐ "To edit an authentication health check:" on page 1440
❐ "To edit virus scanning and content filtering tests:" on page 1442
❐ "To edit ICAP group tests:" on page 1443
❐ "To create a user-defined host health check:" on page 1447
❐ "To create a user-defined composite health check:" on page 1449
1420
Section C: Configuring Global Defaults
All health checks are initially configured to use global defaults. The only
exception is the Dynamic Categorization service, which has the healthy interval set
to 10800 seconds (3 hours), and the failure trigger set to 1.
1421
Advanced Secure Gateway Administration Guide
If the case of a group health check that is disabled but reporting healthy, all
members of the group are treated as healthy regardless of the status of the
members’ individual health check result.
Note: Individual health checks for members of a group remain active; they can
be used apart from the group.
1422
❐ Enable notifications of transitions to unhealthy
A transition to healthy occurs as soon as the target is sufficiently healthy to be sent
a request, even though the target might not be completely healthy. For example, if
you have multiple IP addresses resolved and only one (or a few) is responsive, the
group is classified as healthy and the health status might be Ok with errors or Ok for
some IPs. For some health check groups, like forwarding hosts, you can configure
a minimum number of members that must be healthy for the group to be healthy.
In the event log, status changes can be logged as either informational or severe
logs. In addition to the overall health of the device, you can enable notifications
for each resolved IP address of a target device (if applicable).
An SNMP trap can also be used for notification of health check state changes. It is
part of the Blue Coat Management Information Base (MIB) as blueCoatMgmt 7.2.1.
For information on configuring SNMP, see "Monitoring Network Devices
(SNMP)" on page 1377.
Note: Severity of a health check is pertinent only when a health check fails.
The Advanced Secure Gateway allows you to configure the severity option to
Critical, Warning and No effect. Set the severity of a health check to:
❐ Critical: If the success of a health check is crucial to the health of the device. If
the health check then reports unhealthy, the overall health status becomes
Critical.
1423
Advanced Secure Gateway Administration Guide
When a status change notification e-mail is sent to a listed user, it includes the
following information in the e-mail subject line:
❐ Appliance name (see the Initial Configuration Guide for more information on
naming an appliance)
❐ Health check test (see "Health Check Tests" on page 1417 for a list of available
tests)
❐ Health state change (Health state changes are contingent upon health check
parameters)
The body of the e-mail includes relevant information based on the nature of the
health change.
1424
Section 3 Changing Health Check Default Settings
You can modify the default settings for all health checks on the Configuration >
Health Checks > General > Default Settings tab or you can override the default settings
for a health check on the Configuration > Health Checks > General > Health Checks tab,
selecting the health check, and clicking Edit. Explicit health settings override the
global defaults.
To change the global default settings:
1. Select Configuration > Health Checks > General > Default Settings.
1425
Advanced Secure Gateway Administration Guide
1426
d. Specify the sick interval, in seconds, between health checks to the
server that has been determined to be unhealthy or out of service. The
default is 10. The sick interval is between 1 second and 31536000
seconds (about 1 year).
1427
Advanced Secure Gateway Administration Guide
e. Specify the sick threshold, or the number of failed health checks before
an entry is considered unhealthy. Valid values are 1-65535. The default
is 1.
f. Specify the failure trigger for the number of failed connections to the
server before a health check is triggered.Valid values are between 1
and 2147483647.
The failures are reported back to the health check as a result of either a
connection failure or a response error. The number of these external
failures is cleared every time a health check is completed. If the number of
failures listed meets or exceeds the threshold, and the health check is idle
and not actually executing, then the health of the device or service is
immediately checked.
g. Specify the maximum response time threshold, in milliseconds. The
threshold time can be between 1 and 65535.
h. Click OK to close the dialog.
5. Click Apply.
1428
Section 4 Configuring Health Check Notifications
The Advanced Secure Gateway allows you to configure notifications that alert
you to changes in health status and to emerging issues. By default, notifications
for health check events and status are disabled.
You can set up health check notifications:
❐ Globally on the Configuration > Health Checks > General > Default Notifications tab
❐ Explicitly, for a health check, on the Configuration > Health Checks > General >
Health Checks tab, selecting the health check, and clicking Edit.
Explicit health settings override the global defaults.
b. Event logging: Select the appropriate options to enable the event logging
you require. Messages can be logged as either informational or severe.
c. SNMP traps: Select the situations for which you require SNMP traps to
be sent.
1429
Advanced Secure Gateway Administration Guide
Refer to Table 72–2 on page 1431 for details about these options.
4. Click Apply.
1430
Table 72–2 Notification and Log Settings
Setting Description
Notify/log for each IP address Notify/log any change in health state for each IP
address within the health check.
Log a transition to healthy as Log the event when the health check changes from
any state to a healthy state with the selected
severity level (Informational or Severe).
Log a transition to sick as Log the event when the health check changes from
any state to a sick state with the selected severity
level (Informational or Severe).
1431
Advanced Secure Gateway Administration Guide
5. Select the options to override. You can cancel your choices by clicking Clear all
overrides.
1432
Section D: Forwarding Host and SOCKS Gateways Health Checks
Before you can edit forwarding or SOCKS gateways health check types, you must
configure forwarding hosts or SOCKS gateways. For information about
configuring forwarding, see Chapter 42: "Configuring the Upstream Network
Environment" on page 879; for information about configuring SOCKS gateways,
see Chapter 13: "Managing a SOCKS Proxy" on page 299.
This section discusses managing the automatically generated forwarding host
and SOCKS gateway health checks.
Note: You can create groups in the Configuration > Forwarding > Forwarding Hosts tab
or Configuration > Forwarding > SOCKS Gateways tab.
By default, if any of the members of the group are healthy, then the group is
considered healthy. You can specify the number of group members that must be
healthy for the group to be considered healthy.
1433
Advanced Secure Gateway Administration Guide
1434
d. To change the default settings for this test, click Override the default
settings. Select the options to override. Cancel your choices by clicking
Clear all overrides. For detailed information about configuring healthy
and sick intervals and thresholds, see "Changing Health Check Default
Settings" on page 1425. Click OK to close the dialog.
e. To change default notifications, click Override the default notifications. By
default, no notifications are sent for any health checks. Select the
options to override. You can cancel your choices by clicking Clear all
overrides. For detailed information about configuring notifications, see
"Configuring Health Check Notifications" on page 1429. Click OK to
close the dialog.
f. Click OK to close the edit dialog.
5. Click Apply.
Note: The only way to add or delete group members to the automatically
generated health check tests is to add and remove members from the actual
forwarding or SOCKS gateway group. The automatically generated health
check is then updated.
1. Select Configuration > Health Checks > General > Health Checks.
2. Select the forwarding or SOCKS gateways group health check you need to
modify.
3. Click Edit.
1435
Advanced Secure Gateway Administration Guide
1436
Section E: DNS Server Health Checks
❐ "About DNS Server Health Checks"
❐ "Editing DNS Server Health Checks"
❐ For a server in a custom DNS group, the default is the longest domain name
listed in the group.
You can also override these defaults and specify a health check hostname for each
DNS server.
See Also
Chapter 36: "Configuring DNS" on page 825
1437
Advanced Secure Gateway Administration Guide
1438
b. Select the Host option, as required.
• Use default host uses the default hostname.
• Use user defined host allows you to configure a custom hostname for this
health check. Enter the hostname in the box provided.
Proceed to Step e if you do not want to override defaults.
c. To change default settings, click Override the default settings. Select the
options to override. Cancel your choices by clicking Clear all overrides.
For detailed information about configuring healthy and sick intervals
and thresholds, see "Changing Health Check Default Settings" on page
1425. Click OK to close the dialog.
d. To change the default notifications, click Override the default notifications.
Select the options. Cancel your choices by clicking Clear all overrides.
For detailed information about configuring notifications, see
"Configuring Health Check Notifications" on page 1429.
e. Click OK to close the override dialog.
5. Click OK to close the edit dialog.
6. Click Apply.
1439
Advanced Secure Gateway Administration Guide
1440
Advanced Secure Gateway Administration Guide
1441
Advanced Secure Gateway Administration Guide
Note: The names of the ICAP services and service groups can be a maximum of
64 characters long, a change from previous releases, which allowed names to be a
maximum of 127 characters.
The settings you can change on ICAP, and WebPulse service health checks are:
❐ Enable or disable the health check
❐ Override default settings
❐ Override default notifications
Note: The WebPulse health check has default settings that differ from the
defaults for other content analysis services: 10800 seconds (3 hours) for
the interval, and 1 for the failure trigger.
• Click OK.
1442
c. To change default notifications, click Override the default notifications. By
default, no notifications are sent for any health checks. Select the
options. Cancel your choices by clicking Clear all overrides. For detailed
information about configuring notifications, see "Configuring Health
Check Notifications" on page 1429.
d. Click OK to close the override dialog.
e. Click OK to close the edit dialog.
5. Click Apply.
Note: The only way to add or delete group members to the automatically
generated health check tests is to add and remove members from the ICAP
services. The automatically generated health check type is then updated.
1. Select Configuration > Health Checks > General > Health Checks.
2. Select the external service group health check to modify. Groups are identified
in the Type column.
3. Click Edit.
1443
Advanced Secure Gateway Administration Guide
1444
Section H: Managing User-Defined Health Checks
You can manually create and manage ICMP, TCP, HTTP, HTTPS, or SSL health
check tests for any upstream TCP/IP device. You can use these user-defined
health check types to send notifications of health check state changes.
Under most circumstances, you do not need to create user-defined health checks
because the automatically generated health checks meet most needs. However, to
check for things that Blue Coat does not test for automatically — for example, the
health of the Internet or of the router, you might create user-defined heath checks.
If, for example, you want to control Web traffic based on the apparent health of
the Internet, you can create a user-defined health check to target known Internet
sites. As long as a certain number of the sites are healthy, you can consider the
Internet as healthy.
Further, you can use policy to configure forwarding rules on the Advanced Secure
Gateway. Subsequently, if the user-defined health check determining internet
accessibility transitions to unhealthy, all requests directed to the Advanced Secure
Gateway will be forwarded to the alternate Advanced Secure Gateway until the
primary Advanced Secure Gateway transitions to healthy again.
Note: Frequent testing of specific Internet sites can result in that Internet site
objecting to the number of hits.
1445
Advanced Secure Gateway Administration Guide
❐ TCP: Establishes that a TCP layer connection can be made to a port on the
host. Then the connection is dropped.
❐ SSL: A connection is made to a target and the full SSL handshake is confirmed.
Then the connection is dropped.
❐ HTTP/HTTPS: An HTTP or HTTPS test is defined by the URL supplied. The
port used for this test is as specified in that URL. If no port is explicitly
specified in the URL, the port defaults to the standard Internet value of 80 or
443.
When configuring user-defined host health check types, keep the following in
mind:
❐ User-defined host health checks are created and deleted manually.
❐ All individual user-defined tests consider the target to be a server.
❐ To conduct proxy HTTP/HTTPS tests, a proxy must be defined as a
forwarding host, set up between the originating device and the target, and
forwarding policy must cause the test to be directed through the proxy.
❐ For an ICMP test, a hostname is specified in the health check configuration.
❐ The TCP and SSL tests support SOCKS gateway policy, based on a URL of
tcp://hostname:port/ and ssl://hostname:port/, respectively, using a
hostname and port supplied in health check configuration.
❐ An HTTP/HTTPS test requires a full URL. The port used for this test is as
specified in that URL. If no port is explicitly specified in the URL, the port
defaults to the standard value for these protocols of 80 or 443. The server
being tested is assumed to support whatever port is indicated.
Forwarding and SOCKS gateway policy is applied based on the URL. The
HTTPS or SSL tests use all the server certificate settings in the SSL layer in
policy. For a forwarding host, all the sever certificate settings in the SSL layer
also apply, and if present, override the forwarding host configuration setting.
Note: None of the above tests apply to user-defined composite health checks,
which only consist of a set of members and a setting to combine the results.
1446
Note: Automatically generated group tests and user-defined composite tests
are not the same.
Group tests are automatically generated; they cannot be deleted. Some
editing is permitted, but you cannot add or remove members of the group
through the health checks module. You must modify the forwarding or
SOCKS gateways groups to update the automatically generated group tests.
For a group test, the default is for the group to be healthy if any member is
healthy. For a composite test, the default is for the group to be healthy if all
members are healthy. (The default is configurable.)
Note: You cannot create user-defined health checks for external service tests,
such as authentication servers, ICAP, and the WebPulse service.
The following procedure explains how to create a user-defined host health check.
To create a user-defined composite health check, continue with "To create a user-
defined composite health check:" on page 1449.
1447
Advanced Secure Gateway Administration Guide
3. Select the type of test to configure from the Type of test drop-down list. To
configure a composite test, see "To create a user-defined composite health
check:" on page 1449.
The options you can select vary with the type of health check. The example
above uses the HTTP/HTTPS options. Options for other tests are explained in
this procedure, as well.
a. Enter a name for the health check.
b. Select the Enabled state option, as required.
c. If you are configuring an SSL or TCP health check, enter the port to
use.
d. If you are configuring an ICMP, SSL, or TCP health check, enter the
hostname of the health check’s target. The hostname can be an IPv4 or
IPv6 host or address.
1448
e. For HTTP/HTTPS only:
• Enter the URL address of the target.
• To use Basic user authentication, select the check box and enter the
username and password of the target.
• To use Basic proxy authentication because intermediate proxies might
be between you and the target, select the check box and enter the
username and password of the target.
• To manage a list of HTTP/HTTPS response codes that are considered
successes, enter the list in the Allowed Response Code field, separated by
semi-colons. If one of them is received by the health check then the
health check considers the HTTP(S) test to have been successful.
Note: The 200 response code is added by default. The list must always
have at least one member.
f. To change the default settings for this test, click Override the default
settings. Select the override options. Cancel your choices by clicking
Clear all overrides. For detailed information about configuring healthy
and sick intervals and thresholds, see "Changing Health Check Default
Settings" on page 1425. Click OK.
g. To change the default notifications for this test, click Override the default
notifications. By default, no notifications are sent for any health checks.
Select the override options. You can cancel your choices by clicking
Clear all overrides. For detailed information about configuring
notifications, see "Configuring Health Check Notifications" on page
1429 Click OK.
h. Click OK to close the dialog.
i. Click Apply.
1449
Advanced Secure Gateway Administration Guide
d. Add the health check members to the composite test from the Available
Aliases list by selecting the health check to add and clicking Add to
move the alias to the Selected Alias list.
e. To change the default notifications for this test, click Override the default
notifications. By default, no notifications are sent for any health checks.
Select the override options. You can cancel your choices by clicking
Clear all overrides. For detailed information about configuring
notifications, see "Configuring Health Check Notifications" on page
1429
f. Click OK to close the override dialog.
g. Click OK to close the edit dialog. Click Apply.
1450
Deleting User-Defined Health Checks
Only user-defined health checks can be deleted. If a health check is referenced
either in policy or in another health check, it cannot be deleted.
1451
Advanced Secure Gateway Administration Guide
1452
Section 5 About Health Check Statistics
The Statistics > Health Check panel provides a snapshot of all the health checks
configured on the device. By default, the screen is sorted by the name column. To
change the sort order, click any column header to sort by that column.
The Statistics > Health Check screen displays the following information:
❐ Current time: Displays the current date and time.
❐ Last Boot: Displays the date and time when the device was last booted.
❐ Since Boot: Displays the time that the device has been functioning since the last
boot.
❐ Status:
Displays the summary of each health check configured on the
Advanced Secure Gateway.
• Name: The health check name. Example, auth.blue_coat_iwa
• State: The health check state is represented by an icon and a status
message. If the health check is disabled, it displays as:
• Disabled: Healthy
• Disabled: Unhealthy
If the health check is enabled, the table below shows the messages
displayed:
Table 72–3 Status messages for enabled health checks
1453
Advanced Secure Gateway Administration Guide
1454
❐ The current time is 2:05 PM on February 9, 2015.
❐ The user-defined health check user.p failed.
❐ The dynamic real time rating service is healthy.
❐ The DNS server 8.8.8.8 is functioning without errors.
❐ The SSO realm health status is unknown.
❐ The auth.test health check is disabled.
1455
Advanced Secure Gateway Administration Guide
1456
Chapter 73: Maintaining the Advanced Secure Gateway
Appliance
1457
Advanced Secure Gateway Administration Guide
2 3
1458
6. To proceed with the restart, click OK.
See Also
❐ "Restoring System Defaults" on page 1459
❐ "Restore-Defaults" on page 1459
❐ "Clearing the DNS Cache" on page 1461
❐ "Clearing the Object Cache" on page 1461
❐ "Clearing the Byte Cache" on page 1462
❐ "Clearing Trend Statistics" on page 1462
Restore-Defaults
Settings that are deleted when you use the restore-defaults command include:
❐ All IP addresses (these must be restored before you can access the
Management Console again).
❐ DNS server addresses (these must be restored through the CLI before you can
access the Management Console again).
❐ Installable lists.
❐ All customized configurations.
❐ Blue Coat trusted certificates.
1459
Advanced Secure Gateway Administration Guide
❐ Original SSH (v1 and v2) host keys (new host keys are regenerated).
You can use the force option to restore defaults without confirmation.
Keep-Console
Settings that are retained when you use the restore-defaults command with the
keep-console option include:
2. In the Maintenance Tasks field, click Restore. This invokes the restore-defaults
keep-console action. The Restore Configuration dialog displays.
1460
• Ethernet maximum transmission unit (MTU) size.
• TCP round trip time.
• Static routes table information.
Factory-Defaults
All system settings are deleted when you use the restore-defaults command
with the factory-defaults option.
The only settings that are retained are:
❐ Trial period information
❐ The last five installed appliance systems, from which you can pick one for
rebooting
The Serial Console password is also deleted if you use restore-defaults
factory-defaults. For information on the Serial Console password, see "Securing
the Serial Port" on page 68.
You can use the force option to restore defaults without confirmation.
1461
Advanced Secure Gateway Administration Guide
2. In the Cache and Statistics Tasks field, click Clear next to the object cache. The
Clear Object Cache dialog displays.
3. Click OK.
1462
Section 2 Managing Advanced Secure Gateway Appliance Systems
In the Management Console, the Systems tab displays the five available systems.
Empty systems are indicated by the word Empty.
The system currently running is highlighted in blue and cannot be replaced or
deleted.
From this screen, you can:
❐ View details of the available SGOS system versions.
❐ Select the SGOS system version to boot. See "Setting the Default Boot System"
on page 1463.
❐ Lock one or more of the available SGOS system versions. See "Locking and
Unlocking Advanced Secure Gateway Appliance Systems" on page 1464.
❐ Select the SGOS system version to be replaced. See "Replacing a Advanced
Secure Gateway Appliance System" on page 1464.
❐ Delete one or more of the available SGOS system versions (CLI only). See
"Deleting a Advanced Secure Gateway Appliance System" on page 1464.
To set the Advanced Secure Gateway appliance to run on the next hardware
restart:
1. Select the Maintenance > Upgrade > Systems tab.
1463
Advanced Secure Gateway Administration Guide
Note: An empty system cannot be specified as default, and only one system can
be specified as the default system.
To lock a system:
1. Select the Maintenance > Upgrade > Systems tab.
2. Select the system(s) to lock in the Lock column.
3. Click Apply.
To unlock a system:
1. Select the Maintenance > Upgrade > Systems tab.
2. Deselect the system(s) to unlock in the Lock column.
3. Click Apply.
To delete a system:
At the (config) command prompt:
1464
#(config) installed-systems
#(config installed-systems) delete system_number
Disk Reinitialization
You can reinitialize disks on a multi-disk Advanced Secure Gateway appliance.
You cannot reinitialize the disk on a single-disk appliance. If you suspect a disk
fault in a single-disk system, contact Blue Coat Technical Support for assistance.
About Reinitialization
Reinitialization is done online without rebooting the system. (For more
information, refer to the #disk command in the Command Line Interface Reference.)
SGOS operations, in turn, are not affected, although during the time the disk is
being reinitialized, that disk is not available for caching. Only the master disk
reinitialization restarts the Advanced Secure Gateway appliance.
Only persistent objects are copied to a newly-reinitialized disk. This is usually not
a problem because most of these objects are replicated or mirrored. If the
reinitialized disk contained one copy of these objects (which is lost), another disk
contains another copy.
You cannot reinitialize all of the Advanced Secure Gateway appliance disks over a
very short period of time. Attempting to reinitialize the last disk in a system
before critical components can be replicated to other disks in the system causes a
warning message to appear.
Immediately after reinitialization is complete, the appliance automatically starts
using the reinitialized disk for caching.
1465
Advanced Secure Gateway Administration Guide
Note: The maximum number of objects that can be stored in a Advanced Secure
Gateway appliance is affected by a number of factors, including the SGOS version
it is running and the hardware platform series.
This feature is not available in the Management Console. Use the CLI instead.
1466
1467
Chapter 74: Diagnostics
Diagnostic Terminology
❐ Heartbeats: Enabled by default, Heartbeats (statistics) are a diagnostic tool
used by Blue Coat, allowing them to proactively monitor the health of
appliances.
❐ Core images: Created when there is an unexpected system restart. This
stores the system state at the time of the restart, enhancing the ability for
Blue Coat to determine the root cause of the restart.
❐ SysInfo (System Information): SysInfo provides a snapshot of statistics and
events on the Advanced Secure Gateway.
❐ PCAP: An onboard packet capture utility that captures packets of Ethernet
frames going in or out of an Advanced Secure Gateway.
❐ Policy trace: A policy trace can provide debugging information on policy
transactions. This is helpful, even when policy is not the issue. For
information on using policy tracing, refer to the Content Policy Language
Guide.
❐ Policy coverage: This feature reports on the rules and objects that match
user requests processed through the appliance’s current policy. For more
information on policy coverage, refer to the “Troubleshooting” chapter in
the Content Policy Language Guide and article 000009825 in the Knowledge
Base.
1467
Advanced Secure Gateway Administration Guide
❐ Event Logging: The event log files contain messages generated by software or
hardware events encountered by the appliance. For information on
configuring event logging, see "Configuring Event Logging and Notification"
on page 1366.
❐ Access Logging: Access logs allow for analysis of Quality of Service, content
retrieved, and other troubleshooting. For information on Access Logging, see
"About Access Logging" on page 627.
❐ CPU Monitoring: With CPU monitoring enabled, you can determine what
types of functions are taking up the majority of the CPU.
To test connectivity, use the following commands from the enable prompt:
❐ ping: Verifies that a particular IP address exists and is responding to requests.
❐ traceroute: Traces the route from the current host to the specified destination
host.
❐ test http get path_to_URL: Makes a request through the same code paths as a
proxied client.
❐ display path_to_URL: Makes a direct request (bypassing the cache).
❐ show services: Verifies the port of the Management Console configuration.
❐ show policy: Verifies if policy is controlling the Management Console.
For information on using these commands, refer to Chapter 2: “Standard and
Privileged Mode Commands” in the Command Line Interface Reference.
Note: If you cannot access the Management Console at all, ensure that you are
using HTTPS (https://Proxy_IP_address:8082). To use HTTP, you must
explicitly enable it before you can access the Management Console.
1468
Section 3 Diagnostic Reporting (Service Information)
The service information options allow you to send service information to Blue
Coat using either the Management Console or the CLI. You can select the
information to send, send the information, view the status of current transactions,
and cancel current transactions. You can also send service information
automatically in case of a crash.
Important: A core image and packet capture can contain sensitive information—
for example, parts of an HTTP request or response. The transfer to Blue Coat is
encrypted, and therefore secure; however, if you do not want potentially sensitive
information to be sent to Blue Coat automatically, do not enable the automatic
service information feature.
3. Enter the service-request number that you received from a Technical Support
representative into the Auto Send Service Request Number field (the service-
request number is in the form xx-xxxxxxx or x-xxxxxxx).
4. Click Apply.
5. (Optional) To clear the service-request number, clear the Auto Send Service
Request Number field and click Apply.
1469
Advanced Secure Gateway Administration Guide
Note: Before you can manage the bandwidth for the automatic service
information feature, you must first create an appropriate bandwidth-
management class.For information about creating and configuring bandwidth
classes, see "Configuring Bandwidth Allocation" on page 613.
Important: You must specify a service-request number before you can send
service information. See Blue Coat Support at:
http://www.bluecoat.com/support for details on opening a service request
ticket.
1470
❐ Access Logs (can specify multiple)
❐ Snapshots (can specify multiple)
❐ Contexts (can specify multiple)
1471
Advanced Secure Gateway Administration Guide
2a
2b
2c
Note: Options for items that you do not have on your system are grayed out
and cannot be selected.
1472
d. To select information to send, highlight the appropriate selection in the
Access Logs/Snapshots/Contexts Not Selected field and click Add to
Selected.
1473
Advanced Secure Gateway Administration Guide
Determining which console URL to poll, the time period between snapshots, and
how many snapshots to keep are all configurable options for each snapshot job.
2b
2a
3. Click Apply.
4. (Optional) To view snapshot job information, click View All Snapshots. Close the
window that opens when you are finished viewing.
1474
4a
4b
4c
4d
4e
1475
Advanced Secure Gateway Administration Guide
If both values are both specified, the maximum of the two values is used. See
"Configuring Packet Capturing" on page 1478.
1476
PCAP File Name Format
The name of a downloaded packet capture file has the format:
bluecoat_date_filter-expression.cap, revealing the date and time (UTC) of the
packet capture and any filter expressions used. Because the filter expression can
contain characters that are not supported by a file system, a translation can occur.
The following characters are not translated:
❐ Alphanumeric characters (a-z, A-Z, 0-9)
❐ Periods (.)
Characters that are translated are:
❐ Space (replaced by an underscore)
❐ All other characters (including the underscore and dash) are replaced by a
dash followed by the ASCII equivalent; for example, a dash is translated to
-2D and an ampersand (&) to -26.
Note: Some qualifiers must be escaped with a backslash because their identifiers
are also keywords within the filter expression parser.
❐ ip proto protocol
1477
Advanced Secure Gateway Administration Guide
1478
2d
2a 2b
2c
3a
3b
3c
3d
1479
Advanced Secure Gateway Administration Guide
1480
4
4. To stop the capture, click the Stop capture button. This button is grayed out if a
packet capture is already stopped.
5. To download the capture, click the Download capture button. This button is
grayed out if no file is available for downloading.
1481
Advanced Secure Gateway Administration Guide
3. Select the desired action: Start packet capture, Stop packet capture, Download packet
capture file.
You can also use the following URLs to configure these individually:
❐ To start packet capturing, use this URL:
https://Proxy_IP_address:8082/PCAP/start
1482
A window opens displaying the statistics on the current packet capture
settings. Close the window when you are finished viewing the statistics.
1483
Advanced Secure Gateway Administration Guide
1484
Section 6 Diagnostics: Blue Coat Customer Experience Program and
Monitoring
Every 24 hours, Advanced Secure Gateway appliance transmits a heartbeat, which
is a periodic message that contains Advanced Secure Gateway statistical data.
Besides informing recipients that the device is alive, heartbeats also indicate the
health of the appliance. Heartbeats do not contain any private information; they
only contain aggregate statistics that are invaluable to preemptively diagnose
support issues. The daily heartbeat is encrypted and transferred to Blue Coat
using HTTPS. You can also have the daily heartbeat messages e-mailed to you by
configuring Event Loggging. The e-mailed content is the same content that is sent to
Blue Coat.
You can manage the customer experience program and monitoring settings
(heartbeats) from the CLI only as described in the following sections:
To disable heartbeats:
#(config) diagnostics
#(config diagnostics) heartbeat disable
To disable monitoring:
When monitoring is enabled (it is enabled by default), Blue Coat receives
encrypted information over HTTPS whenever the appliance is rebooted. Like the
heartbeat, the data sent does not contain any private information; it contains
restart summaries and daily heartbeats. This allows the tracking of Advanced
Secure Gateway unexpected restarts because of system issues, and allows Blue
Coat to address system issues preemptively. To disable monitoring, enter the
following commands:
#(config) diagnostics
#(config diagnostics) monitor disable
1485
Advanced Secure Gateway Administration Guide
Note: CPU monitoring uses about 2-3% CPU when enabled, and so is disabled by
default.
3. To enable CPU monitoring, click the Start the CPU Monitor link; to disable it,
click the Stop the CPU Monitor link.
4. To view CPU monitoring statistics, click the CPU Monitor statistics link. You
can also click this link from either of the windows described in Step 3.
1486
Configure Auto Refresh Interval for Monitoring Statistics
You can configure the interval at which CPU monitoring statistics refresh in the
browser. Enter the CLI command:
#(config diagnostics) cpu-monitor interval seconds
Notes
❐ The total percentages displayed on the CPU Monitor Statistics page do not
always add up because the display only shows those functional groups that
are using 1% or more of the CPU processing cycles.
❐ The #(config) show cpu and SGOS#(config diagnostics) view cpu-monitor
commands might sometimes display CPU statistics that differ by about 2-3%.
This occurs because different measurement techniques are used for the two
displays.
1487
Advanced Secure Gateway Administration Guide
1488
Chapter 75: XML Protocol
The XML realm uses a SOAP 1.2 based protocol for the Blue Coat supported
protocol.
This section includes the following topics:
❐ Section A: "Authenticate Request" on page 1490
❐ Section B: "Authenticate Response" on page 1492
❐ Section C: "Authorize Request" on page 1494
❐ Section D: "Authorize Response" on page 1495
Note: Examples in this chapter refer to an XML schema. Refer to the Release
Notes for the location of this file.
1489
Advanced Secure Gateway Administration Guide
1490
POST Method (User Credentials in Headers)
If the user credentials are in the HTTP headers, the password is not added to the
request.
<?xml version='1.0' encoding="UTF-8" ?>
<env:Envelope
xmlns:env="http://www.w3.org/2003/05/soap-envelope">
<env:Body
env:encodingStyle="http://www.w3.org/2003/05/soap-encoding">
<m:authenticate
xmlns:m="http://www.bluecoat.com/xmlns/xml-realm/1.0">
<m:username>Username</m:username>
<m:challenge-state>challenge state</m:challenge-state>
<m:groups enc:arraySize="*" enc:itemType="xsd:string">
<m:group>group1</m:group>
<m:group>group2</m:group>
</m:groups>
<m:attributes enc:arraySize="*" enc:itemType="xsd:string">
<m:attribute>attribute1</m:attribute>
<m:attribute>attribute2</m:attribute>
</m:attributes>
</m:authenticate>
</env:Body>
</env:Envelope>
1491
Advanced Secure Gateway Administration Guide
Success
All of the response fields except full-username are optional. The intersection of
the groups of interest and the groups that the user is in are returned in the groups
element. The attributes of interest for the user are returned in a flattened two
dimensional array of attribute names and values.
<?xml version='1.0' encoding="UTF-8" ?>
<env:Envelope
xmlns:env="http://www.w3.org/2003/05/soap-envelope">
<env:Body
env:encodingStyle="http://www.w3.org/2003/05/soap-encoding">
<m:authenticate-response
xmlns:m="http://www.bluecoat.com/xmlns/xml-realm/1.0">
<m:full-username>full-username</m:full-username>
<m:groups enc:arraySize="*" enc:itemType="xsd:string">
<m:group>group2</m:group>
</m:groups>
<m:attribute-values enc:arraySize="* 2"
enc:itemType="xsd:string">
<m:item>attribute2</m:item>
<m:item>value2a</m:item>
<m:item>attribute2</m:item>
<m:item>value2b</m:item>
<m:item>attribute2</m:item>
<m:item>value2c</m:item>
</m:attribute-values>
</m:authenticate-response>
</env:Body>
</env:Envelope>
Failed/Denied
The failed response includes a text description of the failure that becomes the text
description of the error reported to the user. The fault-code is one of a set of SGOS
authentication errors that can be returned from the responder. The codes are
returned as strings, but are part of an enumeration declared in the schema for the
protocol. Only codes in this list are acceptable.
account_disabled
account_restricted
credentials_mismatch
general_authentication_error
expired_credentials
account_locked_out
account_must_change_password
offbox_server_down
general_authorization_error
unknown_error
1492
<?xml version='1.0' encoding="UTF-8" ?>
<env:Envelope
xmlns:env="http://www.w3.org/2003/05/soap-envelope">
<env:Body>
<env:Fault>
<env:Code>
<env:Value>env:Sender</env:Value>
</env:Code>
<env:Reason>
<env:Text xml:lang="en-US">Bad username or password</env:Text>
</env:Reason>
<env:Detail>
<e:realm-fault
xmlns:e="http://www.bluecoat.com/xmlns/xml-realm/1.0">
<e:fault-code>general_authentication_error</e:fault-code>
<e:realm-fault>
<env:Detail>
<env:Fault>
</env:Body>
</env:Envelope>
1493
Advanced Secure Gateway Administration Guide
GET Method
http://<server hostname>:<server port>/<authorize service
path>?<username parameter
name>=<username>[&group=<group1>&group=<group2>…&attribute=<attribute1
>&…]
POST Method
<?xml version='1.0' encoding="UTF-8" ?>
<env:Envelope
xmlns:env="http://www.w3.org/2003/05/soap-envelope">
<env:Body
env:encodingStyle="http://www.w3.org/2003/05/soap-encoding"
xmlns:enc="http://www.w3.org/2003/05/soap-encoding">
<m:authorize
xmlns:m="http://www.bluecoat.com/soap/xmlns/xml-realm/1.0">
<m:username>Username</m:username>
<m:groups enc:arraySize="*" enc:itemType="xsd:string">
<m:group>group1</m:group>
<m:group>group2</m:group>
</m:groups>
<m:attributes enc:arraySize="*" enc:itemType="xsd:string">
<m:attribute>attribute1</m:attribute>
<m:attribute>attribute2</m:attribute>
</m:attributes>
</m:authorize>
</env:Body>
</env:Envelope>
1494
Section D: Authorize Response
Success
Only applicable groups and attributes are returned. Multi-valued attributes are
returned by multiple instances of the same attribute name.
<?xml version='1.0' encoding="UTF-8" ?>
<env:Envelope
xmlns:env="http://www.w3.org/2003/05/soap-envelope">
<env:Body
env:encodingStyle="http://www.w3.org/2003/05/soap-encoding"
xmlns:enc="http://www.w3.org/2003/05/soap-encoding">
<m:authorize-response
xmlns:m="http://www.bluecoat.com/xmlns/xml-realm/1.0">
<m:groups enc:arraySize="*" enc:itemType="xsd:string">
<m:group>group2</m:group>
</m:groups>
<m:attribute-values enc:arraySize="* 2"
enc:itemType="xsd:string">
<m:item>attribute2</m:item>
<m:item>value2a</m:item>
<m:item>attribute2</m:item>
<m:item>value2b</m:item>
<m:item>attribute2</m:item>
<m:item>value2c</m:item>
</m:attribute-values>
</m:authorize-response>
</env:Body>
</env:Envelope>
Failed
<?xml version='1.0'encoding="UTF-8" ?>
<env:Envelope
xmlns:env="http://www.w3.org/2003/05/soap-envelope">
<env:Body>
<env:Fault>
<env:Code>
<env:Value>env:Receiver</env:Value>
</env:Code>
<env:Reason>
<env:Text xml:lang="en-US">Could not contact LDAP server</
env:Text>
</env:Reason>
<env:Detail>
<e:realm-fault
xmlns:e="http://www.bluecoat.com/xmlns/xml-realm/1.0">
<e:fault-code>offbox_server_down</e:fault-code>
</e:realm-fault>
</env:Detail>
</env:Fault>
</env:Body>
</env:Envelope>
1495
Advanced Secure Gateway Administration Guide
1496
Third Party Copyright Notices
CERTAIN BLUE COAT PRODUCTS MAY INCLUDE THE FOLLOWING SOFTWARE (OR PART THEREOF):
1. Copyright Notice
Some or all of this work - Copyright (c) 1999 - 2011, Intel Corp.
All rights reserved.
2. License
2.1. This is your license from Intel Corp. under its intellectual property rights. You may have additional license terms
from the party that provided you this software, covering your right to use that party's intellectual property rights.
2.2. Intel grants, free of charge, to any person ("Licensee") obtaining a copy of the source code appearing in this file ("Cov-
ered Code") an irrevocable, perpetual, worldwide license under Intel's copyrights in the base code distributed originally
by Intel ("Original Intel Code") to copy, make derivatives, distribute, use and display any portion of the Covered Code
in any form, with the right to sublicense such rights; and
2.3. Intel grants Licensee a non-exclusive and non-transferable patent license (with the right to sublicense), under only
those claims of Intel patents that are infringed by the Original Intel Code, to make, use, sell, offer to sell, and import the
Covered Code and derivative works thereof solely to the minimum extent necessary to exercise the above copyright li-
cense, and in no event shall the patent license extend to any additions to or modifications of the Original Intel Code. No
other license or right is granted directly or by implication, estoppel or otherwise;
The above copyright and patent license is granted only if the following conditions are met:
3. Conditions
3.1. Redistribution of Source with Rights to Further Distribute Source. Redistribution of source code of any substantial
portion of the Covered Code or modification with rights to further distribute source must include the above Copyright
Notice, the above License, this list of Conditions, and the following Disclaimer and Export Compliance provision. In
addition, Licensee must cause all Covered Code to which Licensee contributes to contain a file documenting the changes
Licensee made to create that Covered Code and the date of any change. Licensee must include in that file the documen-
tation of any changes made by any predecessor Licensee. Licensee must include a prominent statement that the modi-
fication is derived, directly or indirectly, from Original Intel Code.
3.2. Redistribution of Source with no Rights to Further Distribute Source. Redistribution of source code of any substan-
tial portion of the Covered Code or modification without rights to further distribute source must include the following
Disclaimer and Export Compliance provision in the documentation and/or other materials provided with distribution.
In addition, Licensee may not authorize further sublicense of source of any portion of the Covered Code, and must in-
clude terms to the effect that the license from Licensee to its licensee is limited to the intellectual property embodied in
the software Licensee provides to its licensee, and not to intellectual property embodied in modifications its licensee
may make.
3.3. Redistribution of Executable. Redistribution in executable form of any substantial portion of the Covered Code or
modification must reproduce the above Copyright Notice, and the following Disclaimer and Export Compliance provi-
sion in the documentation and/or other materials provided with the distribution.
3.4. Intel retains all right, title, and interest in and to the Original Intel Code.
3.5. Neither the name Intel nor any other trademark owned or controlled by Intel shall be used in advertising or other-
wise to promote the sale, use or other dealings in products derived from or relating to the Covered Code without prior
written authorization from Intel.
4.1. INTEL MAKES NO WARRANTY OF ANY KIND REGARDING ANY SOFTWARE PROVIDED HERE. ANY SOFT-
WARE ORIGINATING FROM INTEL OR DERIVED FROM INTEL SOFTWARE IS PROVIDED "AS IS," AND INTEL
WILL NOT PROVIDE ANY SUPPORT, ASSISTANCE, INSTALLATION, TRAINING OR OTHER SERVICES. INTEL
WILL NOT PROVIDE ANY UPDATES, ENHANCEMENTS OR EXTENSIONS. INTEL SPECIFICALLY DISCLAIMS
ANY IMPLIED WARRANTIES OF MERCHANTABILITY, NONINFRINGEMENT AND FITNESS FOR A PARTICU-
LAR PURPOSE.
4.2. IN NO EVENT SHALL INTEL HAVE ANY LIABILITY TO LICENSEE, ITS LICENSEES OR ANY OTHER THIRD
PARTY, FOR ANY LOST PROFITS, LOST DATA, LOSS OF USE OR COSTS OF PROCUREMENT OF SUBSTITUTE
GOODS OR SERVICES, OR FOR ANY INDIRECT, SPECIAL OR CONSEQUENTIAL DAMAGES ARISING OUT OF
THIS AGREEMENT, UNDER ANY CAUSE OF ACTION OR THEORY OF LIABILITY, AND IRRESPECTIVE OF
WHETHER INTEL HAS ADVANCE NOTICE OF THE POSSIBILITY OF SUCH DAMAGES. THESE LIMITATIONS
SHALL APPLY NOTWITHSTANDING THE FAILURE OF THE ESSENTIAL PURPOSE OF ANY LIMITED REMEDY.
1497
SGOS Administration Guide
4.3. Licensee shall not export, either directly or indirectly, any of this software or system incorporating such software
without first obtaining any required license or other approval from the U.S. Department of Commerce or any other agen-
cy or department of the United States Government. In the event Licensee exports any such software from the United
States or re-exports any such software from a foreign destination, Licensee shall ensure that the distribution and export/
re-export of the software is in compliance with all laws, regulations, orders, or other restrictions of the U.S. Export Ad-
ministration Regulations. Licensee agrees that neither it nor any of its subsidiaries will export/re-export any technical
data, process, software, or service, directly or indirectly, to any country for which the United States government or any
agency thereof requires an export license, other governmental approval, or letter of assurance, without first obtaining
such license, approval or letter.
Copyright (c) 1999 The Apache Software Foundation. All rights reserved.
Redistribution and use in source and binary forms, with or without modification, are permitted provided that the fol-
lowing conditions are met:
1. Redistributions of source code must retain the above copyright notice, this list of conditions and the following dis-
claimer.
2. Redistributions in binary form must reproduce the above copyright notice, this list of conditions and the following
disclaimer in the documentation and/or other materials provided with the distribution.
3. The end-user documentation included with the redistribution, if any, must include the following acknowledgement:
"This product includes software developed by the Apache Software Foundation (http://www.apache.org/)."
Alternately, this acknowledgement may appear in the software itself, if and wherever such third-party acknowledge-
ments normally appear.
4. The names "Xerces" and "Apache Software Foundation" must not be used to endorse or promote products derived
from this software without prior written permission. For written permission, please contact [email protected].
5. Products derived from this software may not be called "Apache", nor may "Apache" appear in their name, without
prior written permission of the Apache Software Foundation.
THIS SOFTWARE IS PROVIDED ``AS IS'' AND ANY EXPRESSED OR IMPLIED WARRANTIES, INCLUDING, BUT
NOT LIMITED TO, THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR
PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE APACHE SOFTWARE FOUNDATION OR ITS CONTRIB-
UTORS BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL
DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS
OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY OF LI-
ABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE)
ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH
DAMAGE.
This software consists of voluntary contributions made by many individuals on behalf of the Apache Software Founda-
tion and was originally based on software copyright (c) 1999, International Business Machines, Inc., http://
www.apache.org. For more information on the Apache Software Foundation, please see <http://www.apache.org/>.
Redistribution and use in source and binary forms, with or without modification, are permitted provided that the fol-
lowing conditions are met:
1. Redistributions of source code must retain the above copyright notice, this list of conditions and the following dis-
claimer.
2. Redistributions in binary form must reproduce the above copyright notice, this list of conditions and the following
disclaimer in the documentation and/or other materials provided with the distribution.
3. The end-user documentation included with the redistribution, if any, must include the following acknowledgement:
"This product includes software developed by the Apache Software Foundation (http://www.apache.org/)."
Alternately, this acknowledgement may appear in the software itself, if and wherever such third-party acknowledge-
ments normally appear.
1498
4. The names "Xerces" and "Apache Software Foundation" must not be used to endorse or promote products derived
from this software without prior written permission. For written permission, please contact [email protected].
5. Products derived from this software may not be called "Apache", nor may "Apache" appear in their name, without
prior written permission of the Apache Software Foundation.
THIS SOFTWARE IS PROVIDED ``AS IS'' AND ANY EXPRESSED OR IMPLIED WARRANTIES, INCLUDING, BUT
NOT LIMITED TO, THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR
PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE APACHE SOFTWARE FOUNDATION OR ITS CONTRIB-
UTORS BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL
DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS
OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY OF LI-
ABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE)
ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH
DAMAGE.
This software consists of voluntary contributions made by many individuals on behalf of the Apache Software Founda-
tion and was originally based on software copyright (c) 1999, International Business Machines, Inc., http://
www.apache.org. For more information on the Apache Software Foundation, please see <http://www.apache.org/>.
Apache License
Version 2.0, January 2004
http://www.apache.org/licenses/
1. Definitions.
"License" shall mean the terms and conditions for use, reproduction, and distribution as defined by Sections 1 through
9 of this document.
"Licensor" shall mean the copyright owner or entity authorized by the copyright owner that is granting the License.
"Legal Entity" shall mean the union of the acting entity and all other entities that control, are controlled by, or are
under common control with that entity. For the purposes of this definition, "control" means (i) the power, direct or in-
direct, to cause the direction or management of such entity, whether by contract or otherwise, or (ii) ownership of fifty
percent (50%) or more of the outstanding shares, or (iii) beneficial ownership of such entity.
"You" (or "Your") shall mean an individual or Legal Entity exercising permissions granted by this License.
"Source" form shall mean the preferred form for making modifications, including but not limited to software source
code, documentation source, and configuration files.
"Object" form shall mean any form resulting from mechanical transformation or translation of a Source form, includ-
ing but not limited to compiled object code, generated documentation, and conversions to other media types.
"Work" shall mean the work of authorship, whether in Source or Object form, made available under the License, as
indicated by a copyright notice that is included in or attached to the work (an example is provided in the Appendix be-
low).
"Derivative Works" shall mean any work, whether in Source or Object form, that is based on (or derived from) the
Work and for which the editorial revisions, annotations, elaborations, or other modifications represent, as a whole, an
original work of authorship. For the purposes of this License, Derivative Works shall not include works that remain sep-
arable from, or merely link (or bind by name) to the interfaces of, the Work and Derivative Works thereof.
"Contribution" shall mean any work of authorship, including the original version of the Work and any modifications
or additions to that Work or Derivative Works thereof, that is intentionally submitted to Licensor for inclusion in the
Work by the copyright owner or by an individual or Legal Entity authorized to submit on behalf of the copyright owner.
For the purposes of this definition, "submitted" means any form of electronic, verbal, or written communication sent to
the Licensor or its representatives, including but not limited to communication on electronic mailing lists, source code
control systems, and issue tracking systems that are managed by, or on behalf of, the Licensor for the purpose of dis-
cussing and improving the Work, but excluding communication that is conspicuously marked or otherwise designated
in writing by the copyright owner as "Not a Contribution."
"Contributor" shall mean Licensor and any individual or Legal Entity on behalf of whom a Contribution has been
received by Licensor and subsequently incorporated within the Work.
2. Grant of Copyright License. Subject to the terms and conditions of this License, each Contributor hereby grants to You
a perpetual, worldwide, non-exclusive, no-charge, royalty-free, irrevocable copyright license to reproduce, prepare De-
1499
SGOS Administration Guide
rivative Works of, publicly display, publicly perform, sublicense, and distribute the Work and such Derivative Works
in Source or Object form.
3. Grant of Patent License. Subject to the terms and conditions of this License, each Contributor hereby grants to You a
perpetual, worldwide, non-exclusive, no-charge, royalty-free, irrevocable (except as stated in this section) patent license
to make, have made, use, offer to sell, sell, import, and otherwise transfer the Work, where such license applies only to
those patent claims licensable by such Contributor that are necessarily infringed by their Contribution(s) alone or by
combination of their Contribution(s) with the Work to which such Contribution(s) was submitted. If You institute patent
litigation against any entity (including a cross-claim or counterclaim in a lawsuit) alleging that the Work or a Contribu-
tion incorporated within the Work constitutes direct or contributory patent infringement, then any patent licenses grant-
ed to You under this License for that Work shall terminate as of the date such litigation is filed.
4. Redistribution. You may reproduce and distribute copies of the Work or Derivative Works thereof in any medium,
with or without modifications, and in Source or Object form, provided that You meet the following conditions:
(a) You must give any other recipients of the Work or Derivative Works a copy of this License; and
(b) You must cause any modified files to carry prominent notices stating that You changed the files; and
(c) You must retain, in the Source form of any Derivative Works that You distribute, all copyright, patent, trademark,
and attribution notices from the Source form of the Work, excluding those notices that do not pertain to any part of the
Derivative Works; and
(d) If the Work includes a "NOTICE" text file as part of its distribution, then any Derivative Works that You distribute
must include a readable copy of the attribution notices contained within such NOTICE file, excluding those notices that
do not pertain to any part of the Derivative Works, in at least one of the following places: within a NOTICE text file dis-
tributed as part of the Derivative Works; within the Source form or documentation, if provided along with the Deriva-
tive Works; or, within a display generated by the Derivative Works, if and wherever such third-party notices normally
appear. The contents of the NOTICE file are for informational purposes only and do not modify the License. You may
add Your own attribution notices within Derivative Works that You distribute, alongside or as an addendum to the NO-
TICE text from the Work, provided that such additional attribution notices cannot be construed as modifying the Li-
cense.
You may add Your own copyright statement to Your modifications and may provide additional or different license
terms and conditions for use, reproduction, or distribution of Your modifications, or for any such Derivative Works as
a whole, provided Your use, reproduction, and distribution of the Work otherwise complies with the conditions stated
in this License.
5. Submission of Contributions. Unless You explicitly state otherwise, any Contribution intentionally submitted for
inclusion in the Work by You to the Licensor shall be under the terms and conditions of this License, without any addi-
tional terms or conditions. Notwithstanding the above, nothing herein shall supersede or modify the terms of any sep-
arate license agreement you may have executed with Licensor regarding such Contributions.
6. Trademarks. This License does not grant permission to use the trade names, trademarks, service marks, or product
names of the Licensor, except as required for reasonable and customary use in describing the origin of the Work and
reproducing the content of the NOTICE file.
7. Disclaimer of Warranty. Unless required by applicable law or agreed to in writing, Licensor provides the Work (and
each Contributor provides its Contributions) on an "AS IS" BASIS, WITHOUT WARRANTIES OR CONDITIONS OF
ANY KIND, either express or implied, including, without limitation, any warranties or conditions of TITLE, NON-IN-
FRINGEMENT, MERCHANTABILITY, or FITNESS FOR A PARTICULAR PURPOSE. You are solely responsible for de-
termining the appropriateness of using or redistributing the Work and assume any risks associated with Your exercise
of permissions under this License.
8. Limitation of Liability. In no event and under no legal theory, whether in tort (including negligence), contract, or
otherwise, unless required by applicable law (such as deliberate and grossly
negligent acts) or agreed to in writing, shall any Contributor be liable to You for damages, including any direct, indirect,
special, incidental, or consequential damages of any character arising as a result of this License or out of the use or in-
ability to use the Work (including but not limited to damages for loss of goodwill, work stoppage, computer failure or
malfunction, or any and all other commercial damages or losses), even if such Contributor has been advised of the pos-
sibility of such damages.
9. Accepting Warranty or Additional Liability. While redistributing the Work or Derivative Works thereof, You may
choose to offer, and charge a fee for, acceptance of support, warranty, indemnity, or other liability obligations and/or
rights consistent with this License. However, in accepting such obligations, You may act only on Your own behalf and
on Your sole responsibility, not on behalf of any other Contributor, and only if You agree to indemnify, defend, and hold
each Contributor harmless for any liability incurred by, or claims asserted against, such Contributor by reason of your
accepting any such warranty or additional liability.
To apply the Apache License to your work, attach the following boilerplate notice, with the fields enclosed by brackets
"[]" replaced with your own identifying information. (Don't include the brackets!) The text should be enclosed in the
appropriate comment syntax for the file format. We also recommend that a file or class name and description of purpose
be included on the same "printed page" as the copyright notice for easier identification within third-party archives.
1500
Copyright [yyyy] [name of copyright owner]
Licensed under the Apache License, Version 2.0 (the "License"); you may not use this file except in compliance with
the License. You may obtain a copy of the License at
http://www.apache.org/licenses/LICENSE-2.0
Unless required by applicable law or agreed to in writing, software distributed under the License is distributed on an
"AS IS" BASIS, WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. See the License
for the specific language governing permissions and limitations under the License.
Redistribution and use in source and binary forms, with or without modification, are permitted provided that the fol-
lowing conditions are met:
- Redistributions of source code must retain the above copyright notice, this list of conditions and the following disclaim-
er.
- Redistribution in binary form must reproduce the above copyright notice, this list of conditions and the following dis-
claimer in the documentation and/or other materials provided with the distribution.
Neither the name of Sun Microsystems, Inc. or the names of contributors may be used to endorse or promote products
derived from this software without specific prior written permission.
This software is provided "AS IS," without a warranty of any kind. ALL EXPRESS OR IMPLIED CONDITIONS, REP-
RESENTATIONS AND WARRANTIES, INCLUDING ANY IMPLIED WARRANTY OF MERCHANTABILITY, FIT-
NESS FOR A PARTICULAR PURPOSE OR NON-INFRINGEMENT, ARE HEREBY EXCLUDED. SUN AND ITS
LICENSORS SHALL NOT BE LIABLE FOR ANY DAMAGES OR LIABILITIES SUFFERED BY LICENSEE AS A RE-
SULT OF OR RELATING TO USE, MODIFICATION OR DISTRIBUTION OF THIS SOFTWARE OR ITS DERIVATIVES.
IN NO EVENT WILL SUN OR ITS LICENSORS BE LIABLE FOR ANY LOST REVENUE, PROFIT OR DATA, OR FOR
DIRECT, INDIRECT, SPECIAL, CONSEQUENTIAL, INCIDENTAL OR PUNITIVE DAMAGES, HOWEVER CAUSED
AND REGARDLESS OF THE THEORY OF LIABILITY, ARISING OUT OF THE USE OF OR INABILITY TO USE THIS
SOFTWARE, EVEN IF SUN HAS BEEN ADVISED OF THE POSSIBILITY OF SUCH DAMAGES.
You acknowledge that this software is not designed, licensed or intended for use in the design, construction, operation
or maintenance of any nuclear facility.
Cyrus SASL
http://asg.web.cmu.edu/sasl/index.html
Redistribution and use in source and binary forms, with or without modification, are permitted provided that the fol-
lowing conditions are met:
1. Redistributions of source code must retain the above copyright notice, this list of conditions and the following dis-
claimer.
2. Redistributions in binary form must reproduce the above copyright notice, this list of conditions and the following
disclaimer in the documentation and/or other materials provided with the distribution.
3. The name "Carnegie Mellon University" must not be used to endorse or promote products derived from this software
without prior written permission. For permission or any other legal details, please contact
Office of Technology Transfer
Carnegie Mellon University
5000 Forbes Avenue
Pittsburgh, PA 15213-3890
(412) 268-4387, fax: (412) 268-7395
[email protected]
CARNEGIE MELLON UNIVERSITY DISCLAIMS ALL WARRANTIES WITH REGARD TO THIS SOFTWARE, IN-
CLUDING ALL IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS, IN NO EVENT SHALL CARNE-
1501
SGOS Administration Guide
GIE MELLON UNIVERSITY BE LIABLE FOR ANY SPECIAL, INDIRECT OR CONSEQUENTIAL DAMAGES OR ANY
DAMAGES WHATSOEVER RESULTING FROM LOSS OF USE, DATA OR PROFITS, WHETHER IN AN ACTION OF
CONTRACT, NEGLIGENCE OR OTHER TORTIOUS ACTION, ARISING OUT OF OR IN CONNECTION WITH THE
USE OR PERFORMANCE OF THIS SOFTWARE.
Copyright (C) 1991-2, RSA Data Security, Inc. Created 1991. All rights reserved.
License to copy and use this software is granted provided that it is identified as the "RSA Data Security, Inc. MD5 Mes-
sage-Digest Algorithm" in all material mentioning or referencing this software or this function.
License is also granted to make and use derivative works provided that such works are identified as "derived from the
RSA Data Security, Inc. MD5 Message-Digest Algorithm" in all material mentioning or referencing the derived work.
RSA Data Security, Inc. makes no representations concerning either the merchantability of this software or the suitability
of this software for any particular purpose. It is provided "as is" without express or implied warranty of any kind.
These notices must be retained in any copies of any part of this documentation and/or software.
Redistribution and use in source and binary forms, with or without modification, are permitted provided that the fol-
lowing conditions
are met:
1. Redistributions of source code must retain the above copyright notice, this list of conditions and the following dis-
claimer.
2. Redistributions in binary form must reproduce the above copyright notice, this list of conditions and the following
disclaimer in the documentation and/or other materials provided with the distribution.
3. All advertising materials mentioning features or use of this software must display the following acknowledgement:
This product includes software developed by the University of California, Berkeley and its contributors.
4. Neither the name of the University nor the names of its contributors may be used to endorse or promote products
derived from this software without specific prior written permission.
THIS SOFTWARE IS PROVIDED BY THE REGENTS AND CONTRIBUTORS ``AS IS'' AND ANY EXPRESS OR IM-
PLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES OF MERCHANTABILI-
TY AND FITNESS FOR A PARTICULAR PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE REGENTS OR
CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSE-
QUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SER-
VICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY
THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE
OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POS-
SIBILITY OF SUCH DAMAGE.
Redistribution and use in source and binary forms, with or without modification, are permitted provided that the fol-
lowing conditions are met:
1. Redistributions of source code must retain the above copyright notice, this list of conditions and the following dis-
claimer.
2. Redistributions in binary form must reproduce the above copyright notice, this list of conditions and the following
disclaimer in the documentation and/or other materials provided with the distribution.
3. All advertising materials mentioning features or use of this software must display the following acknowledgement:
This product includes software developed by Kungliga Tekniska Högskolan and its contributors.
4. Neither the name of the Institute nor the names of its contributors may be used to endorse or promote products de-
rived from this software without specific prior written permission.
THIS SOFTWARE IS PROVIDED BY THE INSTITUTE AND CONTRIBUTORS ``AS IS'' AND ANY EXPRESS OR IM-
PLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES OF MERCHANTABILI-
1502
TY AND FITNESS FOR A PARTICULAR PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE INSTITUTE OR
CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSE-
QUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SER-
VICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY
THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE
OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POS-
SIBILITY OF SUCH DAMAGE.
Redistribution and use in source and binary forms, with or without modification, are permitted provided that the fol-
lowing conditions are met:
- Redistributions of source code must retain the above copyright notice, this list of conditions and the following disclaim-
er.
- Redistributions in binary form must reproduce the above copyright notice, this list of conditions and the following dis-
claimer in the documentation and/or other materials provided with the distribution.
- Neither the name of the Intel Corporation nor the names of its contributors may be used to endorse or promote prod-
ucts derived from this software without specific prior written permission.
THIS SOFTWARE IS PROVIDED BY THE COPYRIGHT HOLDERS AND CONTRIBUTORS "AS IS" AND ANY EX-
PRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES OF MER-
CHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE
COPYRIGHT OWNER OR CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL,
EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUB-
STITUTE GOODS OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER
CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT (IN-
CLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN
IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.
This code is derived from software contributed to The NetBSD Foundation by:
Redistribution and use in source and binary forms, with or without modification, are permitted provided that the fol-
lowing conditions are met:
- Redistributions of source code must retain the above copyright notice, this list of conditions and the following disclaim-
er.
- Redistributions in binary form must reproduce the above copyright notice, this list of conditions and the following dis-
claimer in the documentation and/or other materials provided with the distribution.
THIS SOFTWARE IS PROVIDED BY THE NETBSD FOUNDATION, INC. AND CONTRIBUTORS "AS IS" AND ANY
EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES OF
MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL
THE FOUNDATION OR CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EX-
EMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTI-
TUTE GOODS OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER
CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT (IN-
CLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN
IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE
Eclipse License:
THE ACCOMPANYING PROGRAM IS PROVIDED UNDER THE TERMS OF THIS ECLIPSE PUBLIC LICENSE
("AGREEMENT"). ANY USE, REPRODUCTION OR DISTRIBUTION OF THE PROGRAM CONSTITUTES RECIPI-
1503
SGOS Administration Guide
1. DEFINITIONS
“Contribution” means:
a) in the case of the initial Contributor, the initial code and documentation distributed under this Agreement, and b) in
the case of each subsequent Contributor:
i) changes to the Program, and ii) additions to the Program; where such changes and/or additions to the Program orig-
inate from and are distributed by that particular Contributor.
A Contribution 'originates' from a Contributor if it was added to the Program by such Contributor itself or anyone acting
on such Contributor's behalf. Contributions do not include additions to the Program which: (i) are separate modules of
software distributed in conjunction with the Program under their own license agreement, and (ii) are not derivative
works of the Program.
"Contributor" means any person or entity that distributes the Program.
"Licensed Patents " mean patent claims licensable by a Contributor which are necessarily infringed by the use or sale of
its Contribution alone or when combined with the Program.
"Program" means the Contributions distributed in accordance with this Agreement.
"Recipient" means anyone who receives the Program under this Agreement, including all Contributors.
2. GRANT OF RIGHTS
a) Subject to the terms of this Agreement, each Contributor hereby grants Recipient a non-exclusive, worldwide, royalty-
free copyright license to reproduce, prepare derivative works of, publicly display, publicly perform, distribute and sub-
license the Contribution of such Contributor, if any, and such derivative works, in source code and object code form.
b) Subject to the terms of this Agreement, each Contributor hereby grants Recipient a non-exclusive, worldwide, royalty-
free patent license under Licensed Patents to make, use, sell, offer to sell, import and otherwise transfer the Contribution
of such Contributor, if any, in source code and object code form. This patent license shall apply to the combination of
the Contribution and the Program if, at the time the Contribution is added by the Contributor, such addition of the Con-
tribution causes such combination to be covered by the Licensed Patents. The patent license shall not apply to any other
combinations which include the Contribution. No hardware per se is licensed hereunder.
c) Recipient understands that although each Contributor grants the licenses to its Contributions set forth herein, no as-
surances are provided by any Contributor that the Program does not infringe the patent or other intellectual property
rights of any other entity. Each Contributor disclaims any liability to Recipient for claims brought by any other entity
based on infringement of intellectual property rights or otherwise. As a condition to exercising the rights and licenses
granted hereunder, each Recipient hereby assumes sole responsibility to secure any other intellectual property rights
needed, if any. For example, if a third party patent license is required to allow Recipient to distribute the Program, it is
Recipient's responsibility to acquire that license before distributing the Program.
d) Each Contributor represents that to its knowledge it has sufficient copyright rights in its Contribution, if any, to grant
the copyright license set forth in this Agreement.
3. REQUIREMENTS
A Contributor may choose to distribute the Program in object code form under its own license agreement, provided that:
a) it complies with the terms and conditions of this Agreement; and b) its license agreement: i) effectively disclaims on
behalf of all Contributors all warranties and conditions, express and implied, including warranties or conditions of title
and non-infringement, and implied warranties or conditions of merchantability and fitness for a particular purpose; ii)
effectively excludes on behalf of all Contributors all liability for damages, including direct, indirect, special, incidental
and consequential damages, such as lost profits; iii) states that any provisions which differ from this Agreement are of-
fered by that Contributor alone and not by any other party; and iv) states that source code for the Program is available
from such Contributor, and informs licensees how to obtain it in a reasonable manner on or through a medium custom-
arily used for software exchange.
When the Program is made available in source code form:
a) it must be made available under this Agreement; and b) a copy of this Agreement must be included with each copy
of the Program.
Contributors may not remove or alter any copyright notices contained within the Program.
Each Contributor must identify itself as the originator of its Contribution, if any, in a manner that reasonably allows sub-
sequent Recipients to identify the originator of the Contribution.
4. COMMERCIAL DISTRIBUTION
Commercial distributors of software may accept certain responsibilities with respect to end users, business partners and
the like. While this license is intended to facilitate the commercial use of the Program, the Contributor who includes the
Program in a commercial product offering should do so in a manner which does not create potential liability for other
Contributors. Therefore, if a Contributor includes the Program in a commercial product offering, such Contributor
("Commercial Contributor") hereby agrees to defend and indemnify every other Contributor ("Indemnified Contribu-
tor") against any losses, damages and costs (collectively "Losses") arising from claims, lawsuits and other legal actions
brought by a third party against the Indemnified Contributor to the extent caused by the acts or omissions of such Com-
mercial Contributor in connection with its distribution of the Program in a commercial product offering. The obligations
in this section do not apply to any claims or Losses relating to any actual or alleged intellectual property infringement.
In order to qualify, an Indemnified Contributor must: a) promptly notify the Commercial Contributor in writing of such
claim, and b) allow the Commercial Contributor to control, and cooperate with the Commercial Contributor in, the de-
fense and any related settlement negotiations. The Indemnified Contributor may participate in any such claim at its own
expense.
For example, a Contributor might include the Program in a commercial product offering, Product X. That Contributor
is then a Commercial Contributor. If that Commercial Contributor then makes performance claims, or offers warranties
related to Product X, those performance claims and warranties are such Commercial Contributor's responsibility alone.
Under this section, the Commercial Contributor would have to defend claims against the other Contributors related to
those performance claims and warranties, and if a court requires any other Contributor to pay any damages as a result,
the Commercial Contributor must pay those damages.
5. NO WARRANTY
1504
EXCEPT AS EXPRESSLY SET FORTH IN THIS AGREEMENT, THE PROGRAM IS PROVIDED ON AN "AS IS" BASIS,
WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, EITHER EXPRESS OR IMPLIED INCLUDING, WITH-
OUT LIMITATION, ANY WARRANTIES OR CONDITIONS OF TITLE, NON-INFRINGEMENT, MERCHANTABILI-
TY OR FITNESS FOR A PARTICULAR PURPOSE. Each Recipient is solely responsible for determining the
appropriateness of using and distributing the Program and assumes all risks associated with its exercise of rights under
this Agreement , including but not limited to the risks and costs of program errors, compliance with applicable laws,
damage to or loss of data, programs or equipment, and unavailability or interruption of operations.
6. DISCLAIMER OF LIABILITY
EXCEPT AS EXPRESSLY SET FORTH IN THIS AGREEMENT, NEITHER RECIPIENT NOR ANY CONTRIBUTORS
SHALL HAVE ANY LIABILITY FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSE-
QUENTIAL DAMAGES (INCLUDING WITHOUT LIMITATION LOST PROFITS), HOWEVER CAUSED AND ON
ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING NEGLI-
GENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OR DISTRIBUTION OF THE PROGRAM OR
THE EXERCISE OF ANY RIGHTS GRANTED HEREUNDER, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH
DAMAGES.
7. GENERAL
If any provision of this Agreement is invalid or unenforceable under applicable law, it shall not affect the validity or
enforceability of the remainder of the terms of this Agreement, and without further action by the parties hereto, such
provision shall be reformed to the minimum extent necessary to make such provision valid and enforceable.
If Recipient institutes patent litigation against any entity (including a cross-claim or counterclaim in a lawsuit) alleging
that the Program itself (excluding combinations of the Program with other software or hardware) infringes such Recip-
ient's patent(s), then such Recipient's rights granted under Section 2(b) shall terminate as of the date such litigation is
filed.
All Recipient's rights under this Agreement shall terminate if it fails to comply with any of the material terms or condi-
tions of this Agreement and does not cure such failure in a reasonable period of time after becoming aware of such non-
compliance. If all Recipient's rights under this Agreement terminate, Recipient agrees to cease use and distribution of
the Program as soon as reasonably practicable. However, Recipient's obligations under this Agreement and any licenses
granted by Recipient relating to the Program shall continue and survive.
Everyone is permitted to copy and distribute copies of this Agreement, but in order to avoid inconsistency the Agree-
ment is copyrighted and may only be modified in the following manner. The Agreement Steward reserves the right to
publish new versions (including revisions) of this Agreement from time to time. No one other than the Agreement Stew-
ard has the right to modify this Agreement. The Eclipse Foundation is the initial Agreement Steward. The Eclipse Foun-
dation may assign the responsibility to serve as the Agreement Steward to a suitable separate entity. Each new version
of the Agreement will be given a distinguishing version number. The Program (including Contributions) may always
be distributed subject to the version of the Agreement under which it was received. In addition, after a new version of
the Agreement is published, Contributor may elect to distribute the Program (including its Contributions) under the
new version. Except as expressly stated in Sections 2(a) and 2(b) above, Recipient receives no rights or licenses to the
intellectual property of any Contributor under this Agreement, whether expressly, by implication, estoppel or other-
wise. All rights in the Program not expressly granted under this Agreement are reserved.
This Agreement is governed by the laws of the State of New York and the intellectual property laws of the United States
of America. No party to this Agreement will bring a legal action under this Agreement more than one year after the
cause of action arose. Each party waives its rights to a jury trial in any resulting litigation.
Redistribution and use in source and binary forms, with or without modification, are permitted provided that the fol-
lowing conditions are met:
- Redistributions of source code must retain the above copyright notice, this list of conditions and the following disclaim-
er.
- Redistributions in binary form must reproduce the above copyright notice, this list of conditions and the following dis-
claimer in the documentation and/or other materials provided with the distribution.
- Neither the name of Intel nor the names of its contributors may be used to endorse or promote products derived from
this software without specific prior written permission.
THIS SOFTWARE IS PROVIDED BY THE COPYRIGHT HOLDERS AND CONTRIBUTORS "AS IS" AND ANY EX-
PRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES OF MER-
CHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE
COPYRIGHT OWNER OR CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL,
EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUB-
STITUTE GOODS OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER
CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT (IN-
CLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN
IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.
Additional terms: In addition to the forgoing, redistribution and use of the code is conditioned upon the FAT 32 File
System Driver and all derivative works thereof being used for and designed only to read and/or write to a file system
that is directly managed by an Extensible Firmware Interface (EFI) implementation or by an emulator of an EFI imple-
mentation.
1505
SGOS Administration Guide
Redistribution and use in source and binary forms, with or without modification, are permitted provided that the fol-
lowing conditions are met:
1. Redistributions of source code must retain the above copyright notice, this list of conditions and the following dis-
claimer.
2. Redistributions in binary form must reproduce the above copyright notice, this list of conditions and the following
disclaimer in the documentation and/or other materials provided with the distribution.
3. All advertising materials mentioning features or use of this software must display the following acknowledgement:
4. The name of Brini may not be used to endorse or promote products derived from this software without specific prior
written permission.
THIS SOFTWARE IS PROVIDED BY BRINI ``AS IS'' AND ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING,
BUT NOT LIMITED TO, THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICU-
LAR PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL BRINI BE LIABLE FOR ANY DIRECT, INDIRECT, INCI-
DENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO,
PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTER-
RUPTION) HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT LIA-
BILITY, OR TORT (INCLUDING NEGLIGENCE OR
OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POS-
SIBILITY OF SUCH DAMAGE.
Redistribution and use in source and binary forms, with or without modification, are permitted provided that the fol-
lowing conditions are met:
1. Redistributions of source code must retain the above copyright notice, this list of conditions and the following dis-
claimer.
2. Redistributions in binary form must reproduce the above copyright notice, this list of conditions and the following
disclaimer in the documentation and/or other materials provided with the distribution.
3. Neither the name of the project nor the names of its contributors may be used to endorse or promote products derived
from this software without specific prior written permission.
THIS SOFTWARE IS PROVIDED BY THE PROJECT AND CONTRIBUTORS ``AS IS'' AND ANY EXPRESS OR IM-
PLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES OF MERCHANTABILI-
TY AND FITNESS FOR A PARTICULAR PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE PROJECT OR
CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSE-
QUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SER-
VICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY
THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE
OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POS-
SIBILITY OF SUCH DAMAGE.
This library is free for commercial and non-commercial use as long as the following conditions are adhered to. The
following conditions
apply to all code found in this distribution, be it the RC4, RSA, lhash, DES, etc., code; not just the SSL code. The SSL
documentation
included with this distribution is covered by the same copyright terms except that the holder is Tim Hudson (tjh@crypt-
soft.com).
Copyright remains Eric Young's, and as such any Copyright notices in the code are not to be removed.
If this package is used in a product, Eric Young should be given attribution as the author of the parts of the library used.
This can be in the form of a textual message at program startup or in documentation (online or textual) provided with
the package.
Redistribution and use in source and binary forms, with or without modification, are permitted provided that the fol-
1506
lowing conditions are met:
1. Redistributions of source code must retain the copyright notice, this list of conditions and the following disclaimer.
2. Redistributions in binary form must reproduce the above copyright notice, this list of conditions and the following
disclaimer in the documentation and/or other materials provided with the distribution.
3. All advertising materials mentioning features or use of this software must display the following acknowledgement:
4. If you include any Windows specific code (or a derivative thereof) from the apps directory (application code) you
must include an acknowledgement:
"This product includes software written by Tim Hudson ([email protected])"
THIS SOFTWARE IS PROVIDED BY ERIC YOUNG ``AS IS'' AND ANY EXPRESS OR IMPLIED WARRANTIES, IN-
CLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A
PARTICULAR PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE AUTHOR OR CONTRIBUTORS BE LIA-
BLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (IN-
CLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, DATA,
OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY,
WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING
IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAM-
AGE.
The licence and distribution terms for any publicly available version or derivative of this code cannot be changed. i.e.
this code cannot simply be
copied and put under another distribution licence.
Permission to use, copy, modify, and distribute this software and its documentation for any purpose and without fee is
hereby granted, provided that the above copyright notice appear in all copies and that both that the copyright notice
and this permission notice and warranty disclaimer appear in supporting documentation, and that the name of Lucent
or any of its entities not be used in advertising or publicity pertaining to distribution of the software without specific,
written prior permission.
LUCENT DISCLAIMS ALL WARRANTIES WITH REGARD TO THIS SOFTWARE,INCLUDING ALL IMPLIED WAR-
RANTIES OF MERCHANTABILITY AND FITNESS.IN NO EVENT SHALL LUCENT OR ANY OF ITS ENTITIES BE
LIABLE FOR ANY SPECIAL, INDIRECT OR CONSEQUENTIAL DAMAGES OR ANY DAMAGES WHATSOEVER
RESULTING FROM LOSS OF USE, DATA OR PROFITS, WHETHER IN AN ACTION OF CONTRACT, NEGLIGENCE
OR OTHER TORTIOUS ACTION, ARISING OUT OF OR IN CONNECTION WITH THE USE OR PERFORMANCE OF
THIS SOFTWARE.
Permission to use, copy, modify, and distribute this software and its documentation for any purpose and without fee is
hereby granted, provided that the above copyright notice appear in all copies and that both that the copyright notice
and this permission notice and warranty disclaimer appear in supporting documentation, and that the name of Lucent
or any of its entities not be used in advertising or publicity pertaining to distribution of the software without specific,
written prior permission.
LUCENT DISCLAIMS ALL WARRANTIES WITH REGARD TO THIS SOFTWARE, INCLUDING ALL IMPLIED WAR-
RANTIES OF MERCHANTABILITY AND FITNESS. IN NO EVENT SHALL LUCENT OR ANY OF ITS ENTITIES BE
LIABLE FOR ANY SPECIAL, INDIRECT OR CONSEQUENTIAL DAMAGES OR ANY DAMAGES WHATSOEVER
RESULTING FROM LOSS OF USE, DATA OR PROFITS, WHETHER IN AN ACTION OF CONTRACT, NEGLIGENCE
OR OTHER TORTIOUS ACTION, ARISING OUT OF OR IN CONNECTION WITH THE USE OR PERFORMANCE OF
THIS SOFTWARE.
Permission to use, copy, modify, and distribute this software and its documentation for any purpose and without fee
is hereby granted, provided that the above copyright notice appear in all copies and that both that the copyright notice
and this permission notice and warranty disclaimer appear in supporting documentation, and that the name of Lucent
or any of its entities not be used in advertising or publicity pertaining to distribution of the software without specific,
written prior permission.
LUCENT DISCLAIMS ALL WARRANTIES WITH REGARD TO THIS SOFTWARE, INCLUDING ALL IMPLIED WAR-
RANTIES OF MERCHANTABILITY AND FITNESS. IN NO EVENT SHALL LUCENT OR ANY OF ITS ENTITIES BE
1507
SGOS Administration Guide
LIABLE FOR ANY SPECIAL, INDIRECT OR CONSEQUENTIAL DAMAGES OR ANY DAMAGES WHATSOEVER
RESULTING FROM LOSS OF USE, DATA OR PROFITS, WHETHER IN AN ACTION OF CONTRACT, NEGLIGENCE
OR OTHER TORTIOUS ACTION, ARISING OUT OF OR IN CONNECTION WITH THE USE OR PERFORMANCE OF
THIS SOFTWARE.
Permission to use, copy, modify, and distribute this software and its documentation for any purpose and without fee is
hereby granted, provided that the above copyright notice appear in all copies and that both that the copyright notice
and this permission notice and warranty disclaimer appear in supporting documentation, and that the name of Lucent
or any of its entities not be used in advertising or publicity pertaining to distribution of the software without specific,
written prior permission.
LUCENT DISCLAIMS ALL WARRANTIES WITH REGARD TO THIS SOFTWARE, INCLUDING ALL IMPLIED WAR-
RANTIES OF MERCHANTABILITY AND FITNESS.IN NO EVENT SHALL LUCENT OR ANY OF ITS ENTITIES BE
LIABLE FOR ANY SPECIAL, INDIRECT OR CONSEQUENTIAL DAMAGES OR ANY DAMAGES WHATSOEVER
RESULTING FROM LOSS OF USE, DATA OR PROFITS, WHETHER IN AN ACTION OF CONTRACT, NEGLIGENCE
OR OTHER TORTIOUS ACTION, ARISING OUT OF OR IN CONNECTION WITH THE USE OR PERFORMANCE OF
THIS SOFTWARE.
Permission to use, copy, modify, and distribute this software and its documentation for any purpose and without fee is
hereby granted, provided that the above copyright notice appear in all copies and that both that the copyright notice
and this permission notice and warranty disclaimer appear in supporting documentation, and that the name of Lucent
or any of its entities not be used in advertising or publicity pertaining to distribution of the software without specific,
written prior permission.
LUCENT DISCLAIMS ALL WARRANTIES WITH REGARD TO THIS SOFTWARE, INCLUDING ALL IMPLIED WAR-
RANTIES OF MERCHANTABILITY AND FITNESS. IN NO EVENT SHALL LUCENT OR ANY OF ITS ENTITIES BE
LIABLE FOR ANY SPECIAL, INDIRECT OR CONSEQUENTIAL DAMAGES OR ANY DAMAGES WHATSOEVER
RESULTING FROM LOSS OF USE, DATA OR PROFITS, WHETHER IN AN ACTION OF CONTRACT, NEGLIGENCE
OR OTHER TORTIOUS ACTION, ARISING OUT OF OR IN CONNECTION WITH THE USE OR PERFORMANCE OF
THIS SOFTWARE.
Permission to use, copy, modify, and distribute this software and its documentation for any purpose and without fee is
hereby
granted, provided that the above copyright notice appear in all copies and that both that the copyright notice and this
permission notice and warranty disclaimer appear in supporting documentation, and that the name of Lucent or any of
its entities not be used in advertising or publicity pertaining to
distribution of the software without specific, written prior permission.
LUCENT DISCLAIMS ALL WARRANTIES WITH REGARD TO THIS SOFTWARE, INCLUDING ALL IMPLIED WAR-
RANTIES OF MERCHANTABILITY AND FITNESS. IN NO EVENT SHALL LUCENT OR ANY OF ITS ENTITIES BE
LIABLE FOR ANY SPECIAL, INDIRECT OR CONSEQUENTIAL DAMAGES OR ANY DAMAGES WHATSOEVER
RESULTING FROM LOSS OF USE, DATA OR PROFITS, WHETHER IN AN ACTION OF CONTRACT, NEGLIGENCE
OR OTHER TORTIOUS ACTION, ARISING OUT OF OR IN CONNECTION WITH THE USE OR PERFORMANCE OF
THIS SOFTWARE.
This program and the accompanying materials are licensed and made available under the terms and conditions of the
BSD License which accompanies this distribution. The full text of the license may be found at http://opensource.org/
licenses/bsd-license.php.
THE PROGRAM IS DISTRIBUTED UNDER THE BSD LICENSE ON AN "AS IS" BASIS, WITHOUT WARRANTIES
OR REPRESENTATIONS OF ANY KIND, EITHER EXPRESS OR IMPLIED.
Redistribution and use in source and binary forms, with or without modification, are permitted provided that the fol-
lowing conditions are met:
1. Redistributions of source code must retain the above copyright notice, this list of conditions and the following dis-
claimer.
2. Redistributions in binary form must reproduce the above copyright notice, this list of conditions and the following
1508
disclaimer in the documentation and/or other materials provided with the distribution.
3. Neither the name of the University nor the names of its contributors may be used to endorse or promote products
derived from this software without specific prior written permission.
THIS SOFTWARE IS PROVIDED BY THE REGENTS AND CONTRIBUTORS ``AS IS'' AND ANY EXPRESS OR IM-
PLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES OF MERCHANTABILI-
TY AND FITNESS FOR A PARTICULAR PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE REGENTS OR
CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSE-
QUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SER-
VICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY
THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE
OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POS-
SIBILITY OF SUCH DAMAGE.
Redistribution and use in source and binary forms, with or without modification, are permitted provided that the fol-
lowing conditions are met:
1. Redistributions of source code must retain the above copyright notice, this list of conditions and the following dis-
claimer.
2. Redistributions in binary form must reproduce the above copyright notice, this list of conditions and the following
disclaimer in the documentation and/or other materials provided with the distribution.
3. All advertising materials mentioning features or use of this software must display the following acknowledgement:
This product includes software developed by the University of California, Berkeley and its contributors.
4. Neither the name of the University nor the names of its contributors may be used to endorse or promote products
derived from this software without specific prior written permission.
THIS SOFTWARE IS PROVIDED BY THE REGENTS AND CONTRIBUTORS ``AS IS'' AND ANY EXPRESS OR IM-
PLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES OF MERCHANTABILI-
TY AND FITNESS FOR A PARTICULAR PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE REGENTS OR
CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSE-
QUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SER-
VICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY
THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE
OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POS-
SIBILITY OF SUCH DAMAGE.
Redistribution and use in source and binary forms, with or without modification, are permitted provided that the fol-
lowing conditions are met:
1. Redistributions of source code must retain the above copyright notice, this list of conditions and the following dis-
claimer.
2. Redistributions in binary form must reproduce the above copyright notice, this list of conditions and the following
disclaimer in the documentation and/or other materials provided with the distribution.
3. Neither the name of the University nor the names of its contributors may be used to endorse or promote products
derived from this software without specific prior written permission.
THIS SOFTWARE IS PROVIDED BY THE REGENTS AND CONTRIBUTORS ``AS IS'' AND ANY EXPRESS OR IM-
PLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES OF MERCHANTABILI-
TY AND FITNESS FOR A PARTICULAR PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE REGENTS OR
CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSE-
QUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SER-
VICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY
THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT
LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF
THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.
1509
SGOS Administration Guide
Redistribution and use in source and binary forms, with or without modification, are permitted provided that the fol-
lowing conditions are met:
1. Redistributions of source code must retain the above copyright notice, this list of conditions and the following dis-
claimer.
2. Redistributions in binary form must reproduce the above copyright notice, this list of conditions and the following
disclaimer in the documentation and/or other materials provided with the distribution.
3. Neither the name of the University nor the names of its contributors may be used to endorse or promote products
derived from this software without specific prior written permission.
THIS SOFTWARE IS PROVIDED BY THE REGENTS AND CONTRIBUTORS ``AS IS'' AND ANY EXPRESS OR IM-
PLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES OF MERCHANTABILI-
TY AND FITNESS FOR A PARTICULAR PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE REGENTS OR
CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSE-
QUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SER-
VICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY
THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT
LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE
OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.
Redistribution and use in source and binary forms, with or without modification, are permitted provided that the fol-
lowing conditions are met:
1. Redistributions of source code must retain the above copyright notice, this list of conditions and the following dis-
claimer.
2. Redistributions in binary form must reproduce the above copyright notice, this list of conditions and the following
disclaimer in the documentation and/or other materials provided with the distribution.
3. Neither the name of the University nor the names of its contributors may be used to endorse or promote products
derived from this software without specific prior written permission.
THIS SOFTWARE IS PROVIDED BY THE REGENTS AND CONTRIBUTORS ``AS IS'' AND ANY EXPRESS OR IM-
PLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES OF MERCHANTABILI-
TY AND FITNESS FOR A PARTICULAR PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE REGENTS OR
CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSE-
QUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SER-
VICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY
THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE
OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POS-
SIBILITY OF SUCH DAMAGE.
Redistribution and use in source and binary forms, with or without modification, are permitted provided that the fol-
lowing conditions are met:
1. Redistributions of source code must retain the above copyright notice, this list of conditions and the following dis-
claimer.
2. Redistributions in binary form must reproduce the above copyright notice, this list of conditions and the following
disclaimer in the documentation and/or other materials provided with the distribution.
1510
3. All advertising materials mentioning features or use of this software must display the following acknowledgement:
This product includes software developed by the University of California, Berkeley, Intel Corporation, and its contrib-
utors.
4. Neither the name of University, Intel Corporation, or their respective contributors may be used to endorse or promote
products derived from this software without specific prior written permission.
THIS SOFTWARE IS PROVIDED BY THE REGENTS, INTEL CORPORATION AND CONTRIBUTORS ``AS IS'' AND
ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES
OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE ARE DISCLAIMED. IN NO EVENT
SHALL THE REGENTS, INTEL CORPORATION OR CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT, IN-
CIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO,
PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTER-
RUPTION) HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT LIA-
BILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF
THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.
Redistribution and use in source and binary forms, with or without modification, are permitted provided that the fol-
lowing conditions are met:
1. Redistributions of source code must retain the above copyright notice, this list of conditions and the following dis-
claimer.
2. Redistributions in binary form must reproduce the above copyright notice, this list of conditions and the following
disclaimer in the documentation and/or other materials provided with the distribution.
3. Neither the name of the University nor the names of its contributors may be used to endorse or promote products
derived from this software without specific prior written permission.
THIS SOFTWARE IS PROVIDED BY THE REGENTS AND CONTRIBUTORS ``AS IS'' AND ANY EXPRESS OR IM-
PLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES OF MERCHANTABILI-
TY AND FITNESS FOR A PARTICULAR PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE REGENTS OR
CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSE-
QUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SER-
VICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY
THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE
OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POS-
SIBILITY OF SUCH DAMAGE.
Redistribution and use in source and binary forms, with or without modification, are permitted provided that the fol-
lowing conditions are met:
1. Redistributions of source code must retain the above copyright notice, this list of conditions and the following dis-
claimer.
2. Redistributions in binary form must reproduce the above copyright notice, this list of conditions and the following
disclaimer in the documentation and/or other materials provided with the distribution.
3. All advertising materials mentioning features or use of this software must display the following acknowledgement
This product includes software developed by the University of California, Berkeley and its contributors.
4. Neither the name of the University nor the names of its contributors may be used to endorse or promote products
derived from this software without specific prior written permission.
THIS SOFTWARE IS PROVIDED BY THE REGENTS AND CONTRIBUTORS ``AS IS'' AND ANY EXPRESS OR IM-
PLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES OF MERCHANTABILI-
TY AND FITNESS FOR A PARTICULAR PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE REGENTS OR
CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSE-
QUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SER-
VICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY
THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE
OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POS-
1511
SGOS Administration Guide
Redistribution and use in source and binary forms, with or without modification, are permitted provided that the fol-
lowing conditions are met:
1. Redistributions of source code must retain the above copyright notice, this list of conditions and the following dis-
claimer.
2. Redistributions in binary form must reproduce the above copyright notice, this list of conditions and the following
disclaimer in the documentation and/or other materials provided with the distribution.
3. Neither the name of the University nor the names of its contributors may be used to endorse or promote products
derived from this software without specific prior written permission.
THIS SOFTWARE IS PROVIDED BY THE REGENTS AND CONTRIBUTORS ``AS IS'' AND ANY EXPRESS OR IM-
PLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES OF MERCHANTABILI-
TY AND FITNESS FOR A PARTICULAR PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE REGENTS OR
CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSE-
QUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SER-
VICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY
THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT
LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF
THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.
Redistribution and use in source and binary forms, with or without modification, are permitted provided that the fol-
lowing conditions are met:
1. Redistributions of source code must retain the above copyright notice, this list of conditions and the following dis-
claimer.
2. Redistributions in binary form must reproduce the above copyright notice, this list of conditions and the following
disclaimer in the documentation and/or other materials provided with the distribution.
3. Neither the name of the University nor the names of its contributors may be used to endorse or promote products
derived from this software without specific prior written permission.
THIS SOFTWARE IS PROVIDED BY THE REGENTS AND CONTRIBUTORS ``AS IS'' AND ANY EXPRESS OR IM-
PLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES OF MERCHANTABILI-
TY AND FITNESS FOR A PARTICULAR PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE REGENTS OR
CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSE-
QUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SER-
VICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY
THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT
LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE
OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.
Redistribution and use in source and binary forms, with or without modification, are permitted provided that the fol-
lowing conditions are met:
1. Redistributions of source code must retain the above copyright notice, this list of conditions and the following dis-
claimer.
2. Redistributions in binary form must reproduce the above copyright notice, this list of conditions and the following
disclaimer in the documentation and/or other materials provided with the distribution.
1512
3. All advertising materials mentioning features or use of this software must display the following acknowledgement:
This product includes software developed by the University of California, Berkeley, Intel Corporation, and its con-
tributors.
4. Neither the name of University, Intel Corporation, or their respective contributors may be used to endorse or promote
products derived from this software without specific prior written permission.
THIS SOFTWARE IS PROVIDED BY THE REGENTS, INTEL CORPORATION AND CONTRIBUTORS ``AS IS'' AND
ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES
OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE ARE DISCLAIMED. IN NO EVENT
SHALL THE REGENTS, INTEL CORPORATION OR CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT, IN-
CIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO,
PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTER-
RUPTION) HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT LIA-
BILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF
THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.
Redistribution and use in source and binary forms, with or without modification, are permitted provided that the fol-
lowing conditions are met:
1. Redistributions of source code must retain the above copyright notice, this list of conditions and the following dis-
claimer.
2. Redistributions in binary form must reproduce the above copyright notice, this list of conditions and the following
disclaimer in the documentation and/or other materials provided with the distribution.
3. Neither the name of the University nor the names of its contributors may be used to endorse or promote products
derived from this software without specific prior written permission.
THIS SOFTWARE IS PROVIDED BY THE REGENTS AND CONTRIBUTORS ``AS IS'' AND ANY EXPRESS OR IM-
PLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES OF MERCHANTABILI-
TY AND FITNESS FOR A PARTICULAR PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE REGENTS OR
CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSE-
QUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SER-
VICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY
THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE
OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POS-
SIBILITY OF SUCH DAMAGE.
Redistribution and use in source and binary forms, with or without modification, are permitted provided that the fol-
lowing conditions are met:
1. Redistributions of source code must retain the above copyright notice, this list of conditions and the following dis-
claimer.
2. Redistributions in binary form must reproduce the above copyright notice, this list of conditions and the following
disclaimer in the documentation and/or other materials provided with the distribution.
3. Neither the name of the University nor the names of its contributors may be used to endorse or promote products
derived from this software without specific prior written permission.
THIS SOFTWARE IS PROVIDED BY THE REGENTS AND CONTRIBUTORS ``AS IS'' AND ANY EXPRESS OR IM-
PLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES OF MERCHANTABILI-
TY AND FITNESS FOR A PARTICULAR PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE REGENTS OR
CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSE-
QUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SER-
VICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY
THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE
OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POS-
SIBILITY OF SUCH DAMAGE.
Redistribution and use in source and binary forms, with or without modification, are permitted provided that the fol-
1513
SGOS Administration Guide
lowing conditions
are met:
1. Redistributions of source code must retain the above copyright notice, this list of conditions and the following dis-
claimer.
2. Redistributions in binary form must reproduce the above copyright notice, this list of conditions and the following
disclaimer in the documentation and/or other materials provided with the distribution.
3. Neither the name of the University nor the names of its contributors may be used to endorse or promote products
derived from this software without specific prior written permission.
THIS SOFTWARE IS PROVIDED BY THE REGENTS AND CONTRIBUTORS ``AS IS'' AND ANY EXPRESS OR IM-
PLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES OF MERCHANTABILI-
TY AND FITNESS FOR A PARTICULAR PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE REGENTS OR
CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSE-
QUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SER-
VICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY
THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT
LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF
THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.
Redistribution and use in source and binary forms, with or without modification, are permitted provided that the fol-
lowing conditions are met:
1. Redistributions of source code must retain the above copyright notice, this list of conditions and the following dis-
claimer.
2. Redistributions in binary form must reproduce the above copyright notice, this list of conditions and the following
disclaimer in the documentation and/or other materials provided with the distribution.
3. All advertising materials mentioning features or use of this software must display the following acknowledgement:
This product includes software developed by the University of California, Berkeley, Intel Corporation, and its con-
tributors.
4. Neither the name of University, Intel Corporation, or their respective contributors may be used to endorse or promote
products derived from this software without specific prior written permission.
THIS SOFTWARE IS PROVIDED BY THE REGENTS, INTEL CORPORATION AND CONTRIBUTORS ``AS IS'' AND
ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES
OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE ARE DISCLAIMED. IN NO EVENT
SHALL THE REGENTS, INTEL CORPORATION OR CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT, IN-
CIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO,
PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTER-
RUPTION) HOWEVER CAUSED AND ON ANY
THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE
OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POS-
SIBILITY OF SUCH DAMAGE.
Redistribution and use in source and binary forms, with or without modification, are permitted provided that the fol-
lowing conditions are met:
1. Redistributions of source code must retain the above copyright notice, this list of conditions and the following dis-
claimer.
2. Redistributions in binary form must reproduce the above copyright notice, this list of conditions and the following
disclaimer in the documentation and/or other materials provided with the distribution.
3. All advertising materials mentioning features or use of this software must display the following acknowledgement:
This product includes software developed by the University of California, Berkeley and its contributors.
1514
4. Neither the name of the University nor the names of its contributors may be used to endorse or promote products
derived from this software without specific prior written permission.
THIS SOFTWARE IS PROVIDED BY THE REGENTS AND CONTRIBUTORS ``AS IS'' AND ANYEXPRESS OR IM-
PLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES OF MERCHANTABILI-
TY AND FITNESS FOR A PARTICULAR PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE REGENTS OR
CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSE-
QUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SER-
VICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY
THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT
LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE
OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.
Redistribution and use in source and binary forms, with or without modification, are permitted provided that the fol-
lowing conditions are met:
1. Redistributions of source code must retain the above copyright notice, this list of conditions and the following dis-
claimer.
2. Redistributions in binary form must reproduce the above copyright notice, this list of conditions and the following
disclaimer in the documentation and/or other materials provided with the distribution.
3. Neither the name of the University nor the names of its contributors may be used to endorse or promote products
derived from this software without specific prior written permission.
THIS SOFTWARE IS PROVIDED BY THE REGENTS AND CONTRIBUTORS ``AS IS'' AND ANY EXPRESS OR IM-
PLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES OF MERCHANTABILI-
TY AND FITNESS FOR A PARTICULAR PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE REGENTS OR
CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSE-
QUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SER-
VICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY
THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE
OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POS-
SIBILITY OF SUCH DAMAGE.
Redistribution and use in source and binary forms, with or without modification, are permitted provided that the fol-
lowing conditions are met:
1. Redistributions of source code must retain the above copyright notice, this list of conditions and the following dis-
claimer.
2. Redistributions in binary form must reproduce the above copyright notice, this list of conditions and the following
disclaimer in the documentation and/or other materials provided with the distribution.
3. All advertising materials mentioning features or use of this software must display the following acknowledgement:
This product includes software developed by the University of California, Berkeley and its contributors.
4. Neither the name of the University nor the names of its contributors may be used to endorse or promote products
derived from this software
without specific prior written permission.
THIS SOFTWARE IS PROVIDED BY THE REGENTS AND CONTRIBUTORS ``AS IS'' AND ANY EXPRESS OR IM-
PLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES OF MERCHANTABILI-
TY AND FITNESS FOR A PARTICULAR PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE REGENTS OR
CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSE-
QUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SER-
VICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY
THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE
OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POS-
SIBILITY OF SUCH DAMAGE.
Redistribution and use in source and binary forms, with or without modification, are permitted provided that the fol-
lowing conditions are met:
1515
SGOS Administration Guide
1. Redistributions of source code must retain the above copyright notice, this list of conditions and the following dis-
claimer.
2. Redistributions in binary form must reproduce the above copyright notice, this list of conditions and the following
disclaimer in the documentation and/or other materials provided with the distribution.
3. All advertising materials mentioning features or use of this software must display the following acknowledgement:
This product includes software developed by the University of California, Berkeley and its contributors.
4. Neither the name of the University nor the names of its contributors may be used to endorse or promote products
derived from this software without specific prior written permission.
THIS SOFTWARE IS PROVIDED BY THE REGENTS AND CONTRIBUTORS ``AS IS'' AND ANY EXPRESS OR IM-
PLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES OF MERCHANTABILI-
TY AND FITNESS FOR A PARTICULAR PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE REGENTS OR
CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSE-
QUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SER-
VICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY
THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE
OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POS-
SIBILITY OF SUCH DAMAGE.
Redistribution and use in source and binary forms, with or without modification, are permitted provided that the fol-
lowing conditions are met:
1. Redistributions of source code must retain the above copyright notice, this list of conditions and the following dis-
claimer.
2. Redistributions in binary form must reproduce the above copyright notice, this list of conditions and the following
disclaimer in the documentation and/or other materials provided with the distribution.
3. Neither the name of the University nor the names of its contributors may be used to endorse or promote products
derived from this software without specific prior written permission.
THIS SOFTWARE IS PROVIDED BY THE REGENTS AND CONTRIBUTORS ``AS IS'' AND ANY EXPRESS OR IM-
PLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES OF MERCHANTABILI-
TY AND FITNESS FOR A PARTICULAR PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE REGENTS OR
CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSE-
QUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SER-
VICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY
THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT
LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF
THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.
Redistribution and use in source and binary forms, with or without modification, are permitted provided that the fol-
lowing conditions are met:
1. Redistributions of source code must retain the above copyright notice, this list of conditions and the following dis-
claimer.
2. Redistributions in binary form must reproduce the above copyright notice, this list of conditions and the following
disclaimer in the documentation and/or other materials provided with the distribution.
3. All advertising materials mentioning features or use of this software must display the following acknowledgement:
This product includes software developed by the University of California, Berkeley and its contributors.
4. Neither the name of the University nor the names of its contributors may be used to endorse or promote products
derived from this software without specific prior written permission.
THIS SOFTWARE IS PROVIDED BY THE REGENTS AND CONTRIBUTORS ``AS IS'' AND ANY EXPRESS OR IM-
PLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES OF MERCHANTABILI-
TY AND FITNESS FOR A PARTICULAR PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE REGENTS OR
CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSE-
QUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SER-
VICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY
THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT
1516
LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF
THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.
Redistribution and use in source and binary forms, with or without modification, are permitted provided that the fol-
lowing conditions are met:
1. Redistributions of source code must retain the above copyright notice, this list of conditions and the following dis-
claimer.
2. Redistributions in binary form must reproduce the above copyright notice, this list of conditions and the following
disclaimer in the documentation and/or other materials provided with the distribution.
3. Neither the name of the University nor the names of its contributors may be used to endorse or promote products
derived from this software without specific prior written permission.
THIS SOFTWARE IS PROVIDED BY THE REGENTS AND CONTRIBUTORS ``AS IS'' AND ANY EXPRESS OR IM-
PLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES OF MERCHANTABILI-
TY AND FITNESS FOR A PARTICULAR PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE REGENTS OR
CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSE-
QUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS
OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND
ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING NEGLI-
GENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF
THE POSSIBILITY OF SUCH DAMAGE.
Redistribution and use in source and binary forms, with or without modification, are permitted provided that the fol-
lowing conditions are met:
1. Redistributions of source code must retain the above copyright notice, this list of conditions and the following dis-
claimer.
2. Redistributions in binary form must reproduce the above copyright notice, this list of conditions and the following
disclaimer in the documentation and/or other materials provided with the distribution.
3. All advertising materials mentioning features or use of this software must display the following acknowledgement:
This product includes software developed by the University of California, Berkeley and its contributors.
4. Neither the name of the University nor the names of its contributors may be used to endorse or promote products
derived from this software without specific prior written permission.
THIS SOFTWARE IS PROVIDED BY THE REGENTS AND CONTRIBUTORS ``AS IS'' AND ANY EXPRESS OR IM-
PLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES OF MERCHANTABILI-
TY AND FITNESS FOR A PARTICULAR PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE REGENTS OR
CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSE-
QUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SER-
VICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY
THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE
OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POS-
SIBILITY OF SUCH DAMAGE.
Redistribution and use in source and binary forms, with or without modification, are permitted provided that the fol-
lowing conditions are met:
1. Redistributions of source code must retain the above copyright notice, this list of conditions and the following dis-
claimer.
2. Redistributions in binary form must reproduce the above copyright notice, this list of conditions and the following
disclaimer in the documentation and/or other materials provided with the distribution.
1517
SGOS Administration Guide
3. All advertising materials mentioning features or use of this software must display the following acknowledgement:
This product includes software developed by the University of California, Berkeley and its contributors.
4. Neither the name of the University nor the names of its contributors may be used to endorse or promote products
derived from this software without specific prior written permission.
THIS SOFTWARE IS PROVIDED BY THE REGENTS AND CONTRIBUTORS ``AS IS'' AND ANY EXPRESS OR IM-
PLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES OF MERCHANTABILI-
TY AND FITNESS FOR A PARTICULAR PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE REGENTS OR
CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSE-
QUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SER-
VICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY
THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE
OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POS-
SIBILITY OF SUCH DAMAGE.
Redistribution and use in source and binary forms, with or without modification, are permitted provided that the fol-
lowing conditions are met:
1. Redistributions of source code must retain the above copyright notice, this list of conditions and the following dis-
claimer.
2. Redistributions in binary form must reproduce the above copyright notice, this list of conditions and the following
disclaimer in the documentation and/or other materials provided with the distribution.
3. Neither the name of the University nor the names of its contributors may be used to endorse or promote products
derived from this software without specific prior written permission.
THIS SOFTWARE IS PROVIDED BY THE REGENTS AND CONTRIBUTORS ``AS IS'' AND ANY EXPRESS OR IM-
PLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES OF MERCHANTABILI-
TY AND FITNESS FOR A PARTICULAR PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE REGENTS OR
CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSE-
QUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SER-
VICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY
THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE
OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POS-
SIBILITY OF SUCH DAMAGE.
Redistribution and use in source and binary forms, with or without modification, are permitted provided that the fol-
lowing conditions are met:
1. Redistributions of source code must retain the above copyright notice, this list of conditions and the following dis-
claimer.
2. Redistributions in binary form must reproduce the above copyright notice, this list of conditions and the following
disclaimer in the documentation and/or other materials provided with the distribution.
3. All advertising materials mentioning features or use of this software must display the following acknowledgement:
This product includes software developed by the University of California, Berkeley and its contributors.
4. Neither the name of the University nor the names of its contributors may be used to endorse or promote products
derived from this software without specific prior written permission.
THIS SOFTWARE IS PROVIDED BY THE REGENTS AND CONTRIBUTORS ``AS IS'' AND ANY EXPRESS OR IM-
PLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES OF MERCHANTABILI-
TY AND FITNESS FOR A PARTICULAR PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE REGENTS OR
CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSE-
QUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SER-
VICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY
THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT
LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF
THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.
1518
Portions copyright (c) 1999, 2000
Intel Corporation.
All rights reserved.
Redistribution and use in source and binary forms, with or without modification, are permitted provided that the fol-
lowing conditions are met:
1. Redistributions of source code must retain the above copyright notice, this list of conditions and the following dis-
claimer.
2. Redistributions in binary form must reproduce the above copyright notice, this list of conditions and the following
disclaimer in the documentation and/or other materials provided with the distribution.
3. All advertising materials mentioning features or use of this software must display the following acknowledgement:
This product includes software developed by the University of California, Berkeley, Intel Corporation, and its con-
tributors.
4. Neither the name of University, Intel Corporation, or their respective contributors may be used to endorse or promote
products derived from this software without specific prior written permission.
THIS SOFTWARE IS PROVIDED BY THE REGENTS, INTEL CORPORATION AND CONTRIBUTORS ``AS IS'' AND
ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES
OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE ARE DISCLAIMED. IN NO EVENT
SHALL THE REGENTS, INTEL CORPORATION OR CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT, IN-
CIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO,
PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTER-
RUPTION) HOWEVER CAUSED AND ON ANY
THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE
OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POS-
SIBILITY OF SUCH DAMAGE.
Redistribution and use in source and binary forms, with or without modification, are permitted provided that the fol-
lowing conditions are met:
1. Redistributions of source code must retain the above copyright notice, this list of conditions and the following dis-
claimer.
2. Redistributions in binary form must reproduce the above copyright notice, this list of conditions and the following
disclaimer in the documentation and/or other materials provided with the distribution.
3. All advertising materials mentioning features or use of this software must display the following acknowledgement:
This product includes software developed by the University of California, Berkeley and its contributors.
4. Neither the name of the University nor the names of its contributors may be used to endorse or promote products
derived from this software without specific prior written permission.
THIS SOFTWARE IS PROVIDED BY THE REGENTS AND CONTRIBUTORS ``AS IS'' AND ANY EXPRESS OR IM-
PLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES OF MERCHANTABILI-
TY AND FITNESS FOR A PARTICULAR PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE REGENTS OR
CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSE-
QUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SER-
VICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY
THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE
OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POS-
SIBILITY OF SUCH DAMAGE.
Redistribution and use in source and binary forms, with or without modification, are permitted provided that the fol-
lowing conditions are met:
1. Redistributions of source code must retain the above copyright notice, this list of conditions and the following dis-
claimer.
1519
SGOS Administration Guide
2. Redistributions in binary form must reproduce the above copyright notice, this list of conditions and the following
disclaimer in the documentation and/or other materials provided with the distribution.
3. All advertising materials mentioning features or use of this software must display the following acknowledgement:
This product includes software developed by the University of California, Berkeley, Intel Corporation, and its con-
tributors.
4. Neither the name of University, Intel Corporation, or their respective contributors may be used to endorse or promote
products derived from
this software without specific prior written permission.
THIS SOFTWARE IS PROVIDED BY THE REGENTS, INTEL CORPORATION AND CONTRIBUTORS ``AS IS'' AND
ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES
OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE ARE DISCLAIMED. IN NO EVENT
SHALL THE REGENTS, INTEL CORPORATION OR CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT, IN-
CIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO,
PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTER-
RUPTION) HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT LIA-
BILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF
THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.
Redistribution and use in source and binary forms, with or without modification, are permitted provided that the fol-
lowing conditions are met:
1. Redistributions of source code must retain the above copyright notice, this list of conditions and the following dis-
claimer.
2. Redistributions in binary form must reproduce the above copyright notice, this list of conditions and the following
disclaimer in the documentation and/or other materials provided with the distribution.
3. All advertising materials mentioning features or use of this software must display the following acknowledgement:
This product includes software developed by the University of California, Berkeley, Intel Corporation, and its con-
tributors.
4. Neither the name of University, Intel Corporation, or their respective contributors may be used to endorse or promote
products derived from this software without specific prior written permission.
THIS SOFTWARE IS PROVIDED BY THE REGENTS, INTEL CORPORATION AND CONTRIBUTORS ``AS IS'' AND
ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES
OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE ARE DISCLAIMED. IN NO EVENT
SHALL THE REGENTS, INTEL CORPORATION OR CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT, IN-
CIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO,
PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTER-
RUPTION) HOWEVER CAUSED AND ON ANY
THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE
OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POS-
SIBILITY OF SUCH DAMAGE.
HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR
TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF THIS SOFT-
WARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.
Redistribution and use in source and binary forms, with or without modification, are permitted provided that the fol-
lowing conditions are met:
1. Redistributions of source code must retain the above copyright notice, this list of conditions and the following dis-
claimer.
1520
2. Redistributions in binary form must reproduce the above copyright notice, this list of conditions and the following
disclaimer in the documentation and/or other materials provided with the distribution.
3. All advertising materials mentioning features or use of this software must display the following acknowledgement:
This product includes software developed by the University of California, Berkeley, Intel Corporation, and its con-
tributors.
4. Neither the name of University, Intel Corporation, or their respective contributors may be used to endorse or promote
products derived from this software without specific prior written permission.
THIS SOFTWARE IS PROVIDED BY THE REGENTS, INTEL CORPORATION AND CONTRIBUTORS ``AS IS'' AND
ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES
OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE ARE DISCLAIMED. IN NO EVENT
SHALL THE REGENTS, INTEL CORPORATION OR CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT, IN-
CIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO,
PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTER-
RUPTION) HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT LIA-
BILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF
THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.
Redistribution and use in source and binary forms, with or without modification, are permitted provided that the fol-
lowing conditions are met:
1. Redistributions of source code must retain the above copyright notice, this list of conditions and the following dis-
claimer.
2. Redistributions in binary form must reproduce the above copyright notice, this list of conditions and the following
disclaimer in the documentation and/or other materials provided with the distribution.
3. All advertising materials mentioning features or use of this software must display the following acknowledgement:
This product includes software developed by the University of California, Berkeley, Intel Corporation, and its con-
tributors.
4. Neither the name of University, Intel Corporation, or their respective contributors may be used to endorse or promote
products derived from this software without specific prior written permission.
THIS SOFTWARE IS PROVIDED BY THE REGENTS, INTEL CORPORATION AND CONTRIBUTORS ``AS IS'' AND
ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES
OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE ARE DISCLAIMED. IN NO EVENT
SHALL THE REGENTS, INTEL CORPORATION OR CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT, IN-
CIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO,
PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTER-
RUPTION) HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT LIA-
BILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF
THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.
Redistribution and use in source and binary forms, with or without modification, are permitted provided that the fol-
lowing conditions are met:
1. Redistributions of source code must retain the above copyright notice, this list of conditions and the following dis-
claimer.
2. Redistributions in binary form must reproduce the above copyright notice, this list of conditions and the following
disclaimer in the documentation and/or other materials provided with the distribution.
1521
SGOS Administration Guide
3. All advertising materials mentioning features or use of this software must display the following acknowledgement:
This product includes software developed by the University of California, Berkeley, Intel Corporation, and its con-
tributors.
4. Neither the name of University, Intel Corporation, or their respective contributors may be used to endorse or promote
products derived from
this software without specific prior written permission.
THIS SOFTWARE IS PROVIDED BY THE REGENTS, INTEL CORPORATION AND CONTRIBUTORS ``AS IS'' AND
ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES
OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE ARE DISCLAIMED. IN NO EVENT
SHALL THE REGENTS, INTEL CORPORATION OR CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT, IN-
CIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO,
PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTER-
RUPTION) HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT LIA-
BILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF
THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.
Redistribution and use in source and binary forms, with or without modification, are permitted provided that the fol-
lowing conditions are met:
1. Redistributions of source code must retain the above copyright notice, this list of conditions and the following dis-
claimer.
2. Redistributions in binary form must reproduce the above copyright notice, this list of conditions and the following
disclaimer in the documentation and/or other materials provided with the distribution.
3. All advertising materials mentioning features or use of this software must display the following acknowledgement:
This product includes software developed by the University of California, Berkeley and its contributors.
4. Neither the name of the University nor the names of its contributors may be used to endorse or promote products
derived from this software without specific prior written permission.
THIS SOFTWARE IS PROVIDED BY THE REGENTS AND CONTRIBUTORS ``AS IS'' AND ANY EXPRESS OR IM-
PLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES OF MERCHANTABILI-
TY AND FITNESS FOR A PARTICULAR PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE REGENTS OR
CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSE-
QUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SER-
VICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY
THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE
OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POS-
SIBILITY OF SUCH DAMAGE.
Redistribution and use in source and binary forms, with or without modification, are permitted provided that the fol-
lowing conditions are met:
1. Redistributions of source code must retain the above copyright notice, this list of conditions and the following dis-
claimer.
2. Redistributions in binary form must reproduce the above copyright notice, this list of conditions and the following
disclaimer in the documentation and/or other materials provided with the distribution.
3. All advertising materials mentioning features or use of this software must display the following acknowledgement:
This product includes software developed by the University of California, Berkeley and its contributors.
4. Neither the name of the University nor the names of its contributors may be used to endorse or promote products
derived from this software
without specific prior written permission.
THIS SOFTWARE IS PROVIDED BY THE REGENTS AND CONTRIBUTORS ``AS IS'' AND ANY EXPRESS OR IM-
PLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES OF MERCHANTABILI-
TY AND FITNESS FOR A PARTICULAR PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE REGENTS OR
CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSE-
QUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SER-
VICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY
THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE
OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POS-
SIBILITY OF SUCH DAMAGE.
1522
Copyright (c) 1987, 1993
The Regents of the University of California.
All rights reserved.
Redistribution and use in source and binary forms, with or without modification, are permitted provided that the fol-
lowing conditions are met:
1. Redistributions of source code must retain the above copyright notice, this list of conditions and the following dis-
claimer.
2. Redistributions in binary form must reproduce the above copyright notice, this list of conditions and the following
disclaimer in the documentation and/or other materials provided with the distribution.
3. All advertising materials mentioning features or use of this software must display the following acknowledgement:
This product includes software developed by the University of California, Berkeley, Intel Corporation, and its contrib-
utors.
4. Neither the name of University, Intel Corporation, or their respective contributors may be used to endorse or promote
products derived from this software without specific prior written permission.
THIS SOFTWARE IS PROVIDED BY THE REGENTS, INTEL CORPORATION AND CONTRIBUTORS ``AS IS'' AND
ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES
OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE ARE DISCLAIMED. IN NO EVENT
SHALL THE REGENTS, INTEL CORPORATION OR CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT, IN-
CIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO,
PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTER-
RUPTION) HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT LIA-
BILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF
THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.
Redistribution and use in source and binary forms, with or without modification, are permitted provided that the fol-
lowing conditions are met:
1. Redistributions of source code must retain the above copyright notice, this list of conditions and the following dis-
claimer.
2. Redistributions in binary form must reproduce the above copyright notice, this list of conditions and the following
disclaimer in the documentation and/or other materials provided with the distribution.
3. All advertising materials mentioning features or use of this software must display the following acknowledgement:
This product includes software developed by the University of California, Berkeley and its contributors.
4. Neither the name of the University nor the names of its contributors may be used to endorse or promote products
derived from this software without specific prior written permission.
THIS SOFTWARE IS PROVIDED BY THE REGENTS AND CONTRIBUTORS ``AS IS'' AND ANY EXPRESS OR IM-
PLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES OF MERCHANTABILI-
TY AND FITNESS FOR A PARTICULAR PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE REGENTS OR
CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSE-
QUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SER-
VICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY
THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICTLIABILITY, OR TORT (INCLUDING NEGLIGENCE OR
OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSI-
BILITY OF SUCH DAMAGE.
Redistribution and use in source and binary forms, with or without modification, are permitted provided that the fol-
lowing conditions are met:
1. Redistributions of source code must retain the above copyright notice, this list of conditions and the following dis-
claimer.
1523
SGOS Administration Guide
2. Redistributions in binary form must reproduce the above copyright notice, this list of conditions and the following
disclaimer in the documentation and/or other materials provided with the distribution.
3. Neither the name of the University nor the names of its contributors may be used to endorse or promote products
derived from this software without specific prior written permission.
THIS SOFTWARE IS PROVIDED BY THE REGENTS AND CONTRIBUTORS ``AS IS'' AND ANY EXPRESS OR IM-
PLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES OF MERCHANTABILI-
TY AND FITNESS FOR A PARTICULAR PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE REGENTS OR
CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSE-
QUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SER-
VICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY
THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE
OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POS-
SIBILITY OF SUCH DAMAGE.
Redistribution and use in source and binary forms, with or without modification, are permitted provided that the fol-
lowing conditions are met:
1. Redistributions of source code must retain the above copyright notice, this list of conditions and the following dis-
claimer.
2. Redistributions in binary form must reproduce the above copyright notice, this list of conditions and the following
disclaimer in the documentation and/or other materials provided with the distribution.
3. Neither the name of the University nor the names of its contributors may be used to endorse or promote products
derived from this software without specific prior written permission.
THIS SOFTWARE IS PROVIDED BY THE REGENTS AND CONTRIBUTORS ``AS IS'' AND ANY EXPRESS OR IM-
PLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES OF MERCHANTABILI-
TY AND FITNESS FOR A PARTICULAR PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE REGENTS OR
CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL,EXEMPLARY, OR CONSE-
QUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SER-
VICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY
THEORY OF LIABILITY,WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR
OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSI-
BILITY OF SUCH DAMAGE.
Redistribution and use in source and binary forms, with or without modification, are permitted provided that the fol-
lowing conditions are met:
1. Redistributions of source code must retain the above copyright notice, this list of conditions and the following dis-
claimer.
2. Redistributions in binary form must reproduce the above copyright notice, this list of conditions and the following
disclaimer in the documentation and/or other materials provided with the distribution.
3. All advertising materials mentioning features or use of this software must display the following acknowledgement:
This product includes software developed by the University of California, Berkeley and its contributors.
4. Neither the name of the University nor the names of its contributors may be used to endorse or promote products
derived from this software without specific prior written permission.
THIS SOFTWARE IS PROVIDED BY THE REGENTS AND CONTRIBUTORS ``AS IS'' AND ANY EXPRESS OR IM-
PLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES OF MERCHANTABILI-
TY AND FITNESS FOR A PARTICULAR PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE REGENTS OR
CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL,EXEMPLARY, OR CONSE-
QUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SER-
VICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY
THEORY OF LIABILITY,WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR
OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSI-
BILITY OF SUCH DAMAGE.
1524
Portions copyright (c) 1999, 2000
Intel Corporation.
All rights reserved.
Redistribution and use in source and binary forms, with or without modification, are permitted provided that the fol-
lowing conditions
are met:
1. Redistributions of source code must retain the above copyright notice, this list of conditions and the following dis-
claimer.
2. Redistributions in binary form must reproduce the above copyright notice, this list of conditions and the following
disclaimer in the documentation and/or other materials provided with the distribution.
3. All advertising materials mentioning features or use of this software must display the following acknowledgement:
This product includes software developed by the University of California, Berkeley, Intel Corporation, and its con-
tributors.
4. Neither the name of University, Intel Corporation, or their respective contributors may be used to endorse or promote
products derived from this software without specific prior written permission.
THIS SOFTWARE IS PROVIDED BY THE REGENTS, INTEL CORPORATION AND CONTRIBUTORS ``AS IS'' AND
ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES
OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE ARE DISCLAIMED. IN NO EVENT
SHALL THE REGENTS, INTEL CORPORATION OR CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT, IN-
CIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO,
PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTER-
RUPTION) HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT LIA-
BILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF
THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.
Redistribution and use in source and binary forms, with or without modification, are permitted provided that the fol-
lowing conditions are met:
1. Redistributions of source code must retain the above copyright notice, this list of conditions and the following dis-
claimer.
2. Redistributions in binary form must reproduce the above copyright notice, this list of conditions and the following
disclaimer in the documentation and/or other materials provided with the distribution.
3. Neither the name of the University nor the names of its contributors may be used to endorse or promote products
derived from this software without specific prior written permission.
THIS SOFTWARE IS PROVIDED BY THE REGENTS AND CONTRIBUTORS ``AS IS'' AND ANY EXPRESS OR IM-
PLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES OF MERCHANTABILI-
TY AND FITNESS FOR A PARTICULAR PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE REGENTS OR
CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSE-
QUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SER-
VICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY
THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT
LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE
OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.
Redistribution and use in source and binary forms, with or without modification, are permitted provided that the fol-
lowing conditions are met:
1. Redistributions of source code must retain the above copyright notice, this list of conditions and the following dis-
claimer.
2. Redistributions in binary form must reproduce the above copyright notice, this list of conditions and the following
disclaimer in the documentation and/or other materials provided with the distribution.
3. Neither the name of the University nor the names of its contributors may be used to endorse or promote products
derived from this software without specific prior written permission.
THIS SOFTWARE IS PROVIDED BY THE REGENTS AND CONTRIBUTORS ``AS IS'' AND ANY EXPRESS OR IM-
PLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES OF MERCHANTABILI-
1525
SGOS Administration Guide
TY AND FITNESS FOR A PARTICULAR PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE REGENTS OR
CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSE-
QUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SER-
VICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY
THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT
LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF
THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.
Redistribution and use in source and binary forms, with or without modification, are permitted provided that the fol-
lowing conditions are met:
1. Redistributions of source code must retain the above copyright notice, this list of conditions and the following dis-
claimer.
2. Redistributions in binary form must reproduce the above copyright notice, this list of conditions and the following
disclaimer in the documentation and/or other materials provided with the distribution.
4. Neither the name of the University nor the names of its contributors may be used to endorse or promote products
derived from this software without specific prior written permission.
THIS SOFTWARE IS PROVIDED BY THE REGENTS AND CONTRIBUTORS ``AS IS'' AND ANY EXPRESS OR IM-
PLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES OF MERCHANTABILI-
TY AND FITNESS FOR A PARTICULAR PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE REGENTS OR
CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL,EXEMPLARY, OR CONSE-
QUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SER-
VICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY
THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE
OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POS-
SIBILITY OF SUCH DAMAGE.
Redistribution and use in source and binary forms, with or without modification, are permitted provided that the fol-
lowing conditions are met:
1. Redistributions of source code must retain the above copyright notice, this list of conditions and the following dis-
claimer.
2. Redistributions in binary form must reproduce the above copyright notice, this list of conditions and the following
disclaimer in the documentation and/or other materials provided with the distribution.
3. Neither the name of the University nor the names of its contributors may be used to endorse or promote products
derived from this software without specific prior written permission.
THIS SOFTWARE IS PROVIDED BY THE REGENTS AND CONTRIBUTORS ``AS IS'' AND ANY EXPRESS OR IM-
PLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES OF MERCHANTABILI-
TY AND FITNESS FOR A PARTICULAR PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE REGENTS OR
CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSE-
QUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SER-
VICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY
THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE
OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POS-
SIBILITY OF SUCH DAMAGE.
Redistribution and use in source and binary forms, with or without modification, are permitted provided that the fol-
lowing conditions are met:
1526
1. Redistributions of source code must retain the above copyright notice, this list of conditions and the following dis-
claimer.
2. Redistributions in binary form must reproduce the above copyright notice, this list of conditions and the following
disclaimer in the documentation and/or other materials provided with the distribution.
3. All advertising materials mentioning features or use of this software must display the following acknowledgement:
This product includes software developed by the University of California, Berkeley, Intel Corporation, and its con-
tributors.
4. Neither the name of University, Intel Corporation, or their respective contributors may be used to endorse or promote
products derived from this software without specific prior written permission.
THIS SOFTWARE IS PROVIDED BY THE REGENTS, INTEL CORPORATION AND CONTRIBUTORS ``AS IS'' AND
ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES
OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE ARE DISCLAIMED. IN NO EVENT
SHALL THE REGENTS, INTEL CORPORATION OR CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT, IN-
CIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO,
PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTER-
RUPTION) HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT LIA-
BILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF
THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.
Redistribution and use in source and binary forms, with or without modification, are permitted provided that the fol-
lowing conditions are met:
1. Redistributions of source code must retain the above copyright notice, this list of conditions and the following dis-
claimer.
2. Redistributions in binary form must reproduce the above copyright notice, this list of conditions and the following
disclaimer in the
documentation and/or other materials provided with the distribution.
3. Neither the name of the University nor the names of its contributors may be used to endorse or promote products
derived from this software without specific prior written permission.
THIS SOFTWARE IS PROVIDED BY THE REGENTS AND CONTRIBUTORS ``AS IS'' AND ANY EXPRESS OR IM-
PLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES OF MERCHANTABILI-
TY AND FITNESS FOR A PARTICULAR PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE REGENTS OR
CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSE-
QUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SER-
VICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY
THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE
OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POS-
SIBILITY OF SUCH DAMAGE.
Redistribution and use in source and binary forms, with or without modification, are permitted provided that the fol-
lowing conditions are met:
1. Redistributions of source code must retain the above copyright notice, this list of conditions and the following
disclaimer.
2. Redistributions in binary form must reproduce the above copyright notice, this list of conditions and the following
disclaimer in the documentation and/or other materials provided with the distribution.
3. Neither the name of the University nor the names of its contributors may be used to endorse or promote products
derived from this software without specific prior written permission.
THIS SOFTWARE IS PROVIDED BY THE REGENTS AND CONTRIBUTORS ``AS IS'' AND ANY EXPRESS OR IM-
PLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES OF MERCHANTABILI-
TY AND FITNESS FOR A PARTICULAR PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE REGENTS OR
CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSE-
QUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SER-
1527
SGOS Administration Guide
VICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY
THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICTLIABILITY, OR TORT (INCLUDING NEGLIGENCE OR
OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSI-
BILITY OF SUCH DAMAGE.
Permission to use, copy, modify, and distribute this software and its documentation for any purpose and without fee
is hereby granted, provided that the above copyright notice appears in all copies and that both that copyright notice and
this permission notice appear in supporting documentation, and that the name of The University of Michigan not be
used in advertising or publicity pertaining to distribution of the software without specific, written prior permission. This
software is supplied as is without expressed or implied warranties of any kind.
Redistribution and use in source and binary forms, with or without modification, are permitted provided that the fol-
lowing conditions are met:
1. Redistributions of source code must retain the above copyright notice, this list of conditions and the following dis-
claimer.
2. Redistributions in binary form must reproduce the above copyright notice, this list of conditions and the following
disclaimer in the documentation and/or other materials provided with the distribution.
3. Neither the name of the University nor the names of its contributors may be used to endorse or promote products
derived from this software without specific prior written permission.
THIS SOFTWARE IS PROVIDED BY THE REGENTS AND CONTRIBUTORS ``AS IS'' AND ANY EXPRESS OR IM-
PLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES OF MERCHANTABILI-
TY AND FITNESS FOR A PARTICULAR PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE REGENTS OR
CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSE-
QUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SER-
VICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY
THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE
OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POS-
SIBILITY OF SUCH DAMAGE.
Redistribution and use in source and binary forms, with or without modification, are permitted provided that the fol-
lowing conditions are met:
1. Redistributions of source code must retain the above copyright notice, this list of conditions and the following dis-
claimer.
2. Redistributions in binary form must reproduce the above copyright notice, this list of conditions and the following
disclaimer in the documentation and/or other materials provided with the distribution.
3. All advertising materials mentioning features or use of this software must display the following acknowledgement:
This product includes software developed by the University of California, Berkeley and its contributors.
4. Neither the name of the University nor the names of its contributors may be used to endorse or promote products
derived from this software without specific prior written permission.
THIS SOFTWARE IS PROVIDED BY THE REGENTS AND CONTRIBUTORS ``AS IS'' AND ANY EXPRESS OR IM-
PLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES OF MERCHANTABILI-
TY AND FITNESS FOR A PARTICULAR PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE REGENTS OR
1528
CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSE-
QUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SER-
VICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY
THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE
OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POS-
SIBILITY OF SUCH DAMAGE.
Redistribution and use in source and binary forms, with or without modification, are permitted provided that the fol-
lowing conditions are met:
1. Redistributions of source code must retain the above copyright notice, this list of conditions and the following dis-
claimer.
2. Redistributions in binary form must reproduce the above copyright notice, this list of conditions and the following
disclaimer in the documentation and/or other materials provided with the distribution.
3. Neither the name of the University nor the names of its contributors may be used to endorse or promote products
derived from this software without specific prior written permission.
THIS SOFTWARE IS PROVIDED BY THE REGENTS AND CONTRIBUTORS ``AS IS'' AND ANY EXPRESS OR IM-
PLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES OF MERCHANTABILI-
TY AND FITNESS FOR A PARTICULAR PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE REGENTS OR
CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSE-
QUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SER-
VICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY
THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE
OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POS-
SIBILITY OF SUCH DAMAGE.
Redistribution and use in source and binary forms, with or without modification, are permitted provided that the fol-
lowing conditions
are met:
- Redistributions of source code must retain the above copyright notice, this list of conditions and the following dis-
claimer.
- Redistributions in binary form must reproduce the above copyright notice, this list of conditions and the following
disclaimer in the documentation and/or other materials provided with the distribution.
- Neither the name of the University nor the names of its contributors may be used to endorse or promote products
derived from this software without specific prior written permission.
THIS SOFTWARE IS PROVIDED BY THE COPYRIGHT HOLDERS AND CONTRIBUTORS "AS IS" AND ANY EX-
PRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES OF MER-
CHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE
COPYRIGHT HOLDERS OR CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL,
EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUB-
STITUTE GOODS OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER
CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT (IN-
CLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN
IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.
Redistribution and use in source and binary forms, with or without modification, are permitted provided that the fol-
lowing conditions are met:
1. Redistributions of source code must retain the above copyright notice, this list of conditions and the following dis-
claimer.
2. Redistributions in binary form must reproduce the above copyright notice, this list of conditions and the following
disclaimer in the documentation and/or other materials provided with the distribution.
3. Neither the name of the University nor the names of its contributors may be used to endorse or promote products
derived from this software without specific prior written permission.
THIS SOFTWARE IS PROVIDED BY THE REGENTS AND CONTRIBUTORS ``AS IS'' AND ANY EXPRESS OR IM-
PLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES OF MERCHANTABILI-
TY AND FITNESS FOR A PARTICULAR PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE REGENTS OR
CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSE-
1529
SGOS Administration Guide
QUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SER-
VICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY
THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT
LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF
THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.
Permission to use, copy, modify and distribute this software and its documentation is hereby granted, provided that
both the copyright notice and this permission notice appear in all copies of the software, derivative works or modified
versions, and any portions thereof, and that both notices appear in supporting documentation.
CARNEGIE MELLON ALLOWS FREE USE OF THIS SOFTWARE IN ITS "AS IS" CONDITION. CARNEGIE MELLON
DISCLAIMS ANY LIABILITY OF ANY KIND FOR ANY DAMAGES WHATSOEVER RESULTING FROM THE USE OF
THIS SOFTWARE.
any improvements or extensions that they make and grant Carnegie Mellon the rights to redistribute these changes.
Redistribution and use in source and binary forms, with or without modification, are permitted provided that the fol-
lowing conditions are met:
1. Redistributions of source code must retain the above copyright notice, this list of conditions and the following dis-
claimer.
2. Redistributions in binary form must reproduce the above copyright notice, this list of conditions and the following
disclaimer in the documentation and/or other materials provided with the distribution.
3. Neither the name of the University nor the names of its contributors may be used to endorse or promote products
derived from this software
without specific prior written permission.
THIS SOFTWARE IS PROVIDED BY THE REGENTS AND CONTRIBUTORS ``AS IS'' AND ANY EXPRESS OR IM-
PLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES OF MERCHANTABILI-
TY AND FITNESS FOR A PARTICULAR PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE REGENTS OR
CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSE-
QUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SER-
VICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY
THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE
OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POS-
SIBILITY OF SUCH DAMAGE.
Redistribution and use in source and binary forms, with or without modification, are permitted provided that the fol-
lowing conditions are met:
1. Redistributions of source code must retain the above copyright notice, this list of conditions and the following dis-
claimer.
2. Redistributions in binary form must reproduce the above copyright notice, this list of conditions and the following
disclaimer in the documentation and/or other materials provided with the distribution.
4. Neither the name of the University nor the names of its contributors may be used to endorse or promote products
derived from this software without specific prior written permission.
THIS SOFTWARE IS PROVIDED BY THE REGENTS AND CONTRIBUTORS ``AS IS'' AND ANY EXPRESS OR IM-
PLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES OF MERCHANTABILI-
TY AND FITNESS FOR A PARTICULAR PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE REGENTS OR
CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSE-
QUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SER-
VICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY
1530
THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE
OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POS-
SIBILITY OF SUCH DAMAGE.
Derived from hp300 version by Mike Hibler, this version by William Jolitz uses a recursive map [a pde points to the page
directory] to map the page tables using the pagetables themselves. This is done to reduce the impact on kernel virtual
memory for lots of sparse address space, and to reduce the cost of memory to each process.
Redistribution and use in source and binary forms, with or without modification, are permitted provided that the fol-
lowing conditions are met:
1. Redistributions of source code must retain the above copyright notice, this list of conditions and the following dis-
claimer.
2. Redistributions in binary form must reproduce the above copyright notice, this list of conditions and the following
disclaimer in the documentation and/or other materials provided with the distribution.
3. Neither the name of the University nor the names of its contributors may be used to endorse or promote products
derived from this software without specific prior written permission.
THIS SOFTWARE IS PROVIDED BY THE REGENTS AND CONTRIBUTORS ``AS IS'' AND ANY EXPRESS OR IM-
PLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES OF MERCHANTABILI-
TY AND FITNESS FOR A PARTICULAR PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE REGENTS OR
CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSE-
QUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SER-
VICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY
THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE
OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POS-
SIBILITY OF SUCH DAMAGE.
All advertising materials mentioning features or use of this software must display the following acknowledgement:
This product includes software developed by the University of California, Lawrence Berkeley Laboratory.
Redistribution and use in source and binary forms, with or without modification, are permitted provided that the fol-
lowing conditions are met:
1. Redistributions of source code must retain the above copyright notice, this list of conditions and the following dis-
claimer.
2. Redistributions in binary form must reproduce the above copyright notice, this list of conditions and the following
disclaimer in the documentation and/or other materials provided with the distribution.
3. Neither the name of the University nor the names of its contributors may be used to endorse or promote products
derived from this software without specific prior written permission.
THIS SOFTWARE IS PROVIDED BY THE REGENTS AND CONTRIBUTORS ``AS IS'' AND ANY EXPRESS OR IM-
PLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES OF MERCHANTABILI-
TY AND FITNESS FOR A PARTICULAR PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE REGENTS OR
CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSE-
QUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SER-
VICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY
THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT
LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF
THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.
Redistribution and use in source and binary forms, with or without modification, are permitted provided that the fol-
lowing conditions are met:
1. Redistributions of source code must retain the above copyright notice, this list of conditions and the following dis-
claimer.
2. Redistributions in binary form must reproduce the above copyright notice, this list of conditions and the following
disclaimer in the documentation and/or other materials provided with the distribution.
1531
SGOS Administration Guide
3. Neither the name of the University nor the names of its contributors may be used to endorse or promote products
derived from this software without specific prior written permission.
THIS SOFTWARE IS PROVIDED BY THE REGENTS AND CONTRIBUTORS ``AS IS'' AND ANY EXPRESS OR IM-
PLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES OF MERCHANTABILI-
TY AND FITNESS FOR A PARTICULAR PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE REGENTS OR
CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSE-
QUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SER-
VICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY
THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE
OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POS-
SIBILITY OF SUCH DAMAGE.
Redistribution and use in source and binary forms, with or without modification, are permitted provided that the fol-
lowing conditions are met:
1. Redistributions of source code must retain the above copyright notice, this list of conditions and the following dis-
claimer.
2. Redistributions in binary form must reproduce the above copyright notice, this list of conditions and the following
disclaimer in the documentation and/or other materials provided with the distribution.
3. Neither the name of the University nor the names of its contributors may be used to endorse or promote products
derived from this software without specific prior written permission.
THIS SOFTWARE IS PROVIDED BY THE REGENTS AND CONTRIBUTORS ``AS IS'' AND ANY EXPRESS OR IM-
PLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES OF MERCHANTABILI-
TY AND FITNESS FOR A PARTICULAR PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE REGENTS OR
CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSE-
QUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SER-
VICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY
THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT
LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF
THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.
Permission to use, copy, modify and distribute this software and its documentation is hereby granted, provided that
both the copyright notice and this permission notice appear in all copies of the software, derivative works or modified
versions, and any portions thereof, and that both notices appear in supporting documentation.
CARNEGIE MELLON ALLOWS FREE USE OF THIS SOFTWARE IN ITS "AS IS" CONDITION. CARNEGIE MELLON
DISCLAIMS ANY LIABILITY OF ANY KIND FOR ANY DAMAGES WHATSOEVER RESULTING FROM THE USE OF
THIS SOFTWARE.
any improvements or extensions that they make and grant Carnegie the rights to redistribute these changes.
Redistribution and use in source and binary forms, with or without modification, are permitted provided that the fol-
lowing conditions are met:
1. Redistributions of source code must retain the above copyright notice, this list of conditions and the following dis-
claimer.
2. Redistributions in binary form must reproduce the above copyright notice, this list of conditions and the following
disclaimer in the documentation and/or other materials provided with the distribution.
3. All advertising materials mentioning features or use of this software must display the following acknowledgement:
This product includes software developed by the RiscBSD team.
4. The name "RiscBSD" nor the name of the author may be used to endorse or promote products derived from this soft-
1532
ware without specific prior written permission.
THIS SOFTWARE IS PROVIDED BY RISCBSD ``AS IS'' AND ANY EXPRESS OR IMPLIED WARRANTIES, INCLUD-
ING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PAR-
TICULAR PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL RISCBSD OR CONTRIBUTORS BE LIABLE FOR
ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUD-
ING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, DATA, OR
PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER
IN CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY
WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.
Redistribution and use in source and binary forms, with or without modification, are permitted provided that the fol-
lowing conditions are met:
1. Redistributions of source code must retain the above copyright notice, this list of conditions and the following dis-
claimer.
2. Redistributions in binary form must reproduce the above copyright notice, this list of conditions and the following
disclaimer in the documentation and/or other materials provided with the distribution.
THIS SOFTWARE IS PROVIDED BY THE NETBSD FOUNDATION, INC. AND CONTRIBUTORS ``AS IS'' AND ANY
EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES OF
MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL
THE FOUNDATION OR CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EX-
EMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTI-
TUTE GOODS OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER
CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT (IN-
CLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN
IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.
Redistribution and use in source and binary forms, with or without modification, are permitted provided that the fol-
lowing conditions are met:
1. Redistributions of source code must retain the above copyright notice, this list of conditions and the following dis-
claimer.
2. Redistributions in binary form must reproduce the above copyright notice, this list of conditions and the following
disclaimer in the documentation and/or other materials provided with the distribution.
THIS SOFTWARE IS PROVIDED BY THE CONTRIBUTORS ``AS IS'' AND ANY EXPRESS OR IMPLIED WARRAN-
TIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS
FOR A PARTICULAR PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE REGENTS OR CONTRIBUTORS
BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAM-
AGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF
USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY OF LIA-
BILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE)
ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH
DAMAGE.
Redistribution and use in source and binary forms, with or without modification, are permitted provided that the fol-
lowing conditions are met:
1. Redistributions of source code must retain the above copyright notice, this list of conditions and the following dis-
claimer.
2. Redistributions in binary form must reproduce the above copyright notice, this list of conditions and the following
disclaimer in the documentation and/or other materials provided with the distribution.
3. All advertising materials mentioning features or use of this software must display the following acknowledgement:
This product includes software developed by Brini.
4. The name of the company nor the name of the author may be used to endorse or promote products derived from this
software without specific prior written permission.
THIS SOFTWARE IS PROVIDED BY BRINI ``AS IS'' AND ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING,
BUT NOT LIMITED TO, THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICU-
LAR PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL BRINI OR CONTRIBUTORS BE LIABLE FOR ANY DI-
1533
SGOS Administration Guide
Redistribution and use in source and binary forms, with or without modification, are permitted provided that the fol-
lowing conditions are met:
1. Redistributions of source code must retain the above copyright notice, this list of conditions and the following dis-
claimer.
2. Redistributions in binary form must reproduce the above copyright notice, this list of conditions and the following
disclaimer in the documentation and/or other materials provided with the distribution.
3. All advertising materials mentioning features or use of this software must display the following acknowledgement:
This product includes software developed by Christopher G. Demetriou.
4. The name of the author may not be used to endorse or promote products derived from this software without specific
prior written permission
THIS SOFTWARE IS PROVIDED BY THE AUTHOR ``AS IS'' AND ANY EXPRESS OR IMPLIED WARRANTIES, IN-
CLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A
PARTICULAR PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE AUTHOR BE LIABLE FOR ANY DIRECT,
INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT
LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR
BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CON-
TRACT, STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT
OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.
Redistribution and use in source and binary forms, with or without modification, are permitted provided that the fol-
lowing conditions
are met:
1. Redistributions of source code must retain the above copyright notice, this list of conditions and the following dis-
claimer.
2. Redistributions in binary form must reproduce the above copyright notice, this list of conditions and the following
disclaimer in the documentation and/or other materials provided with the distribution.
3. All advertising materials mentioning features or use of this software must display the following acknowledgement:
This product includes software developed by the RiscBSD team.
4. The name "RiscBSD" nor the name of the author may be used to endorse or promote products derived from this soft-
ware without specific prior written permission.
THIS SOFTWARE IS PROVIDED BY RISCBSD ``AS IS'' AND ANY EXPRESS OR IMPLIED WARRANTIES, INCLUD-
ING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PAR-
TICULAR PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL RISCBSD OR CONTRIBUTORS BE LIABLE FOR
ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUD-
ING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, DATA, OR
PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER
IN CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY
WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.
Redistribution and use in source and binary forms, with or without modification, are permitted provided that the fol-
lowing conditions are met:
1. Redistributions of source code must retain the above copyright notice, this list of conditions and the following dis-
claimer.
2. Redistributions in binary form must reproduce the above copyright notice, this list of conditions and the following
disclaimer in the documentation and/or other materials provided with the distribution.
3. All advertising materials mentioning features or use of this software must display the following acknowledgement:
This product includes software developed by Michael L. Hitch.
1534
4. The name of the author may not be used to endorse or promote products derived from this software without specific
prior written permission
THIS SOFTWARE IS PROVIDED BY THE AUTHOR ``AS IS'' AND ANY EXPRESS OR IMPLIED WARRANTIES, IN-
CLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A
PARTICULAR PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE AUTHOR BE LIABLE FOR ANY DIRECT,
INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT
LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR
BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CON-
TRACT, STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT
OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.
Redistribution and use in source and binary forms, with or without modification, are permitted provided that the fol-
lowing conditions are met:
1. Redistributions of source code must retain the above copyright notice, this list of conditions and the following dis-
claimer.
2. Redistributions in binary form must reproduce the above copyright notice, this list of conditions and the following
disclaimer in the documentation and/or other materials provided with the distribution.
THIS SOFTWARE IS PROVIDED BY THE NETBSD FOUNDATION, INC. AND CONTRIBUTORS ``AS IS'' AND ANY
EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES OF
MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL
THE FOUNDATION OR CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT,INCIDENTAL, SPECIAL, EX-
EMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF
SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEV-
ER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT (IN-
CLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN
IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.
Redistribution and use in source and binary forms, with or without modification, are permitted provided that the fol-
lowing conditions are met:
1. Redistributions of source code must retain the above copyright notice, this list of conditions and the following dis-
claimer.
2. Redistributions in binary form must reproduce the above copyright notice, this list of conditions and the following
disclaimer in the documentation and/or other materials provided with the distribution.
3. All advertising materials mentioning features or use of this software must display the following acknowledgement:
This product includes software developed by Winning Strategies, Inc.
4. The name of the author may not be used to endorse or promote products derived from this software without specific
prior written permission.
THIS SOFTWARE IS PROVIDED BY THE AUTHOR ``AS IS'' AND ANY EXPRESS OR IMPLIED WARRANTIES, IN-
CLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A
PARTICULAR PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE AUTHOR BE LIABLE FOR ANY DIRECT,
INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT
LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR
BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CON-
TRACT, STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT
OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.
Redistribution and use in source and binary forms, with or without modification, are permitted provided that the fol-
lowing conditions are met:
1. Redistributions of source code must retain the above copyright notice, this list of conditions and the following dis-
claimer.
2. Redistributions in binary form must reproduce the above copyright notice, this list of conditions and the following
disclaimer in the documentation and/or other materials provided with the distribution.
3. Neither the name of the Institute nor the names of its contributors may be used to endorse or promote products de-
1535
SGOS Administration Guide
THIS SOFTWARE IS PROVIDED BY THE INSTITUTE AND CONTRIBUTORS ``AS IS'' AND ANY EXPRESS OR IM-
PLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES OF MERCHANTABILI-
TY AND FITNESS FOR A PARTICULAR PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE INSTITUTE OR
CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSE-
QUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SER-
VICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY
THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE
OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POS-
SIBILITY OF SUCH DAMAGE.
Permission to use, copy, modify and distribute this software and its documentation is hereby granted, provided that
both the copyright notice and this permission notice appear in all copies of the software, derivative works or modified
versions, and any portions thereof, and that both notices appear in supporting documentation.
CARNEGIE MELLON ALLOWS FREE USE OF THIS SOFTWARE IN ITS "AS IS" CONDITION. CARNEGIE MELLON
DISCLAIMS ANY LIABILITY OF ANY KIND FOR ANY DAMAGES WHATSOEVER RESULTING FROM THE USE OF
THIS SOFTWARE.
any improvements or extensions that they make and grant Carnegie the rights to redistribute these changes.
Permission to use, copy, modify, and distribute this software for any purpose with or without fee is hereby granted,
provided that the above copyright notice and this permission notice appear in all copies.
THE SOFTWARE IS PROVIDED "AS IS" AND INTERNET SOFTWARE CONSORTIUM DISCLAIMS ALL WARRAN-
TIES WITH REGARD TO THIS SOFTWARE INCLUDING ALL IMPLIED WARRANTIES OF MERCHANTABILITY
AND FITNESS. IN NO EVENT SHALL INTERNET SOFTWARE CONSORTIUM BE LIABLE FOR ANY SPECIAL, DI-
RECT, INDIRECT, OR CONSEQUENTIAL DAMAGES OR ANY DAMAGES WHATSOEVER RESULTING FROM
LOSS OF USE, DATA OR PROFITS, WHETHER IN AN ACTION OF CONTRACT, NEGLIGENCE OR OTHER TOR-
TIOUS ACTION, ARISING OUT OF OR IN CONNECTION WITH THE USE OR PERFORMANCE OF THIS SOFT-
WARE.
Permission to use, copy, modify and distribute this software and its documentation is hereby granted, provided that
both the copyright notice and this permission notice appear in all copies of the software, derivative works or modified
versions, and any portions thereof, and that both notices appear in supporting documentation.
CARNEGIE MELLON ALLOWS FREE USE OF THIS SOFTWARE IN ITS "AS IS" CONDITION. CARNEGIE MELLON
DISCLAIMS ANY LIABILITY OF ANY KIND FOR ANY DAMAGES WHATSOEVER RESULTING FROM THE USE OF
THIS SOFTWARE.
any improvements or extensions that they make and grant Carnegie the rights to redistribute these changes.
Permission to use, copy, modify, and distribute this software for any purpose with or without fee is hereby granted,
provided that the above copyright notice and this permission notice appear in all copies.
THE SOFTWARE IS PROVIDED "AS IS" AND INTERNET SOFTWARE CONSORTIUM DISCLAIMS ALL WARRAN-
TIES WITH REGARD TO THIS SOFTWARE INCLUDING ALL IMPLIED WARRANTIES OF MERCHANTABILITY
AND FITNESS. IN NO EVENT SHALL INTERNET SOFTWARE CONSORTIUM BE LIABLE FOR ANY SPECIAL, DI-
RECT, INDIRECT, OR CONSEQUENTIAL DAMAGES OR ANY DAMAGES WHATSOEVER RESULTING FROM
LOSS OF USE, DATA OR PROFITS, WHETHER IN AN ACTION OF CONTRACT, NEGLIGENCE OR OTHER TOR-
1536
TIOUS ACTION, ARISING OUT OF OR IN CONNECTION WITH THE USE OR PERFORMANCE OF THIS SOFT-
WARE.
Redistribution and use in source and binary forms, with or without modification, are permitted provided that the fol-
lowing conditions are met:
1. Redistributions of source code must retain the above copyright notice, this list of conditions and the following dis-
claimer.
2. Redistributions in binary form must reproduce the above copyright notice, this list of conditions and the following
disclaimer in the documentation and/or other materials provided with the distribution.
THIS SOFTWARE IS PROVIDED BY THE AUTHOR AND CONTRIBUTORS ``AS IS'' AND ANY EXPRESS OR IM-
PLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES OF MERCHANTABILI-
TY AND FITNESS FOR A PARTICULAR PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE AUTHOR OR
CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSE-
QUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SER-
VICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY
THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE
OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POS-
SIBILITY OF SUCH DAMAGE.
Redistribution and use in source and binary forms, with or without modification, are permitted provided that the fol-
lowing conditions are met:
1. Redistributions of source code must retain the above copyright notice, this list of conditions and the following dis-
claimer.
2. Redistributions in binary form must reproduce the above copyright notice, this list of conditions and the following
disclaimer in the documentation and/or other materials provided with the distribution.
THIS SOFTWARE IS PROVIDED BY THE AUTHOR AND CONTRIBUTORS ``AS IS'' AND ANY EXPRESS OR IM-
PLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES OF MERCHANTABILI-
TY AND FITNESS FOR A PARTICULAR PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE AUTHOR OR
CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSE-
QUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SER-
VICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY
THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE
OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POS-
SIBILITY OF SUCH DAMAGE.
Redistribution and use in source and binary forms, with or without modification, are permitted provided that the fol-
lowing conditions are met:
1. Redistributions of source code must retain the above copyright notice, this list of conditions and the following dis-
claimer.
2. Redistributions in binary form must reproduce the above copyright notice, this list of conditions and the following
disclaimer in the documentation and/or other materials provided with the distribution.
3. All advertising materials mentioning features or use of this software must display the following acknowledgement:
This product includes software developed by Christos Zoulas.
4. The name of the author may not be used to endorse or promote products derived from this software without specific
prior written permission.
THIS SOFTWARE IS PROVIDED BY THE AUTHOR ``AS IS'' AND ANY EXPRESS OR IMPLIED WARRANTIES, IN-
CLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A
PARTICULAR PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE AUTHOR BE LIABLE FOR ANY DIRECT,
INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT
LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR
BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CON-
TRACT, STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT
OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.
1537
SGOS Administration Guide
Redistribution and use in source and binary forms, with or without modification, are permitted provided that the fol-
lowing conditions are met:
1. Redistributions of source code must retain the above copyright notice, this list of conditions and the following dis-
claimer.
2. Redistributions in binary form must reproduce the above copyright notice, this list of conditions and the following
disclaimer in the documentation and/or other materials provided with the distribution.
3. All advertising materials mentioning features or use of this software must display the following acknowledgement:
This product includes software developed by Mark Brinicombe for the NetBSD Project.
4. The name of the author may not be used to endorse or promote products derived from this software without specific
prior written permission
THIS SOFTWARE IS PROVIDED BY THE AUTHOR ``AS IS'' AND ANY EXPRESS OR IMPLIED WARRANTIES, IN-
CLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A
PARTICULAR PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE AUTHOR BE LIABLE FOR ANY DIRECT,
INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT
LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR
BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CON-
TRACT, STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT
OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.
Redistribution and use in source and binary forms, with or without modification, are permitted provided that the fol-
lowing conditions are met:
1. Redistributions of source code must retain the above copyright notice, this list of conditions and the following dis-
claimer.
2. Redistributions in binary form must reproduce the above copyright notice, this list of conditions and the following
disclaimer in the documentation and/or other materials provided with the distribution.
3. All advertising materials mentioning features or use of this software must display the following acknowledgement:
This product includes software developed by the NetBSD Foundation, Inc. and its contributors.
4. Neither the name of The NetBSD Foundation nor the names of its contributors may be used to endorse or promote
products derived from this software without specific prior written permission.
THIS SOFTWARE IS PROVIDED BY THE NETBSD FOUNDATION, INC. AND CONTRIBUTORS ``AS IS'' AND ANY
EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES OF
MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL
THE FOUNDATION OR CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EX-
EMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTI-
TUTE GOODS OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER
CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT (IN-
CLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN
IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.
Permission to use, copy, modify, and distribute this software for any purpose with or without fee is hereby granted,
provided that the above copyright notice and this permission notice appear in all copies.
THE SOFTWARE IS PROVIDED "AS IS" AND INTERNET SOFTWARE CONSORTIUM DISCLAIMS ALL WARRAN-
TIES WITH REGARD TO THIS SOFTWARE INCLUDING ALL IMPLIED WARRANTIES OF MERCHANTABILITY
AND FITNESS. IN NO EVENT SHALL INTERNET SOFTWARE CONSORTIUM BE LIABLE FOR ANY SPECIAL, DI-
RECT, INDIRECT, OR CONSEQUENTIAL DAMAGES OR ANY DAMAGES WHATSOEVER RESULTING FROM
LOSS OF USE, DATA OR PROFITS, WHETHER IN AN ACTION OF CONTRACT, NEGLIGENCE OR OTHER TOR-
TIOUS ACTION, ARISING OUT OF OR IN CONNECTION WITH THE USE OR PERFORMANCE OF THIS SOFT-
WARE.
Copyright (c) 1997, 1998, 1999, 2000 The NetBSD Foundation, Inc.
All rights reserved.
Redistribution and use in source and binary forms, with or without modification, are permitted provided that the fol-
lowing conditions are met:
1. Redistributions of source code must retain the above copyright notice, this list of conditions and the following dis-
claimer.
1538
2. Redistributions in binary form must reproduce the above copyright notice, this list of conditions and the following
disclaimer in the documentation and/or other materials provided with the distribution.
3. All advertising materials mentioning features or use of this software must display the following acknowledgement:
This product includes software developed by the NetBSD Foundation, Inc. and its contributors.
4. Neither the name of The NetBSD Foundation nor the names of its contributors may be used to endorse or promote
products derived from this software without specific prior written permission.
THIS SOFTWARE IS PROVIDED BY THE NETBSD FOUNDATION, INC. AND CONTRIBUTORS ''AS IS'' AND ANY
EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES OF
MERCHANTABILITY AND FITNESS FOR A PARTICULAR
PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE FOUNDATION OR CONTRIBUTORS BE LIABLE FOR
ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUD-
ING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, DATA, OR
PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER
IN CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY
WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.
Redistribution and use in source and binary forms, with or without modification, are permitted provided that the fol-
lowing conditions are met:
1. Redistributions of source code must retain the above copyright notice, this list of conditions and the following dis-
claimer.
2. Redistributions in binary form must reproduce the above copyright notice, this list of conditions and the following
disclaimer in the documentation and/or other materials provided with the distribution.
3. All advertising materials mentioning features or use of this software must display the following acknowledgement:
This product includes software developed by the NetBSD Foundation, Inc. and its contributors.
4. Neither the name of The NetBSD Foundation nor the names of its contributors may be used to endorse or promote
products derived from this software without specific prior written permission.
THIS SOFTWARE IS PROVIDED BY THE NETBSD FOUNDATION, INC. AND CONTRIBUTORS ``AS IS'' AND ANY
EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES OF
MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL
THE FOUNDATION OR CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EX-
EMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTI-
TUTE GOODS OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER
CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT (IN-
CLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN
IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.
Copyright (c) 1997, 1998, 2005, 2008 The NetBSD Foundation, Inc.
All rights reserved.
Redistribution and use in source and binary forms, with or without modification, are permitted provided that the fol-
lowing conditions are met:
1. Redistributions of source code must retain the above copyright notice, this list of conditions and the following dis-
claimer.
2. Redistributions in binary form must reproduce the above copyright notice, this list of conditions and the following
disclaimer in the documentation and/or other materials provided with the distribution.
THIS SOFTWARE IS PROVIDED BY THE NETBSD FOUNDATION, INC. AND CONTRIBUTORS ``AS IS'' AND ANY
EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES OF
MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL
THE FOUNDATION OR CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EX-
EMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTI-
TUTE GOODS OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER
CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT (IN-
CLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN
IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.
Redistribution and use in source and binary forms, with or without modification, are permitted provided that the fol-
lowing conditions are met:
1539
SGOS Administration Guide
1. Redistributions of source code must retain the above copyright notice, this list of conditions and the following dis-
claimer.
2. Redistributions in binary form must reproduce the above copyright notice, this list of conditions and the following
disclaimer in the documentation and/or other materials provided with the distribution.
THIS SOFTWARE IS PROVIDED BY THE NETBSD FOUNDATION, INC. AND CONTRIBUTORS ''AS IS'' AND ANY
EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES OF
MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL
THE FOUNDATION OR CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EX-
EMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTI-
TUTE GOODS OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER
CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT (IN-
CLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN
IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.
Redistribution and use in source and binary forms, with or without modification, are permitted provided that the fol-
lowing conditions are met:
1. Redistributions of source code must retain the above copyright notice, this list of conditions and the following dis-
claimer.
2. Redistributions in binary form must reproduce the above copyright notice, this list of conditions and the following
disclaimer in the documentation and/or other materials provided with the distribution.
3. All advertising materials mentioning features or use of this software must display the following acknowledgement:
This product includes software developed by the NetBSD Foundation, Inc. and its contributors.
4. Neither the name of The NetBSD Foundation nor the names of its contributors may be used to endorse or promote
products derived from this software without specific prior written permission.
THIS SOFTWARE IS PROVIDED BY THE NETBSD FOUNDATION, INC. AND CONTRIBUTORS ``AS IS'' AND ANY
EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES OF
MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL
THE FOUNDATION OR CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EX-
EMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTI-
TUTE GOODS OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER
CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT (IN-
CLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN
IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.
Redistribution and use in source and binary forms, with or without modification, are permitted provided that the fol-
lowing conditions are met:
1. Redistributions of source code must retain the above copyright notice, this list of conditions and the following dis-
claimer.
2. Redistributions in binary form must reproduce the above copyright notice, this list of conditions and the following
disclaimer in the
documentation and/or other materials provided with the distribution.
THIS SOFTWARE IS PROVIDED BY THE NETBSD FOUNDATION, INC. AND CONTRIBUTORS ``AS IS'' AND ANY
EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES OF
MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL
THE FOUNDATION OR CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EX-
EMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTI-
TUTE GOODS OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER
CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT (IN-
CLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN
IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.
This version of the SRE library can be redistributed under CNRI's Python 1.6 license. For any other use, please contact
Secret Labs AB ([email protected]).
Portions of this engine have been developed in cooperation with CNRI. Hewlett-Packard provided funding for 1.6 in-
tegration and other compatibility work.
1540
Copyright (c) 1997-2004 The NetBSD Foundation, Inc.
All rights reserved.
Redistribution and use in source and binary forms, with or without modification, are permitted provided that the fol-
lowing conditions are met:
1. Redistributions of source code must retain the above copyright notice, this list of conditions and the following dis-
claimer.
2. Redistributions in binary form must reproduce the above copyright notice, this list of conditions and the following
disclaimer in the documentation and/or other materials provided with the distribution.
3. All advertising materials mentioning features or use of this software must display the following acknowledgement:
This product includes software developed by the NetBSD Foundation, Inc. and its contributors.
4. Neither the name of The NetBSD Foundation nor the names of its contributors may be used to endorse or promote
products derived from this software without specific prior written permission.
THIS SOFTWARE IS PROVIDED BY THE NETBSD FOUNDATION, INC. AND CONTRIBUTORS ``AS IS'' AND ANY
EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES OF
MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL
THE FOUNDATION OR CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EX-
EMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTI-
TUTE GOODS OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER
CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT (IN-
CLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN
IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.
Redistribution and use in source and binary forms, with or without modification, are permitted provided that the fol-
lowing conditions are met:
1. Redistributions of source code must retain the above copyright notice, this list of conditions and the following dis-
claimer.
2. Redistributions in binary form must reproduce the above copyright notice, this list of conditions and the following
disclaimer in the documentation and/or other materials provided with the distribution.
3. All advertising materials mentioning features or use of this software must display the following acknowledgement:
This product includes software developed by Christos Zoulas.
4. The name of the author may not be used to endorse or promote products derived from this software without specific
prior written permission.
THIS SOFTWARE IS PROVIDED BY THE AUTHOR ``AS IS'' AND ANY EXPRESS OR IMPLIED WARRANTIES, IN-
CLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A
PARTICULAR PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE AUTHOR BE LIABLE FOR ANY DIRECT,
INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT
LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR
BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CON-
TRACT, STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT
OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.
Redistribution and use in source and binary forms, with or without modification, are permitted provided that the fol-
lowing conditions are met:
1. Redistributions of source code must retain the above copyright notice, this list of conditions and the following dis-
claimer.
2. Redistributions in binary form must reproduce the above copyright notice, this list of conditions and the following
disclaimer in the documentation and/or other materials provided with the distribution.
3. All advertising materials mentioning features or use of this software must display the following acknowledgement:
This product includes software developed by Causality Limited.
4. The name of Causality Limited may not be used to endorse or promote products derived from this software without
specific prior written permission.
THIS SOFTWARE IS PROVIDED BY CAUSALITY LIMITED ``AS IS'' AND ANY EXPRESS OR IMPLIED WARRAN-
1541
SGOS Administration Guide
TIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS
FOR A PARTICULAR PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL CAUSALITY LIMITED BE LIABLE FOR
ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUD-
ING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, DATA, OR
PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER
IN CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY
WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.
Redistribution and use in source and binary forms, with or without modification, are permitted provided that the fol-
lowing conditions are met:
1. Redistributions of source code must retain the above copyright notice, this list of conditions and the following dis-
claimer.
2. Redistributions in binary form must reproduce the above copyright notice, this list of conditions and the following
disclaimer in the documentation and/or other materials provided with the distribution.
3. The name of the author may not be used to endorse or promote products derived from this software without specific
prior written permission.
THIS SOFTWARE IS PROVIDED ``AS IS'' AND ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT
LIMITED TO, THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PUR-
POSE ARE DISCLAIMED. IN NO EVENT SHALL THE AUTHOR BE LIABLE FOR ANY DIRECT, INDIRECT, INCI-
DENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO,
PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTER-
RUPTION) HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT LIA-
BILITY, OR TORT (INCLUDING NEGLIGENCE OR
OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSI-
BILITY OF SUCH DAMAGE.
Copyright (c) 1998, 1999, 2000, 2001 The NetBSD Foundation, Inc.
All rights reserved.
Redistribution and use in source and binary forms, with or without modification, are permitted provided that the fol-
lowing conditions are met:
1. Redistributions of source code must retain the above copyright notice, this list of conditions and the following dis-
claimer.
2. Redistributions in binary form must reproduce the above copyright notice, this list of conditions and the following
disclaimer in the documentation and/or other materials provided with the distribution.
3. All advertising materials mentioning features or use of this software must display the following acknowledgement:
This product includes software developed by the NetBSD Foundation, Inc. and its contributors.
4. Neither the name of The NetBSD Foundation nor the names of its contributors may be used to endorse or promote
products derived from this software without specific prior written permission.
THIS SOFTWARE IS PROVIDED BY THE NETBSD FOUNDATION, INC. AND CONTRIBUTORS ''AS IS'' AND ANY
EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES OF
MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL
THE FOUNDATION OR CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EX-
EMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTI-
TUTE GOODS OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER
CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT (IN-
CLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN
IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.
Redistribution and use in source and binary forms, with or without modification, are permitted provided that the fol-
lowing conditions are met:
1. Redistributions of source code must retain the above copyright notice, this list of conditions and the following dis-
claimer.
2. Redistributions in binary form must reproduce the above copyright notice, this list of conditions and the following
disclaimer in the documentation and/or other materials provided with the distribution.
1542
3. All advertising materials mentioning features or use of this software must display the following acknowledgement:
This product includes software developed by the NetBSD Foundation, Inc. and its contributors.
4. Neither the name of The NetBSD Foundation nor the names of its contributors may be used to endorse or promote
products derived from this software without specific prior written permission.
THIS SOFTWARE IS PROVIDED BY THE NETBSD FOUNDATION, INC. AND CONTRIBUTORS '' AS IS'' AND ANY
EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES OF
MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL
THE FOUNDATION OR CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EX-
EMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTI-
TUTE GOODS OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER
CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT (IN-
CLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN
IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.
Redistribution and use in source and binary forms, with or without modification, are permitted provided that the fol-
lowing conditions are met:
1. Redistributions of source code must retain the above copyright notice, this list of conditions and the following dis-
claimer.
2. Redistributions in binary form must reproduce the above copyright notice, this list of conditions and the following
disclaimer in the documentation and/or other materials provided with the distribution.
3. All advertising materials mentioning features or use of this software must display the following acknowledgement:
"This product includes software developed by the OpenSSL Project for use in the OpenSSL Toolkit. (http://
www.openssl.org/)"
4. The names "OpenSSL Toolkit" and "OpenSSL Project" must not be used to endorse or promote products derived from
this software without
prior written permission. For written permission, please contact [email protected].
5. Products derived from this software may not be called "OpenSSL" nor may "OpenSSL" appear in their names without
prior written
permission of the OpenSSL Project.
THIS SOFTWARE IS PROVIDED BY THE OpenSSL PROJECT ''AS IS'' AND ANY EXPRESSED OR IMPLIED WAR-
RANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FIT-
NESS FOR A PARTICULAR PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE OpenSSL PROJECT OR ITS
CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSE-
QUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SER-
VICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY
THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE
OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POS-
SIBILITY OF SUCH DAMAGE.
This product includes cryptographic software written by Eric Young ([email protected]). This product includes soft-
ware written by Tim Hudson ([email protected]).
Redistribution and use in source and binary forms, with or without modification, are permitted provided that the fol-
lowing conditions are met:
1. Redistributions of source code must retain the above copyright notice, this list of conditions and the following dis-
claimer.
2. Redistributions in binary form must reproduce the above copyright notice, this list of conditions and the following
disclaimer in the documentation and/or other materials provided with the distribution.
THIS SOFTWARE IS PROVIDED BY THE AUTHOR AND CONTRIBUTORS ``AS IS'' AND ANY EXPRESS OR IM-
PLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES OF MERCHANTABILI-
TY AND FITNESS FOR A PARTICULAR PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE AUTHOR OR
CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSE-
QUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SER-
1543
SGOS Administration Guide
VICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY
THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE
OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POS-
SIBILITY OF SUCH DAMAGE.
Redistribution and use in source and binary forms, with or without modification, are permitted provided that the fol-
lowing conditions are met:
1. Redistributions of source code must retain the above copyright notice, this list of conditions and the following dis-
claimer.
2. Redistributions in binary form must reproduce the above copyright notice, this list of conditions and the following
disclaimer in the documentation and/or other materials provided with the distribution.
THIS SOFTWARE IS PROVIDED BY THE AUTHOR AND CONTRIBUTORS ``AS IS'' AND ANY EXPRESS OR IM-
PLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES OF MERCHANTABILI-
TY AND FITNESS FOR A PARTICULAR PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE AUTHOR OR
CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSE-
QUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SER-
VICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY
THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE
OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POS-
SIBILITY OF SUCH DAMAGE.
Redistribution and use in source and binary forms, with or without modification, are permitted provided that the fol-
lowing conditions are met:
1. Redistributions of source code must retain the above copyright notice, this list of conditions and the following dis-
claimer.
2. Redistributions in binary form must reproduce the above copyright notice, this list of conditions and the following
disclaimer in the
documentation and/or other materials provided with the distribution.
THIS SOFTWARE IS PROVIDED BY THE AUTHOR AND CONTRIBUTORS ``AS IS'' AND ANY EXPRESS OR IM-
PLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES OF MERCHANTABILI-
TY AND FITNESS FOR A PARTICULAR PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE AUTHOR OR
CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSE-
QUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SER-
VICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY
THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE
OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POS-
SIBILITY OF SUCH DAMAGE.
Redistribution and use in source and binary forms, with or without modification, are permitted provided that the fol-
lowing conditions are met:
1. Redistributions of source code must retain the above copyright notice, this list of conditions and the following dis-
claimer.
2. Redistributions in binary form must reproduce the above copyright notice, this list of conditions and the following
disclaimer in the documentation and/or other materials provided with the distribution.
3. All advertising materials mentioning features or use of this software must display the following acknowledgement:
This product includes software developed by the NetBSD Foundation, Inc. and its contributors.
4. Neither the name of The NetBSD Foundation nor the names of its contributors may be used to endorse or promote
products derived from this software without specific prior written permission.
THIS SOFTWARE IS PROVIDED BY THE NETBSD FOUNDATION, INC. AND CONTRIBUTORS ''AS IS'' AND ANY
EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES OF
MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL
THE FOUNDATION OR CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EX-
EMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTI-
TUTE GOODS OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER
CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT (IN-
CLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN
1544
IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.
Redistribution and use in source and binary forms, with or without modification, are permitted provided that the fol-
lowing conditions are met:
1. Redistributions of source code must retain the above copyright notice, this list of conditions and the following dis-
claimer.
2. Redistributions in binary form must reproduce the above copyright notice, this list of conditions and the following
disclaimer in the documentation and/or other materials provided with the distribution.
3. All advertising materials mentioning features or use of this software must display the following acknowledgement:
This product includes software developed by the NetBSD Foundation, Inc. and its contributors.
4. Neither the name of The NetBSD Foundation nor the names of its contributors may be used to endorse or promote
products derived from this software without specific prior written permission.
THIS SOFTWARE IS PROVIDED BY THE NETBSD FOUNDATION, INC. AND CONTRIBUTORS "AS IS'' AND ANY
EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES OF
MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL
THE FOUNDATION OR CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EX-
EMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTI-
TUTE GOODS OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER
CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT (IN-
CLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN
IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.
THE PROGRAM IS DISTRIBUTED UNDER THE BSD LICENSE ON AN "AS IS" BASIS, WITHOUT WARRANTIES OR
REPRESENTATIONS OF ANY KIND, EITHER EXPRESS OR IMPLIED.
Redistribution and use in source and binary forms, with or without modification, are permitted provided that the fol-
lowing conditions are met:
1. Redistributions of source code must retain the above copyright notice, this list of conditions and the following dis-
claimer.
2. Redistributions in binary form must reproduce the above copyright notice, this list of conditions and the following
disclaimer in the documentation and/or other materials provided with the distribution.
3. The name of the author may not be used to endorse or promote products derived from this software without specific
prior written permission.
THIS SOFTWARE IS PROVIDED ``AS IS'' AND ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT
LIMITED TO, THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PUR-
POSE ARE DISCLAIMED. IN NO EVENT SHALL THE AUTHOR BE LIABLE FOR ANY DIRECT, INDIRECT, INCI-
DENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO,
PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTER-
RUPTION) HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT LIA-
BILITY, OR TORT (INCLUDING NEGLIGENCE OR
OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSI-
BILITY OF SUCH DAMAGE.
Permission to use, copy, modify, and distribute this software for any purpose with or without fee is hereby granted,
provided that the above copyright notice and this permission notice appear in all copies.
THE SOFTWARE IS PROVIDED "AS IS" AND TODD C. MILLER DISCLAIMS ALL WARRANTIES WITH REGARD
TO THIS SOFTWARE INCLUDING ALL IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS. IN NO
EVENT SHALL TODD C. MILLER BE LIABLE FOR ANY SPECIAL, DIRECT, INDIRECT, OR CONSEQUENTIAL
DAMAGES OR ANY DAMAGES WHATSOEVER RESULTING FROM LOSS OF USE, DATA OR PROFITS, WHETHER
IN AN ACTION OF CONTRACT, NEGLIGENCE OR OTHER TORTIOUS ACTION, ARISING OUT OF OR IN CON-
NECTION WITH THE USE OR PERFORMANCE OF THIS SOFTWARE.
1545
SGOS Administration Guide
Redistribution and use in source and binary forms, with or without modification, are permitted provided that the fol-
lowing conditions are met:
1. Redistributions of source code must retain the above copyright notice, this list of conditions and the following dis-
claimer.
2. Redistributions in binary form must reproduce the above copyright notice, this list of conditions and the following
disclaimer in the documentation
and/or other materials provided with the distribution.
3. All advertising materials mentioning features or use of this software must display the following acknowledgement:
This product includes software developed by Intel Corporation and its contributors.
4. Neither the name of Intel Corporation or its contributors may be used to endorse or promote products derived from
this software without specific
prior written permission.
THIS SOFTWARE IS PROVIDED BY INTEL CORPORATION AND CONTRIBUTORS ''AS IS'' AND ANY EXPRESS
OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES OF MERCHANT-
ABILITY AND FITNESS FOR A PARTICULAR PURPOSE ARE
DISCLAIMED. IN NO EVENT SHALL INTEL CORPORATION OR CONTRIBUTORS BE LIABLE FOR ANY DIRECT,
INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT
LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR
BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CON-
TRACT, STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT
OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.
THE PROGRAM IS DISTRIBUTED UNDER THE BSD LICENSE ON AN "AS IS" BASIS, WITHOUT WARRANTIES OR
REPRESENTATIONS OF ANY KIND, EITHER EXPRESS OR IMPLIED.
THE PROGRAM IS DISTRIBUTED UNDER THE BSD LICENSE ON AN "AS IS" BASIS, WITHOUT WARRANTIES OR
REPRESENTATIONS OF ANY KIND, EITHER EXPRESS OR IMPLIED.
THE PROGRAM IS DISTRIBUTED UNDER THE BSD LICENSE ON AN "AS IS" BASIS, WITHOUT WARRANTIES OR
REPRESENTATIONS OF ANY KIND, EITHER EXPRESS OR IMPLIED.
THE PROGRAM IS DISTRIBUTED UNDER THE BSD LICENSE ON AN "AS IS" BASIS, WITHOUT WARRANTIES OR
REPRESENTATIONS OF ANY KIND, EITHER EXPRESS OR IMPLIED.
Redistribution and use in source and binary forms, with or without modification, are permitted provided that the fol-
1546
lowing conditions are met:
1. Redistributions of source code must retain the above copyright notice, this list of conditions and the following dis-
claimer.
2. Redistributions in binary form must reproduce the above copyright notice, this list of conditions and the following
disclaimer in the documentation and/or other materials provided with the distribution.
3. All advertising materials mentioning features or use of this software must display the following acknowledgement:
"This product includes software developed by the OpenSSL Project for use in the OpenSSL Toolkit. (http://
www.OpenSSL.org/)"
4. The names "OpenSSL Toolkit" and "OpenSSL Project" must not be used to endorse or promote products derived from
this software without prior written permission. For written permission, please contact [email protected].
5. Products derived from this software may not be called "OpenSSL" nor may "OpenSSL" appear in their names without
prior written permission of the OpenSSL Project.
THIS SOFTWARE IS PROVIDED BY THE OpenSSL PROJECT ``AS IS'' AND ANY EXPRESSED OR IMPLIED WAR-
RANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FIT-
NESS FOR A PARTICULAR PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE OpenSSL PROJECT OR ITS
CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSE-
QUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SER-
VICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY
THEORY OF LIABILITY, WHETHER IN CONTRACT,
STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE
USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.
THE PROGRAM IS DISTRIBUTED UNDER THE BSD LICENSE ON AN "AS IS" BASIS, WITHOUT WARRANTIES OR
REPRESENTATIONS OF ANY KIND, EITHER EXPRESS OR IMPLIED.
THE PROGRAM IS DISTRIBUTED UNDER THE BSD LICENSE ON AN "AS IS" BASIS, WITHOUT WARRANTIES OR
REPRESENTATIONS OF ANY KIND, EITHER EXPRESS OR IMPLIED.
This program and the accompanying materials are licensed and made available under the terms and conditions of the
BSD License which accompanies this distribution. The full text of the license may be found at http://opensource.org/
licenses/bsd-license.php
THE PROGRAM IS DISTRIBUTED UNDER THE BSD LICENSE ON AN "AS IS" BASIS, WITHOUT WARRANTIES OR
REPRESENTATIONS OF ANY KIND, EITHER EXPRESS OR IMPLIED.
This program and the accompanying materials are licensed and made available under the terms and conditions of the
BSD License which accompanies this distribution. The full text of the license may be found at http://opensource.org/
licenses/bsd-license.php
THE PROGRAM IS DISTRIBUTED UNDER THE BSD LICENSE ON AN "AS IS" BASIS, WITHOUT WARRANTIES OR
REPRESENTATIONS OF ANY KIND, EITHER EXPRESS OR IMPLIED.
Redistribution and use in source and binary forms, with or without modification, are permitted provided that the fol-
lowing conditions are met:
1547
SGOS Administration Guide
1. Redistributions of source code must retain the above copyright notice, this list of conditions and the following dis-
claimer.
2. Redistributions in binary form must reproduce the above copyright notice, this list of conditions and the following
disclaimer in the documentation and/or other materials provided with the distribution.
THIS SOFTWARE IS PROVIDED BY THE AUTHOR AND CONTRIBUTORS '' AS IS'' AND ANY EXPRESS OR IM-
PLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES OF MERCHANTABILI-
TY AND FITNESS FOR A PARTICULAR PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE AUTHOR OR
CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSE-
QUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SER-
VICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY
THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE
OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POS-
SIBILITY OF SUCH DAMAGE.
Redistribution and use in source and binary forms, with or without modification, are permitted provided that the fol-
lowing conditions are met:
1. Redistributions of source code must retain the above copyright notice, this list of conditions and the following dis-
claimer.
2. Redistributions in binary form must reproduce the above copyright notice, this list of conditions and the following
disclaimer in the documentation and/or other materials provided with the distribution.
3. All advertising materials mentioning features or use of this software must display the following acknowledgement:
This product includes software developed by the NetBSD Foundation, Inc. and its contributors.
4. Neither the name of The NetBSD Foundation nor the names of its contributors may be used to endorse or promote
products derived from this software without specific prior written permission.
THIS SOFTWARE IS PROVIDED BY THE NETBSD FOUNDATION, INC. AND CONTRIBUTORS ''AS IS'' AND ANY
EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES OF
MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL
THE FOUNDATION OR CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EX-
EMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTI-
TUTE GOODS OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER
CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT (IN-
CLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN
IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.
Redistribution and use in source and binary forms, with or without modification, are permitted provided that the fol-
lowing conditions are met:
1. Redistributions of source code must retain the above copyright notice, this list of conditions and the following dis-
claimer.
2. Redistributions in binary form must reproduce the above copyright notice, this list of conditions and the following
disclaimer in the documentation and/or other materials provided with the distribution.
3. All advertising materials mentioning features or use of this software must display the following acknowledgement:
This product includes software developed by the NetBSD Foundation, Inc. and its contributors.
4. Neither the name of The NetBSD Foundation nor the names of its contributors may be used to endorse or promote
products derived from this software without specific prior written permission.
THIS SOFTWARE IS PROVIDED BY THE NETBSD FOUNDATION, INC. AND CONTRIBUTORS ``AS IS'' AND ANY
EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES OF
MERCHANTABILITY AND FITNESS FOR A PARTICULAR
PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE FOUNDATION OR CONTRIBUTORS BE LIABLE FOR
ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUD-
ING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, DATA, OR
PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER
IN CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY
WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.
1548
All rights reserved.
Redistribution and use in source and binary forms, with or without modification, are permitted provided that the fol-
lowing conditions are met:
1. Redistributions of source code must retain the above copyright notice, this list of conditions and the following dis-
claimer.
2. Redistributions in binary form must reproduce the above copyright notice, this list of conditions and the following
disclaimer in the documentation and/or other materials provided with the distribution.
3. The name of the author may not be used to endorse or promote products derived from this software without specific
prior written permission.
THIS SOFTWARE IS PROVIDED ``AS IS'' AND ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT
LIMITED TO, THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PUR-
POSE ARE DISCLAIMED. IN NO EVENT SHALL THE AUTHOR BE LIABLE FOR ANY DIRECT, INDIRECT, INCI-
DENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO,
PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTER-
RUPTION) HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT LIA-
BILITY, OR TORT (INCLUDING NEGLIGENCE OR
OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSI-
BILITY OF SUCH DAMAGE.
Redistribution and use in source and binary forms, with or without modification, are permitted provided that the fol-
lowing conditions are met:
1. Redistributions of source code must retain the above copyright notice, this list of conditions and the following dis-
claimer.
2. Redistributions in binary form must reproduce the above copyright notice, this list of conditions and the following
disclaimer in the documentation and/or other materials provided with the distribution.
THIS SOFTWARE IS PROVIDED BY THE AUTHOR AND CONTRIBUTORS ``AS IS'' AND ANY EXPRESS OR IM-
PLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES OF MERCHANTABILI-
TY AND FITNESS FOR A PARTICULAR PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE AUTHOR OR
CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSE-
QUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SER-
VICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY
THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE
OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POS-
SIBILITY OF SUCH DAMAGE.
Redistribution and use in source and binary forms, with or without modification, are permitted provided that the fol-
lowing conditions are met:
1. Redistributions of source code must retain the above copyright notice, this list of conditions and the following dis-
claimer.
2. Redistributions in binary form must reproduce the above copyright notice, this list of conditions and the following
disclaimer in the documentation and/or other materials provided with the distribution.
3. All advertising materials mentioning features or use of this software must display the following acknowledgement:
This product includes software developed by Intel Corporation and its contributors.
4. Neither the name of Intel Corporation or its contributors may be used to endorse or promote products derived from
this software without specific prior written permission.
THIS SOFTWARE IS PROVIDED BY INTEL CORPORATION AND CONTRIBUTORS ``AS IS'' AND ANY EXPRESS
OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES OF MERCHANT-
ABILITY AND FITNESS FOR A PARTICULAR PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL INTEL COR-
PORATION OR CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL,
EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUB-
STITUTE GOODS OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER
CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT (IN-
CLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN
IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.
1549
SGOS Administration Guide
Redistribution and use in source and binary forms, with or without modification, are permitted provided that the fol-
lowing conditions are met:
1. Redistributions of source code must retain the above copyright notice, this list of conditions and the following dis-
claimer.
2. Redistributions in binary form must reproduce the above copyright notice, this list of conditions and the following
disclaimer in the documentation and/or other materials provided with the distribution.
3. All advertising materials mentioning features or use of this software must display the following acknowledgement:
This product includes software developed by the NetBSD Foundation, Inc. and its contributors.
4. Neither the name of The NetBSD Foundation nor the names of its contributors may be used to endorse or promote
products derived from this software without specific prior written permission.
THIS SOFTWARE IS PROVIDED BY THE NETBSD FOUNDATION, INC. AND CONTRIBUTORS ``AS IS'' AND ANY
EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES OF
MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL
THE FOUNDATION OR CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EX-
EMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTI-
TUTE GOODS OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER
CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT (IN-
CLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN
IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.
Redistribution and use in source and binary forms, with or without modification, are permitted provided that the fol-
lowing conditions are met:
1. Redistributions of source code must retain the above copyright notice, this list of conditions and the following dis-
claimer.
2. Redistributions in binary form must reproduce the above copyright notice, this list of conditions and the following
disclaimer in the documentation and/or other materials provided with the distribution.
3. All advertising materials mentioning features or use of this software must display the following acknowledgement:
This product includes software developed by the NetBSD Foundation, Inc. and its contributors.
4. Neither the name of The NetBSD Foundation nor the names of its contributors may be used to endorse or promote
products derived from this software without specific prior written permission.
THIS SOFTWARE IS PROVIDED BY THE NETBSD FOUNDATION, INC. AND CONTRIBUTORS ``AS IS'' AND ANY
EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES OF
MERCHANTABILITY AND FITNESS FOR A PARTICULAR
PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE FOUNDATION OR CONTRIBUTORS BE LIABLE FOR
ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUD-
ING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, DATA, OR
PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER
IN CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY
WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.
THE PROGRAM IS DISTRIBUTED UNDER THE BSD LICENSE ON AN "AS IS" BASIS, WITHOUT WARRANTIES OR
REPRESENTATIONS OF ANY KIND, EITHER EXPRESS OR IMPLIED.
Redistribution and use in source and binary forms, with or without modification, are permitted provided that the fol-
lowing conditions are met:
1. Redistributions of source code must retain the above copyright notice, this list of conditions and the following dis-
claimer.
1550
2. Redistributions in binary form must reproduce the above copyright notice, this list of conditions and the following
disclaimer in the documentation and/or other materials provided with the distribution.
THIS SOFTWARE IS PROVIDED BY THE AUTHOR AND CONTRIBUTORS ``AS IS'' AND ANY EXPRESS OR IM-
PLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES OF MERCHANTABILI-
TY AND FITNESS FOR A PARTICULAR PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE AUTHOR OR
CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSE-
QUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SER-
VICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY
THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT
LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE
OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.
Redistribution and use in source and binary forms, with or without modification, are permitted provided that the fol-
lowing conditions are met:
1. Redistributions of source code must retain the above copyright notice, this list of conditions and the following dis-
claimer.
2. Redistributions in binary form must reproduce the above copyright notice, this list of conditions and the following
disclaimer in the documentation and/or other materials provided with the distribution.
THIS SOFTWARE IS PROVIDED BY THE AUTHOR AND CONTRIBUTORS ``AS IS'' AND ANY EXPRESS OR IM-
PLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES OF MERCHANTABILI-
TY AND FITNESS FOR A PARTICULAR PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE AUTHOR OR
CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSE-
QUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SER-
VICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY
THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT
LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE
OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.
Redistribution and use in source and binary forms, with or without modification, are permitted provided that the fol-
lowing conditions are met:
1. Redistributions of source code must retain the above copyright notice, this list of conditions and the following dis-
claimer.
2. Redistributions in binary form must reproduce the above copyright notice, this list of conditions and the following
disclaimer in the documentation and/or other materials provided with the distribution.
3. All advertising materials mentioning features or use of this software must display the following acknowledgement:
This product includes software developed by the NetBSD Foundation, Inc. and its contributors.
4. Neither the name of The NetBSD Foundation nor the names of its contributors may be used to endorse or promote
products derived from this software without specific prior written permission.
THIS SOFTWARE IS PROVIDED BY THE NETBSD FOUNDATION, INC. AND CONTRIBUTORS ``AS IS'' AND ANY
EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES OF
MERCHANTABILITY AND FITNESS FOR A PARTICULAR
PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE FOUNDATION OR CONTRIBUTORS BE LIABLE FOR
ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUD-
ING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, DATA, OR
PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER
IN CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY
WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.
Redistribution and use in source and binary forms, with or without modification, are permitted provided that the fol-
lowing conditions are met:
1. Redistributions of source code must retain the above copyright notice, this list of conditions and the following dis-
claimer.
2. Redistributions in binary form must reproduce the above copyright notice, this list of conditions and the following
disclaimer in the documentation and/or other materials provided with the distribution.
1551
SGOS Administration Guide
THIS SOFTWARE IS PROVIDED BY THE NETBSD FOUNDATION, INC. AND CONTRIBUTORS ``AS IS'' AND ANY
EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES OF
MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL
THE FOUNDATION OR CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EX-
EMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF
SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEV-
ER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT (IN-
CLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN
IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.
Redistribution and use in source and binary forms, with or without modification, are permitted provided that the fol-
lowing conditions are met:
1. Redistributions of source code must retain the above copyright notice, this list of conditions and the following dis-
claimer.
2. Redistributions in binary form must reproduce the above copyright notice, this list of conditions and the following
disclaimer in the documentation and/or other materials provided with the distribution.
THIS SOFTWARE IS PROVIDED BY THE AUTHOR ``AS IS'' AND ANY EXPRESS OR IMPLIED WARRANTIES, IN-
CLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A
PARTICULAR PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE AUTHOR BE LIABLE FOR ANY DIRECT,
INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT
LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR
BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CON-
TRACT, STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT
OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.
This program and the accompanying materials are licensed and made available under the terms and conditions of the
BSD License which accompanies this distribution. The full text of the license may be found at http://opensource.org/
licenses/bsd-license.php
THE PROGRAM IS DISTRIBUTED UNDER THE BSD LICENSE ON AN "AS IS" BASIS, WITHOUT WARRANTIES
OR REPRESENTATIONS OF ANY KIND, EITHER EXPRESS OR IMPLIED.
This program and the accompanying materials are licensed and made available under the terms and conditions of the
BSD License which accompanies this distribution. The full text of the license may be found at http://opensource.org/
licenses/bsd-license.php
THE PROGRAM IS DISTRIBUTED UNDER THE BSD LICENSE ON AN "AS IS" BASIS, WITHOUT WARRANTIES
OR REPRESENTATIONS OF ANY KIND, EITHER EXPRESS OR IMPLIED.
Redistribution and use in source and binary forms, with or without modification, are permitted provided that the fol-
lowing conditions are met:
1. Redistributions of source code must retain the above copyright notice, this list of conditions and the following dis-
claimer.
2. Redistributions in binary form must reproduce the above copyright notice, this list of conditions and the following
disclaimer in the documentation and/or other materials provided with the distribution.
THIS SOFTWARE IS PROVIDED BY THE AUTHOR ``AS IS'' AND ANY EXPRESS OR IMPLIED WARRANTIES, IN-
CLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A
PARTICULAR PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE AUTHOR BE LIABLE FOR ANY DIRECT,
INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT
LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR
BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CON-
TRACT, STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT
OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.
1552
Redistribution and use in source and binary forms, with or without modification, are permitted provided that the fol-
lowing conditions are met:
1. Redistributions of source code must retain the above copyright notice, this list of conditions and the following dis-
claimer.
2. Redistributions in binary form must reproduce the above copyright notice, this list of conditions and the following
disclaimer in the documentation and/or other materials provided with the distribution.
THIS SOFTWARE IS PROVIDED BY THE AUTHOR AND CONTRIBUTORS ``AS IS'' AND ANY EXPRESS OR IM-
PLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES OF MERCHANTABILI-
TY AND FITNESS FOR A PARTICULAR PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE AUTHOR OR
CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSE-
QUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SER-
VICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY
THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE
OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POS-
SIBILITY OF SUCH DAMAGE.
Redistribution and use in source and binary forms, with or without modification, are permitted provided that the fol-
lowing conditions are met:
1. Redistributions of source code must retain the above copyright notice, this list of conditions and the following dis-
claimer.
2. Redistributions in binary form must reproduce the above copyright notice, this list of conditions and the following
disclaimer in the documentation and/or other materials provided with the distribution.
3. All advertising materials mentioning features or use of this software must display the following acknowledgement:
This product includes software developed by the NetBSD Foundation, Inc. and its contributors.
4. Neither the name of The NetBSD Foundation nor the names of its contributors may be used to endorse or promote
products derived from this software without specific prior written permission.
THIS SOFTWARE IS PROVIDED BY THE NETBSD FOUNDATION, INC. AND CONTRIBUTORS ``AS IS'' AND ANY
EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES OF
MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL
THE FOUNDATION OR CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EX-
EMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTI-
TUTE GOODS OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER
CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT (IN-
CLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN
IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.
Redistribution and use in source and binary forms, with or without modification, are permitted provided that the fol-
lowing conditions are met:
1. Redistributions of source code must retain the above copyright notice, this list of conditions and the following dis-
claimer.
2. Redistributions in binary form must reproduce the above copyright notice, this list of conditions and the following
disclaimer in the documentation and/or other materials provided with the distribution.
THIS SOFTWARE IS PROVIDED BY THE AUTHOR AND CONTRIBUTORS ``AS IS'' AND ANY EXPRESS OR IM-
PLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES OF MERCHANTABILI-
TY AND FITNESS FOR A PARTICULAR PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE AUTHOR OR
CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSE-
QUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SER-
VICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY
THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT
LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE
OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.
Redistribution and use in source and binary forms, with or without modification, are permitted provided that the fol-
lowing conditions are met:
1553
SGOS Administration Guide
1. Redistributions of source code must retain the above copyright notice, this list of conditions and the following dis-
claimer.
2. Redistributions in binary form must reproduce the above copyright notice, this list of conditions and the following
disclaimer in the documentation and/or other materials provided with the distribution.
THIS SOFTWARE IS PROVIDED BY THE AUTHOR AND CONTRIBUTORS ``AS IS'' AND ANY EXPRESS OR IM-
PLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES OF MERCHANTABILI-
TY AND FITNESS FOR A PARTICULAR PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE AUTHOR OR
CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSE-
QUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SER-
VICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY
THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT
LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE
OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.
Redistribution and use in source and binary forms, with or without modification, are permitted provided that the fol-
lowing conditions are met:
1. Redistributions of source code must retain the above copyright notice, this list of conditions and the following dis-
claimer.
2. Redistributions in binary form must reproduce the above copyright notice, this list of conditions and the following
disclaimer in the documentation and/or other materials provided with the distribution.
THIS SOFTWARE IS PROVIDED BY THE AUTHOR AND CONTRIBUTORS ``AS IS'' AND ANY EXPRESS OR IM-
PLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES OF MERCHANTABILI-
TY AND FITNESS FOR A PARTICULAR PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE AUTHOR OR
CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSE-
QUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SER-
VICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY
THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE
OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POS-
SIBILITY OF SUCH DAMAGE.
Redistribution and use in source and binary forms, with or without modification, are permitted provided that the fol-
lowing conditions are met:
1. Redistributions of source code must retain the above copyright notice, this list of conditions and the following dis-
claimer.
2. Redistributions in binary form must reproduce the above copyright notice, this list of conditions and the following
disclaimer in the documentation and/or other materials provided with the distribution.
THIS SOFTWARE IS PROVIDED BY THE AUTHOR AND CONTRIBUTORS ``AS IS'' AND ANY EXPRESS OR IM-
PLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES OF MERCHANTABILI-
TY AND FITNESS FOR A PARTICULAR PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE AUTHOR OR
CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSE-
QUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SER-
VICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY
THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE
OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POS-
SIBILITY OF SUCH DAMAGE.
Redistribution and use in source and binary forms, with or without modification, are permitted provided that the fol-
lowing conditions are met:
1. Redistributions of source code must retain the above copyright notice, this list of conditions and the following dis-
claimer.
2. Redistributions in binary form must reproduce the above copyright notice, this list of conditions and the following
disclaimer in the documentation and/or other materials provided with the distribution.
1554
THIS SOFTWARE IS PROVIDED BY THE AUTHOR AND CONTRIBUTORS ``AS IS'' AND ANY EXPRESS OR IM-
PLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES OF MERCHANTABILI-
TY AND FITNESS FOR A PARTICULAR PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE AUTHOR OR
CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSE-
QUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SER-
VICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY
THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE
OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POS-
SIBILITY OF SUCH DAMAGE.
Developed by:
LLVM Team
http://llvm.org
Permission is hereby granted, free of charge, to any person obtaining a copy of this software and associated documen-
tation files (the "Software"), to deal with the Software without restriction, including without limitation the rights to use,
copy, modify, merge, publish, distribute, sublicense, and/or sell copies of the Software, and to permit persons to whom
the Software is furnished to do so, subject to the following conditions:
Redistributions of source code must retain the above copyright notice, this list of conditions and the following dis-
claimers.
Redistributions in binary form must reproduce the above copyright notice, this list of conditions and the following
disclaimers in the documentation and/or other materials provided with the distribution.
Neither the names of the LLVM Team, University of Illinois at Urbana-Champaign, nor the names of its contributors
may be used to endorse or promote products derived from this Software without specific prior written permission.
THE SOFTWARE IS PROVIDED "AS IS", WITHOUT WARRANTY OF ANY KIND, EXPRESS OR IMPLIED, INCLUD-
ING BUT NOT LIMITED TO THE WARRANTIES OF MERCHANTABILITY, FITNESS FOR A PARTICULAR PUR-
POSE AND NONINFRINGEMENT. IN NO EVENT SHALL THE CONTRIBUTORS OR COPYRIGHT HOLDERS BE
LIABLE FOR ANY CLAIM, DAMAGES OR OTHER LIABILITY, WHETHER IN AN ACTION OF CONTRACT, TORT
OR OTHERWISE, ARISING FROM, OUT OF OR IN CONNECTION WITH THE SOFTWARE OR THE USE OR OTHER
DEALINGS WITH THE SOFTWARE.
Redistribution and use in source and binary forms, with or without modification, are permitted provided that the fol-
lowing conditions are met:
1. Redistributions of source code must retain the above copyright notice, this list of conditions and the following dis-
claimer.
2. Redistributions in binary form must reproduce the above copyright notice, this list of conditions and the following
disclaimer in the documentation and/or other materials provided with the distribution.
THIS SOFTWARE IS PROVIDED BY THE AUTHOR AND CONTRIBUTORS ``AS IS'' AND ANY EXPRESS OR IM-
PLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES OF MERCHANTABILI-
TY AND FITNESS FOR A PARTICULAR PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE AUTHOR OR
CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSE-
QUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SER-
VICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY
THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT
LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF
THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.
Redistribution and use in source and binary forms, with or without modification, are permitted provided that the fol-
lowing conditions are met:
1. Redistributions of source code must retain the above copyright notice, this list of conditions and the following dis-
claimer.
1555
SGOS Administration Guide
2. Redistributions in binary form must reproduce the above copyright notice, this list of conditions and the following
disclaimer in the documentation and/or other materials provided with the distribution.
THIS SOFTWARE IS PROVIDED BY THE AUTHOR AND CONTRIBUTORS ``AS IS'' AND ANY EXPRESS OR IM-
PLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES OF MERCHANTABILI-
TY AND FITNESS FOR A PARTICULAR PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE AUTHOR OR
CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSE-
QUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SER-
VICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY
THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICTLIABILITY, OR TORT (INCLUDING NEGLIGENCE OR
OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSI-
BILITY OF SUCH DAMAGE.
This program and the accompanying materials are licensed and made available under the terms and conditions of the
BSD License which accompanies this distribution. The full text of the license may be found at http://opensource.org/
licenses/bsd-license.php
THE PROGRAM IS DISTRIBUTED UNDER THE BSD LICENSE ON AN "AS IS" BASIS, WITHOUT WARRANTIES OR
REPRESENTATIONS OF ANY KIND, EITHER EXPRESS OR IMPLIED.
THE PROGRAM IS DISTRIBUTED UNDER THE BSD LICENSE ON AN "AS IS" BASIS, WITHOUT WARRANTIES OR
REPRESENTATIONS OF ANY KIND, EITHER EXPRESS OR IMPLIED.
THE PROGRAM IS DISTRIBUTED UNDER THE BSD LICENSE ON AN "AS IS" BASIS,
WITHOUT WARRANTIES OR REPRESENTATIONS OF ANY KIND, EITHER EXPRESS OR IMPLIED.
THE PROGRAM IS DISTRIBUTED UNDER THE BSD LICENSE ON AN "AS IS" BASIS, WITHOUT WARRANTIES OR
REPRESENTATIONS OF ANY KIND, EITHER EXPRESS OR IMPLIED.
THE PROGRAM IS DISTRIBUTED UNDER THE BSD LICENSE ON AN "AS IS" BASIS, WITHOUT WARRANTIES OR
REPRESENTATIONS OF ANY KIND, EITHER EXPRESS OR IMPLIED.
THE PROGRAM IS DISTRIBUTED UNDER THE BSD LICENSE ON AN "AS IS" BASIS, WITHOUT WARRANTIES OR
REPRESENTATIONS OF ANY KIND, EITHER EXPRESS OR IMPLIED.
1556
licenses/bsd-license.php.
THE PROGRAM IS DISTRIBUTED UNDER THE BSD LICENSE ON AN "AS IS" BASIS, WITHOUT WARRANTIES
OR REPRESENTATIONS OF ANY KIND, EITHER EXPRESS OR IMPLIED.
THE PROGRAM IS DISTRIBUTED UNDER THE BSD LICENSE ON AN "AS IS" BASIS, WITHOUT WARRANTIES OR
REPRESENTATIONS OF ANY KIND, EITHER EXPRESS OR IMPLIED.
This program and the accompanying materials are licensed and made available under the terms and conditions of the
BSD License which accompanies this distribution. The full text of the license may be found at http://opensource.org/
licenses/bsd-license.php
THE PROGRAM IS DISTRIBUTED UNDER THE BSD LICENSE ON AN "AS IS" BASIS, WITHOUT WARRANTIES OR
REPRESENTATIONS OF ANY KIND, EITHER EXPRESS OR IMPLIED.
This program and the accompanying materials are licensed and made available under the terms and conditions of the
BSD License which accompanies this distribution. The full text of the license may be found at http://opensource.org/
licenses/bsd-license.php
THE PROGRAM IS DISTRIBUTED UNDER THE BSD LICENSE ON AN "AS IS" BASIS, WITHOUT WARRANTIES OR
REPRESENTATIONS OF ANY KIND, EITHER EXPRESS OR IMPLIED.
THE PROGRAM IS DISTRIBUTED UNDER THE BSD LICENSE ON AN "AS IS" BASIS, WITHOUT WARRANTIES OR
REPRESENTATIONS OF ANY KIND, EITHER EXPRESS OR IMPLIED.
This program and the accompanying materials are licensed and made available under the terms and conditions of the
BSD License which accompanies this distribution. The full text of the license may be found at http://opensource.org/
licenses/bsd-license.php
THE PROGRAM IS DISTRIBUTED UNDER THE BSD LICENSE ON AN "AS IS" BASIS, WITHOUT WARRANTIES OR
REPRESENTATIONS OF ANY KIND, EITHER EXPRESS OR IMPLIED.
THE PROGRAM IS DISTRIBUTED UNDER THE BSD LICENSE ON AN "AS IS" BASIS, WITHOUT WARRANTIES OR
REPRESENTATIONS OF ANY KIND, EITHER EXPRESS OR IMPLIED.
1557
SGOS Administration Guide
licenses/bsd-license.php
THE PROGRAM IS DISTRIBUTED UNDER THE BSD LICENSE ON AN "AS IS" BASIS, WITHOUT WARRANTIES OR
REPRESENTATIONS OF ANY KIND, EITHER EXPRESS OR IMPLIED.
THE PROGRAM IS DISTRIBUTED UNDER THE BSD LICENSE ON AN "AS IS" BASIS, WITHOUT WARRANTIES OR
REPRESENTATIONS OF ANY KIND, EITHER EXPRESS OR IMPLIED.
THE PROGRAM IS DISTRIBUTED UNDER THE BSD LICENSE ON AN "AS IS" BASIS, WITHOUT WARRANTIES
OR REPRESENTATIONS OF ANY KIND, EITHER EXPRESS OR IMPLIED.
THE PROGRAM IS DISTRIBUTED UNDER THE BSD LICENSE ON AN "AS IS" BASIS, WITHOUT WARRANTIES OR
REPRESENTATIONS OF ANY KIND, EITHER EXPRESS OR IMPLIED.
THE PROGRAM IS DISTRIBUTED UNDER THE BSD LICENSE ON AN "AS IS" BASIS, WITHOUT WARRANTIES OR
REPRESENTATIONS OF ANY KIND, EITHER EXPRESS OR IMPLIED.
This program and the accompanying materials are licensed and made available under the terms and conditions of the
BSD License which accompanies this distribution. The full text of the license may be found at http://opensource.org/
licenses/bsd-license.php
THE PROGRAM IS DISTRIBUTED UNDER THE BSD LICENSE ON AN "AS IS" BASIS, WITHOUT WARRANTIES OR
REPRESENTATIONS OF ANY KIND, EITHER EXPRESS OR IMPLIED.
THE PROGRAM IS DISTRIBUTED UNDER THE BSD LICENSE ON AN "AS IS" BASIS, WITHOUT WARRANTIES OR
REPRESENTATIONS OF ANY KIND, EITHER EXPRESS OR IMPLIED.
THE PROGRAM IS DISTRIBUTED UNDER THE BSD LICENSE ON AN "AS IS" BASIS, WITHOUT WARRANTIES
OR REPRESENTATIONS OF ANY KIND, EITHER EXPRESS OR IMPLIED.
1558
Redistribution and use in source and binary forms, with or without modification, are permitted provided that the fol-
lowing conditions are met:
1. Redistributions of source code must retain the above copyright notice, this list of conditions and the following dis-
claimer.
2. Redistributions in binary form must reproduce the above copyright notice, this list of conditions and the following
disclaimer in the documentation and/or other materials provided with the distribution.
THIS SOFTWARE IS PROVIDED BY THE AUTHOR ``AS IS'' AND ANY EXPRESS OR IMPLIED WARRANTIES, IN-
CLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A
PARTICULAR PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE AUTHOR BE LIABLE FOR ANY DIRECT,
INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT
LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR
BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CON-
TRACT, STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT
OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.
Redistribution and use in source and binary forms, with or without modification, are permitted provided that the fol-
lowing conditions are met:
1. Redistributions of source code must retain the above copyright notice, this list of conditions and the following dis-
claimer.
2. Redistributions in binary form must reproduce the above copyright notice, this list of conditions and the following
disclaimer in the documentation and/or other materials provided with the distribution.
3. All advertising materials mentioning features or use of this software must display the following acknowledgement:
This product includes software developed by the NetBSD Foundation, Inc. and its contributors.
4. Neither the name of The NetBSD Foundation nor the names of its contributors may be used to endorse or promote
products derived from this software without specific prior written permission.
THIS SOFTWARE IS PROVIDED BY THE NETBSD FOUNDATION, INC. AND CONTRIBUTORS ``AS IS'' AND ANY
EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES OF
MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL
THE FOUNDATION OR CONTRIBUTORS BE LIABLE FOR ANY DIRECT,INDIRECT,INCIDENTAL, SPECIAL, EX-
EMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTI-
TUTE GOODS OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER
CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT (IN-
CLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN
IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.
Permission to use, copy, modify, and distribute this software for any purpose with or without fee is hereby granted,
provided that the above copyright notice and this permission notice appear in all copies.
THE SOFTWARE IS PROVIDED "AS IS" AND ISC DISCLAIMS ALL WARRANTIES WITH REGARD TO THIS SOFT-
WARE INCLUDING ALL IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS. IN NO EVENT SHALL
ISC BE LIABLE FOR ANY SPECIAL, DIRECT, INDIRECT, OR CONSEQUENTIAL DAMAGES OR ANY DAMAGES
WHATSOEVER RESULTING FROM LOSS OF USE, DATA OR PROFITS, WHETHER IN AN ACTION OF CON-
TRACT, NEGLIGENCE OR OTHER TORTIOUS ACTION, ARISING OUT OF OR IN CONNECTION WITH THE USE
OR PERFORMANCE OF THIS SOFTWARE.
Permission to use, copy, modify, and distribute this software for any purpose with or without fee is hereby granted,
provided that the above copyright notice and this permission notice appear in all copies.
THE SOFTWARE IS PROVIDED "AS IS" AND ISC DISCLAIMS ALL WARRANTIES WITH REGARD TO THIS SOFT-
WARE INCLUDING ALL IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS. IN NO EVENT SHALL
ISC BE LIABLE FOR ANY SPECIAL, DIRECT, INDIRECT, OR CONSEQUENTIAL DAMAGES OR ANY DAMAGES
WHATSOEVER RESULTING FROM LOSS OF USE, DATA OR PROFITS, WHETHER IN AN ACTION OF CON-
TRACT, NEGLIGENCE OR OTHER TORTIOUS ACTION, ARISING OUT OF OR IN CONNECTION WITH THE USE
OR PERFORMANCE OF THIS SOFTWARE.
1559
SGOS Administration Guide
BSD License which accompanies this distribution. The full text of the license may be found at http://opensource.org/
licenses/bsd-license.php
THE PROGRAM IS DISTRIBUTED UNDER THE BSD LICENSE ON AN "AS IS" BASIS, WITHOUT WARRANTIES OR
REPRESENTATIONS OF ANY KIND, EITHER EXPRESS OR IMPLIED.
THE PROGRAM IS DISTRIBUTED UNDER THE BSD LICENSE ON AN "AS IS" BASIS, WITHOUT WARRANTIES OR
REPRESENTATIONS OF ANY KIND, EITHER EXPRESS OR IMPLIED.
THE PROGRAM IS DISTRIBUTED UNDER THE BSD LICENSE ON AN "AS IS" BASIS, WITHOUT WARRANTIES OR
REPRESENTATIONS OF ANY KIND, EITHER EXPRESS OR IMPLIED.
THE PROGRAM IS DISTRIBUTED UNDER THE BSD LICENSE ON AN "AS IS" BASIS, WITHOUT WARRANTIES OR
REPRESENTATIONS OF ANY KIND, EITHER EXPRESS OR IMPLIED.
THE PROGRAM IS DISTRIBUTED UNDER THE BSD LICENSE ON AN "AS IS" BASIS, WITHOUT WARRANTIES OR
REPRESENTATIONS OF ANY KIND, EITHER EXPRESS OR IMPLIED.
THE PROGRAM IS DISTRIBUTED UNDER THE BSD LICENSE ON AN "AS IS" BASIS, WITHOUT WARRANTIES OR
REPRESENTATIONS OF ANY KIND, EITHER EXPRESS OR IMPLIED.
THE PROGRAM IS DISTRIBUTED UNDER THE BSD LICENSE ON AN "AS IS" BASIS, WITHOUT WARRANTIES OR
REPRESENTATIONS OF ANY KIND, EITHER EXPRESS OR IMPLIED.
THE PROGRAM IS DISTRIBUTED UNDER THE BSD LICENSE ON AN "AS IS" BASIS, WITHOUT WARRANTIES OR
REPRESENTATIONS OF ANY KIND, EITHER EXPRESS OR IMPLIED.
1560
BSD License which accompanies this distribution. The full text of the license may be found at http://opensource.org/
licenses/bsd-license.php
THE PROGRAM IS DISTRIBUTED UNDER THE BSD LICENSE ON AN "AS IS" BASIS, WITHOUT WARRANTIES OR
REPRESENTATIONS OF ANY KIND, EITHER EXPRESS OR IMPLIED.
THE PROGRAM IS DISTRIBUTED UNDER THE BSD LICENSE ON AN "AS IS" BASIS, WITHOUT WARRANTIES OR
REPRESENTATIONS OF ANY KIND, EITHER EXPRESS OR IMPLIED.
THE PROGRAM IS DISTRIBUTED UNDER THE BSD LICENSE ON AN "AS IS" BASIS, WITHOUT WARRANTIES OR
REPRESENTATIONS OF ANY KIND, EITHER EXPRESS OR IMPLIED.
THE PROGRAM IS DISTRIBUTED UNDER THE BSD LICENSE ON AN "AS IS" BASIS, WITHOUT WARRANTIES OR
REPRESENTATIONS OF ANY KIND, EITHER EXPRESS OR IMPLIED.
THE PROGRAM IS DISTRIBUTED UNDER THE BSD LICENSE ON AN "AS IS" BASIS, WITHOUT WARRANTIES
OR REPRESENTATIONS OF ANY KIND, EITHER EXPRESS OR IMPLIED.
THE PROGRAM IS DISTRIBUTED UNDER THE BSD LICENSE ON AN "AS IS" BASIS, WITHOUT WARRANTIES OR
REPRESENTATIONS OF ANY KIND, EITHER EXPRESS OR IMPLIED.
THE PROGRAM IS DISTRIBUTED UNDER THE BSD LICENSE ON AN "AS IS" BASIS, WITHOUT WARRANTIES OR
REPRESENTATIONS OF ANY KIND, EITHER EXPRESS OR IMPLIED.
THE PROGRAM IS DISTRIBUTED UNDER THE BSD LICENSE ON AN "AS IS" BASIS, WITHOUT WARRANTIES
OR REPRESENTATIONS OF ANY KIND, EITHER EXPRESS OR IMPLIED.
1561
SGOS Administration Guide
This program and the accompanying materials are licensed and made available under the terms and conditions of the
BSD License which accompanies this distribution. The full text of the license may be found at http://opensource.org/
licenses/bsd-license.php
THE PROGRAM IS DISTRIBUTED UNDER THE BSD LICENSE ON AN "AS IS" BASIS,WITHOUT WARRANTIES OR
REPRESENTATIONS OF ANY KIND, EITHER EXPRESS OR IMPLIED.
This program and the accompanying materials are licensed and made available under the terms and conditions of the
BSD License which accompanies this distribution. The full text of the license may be found at http://opensource.org/
licenses/bsd-license.php
THE PROGRAM IS DISTRIBUTED UNDER THE BSD LICENSE ON AN "AS IS" BASIS, WITHOUT WARRANTIES OR
REPRESENTATIONS OF ANY KIND, EITHER EXPRESS OR IMPLIED.
This program and the accompanying materials are licensed and made available under the terms and conditions of the
BSD License which accompanies this distribution. The full text of the license may be found at http://opensource.org/
licenses/bsd-license.php
THE PROGRAM IS DISTRIBUTED UNDER THE BSD LICENSE ON AN "AS IS" BASIS, WITHOUT WARRANTIES OR
REPRESENTATIONS OF ANY KIND, EITHER EXPRESS OR IMPLIED.
This program and the accompanying materials are licensed and made available under the terms and conditions of the
BSD License which accompanies this distribution. The full text of the license may be found at http://opensource.org/
licenses/bsd-license.php
THE PROGRAM IS DISTRIBUTED UNDER THE BSD LICENSE ON AN "AS IS" BASIS, WITHOUT WARRANTIES OR
REPRESENTATIONS OF ANY KIND, EITHER EXPRESS OR IMPLIED.
This program and the accompanying materials are licensed and made available under the terms and conditions of the
BSD License which accompanies this distribution. The full text of the license may be found at http://opensource.org/
licenses/bsd-license.php
THE PROGRAM IS DISTRIBUTED UNDER THE BSD LICENSE ON AN "AS IS" BASIS, WITHOUT WARRANTIES OR
REPRESENTATIONS OF ANY KIND, EITHER EXPRESS OR IMPLIED.
This program and the accompanying materials are licensed and made available under the terms and conditions of the
BSD License which accompanies this distribution. The full text of the license may be found at: http://opensource.org/
licenses/bsd-license.php
THE PROGRAM IS DISTRIBUTED UNDER THE BSD LICENSE ON AN "AS IS" BASIS, WITHOUT WARRANTIES
OR REPRESENTATIONS OF ANY KIND, EITHER EXPRESS OR IMPLIED.
This program and the accompanying materials are licensed and made available under the terms and conditions of the
BSD License which accompanies this distribution. The full text of the license may be found at http://opensource.org/
licenses/bsd-license.php
1562
Copyright (c) 2006, Intel Corporation.
All rights reserved.
This program and the accompanying materials are licensed and made available under the terms and conditions of the
BSD License which accompanies this distribution. The full text of the license may be found at http://opensource.org/
licenses/bsd-license.php
THE PROGRAM IS DISTRIBUTED UNDER THE BSD LICENSE ON AN "AS IS" BASIS, WITHOUT WARRANTIES
OR REPRESENTATIONS OF ANY KIND, EITHER EXPRESS OR IMPLIED.
THE PROGRAM IS DISTRIBUTED UNDER THE BSD LICENSE ON AN "AS IS" BASIS, WITHOUT WARRANTIES OR
REPRESENTATIONS OF ANY KIND, EITHER EXPRESS OR IMPLIED.
This program and the accompanying materials are licensed and made available under the terms and conditions of the
BSD License which accompanies this distribution. The full text of the license may be found at http://opensource.org/
licenses/bsd-license.php
THE PROGRAM IS DISTRIBUTED UNDER THE BSD LICENSE ON AN "AS IS" BASIS, WITHOUT WARRANTIES OR
REPRESENTATIONS OF ANY KIND, EITHER EXPRESS OR IMPLIED.
This program and the accompanying materials are licensed and made available under the terms and conditions of the
BSD License which accompanies this distribution. The full text of the license may be found at http://opensource.org/
licenses/bsd-license.php
THE PROGRAM IS DISTRIBUTED UNDER THE BSD LICENSE ON AN "AS IS" BASIS, WITHOUT WARRANTIES
OR REPRESENTATIONS OF ANY KIND, EITHER EXPRESS OR IMPLIED.
This program and the accompanying materials are licensed and made available under the terms and conditions of the
BSD License which accompanies this distribution. The full text of the license may be found at: http://opensource.org/
licenses/bsd-license.php
THE PROGRAM IS DISTRIBUTED UNDER THE BSD LICENSE ON AN "AS IS" BASIS, WITHOUT WARRANTIES
OR REPRESENTATIONS OF ANY KIND, EITHER EXPRESS OR IMPLIED.
THE PROGRAM IS DISTRIBUTED UNDER THE BSD LICENSE ON AN "AS IS" BASIS, WITHOUT WARRANTIES OR
REPRESENTATIONS OF ANY KIND, EITHER EXPRESS OR IMPLIED.
This program and the accompanying materials are licensed and made available under the terms and conditions of the
BSD License which accompanies this distribution. The full text of the license may be found at http://opensource.org/
licenses/bsd-license.php
THE PROGRAM IS DISTRIBUTED UNDER THE BSD LICENSE ON AN "AS IS" BASIS, WITHOUT WARRANTIES
OR REPRESENTATIONS OF ANY KIND, EITHER EXPRESS OR IMPLIED.
1563
SGOS Administration Guide
THE PROGRAM IS DISTRIBUTED UNDER THE BSD LICENSE ON AN "AS IS" BASIS, WITHOUT WARRANTIES
OR REPRESENTATIONS OF ANY KIND, EITHER EXPRESS OR IMPLIED.
This program and the accompanying materials are licensed and made available under the terms and conditions of the
BSD License which accompanies this distribution. The full text of the license may be found at http://opensource.org/
licenses/bsd-license.php
THE PROGRAM IS DISTRIBUTED UNDER THE BSD LICENSE ON AN "AS IS" BASIS, WITHOUT WARRANTIES OR
REPRESENTATIONS OF ANY KIND, EITHER EXPRESS OR IMPLIED.
This program and the accompanying materials are licensed and made available under the terms and conditions of the
BSD License which accompanies this distribution. The full text of the license may be found at http://opensource.org/
licenses/bsd-license.php
THE PROGRAM IS DISTRIBUTED UNDER THE BSD LICENSE ON AN "AS IS" BASIS, WITHOUT WARRANTIES OR
REPRESENTATIONS OF ANY KIND, EITHER EXPRESS OR IMPLIED.
This program and the accompanying materials are licensed and made available under the terms and conditions of the
BSD License which accompanies this distribution. The full text of the license may be found at http://opensource.org/
licenses/bsd-license.php
THE PROGRAM IS DISTRIBUTED UNDER THE BSD LICENSE ON AN "AS IS" BASIS, WITHOUT WARRANTIES OR
REPRESENTATIONS OF ANY KIND, EITHER EXPRESS OR IMPLIED.
This program and the accompanying materials are licensed and made available under the terms and conditions of the
BSD License which accompanies this distribution. The full text of the license may be found at http://opensource.org/
licenses/bsd-license.php
THE PROGRAM IS DISTRIBUTED UNDER THE BSD LICENSE ON AN "AS IS" BASIS, WITHOUT WARRANTIES OR
REPRESENTATIONS OF ANY KIND, EITHER EXPRESS OR IMPLIED.
This program and the accompanying materials are licensed and made available under the terms and conditions of the
BSD License which accompanies this distribution. The full text of the license may be found at http://opensource.org/
licenses/bsd-license.php
THE PROGRAM IS DISTRIBUTED UNDER THE BSD LICENSE ON AN "AS IS" BASIS, WITHOUT WARRANTIES OR
REPRESENTATIONS OF ANY KIND, EITHER EXPRESS OR IMPLIED.
This program and the accompanying materials are licensed and made available under the terms and conditions of the
1564
BSD License which accompanies this distribution. The full text of the license may be found at: http://opensource.org/
licenses/bsd-license.php
THE PROGRAM IS DISTRIBUTED UNDER THE BSD LICENSE ON AN "AS IS" BASIS, WITHOUT WARRANTIES
OR REPRESENTATIONS OF ANY KIND, EITHER EXPRESS OR IMPLIED.
This program and the accompanying materials are licensed and made available under the terms and conditions of the
BSD License which accompanies this distribution. The full text of the license may be found at http://opensource.org/
licenses/bsd-license.php.
THE PROGRAM IS DISTRIBUTED UNDER THE BSD LICENSE ON AN "AS IS" BASIS, WITHOUT WARRANTIES
OR REPRESENTATIONS OF ANY KIND, EITHER EXPRESS OR IMPLIED.
This program and the accompanying materials are licensed and made available under the terms and conditions of the
BSD License which accompanies this distribution. The full text of the license may be found at http://opensource.org/
licenses/bsd-license.php
THE PROGRAM IS DISTRIBUTED UNDER THE BSD LICENSE ON AN "AS IS" BASIS, WITHOUT WARRANTIES
OR REPRESENTATIONS OF ANY KIND, EITHER EXPRESS OR IMPLIED.
This program and the accompanying materials are licensed and made available under the terms and conditions of the
BSD License which accompanies this distribution. The full text of the license may be found at http://opensource.org/
licenses/bsd-license.php.
THE PROGRAM IS DISTRIBUTED UNDER THE BSD LICENSE ON AN "AS IS" BASIS, WITHOUT WARRANTIES
OR REPRESENTATIONS OF ANY KIND, EITHER EXPRESS OR IMPLIED.
This program and the accompanying materials are licensed and made available under the terms and conditions of the
BSD License which accompanies this distribution. The full text of the license may be found at http://opensource.org/
licenses/bsd-license.php
THE PROGRAM IS DISTRIBUTED UNDER THE BSD LICENSE ON AN "AS IS" BASIS, WITHOUT WARRANTIES OR
REPRESENTATIONS OF ANY KIND, EITHER EXPRESS OR IMPLIED.
This program and the accompanying materials are licensed and made available under the terms and conditions of the
BSD License which accompanies this distribution. The full text of the license may be found at http://opensource.org/
licenses/bsd-license.php.
THE PROGRAM IS DISTRIBUTED UNDER THE BSD LICENSE ON AN "AS IS" BASIS, WITHOUT WARRANTIES
OR REPRESENTATIONS OF ANY KIND, EITHER EXPRESS OR IMPLIED.
This program and the accompanying materials are licensed and made available under the terms and conditions of the
BSD License which accompanies this distribution. The full text of the license may be found at http://opensource.org/
licenses/bsd-license.php
THE PROGRAM IS DISTRIBUTED UNDER THE BSD LICENSE ON AN "AS IS" BASIS, WITHOUT WARRANTIES OR
REPRESENTATIONS OF ANY KIND, EITHER EXPRESS OR IMPLIED.
1565
SGOS Administration Guide
This program and the accompanying materials are licensed and made available under the terms and conditions of the
BSD License which accompanies this distribution. The full text of the license may be found at http://opensource.org/
licenses/bsd-license.php
THE PROGRAM IS DISTRIBUTED UNDER THE BSD LICENSE ON AN "AS IS" BASIS, WITHOUT WARRANTIES OR
REPRESENTATIONS OF ANY KIND, EITHER EXPRESS OR IMPLIED.
This program and the accompanying materials are licensed and made available under the terms and conditions of the
BSD License which accompanies this distribution. The full text of the license may be found at http://opensource.org/
licenses/bsd-license.php.
THE PROGRAM IS DISTRIBUTED UNDER THE BSD LICENSE ON AN "AS IS" BASIS, WITHOUT WARRANTIES
OR REPRESENTATIONS OF ANY KIND, EITHER EXPRESS OR IMPLIED.
This program and the accompanying materials are licensed and made available under the terms and conditions of the
BSD License which accompanies this distribution. The full text of the license may be found at http://opensource.org/
licenses/bsd-license.php
THE PROGRAM IS DISTRIBUTED UNDER THE BSD LICENSE ON AN "AS IS" BASIS, WITHOUT WARRANTIES OR
REPRESENTATIONS OF ANY KIND, EITHER EXPRESS OR IMPLIED.
This program and the accompanying materials are licensed and made available under the terms and conditions of the
BSD License which accompanies this distribution. The full text of the license may be found at: http://opensource.org/
licenses/bsd-license.php
THE PROGRAM IS DISTRIBUTED UNDER THE BSD LICENSE ON AN "AS IS" BASIS, WITHOUT WARRANTIES
OR REPRESENTATIONS OF ANY KIND, EITHER EXPRESS OR IMPLIED.
This program and the accompanying materials are licensed and made available under the terms and conditions of the
BSD License which accompanies this distribution. The full text of the license may be found at http://opensource.org/
licenses/bsd-license.php
THE PROGRAM IS DISTRIBUTED UNDER THE BSD LICENSE ON AN "AS IS" BASIS, WITHOUT WARRANTIES OR
REPRESENTATIONS OF ANY KIND, EITHER EXPRESS OR IMPLIED.
This program and the accompanying materials are licensed and made available under the terms and conditions of the
BSD License which accompanies this distribution. The full text of the license may be found at http://opensource.org/
licenses/bsd-license.php.
THE PROGRAM IS DISTRIBUTED UNDER THE BSD LICENSE ON AN "AS IS" BASIS, WITHOUT WARRANTIES
OR REPRESENTATIONS OF ANY KIND, EITHER EXPRESS OR IMPLIED.
This program and the accompanying materials are licensed and made available under the terms and conditions of the
BSD License which accompanies this distribution. The full text of the license may be found at http://opensource.org/
licenses/bsd-license.php
THE PROGRAM IS DISTRIBUTED UNDER THE BSD LICENSE ON AN "AS IS" BASIS, WITHOUT WARRANTIES OR
REPRESENTATIONS OF ANY KIND, EITHER EXPRESS OR IMPLIED.
1566
Copyright (c) 2006 - 2009, Intel Corporation.
All rights reserved.
This program and the accompanying materials are licensed and made available under the terms and conditions of the
BSD License which accompanies this distribution. The full text of the license may be found at http://opensource.org/
licenses/bsd-license.php
THE PROGRAM IS DISTRIBUTED UNDER THE BSD LICENSE ON AN "AS IS" BASIS, WITHOUT WARRANTIES
OR REPRESENTATIONS OF ANY KIND, EITHER EXPRESS OR IMPLIED.
This program and the accompanying materials are licensed and made available under the terms and conditions of the
BSD License which accompanies this distribution. The full text of the license may be found at http://opensource.org/
licenses/bsd-license.php.
THE PROGRAM IS DISTRIBUTED UNDER THE BSD LICENSE ON AN "AS IS" BASIS, WITHOUT WARRANTIES
OR REPRESENTATIONS OF ANY KIND, EITHER EXPRESS OR IMPLIED.
This program and the accompanying materials are licensed and made available under the terms and conditions of the
BSD License
which accompanies this distribution. The full text of the license may be found at http://opensource.org/licenses/bsd-
license.php.
THE PROGRAM IS DISTRIBUTED UNDER THE BSD LICENSE ON AN "AS IS" BASIS, WITHOUT WARRANTIES
OR REPRESENTATIONS OF ANY KIND, EITHER EXPRESS OR IMPLIED.
This program and the accompanying materials are licensed and made available under the terms and conditions of the
BSD License which accompanies this distribution. The full text of the license may be found at http://opensource.org/
licenses/bsd-license.php.
THE PROGRAM IS DISTRIBUTED UNDER THE BSD LICENSE ON AN "AS IS" BASIS, WITHOUT WARRANTIES
OR REPRESENTATIONS OF ANY KIND, EITHER EXPRESS OR IMPLIED.
This program and the accompanying materials are licensed and made available under the terms and conditions of the
BSD License which accompanies this distribution. The full text of the license may be found at http://opensource.org/
licenses/bsd-license.php
THE PROGRAM IS DISTRIBUTED UNDER THE BSD LICENSE ON AN "AS IS" BASIS, WITHOUT WARRANTIES OR
REPRESENTATIONS OF ANY KIND, EITHER EXPRESS OR IMPLIED.
This program and the accompanying materials are licensed and made available under the terms and conditions of the
BSD License which accompanies this distribution. The full text of the license may be found at http://opensource.org/
licenses/bsd-license.php
THE PROGRAM IS DISTRIBUTED UNDER THE BSD LICENSE ON AN "AS IS" BASIS, WITHOUT WARRANTIES OR
REPRESENTATIONS OF ANY KIND, EITHER EXPRESS OR IMPLIED.
1567
SGOS Administration Guide
This program and the accompanying materials are licensed and made available under the terms and conditions of the
BSD License which accompanies this distribution. The full text of the license may be found at http://opensource.org/
licenses/bsd-license.php
THE PROGRAM IS DISTRIBUTED UNDER THE BSD LICENSE ON AN "AS IS" BASIS, WITHOUT WARRANTIES OR
REPRESENTATIONS OF ANY KIND, EITHER EXPRESS OR IMPLIED.
This program and the accompanying materials are licensed and made available under the terms and conditions of the
BSD License which accompanies this distribution. The full text of the license may be found at http://opensource.org/
licenses/bsd-license.php
THE PROGRAM IS DISTRIBUTED UNDER THE BSD LICENSE ON AN "AS IS" BASIS, WITHOUT WARRANTIES OR
REPRESENTATIONS OF ANY KIND, EITHER EXPRESS OR IMPLIED.
This program and the accompanying materials are licensed and made available under the terms and conditions of the
BSD License which accompanies this distribution. The full text of the license may be found at http://opensource.org/
licenses/bsd-license.php
THE PROGRAM IS DISTRIBUTED UNDER THE BSD LICENSE ON AN "AS IS" BASIS, WITHOUT WARRANTIES OR
REPRESENTATIONS OF ANY KIND, EITHER EXPRESS OR IMPLIED.
This program and the accompanying materials are licensed and made available under the terms and conditions of the
BSD License which accompanies this distribution. The full text of the license may be found at http://opensource.org/
licenses/bsd-license.php
THE PROGRAM IS DISTRIBUTED UNDER THE BSD LICENSE ON AN "AS IS" BASIS, WITHOUT WARRANTIES OR
REPRESENTATIONS OF ANY KIND, EITHER EXPRESS OR IMPLIED.
This program and the accompanying materials are licensed and made available under the terms and conditions of the
BSD License which accompanies this distribution. The full text of the license may be found at http://opensource.org/
licenses/bsd-license.php.
THE PROGRAM IS DISTRIBUTED UNDER THE BSD LICENSE ON AN "AS IS" BASIS, WITHOUT WARRANTIES
OR REPRESENTATIONS OF ANY KIND, EITHER EXPRESS OR IMPLIED.
This program and the accompanying materials are licensed and made available under the terms and conditions of the
BSD License that accompanies this distribution. The full text of the license may be found at http://opensource.org/li-
censes/bsd-license.php.
THE PROGRAM IS DISTRIBUTED UNDER THE BSD LICENSE ON AN "AS IS" BASIS, WITHOUT WARRANTIES OR
REPRESENTATIONS OF ANY KIND, EITHER EXPRESS OR IMPLIED.
1568
Portions copyright (c) 2011, Apple Inc.
All rights reserved.
This program and the accompanying materials are licensed and made available under the terms and conditions of the
BSD License which accompanies this distribution. The full text of the license may be found at http://opensource.org/
licenses/bsd-license.php
THE PROGRAM IS DISTRIBUTED UNDER THE BSD LICENSE ON AN "AS IS" BASIS, WITHOUT WARRANTIES OR
REPRESENTATIONS OF ANY KIND, EITHER EXPRESS OR IMPLIED.
This program and the accompanying materials are licensed and made available under the terms and conditions of the
BSD License that accompanies this distribution. The full text of the license may be found at http://opensource.org/li-
censes/bsd-license.php.
THE PROGRAM IS DISTRIBUTED UNDER THE BSD LICENSE ON AN "AS IS" BASIS, WITHOUT WARRANTIES OR
REPRESENTATIONS OF ANY KIND, EITHER EXPRESS OR IMPLIED.
This program and the accompanying materials are licensed and made available under the terms and conditions of the
BSD License that accompanies this distribution. The full text of the license may be found at http://opensource.org/li-
censes/bsd-license.php.
THE PROGRAM IS DISTRIBUTED UNDER THE BSD LICENSE ON AN "AS IS" BASIS, WITHOUT WARRANTIES OR
REPRESENTATIONS OF ANY KIND, EITHER EXPRESS OR IMPLIED.
This program and the accompanying materials are licensed and made available under the terms and conditions of the
BSD License that accompanies this distribution. The full text of the license may be found at http://opensource.org/li-
censes/bsd-license.php.
THE PROGRAM IS DISTRIBUTED UNDER THE BSD LICENSE ON AN "AS IS" BASIS, WITHOUT WARRANTIES
OR REPRESENTATIONS OF ANY KIND, EITHER EXPRESS OR IMPLIED.
Redistribution and use in source and binary forms, with or without modification, are permitted provided that the fol-
lowing conditions are met:
1. Redistributions of source code must retain the above copyright notice, this list of conditions and the following dis-
claimer.
2. Redistributions in binary form must reproduce the above copyright notice, this list of conditions and the following
disclaimer in the documentation and/or other materials provided with the distribution.
3. All advertising materials mentioning features or use of this software must display the following acknowledgement:
This product includes software developed by the University of California, Berkeley and its contributors.
4. Neither the name of the University nor the names of its contributors may be used to endorse or promote products
derived from this software
without specific prior written permission.
THIS SOFTWARE IS PROVIDED BY THE REGENTS AND CONTRIBUTORS ``AS IS'' AND ANY EXPRESS OR IM-
PLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES OF MERCHANTABILI-
TY AND FITNESS FOR A PARTICULAR PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE REGENTS OR
CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSE-
QUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SER-
VICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY
THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE
OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POS-
SIBILITY OF SUCH DAMAGE.
1569
SGOS Administration Guide
This program and the accompanying materials are licensed and made available under the terms and conditions of the
BSD License that accompanies this distribution. The full text of the license may be found at http://opensource.org/li-
censes/bsd-license.php.
THE PROGRAM IS DISTRIBUTED UNDER THE BSD LICENSE ON AN "AS IS" BASIS, WITHOUT WARRANTIES OR
REPRESENTATIONS OF ANY KIND, EITHER EXPRESS OR IMPLIED.
THE PROGRAM IS DISTRIBUTED UNDER THE BSD LICENSE ON AN "AS IS" BASIS, WITHOUT WARRANTIES
OR REPRESENTATIONS OF ANY KIND, EITHER EXPRESS OR IMPLIED.
This program and the accompanying materials are licensed and made available under the terms and conditions of the
BSD License which accompanies this distribution. The full text of the license may be found at: http://opensource.org/
licenses/bsd-license.php
THE PROGRAM IS DISTRIBUTED UNDER THE BSD LICENSE ON AN "AS IS" BASIS, WITHOUT WARRANTIES
OR REPRESENTATIONS OF ANY KIND, EITHER EXPRESS OR IMPLIED.
This program and the accompanying materials are licensed and made available under the terms and conditions of the
BSD License which accompanies this distribution. The full text of the license may be found at http://opensource.org/
licenses/bsd-license.php
THE PROGRAM IS DISTRIBUTED UNDER THE BSD LICENSE ON AN "AS IS" BASIS, WITHOUT WARRANTIES OR
REPRESENTATIONS OF ANY KIND, EITHER EXPRESS OR IMPLIED.
This program and the accompanying materials are licensed and made available under the terms and conditions of the
BSD License which accompanies this distribution. The full text of the license may be found at http://opensource.org/
licenses/bsd-license.php.
THE PROGRAM IS DISTRIBUTED UNDER THE BSD LICENSE ON AN "AS IS" BASIS, WITHOUT WARRANTIES
OR REPRESENTATIONS OF ANY KIND, EITHER EXPRESS OR IMPLIED.
This program and the accompanying materials are licensed and made available under the terms and conditions of the
BSD License which accompanies this distribution. The full text of the license may be found at http://opensource.org/
licenses/bsd-license.php
THE PROGRAM IS DISTRIBUTED UNDER THE BSD LICENSE ON AN "AS IS" BASIS, WITHOUT WARRANTIES OR
REPRESENTATIONS OF ANY KIND, EITHER EXPRESS OR IMPLIED.
This program and the accompanying materials are licensed and made available under the terms and conditions of the
BSD License which accompanies this distribution. The full text of the license may be found at http://opensource.org/
licenses/bsd-license.php
THE PROGRAM IS DISTRIBUTED UNDER THE BSD LICENSE ON AN "AS IS" BASIS, WITHOUT WARRANTIES
OR REPRESENTATIONS OF ANY KIND, EITHER EXPRESS OR IMPLIED.
This program and the accompanying materials are licensed and made available under the terms and conditions of the
BSD License which accompanies this distribution. The full text of the license may be found at http://opensource.org/
licenses/bsd-license.php
THE PROGRAM IS DISTRIBUTED UNDER THE BSD LICENSE ON AN "AS IS" BASIS, WITHOUT WARRANTIES
OR REPRESENTATIONS OF ANY KIND, EITHER EXPRESS OR IMPLIED.
1570
All rights reserved.
Portions copyright (c) 2008 - 2009, Apple Inc.
All rights reserved.
This program and the accompanying materials are licensed and made available under the terms and conditions of the
BSD License which accompanies this distribution. The full text of the license may be found at http://opensource.org/
licenses/bsd-license.php.
THE PROGRAM IS DISTRIBUTED UNDER THE BSD LICENSE ON AN "AS IS" BASIS, WITHOUT WARRANTIES
OR REPRESENTATIONS OF ANY KIND, EITHER EXPRESS OR IMPLIED.
This program and the accompanying materials are licensed and made available under the terms and conditions of the
BSD License which accompanies this distribution. The full text of the license may be found at http://opensource.org/
licenses/bsd-license.php
THE PROGRAM IS DISTRIBUTED UNDER THE BSD LICENSE ON AN "AS IS" BASIS, WITHOUT WARRANTIES OR
REPRESENTATIONS OF ANY KIND, EITHER EXPRESS OR IMPLIED.
This program and the accompanying materials are licensed and made available under the terms and conditions of the
BSD License which accompanies this distribution. The full text of the license may be found at http://opensource.org/
licenses/bsd-license.php
THE PROGRAM IS DISTRIBUTED UNDER THE BSD LICENSE ON AN "AS IS" BASIS, WITHOUT WARRANTIES OR
REPRESENTATIONS OF ANY KIND, EITHER EXPRESS OR IMPLIED.
This program and the accompanying materials are licensed and made available under the terms and conditions of the
BSD License which accompanies this distribution. The full text of the license may be found at http://opensource.org/
licenses/bsd-license.php
THE PROGRAM IS DISTRIBUTED UNDER THE BSD LICENSE ON AN "AS IS" BASIS, WITHOUT WARRANTIES OR
REPRESENTATIONS OF ANY KIND, EITHER EXPRESS OR IMPLIED.
This program and the accompanying materials are licensed and made available under the terms and conditions of the
BSD License which accompanies this distribution. The full text of the license may be found at http://opensource.org/
licenses/bsd-license.php
THE PROGRAM IS DISTRIBUTED UNDER THE BSD LICENSE ON AN "AS IS" BASIS, WITHOUT WARRANTIES OR
REPRESENTATIONS OF ANY KIND, EITHER EXPRESS OR IMPLIED.
This program and the accompanying materials are licensed and made available under the terms and conditions of the
BSD License that accompanies this distribution. The full text of the license may be found at http://opensource.org/li-
censes/bsd-license.php.
THE PROGRAM IS DISTRIBUTED UNDER THE BSD LICENSE ON AN "AS IS" BASIS, WITHOUT WARRANTIES OR
REPRESENTATIONS OF ANY KIND, EITHER EXPRESS OR IMPLIED.
1571
SGOS Administration Guide
This program and the accompanying materials are licensed and made available under the terms and conditions of the
BSD License that accompanies this distribution. The full text of the license may be found at http://opensource.org/li-
censes/bsd-license.php.
THE PROGRAM IS DISTRIBUTED UNDER THE BSD LICENSE ON AN "AS IS" BASIS, WITHOUT WARRANTIES OR
REPRESENTATIONS OF ANY KIND, EITHER EXPRESS OR IMPLIED.
This program and the accompanying materials are licensed and made available under the terms and conditions of the
BSD License which accompanies this distribution. The full text of the license may be found at: http://opensource.org/
licenses/bsd-license.php
THE PROGRAM IS DISTRIBUTED UNDER THE BSD LICENSE ON AN "AS IS" BASIS, WITHOUT WARRANTIES
OR REPRESENTATIONS OF ANY KIND, EITHER EXPRESS OR IMPLIED.
This program and the accompanying materials are licensed and made available under the terms and conditions of the
BSD License which accompanies this distribution. The full text of the license may be found at http://opensource.org/
licenses/bsd-license.php
THE PROGRAM IS DISTRIBUTED UNDER THE BSD LICENSE ON AN "AS IS" BASIS, WITHOUT WARRANTIES OR
REPRESENTATIONS OF ANY KIND, EITHER EXPRESS OR IMPLIED.
This program and the accompanying materials are licensed and made available under the terms and conditions of the
BSD License which accompanies this distribution. The full text of the license may be found at http://opensource.org/
licenses/bsd-license.php.
THE PROGRAM IS DISTRIBUTED UNDER THE BSD LICENSE ON AN "AS IS" BASIS, WITHOUT WARRANTIES
OR REPRESENTATIONS OF ANY KIND, EITHER EXPRESS OR IMPLIED.
This program and the accompanying materials are licensed and made available under the terms and conditions of the
BSD License which accompanies this distribution. The full text of the license may be found at http://opensource.org/
licenses/bsd-license.php
THE PROGRAM IS DISTRIBUTED UNDER THE BSD LICENSE ON AN "AS IS" BASIS, WITHOUT WARRANTIES OR
REPRESENTATIONS OF ANY KIND, EITHER EXPRESS OR IMPLIED.
This program and the accompanying materials are licensed and made available under the terms and conditions of the
BSD License which accompanies this distribution. The full text of the license may be found at http://opensource.org/
licenses/bsd-license.php
THE PROGRAM IS DISTRIBUTED UNDER THE BSD LICENSE ON AN "AS IS" BASIS, WITHOUT WARRANTIES
OR REPRESENTATIONS OF ANY KIND, EITHER EXPRESS OR IMPLIED.
Redistribution and use in source and binary forms, with or without modification, are permitted provided that the fol-
lowing conditions are met:
1. Redistributions of source code must retain the above copyright notice, this list of conditions and the following dis-
claimer.
2. Redistributions in binary form must reproduce the above copyright notice, this list of conditions and the following
disclaimer in the
documentation and/or other materials provided with the distribution.
THIS SOFTWARE IS PROVIDED BY THE AUTHOR AND CONTRIBUTORS ''AS IS'' AND ANY EXPRESS OR IM-
PLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES OF MERCHANTABILI-
TY AND FITNESS FOR A PARTICULAR PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE AUTHOR OR
CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSE-
QUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SER-
VICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY
1572
THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE
OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POS-
SIBILITY OF SUCH DAMAGE.
Redistribution and use in source and binary forms, with or without modification, are permitted provided that the fol-
lowing conditions are met:
1. Redistributions of source code must retain the above copyright notice, this list of conditions and the following dis-
claimer.
2. Redistributions in binary form must reproduce the above copyright notice, this list of conditions and the following
disclaimer in the documentation and/or other materials provided with the distribution.
3. All advertising materials mentioning features or use of this software must display the following acknowledgement:
This product includes software developed by the NetBSD Foundation, Inc. and its contributors.
4. Neither the name of The NetBSD Foundation nor the names of its contributors may be used to endorse or promote
products derived from this software without specific prior written permission.
THIS SOFTWARE IS PROVIDED BY THE NETBSD FOUNDATION, INC. AND CONTRIBUTORS ''AS IS'' AND ANY
EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES OF
MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL
THE FOUNDATION OR CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EX-
EMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTI-
TUTE GOODS OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER
CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT (IN-
CLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN
IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.
This program and the accompanying materials are licensed and made available under the terms and conditions of the
BSD License which accompanies this distribution. The full text of the license may be found at http://opensource.org/
licenses/bsd-license.php
THE PROGRAM IS DISTRIBUTED UNDER THE BSD LICENSE ON AN "AS IS" BASIS, WITHOUT WARRANTIES
OR REPRESENTATIONS OF ANY KIND, EITHER EXPRESS OR IMPLIED.
This program and the accompanying materials are licensed and made available under the terms and conditions of the
BSD License which accompanies this distribution. The full text of the license may be found at: http://opensource.org/
licenses/bsd-license.php
THE PROGRAM IS DISTRIBUTED UNDER THE BSD LICENSE ON AN "AS IS" BASIS, WITHOUT WARRANTIES
OR REPRESENTATIONS OF ANY KIND, EITHER EXPRESS OR IMPLIED.
This program and the accompanying materials are licensed and made available under the terms and conditions of the
BSD License which accompanies this distribution. The full text of the license may be found at http://opensource.org/
licenses/bsd-license.php
THE PROGRAM IS DISTRIBUTED UNDER THE BSD LICENSE ON AN "AS IS" BASIS, WITHOUT WARRANTIES
OR REPRESENTATIONS OF ANY KIND, EITHER EXPRESS OR IMPLIED.
This program and the accompanying materials are licensed and made available under the terms and conditions of the
BSD License which accompanies this distribution. The full text of the license may be found at http://opensource.org/
licenses/bsd-license.php.
THE PROGRAM IS DISTRIBUTED UNDER THE BSD LICENSE ON AN "AS IS" BASIS, WITHOUT WARRANTIES
OR REPRESENTATIONS OF ANY KIND, EITHER EXPRESS OR IMPLIED.
1573
SGOS Administration Guide
This program and the accompanying materials are licensed and made available under the terms and conditions of the
BSD License which accompanies this distribution. The full text of the license may be found at http://opensource.org/
licenses/bsd-license.php
THE PROGRAM IS DISTRIBUTED UNDER THE BSD LICENSE ON AN "AS IS" BASIS, WITHOUT WARRANTIES OR
REPRESENTATIONS OF ANY KIND, EITHER EXPRESS OR IMPLIED.
This program and the accompanying materials are licensed and made available under the terms and conditions of the
BSD License which accompanies this distribution. The full text of the license may be found at http://opensource.org/
licenses/bsd-license.php.
THE PROGRAM IS DISTRIBUTED UNDER THE BSD LICENSE ON AN "AS IS" BASIS, WITHOUT WARRANTIES
OR REPRESENTATIONS OF ANY KIND, EITHER EXPRESS OR IMPLIED.
This program and the accompanying materials are licensed and made available under the terms and conditions of the
BSD License which accompanies this distribution. The full text of the license may be found at http://opensource.org/
licenses/bsd-license.php
THE PROGRAM IS DISTRIBUTED UNDER THE BSD LICENSE ON AN "AS IS" BASIS, WITHOUT WARRANTIES
OR REPRESENTATIONS OF ANY KIND, EITHER EXPRESS OR IMPLIED.
This program and the accompanying materials are licensed and made available under the terms and conditions of the
BSD License that accompanies this distribution.
The full text of the license may be found at http://opensource.org/licenses/bsd-license.php.
THE PROGRAM IS DISTRIBUTED UNDER THE BSD LICENSE ON AN "AS IS" BASIS, WITHOUT WARRANTIES OR
REPRESENTATIONS OF ANY KIND, EITHER EXPRESS OR IMPLIED.
This program and the accompanying materials are licensed and made available under the terms and conditions of the
BSD License which accompanies this distribution. The full text of the license may be found at: http://opensource.org/
licenses/bsd-license.php
THE PROGRAM IS DISTRIBUTED UNDER THE BSD LICENSE ON AN "AS IS" BASIS, WITHOUT WARRANTIES
OR REPRESENTATIONS OF ANY KIND, EITHER EXPRESS OR IMPLIED.
This program and the accompanying materials are licensed and made available under the terms and conditions of the
BSD License which accompanies this distribution. The full text of the license may be found at http://opensource.org/
licenses/bsd-license.php.
THE PROGRAM IS DISTRIBUTED UNDER THE BSD LICENSE ON AN "AS IS" BASIS, WITHOUT WARRANTIES
OR REPRESENTATIONS OF ANY KIND, EITHER EXPRESS OR IMPLIED.
THE PROGRAM IS DISTRIBUTED UNDER THE BSD LICENSE ON AN "AS IS" BASIS, WITHOUT WARRANTIES
OR REPRESENTATIONS OF ANY KIND, EITHER EXPRESS OR IMPLIED.
1574
THE PROGRAM IS DISTRIBUTED UNDER THE BSD LICENSE ON AN "AS IS" BASIS, WITHOUT WARRANTIES OR
REPRESENTATIONS OF ANY KIND, EITHER EXPRESS OR IMPLIED.
This program and the accompanying materials are licensed and made available under the terms and conditions of the
BSD License which accompanies this distribution. The full text of the license may be found at http://opensource.org/
licenses/bsd-license.php.
THE PROGRAM IS DISTRIBUTED UNDER THE BSD LICENSE ON AN "AS IS" BASIS, WITHOUT WARRANTIES
OR REPRESENTATIONS OF ANY KIND, EITHER EXPRESS OR IMPLIED.
THE PROGRAM IS DISTRIBUTED UNDER THE BSD LICENSE ON AN "AS IS" BASIS, WITHOUT WARRANTIES
OR REPRESENTATIONS OF ANY KIND, EITHER EXPRESS OR IMPLIED.
THE PROGRAM IS DISTRIBUTED UNDER THE BSD LICENSE ON AN "AS IS" BASIS, WITHOUT WARRANTIES
OR REPRESENTATIONS OF ANY KIND, EITHER EXPRESS OR IMPLIED.
This program and the accompanying materials are licensed and made available under the terms and conditions of the
BSD License which accompanies this distribution. The full text of the license may be found at http://opensource.org/
licenses/bsd-license.php
THE PROGRAM IS DISTRIBUTED UNDER THE BSD LICENSE ON AN "AS IS" BASIS, WITHOUT WARRANTIES OR
REPRESENTATIONS OF ANY KIND, EITHER EXPRESS OR IMPLIED.
This program and the accompanying materials are licensed and made available under the terms and conditions of the
BSD License which accompanies this distribution. The full text of the license may be found at http://opensource.org/
licenses/bsd-license.php
THE PROGRAM IS DISTRIBUTED UNDER THE BSD LICENSE ON AN "AS IS" BASIS, WITHOUT WARRANTIES
OR REPRESENTATIONS OF ANY KIND, EITHER EXPRESS OR IMPLIED.
This program and the accompanying materials are licensed and made available under the terms and conditions of the
BSD License which accompanies this distribution. The full text of the license may be found at http://opensource.org/
licenses/bsd-license.php
THE PROGRAM IS DISTRIBUTED UNDER THE BSD LICENSE ON AN "AS IS" BASIS, WITHOUT WARRANTIES
OR REPRESENTATIONS OF ANY KIND, EITHER EXPRESS OR IMPLIED.
This program and the accompanying materials are licensed and made available under the terms and conditions of the
BSD License which accompanies this distribution. The full text of the license may be found at http://opensource.org/
licenses/bsd-license.php
1575
SGOS Administration Guide
THE PROGRAM IS DISTRIBUTED UNDER THE BSD LICENSE ON AN "AS IS" BASIS, WITHOUT WARRANTIES
OR REPRESENTATIONS OF ANY KIND, EITHER EXPRESS OR IMPLIED.
This program and the accompanying materials are licensed and made available under the terms and conditions of the
BSD License which accompanies this distribution. The full text of the license may be found at http://opensource.org/
licenses/bsd-license.php
THE PROGRAM IS DISTRIBUTED UNDER THE BSD LICENSE ON AN "AS IS" BASIS, WITHOUT WARRANTIES
OR REPRESENTATIONS OF ANY KIND, EITHER EXPRESS OR IMPLIED.
This program and the accompanying materials are licensed and made available under the terms and conditions of the
BSD License which accompanies this distribution. The full text of the license may be found at http://opensource.org/
licenses/bsd-license.php
THE PROGRAM IS DISTRIBUTED UNDER THE BSD LICENSE ON AN "AS IS" BASIS, WITHOUT WARRANTIES
OR REPRESENTATIONS OF ANY KIND, EITHER EXPRESS OR IMPLIED.
This program and the accompanying materials are licensed and made available under the terms and conditions of the
BSD License which accompanies this distribution. The full text of the license may be found at http://opensource.org/
licenses/bsd-license.php.
THE PROGRAM IS DISTRIBUTED UNDER THE BSD LICENSE ON AN "AS IS" BASIS, WITHOUT WARRANTIES OR
REPRESENTATIONS OF ANY KIND, EITHER EXPRESS OR IMPLIED.
This program and the accompanying materials are licensed and made available under the terms and conditions of the
BSD License which accompanies this distribution. The full text of the license may be found at http://opensource.org/
licenses/bsd-license.php
THE PROGRAM IS DISTRIBUTED UNDER THE BSD LICENSE ON AN "AS IS" BASIS, WITHOUT WARRANTIES
OR REPRESENTATIONS OF ANY KIND, EITHER EXPRESS OR IMPLIED.
This program and the accompanying materials are licensed and made available under the terms and conditions of the
BSD License that accompanies this distribution. The full text of the license may be found at http://opensource.org/li-
censes/bsd-license.php.
THE PROGRAM IS DISTRIBUTED UNDER THE BSD LICENSE ON AN "AS IS" BASIS, WITHOUT WARRANTIES OR
REPRESENTATIONS OF ANY KIND, EITHER EXPRESS OR IMPLIED.
This program and the accompanying materials are licensed and made available under the terms and conditions of the
BSD License which accompanies this distribution. The full text of the license may be found at http://opensource.org/
licenses/bsd-license.php.
THE PROGRAM IS DISTRIBUTED UNDER THE BSD LICENSE ON AN "AS IS" BASIS, WITHOUT WARRANTIES OR
REPRESENTATIONS OF ANY KIND, EITHER EXPRESS OR IMPLIED.
This program and the accompanying materials are licensed and made available under the terms and conditions of the
BSD License which accompanies this distribution. The full text of the license may be found at http://opensource.org/
licenses/bsd-license.php
THE PROGRAM IS DISTRIBUTED UNDER THE BSD LICENSE ON AN "AS IS" BASIS, WITHOUT WARRANTIES
1576
OR REPRESENTATIONS OF ANY KIND, EITHER EXPRESS OR IMPLIED.
This program and the accompanying materials are licensed and made available under the terms and conditions of the
BSD License which accompanies this distribution. The full text of the license may be found at http://opensource.org/
licenses/bsd-license.php
THE PROGRAM IS DISTRIBUTED UNDER THE BSD LICENSE ON AN "AS IS" BASIS, WITHOUT WARRANTIES
OR REPRESENTATIONS OF ANY KIND, EITHER EXPRESS OR IMPLIED.
This program and the accompanying materials are licensed and made available under the terms and conditions of the
BSD License which accompanies this distribution. The full text of the license may be found at http://opensource.org/
licenses/bsd-license.php
THE PROGRAM IS DISTRIBUTED UNDER THE BSD LICENSE ON AN "AS IS" BASIS, WITHOUT WARRANTIES
OR REPRESENTATIONS OF ANY KIND, EITHER EXPRESS OR IMPLIED.
This program and the accompanying materials are licensed and made available under the terms and conditions of the
BSD License which accompanies this distribution. The full text of the license may be found at http://opensource.org/
licenses/bsd-license.php
THE PROGRAM IS DISTRIBUTED UNDER THE BSD LICENSE ON AN "AS IS" BASIS, WITHOUT WARRANTIES OR
REPRESENTATIONS OF ANY KIND, EITHER EXPRESS OR IMPLIED.
This program and the accompanying materials are licensed and made available under the terms and conditions of the
BSD License which accompanies this distribution. The full text of the license may be found at http://opensource.org/
licenses/bsd-license.php
THE PROGRAM IS DISTRIBUTED UNDER THE BSD LICENSE ON AN "AS IS" BASIS, WITHOUT WARRANTIES OR
REPRESENTATIONS OF ANY KIND, EITHER EXPRESS OR IMPLIED.
This program and the accompanying materials are licensed and made available under the terms and conditions of the
BSD License which accompanies this distribution. The full text of the license may be found at http://opensource.org/
licenses/bsd-license.php.
THE PROGRAM IS DISTRIBUTED UNDER THE BSD LICENSE ON AN "AS IS" BASIS, WITHOUT WARRANTIES
OR REPRESENTATIONS OF ANY KIND, EITHER EXPRESS OR IMPLIED.
This program and the accompanying materials are licensed and made available under the terms and conditions of the
BSD License which accompanies this distribution. The full text of the license may be found at http://opensource.org/
licenses/bsd-license.php
THE PROGRAM IS DISTRIBUTED UNDER THE BSD LICENSE ON AN "AS IS" BASIS, WITHOUT WARRANTIES
OR REPRESENTATIONS OF ANY KIND, EITHER EXPRESS OR IMPLIED.
This program and the accompanying materials are licensed and made available under the terms and conditions of the
BSD License which accompanies this distribution. The full text of the license may be found at http://opensource.org/
licenses/bsd-license.php
1577
SGOS Administration Guide
THE PROGRAM IS DISTRIBUTED UNDER THE BSD LICENSE ON AN "AS IS" BASIS, WITHOUT WARRANTIES
OR REPRESENTATIONS OF ANY KIND, EITHER EXPRESS OR IMPLIED.
THE PROGRAM IS DISTRIBUTED UNDER THE BSD LICENSE ON AN "AS IS" BASIS, WITHOUT WARRANTIES OR
REPRESENTATIONS OF ANY KIND, EITHER EXPRESS OR IMPLIED.
THE PROGRAM IS DISTRIBUTED UNDER THE BSD LICENSE ON AN "AS IS" BASIS, WITHOUT WARRANTIES OR
REPRESENTATIONS OF ANY KIND, EITHER EXPRESS OR IMPLIED.
This program and the accompanying materials are licensed and made available under the terms and conditions of the
BSD License which accompanies this distribution. The full text of the license may be found at http://opensource.org/
licenses/bsd-license.php.
THE PROGRAM IS DISTRIBUTED UNDER THE BSD LICENSE ON AN "AS IS" BASIS, WITHOUT WARRANTIES OR
REPRESENTATIONS OF ANY KIND, EITHER EXPRESS OR IMPLIED.
THE PROGRAM IS DISTRIBUTED UNDER THE BSD LICENSE ON AN "AS IS" BASIS, WITHOUT WARRANTIES
OR REPRESENTATIONS OF ANY KIND, EITHER EXPRESS OR IMPLIED.
THE PROGRAM IS DISTRIBUTED UNDER THE BSD LICENSE ON AN "AS IS" BASIS, WITHOUT WARRANTIES OR
REPRESENTATIONS OF ANY KIND, EITHER EXPRESS OR IMPLIED.
THE PROGRAM IS DISTRIBUTED UNDER THE BSD LICENSE ON AN "AS IS" BASIS, WITHOUT WARRANTIES OR
REPRESENTATIONS OF ANY KIND, EITHER EXPRESS OR IMPLIED.
THE PROGRAM IS DISTRIBUTED UNDER THE BSD LICENSE ON AN "AS IS" BASIS, WITHOUT WARRANTIES
OR REPRESENTATIONS OF ANY KIND, EITHER EXPRESS OR IMPLIED.
1578
All rights reserved.
This program and the accompanying materials are licensed and made available under the terms and conditions of the
BSD License which accompanies this distribution. The full text of the license may be found at http://opensource.org/
licenses/bsd-license.php
THE PROGRAM IS DISTRIBUTED UNDER THE BSD LICENSE ON AN "AS IS" BASIS, WITHOUT WARRANTIES
OR REPRESENTATIONS OF ANY KIND, EITHER EXPRESS OR IMPLIED.
This program and the accompanying materials are licensed and made available under the terms and conditions of the
BSD License that accompanies this distribution. The full text of the license may be found at http://opensource.org/li-
censes/bsd-license.php.
THE PROGRAM IS DISTRIBUTED UNDER THE BSD LICENSE ON AN "AS IS" BASIS, WITHOUT WARRANTIES OR
REPRESENTATIONS OF ANY KIND, EITHER EXPRESS OR IMPLIED.
THE PROGRAM IS DISTRIBUTED UNDER THE BSD LICENSE ON AN "AS IS" BASIS, WITHOUT WARRANTIES OR
REPRESENTATIONS OF ANY KIND, EITHER EXPRESS OR IMPLIED.
THE PROGRAM IS DISTRIBUTED UNDER THE BSD LICENSE ON AN "AS IS" BASIS, WITHOUT WARRANTIES
OR REPRESENTATIONS OF ANY KIND, EITHER EXPRESS OR IMPLIED.
THE PROGRAM IS DISTRIBUTED UNDER THE BSD LICENSE ON AN "AS IS" BASIS, WITHOUT WARRANTIES
OR REPRESENTATIONS OF ANY KIND, EITHER EXPRESS OR IMPLIED.
THE PROGRAM IS DISTRIBUTED UNDER THE BSD LICENSE ON AN "AS IS" BASIS, WITHOUT WARRANTIES
OR REPRESENTATIONS OF ANY KIND, EITHER EXPRESS OR IMPLIED.
This program and the accompanying materials are licensed and made available under the terms and conditions of the
BSD License which accompanies this distribution. The full text of the license may be found at http://opensource.org/
licenses/bsd-license.php
THE PROGRAM IS DISTRIBUTED UNDER THE BSD LICENSE ON AN "AS IS" BASIS, WITHOUT WARRANTIES OR
REPRESENTATIONS OF ANY KIND, EITHER EXPRESS OR IMPLIED.
This program and the accompanying materials are licensed and made available under the terms and conditions of the
BSD License which accompanies this distribution. The full text of the license may be found at http://opensource.org/
licenses/bsd-license.php
1579
SGOS Administration Guide
THE PROGRAM IS DISTRIBUTED UNDER THE BSD LICENSE ON AN "AS IS" BASIS, WITHOUT WARRANTIES
OR REPRESENTATIONS OF ANY KIND, EITHER EXPRESS OR IMPLIED.
This program and the accompanying materials are licensed and made available under the terms and conditions of the
BSD License which accompanies this distribution. The full text of the license may be found at http://opensource.org/
licenses/bsd-license.php
THE PROGRAM IS DISTRIBUTED UNDER THE BSD LICENSE ON AN "AS IS" BASIS, WITHOUT WARRANTIES OR
REPRESENTATIONS OF ANY KIND, EITHER EXPRESS OR IMPLIED.
Redistribution and use in source and binary forms, with or without modification, are permitted provided that the fol-
lowing conditions are met:
1. Redistributions of source code must retain the above copyright notice, this list of conditions and the following dis-
claimer.
2. Redistributions in binary form must reproduce the above copyright notice, this list of conditions and the following
disclaimer in the documentation and/or other materials provided with the distribution.
3. Neither the name of the University nor the names of its contributors may be used to endorse or promote products
derived from this software without specific prior written permission.
THIS SOFTWARE IS PROVIDED BY THE REGENTS AND CONTRIBUTORS '' AS IS'' AND ANY EXPRESS OR IM-
PLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES OF MERCHANTABILI-
TY AND FITNESS FOR A PARTICULAR PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE REGENTS OR
CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSE-
QUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SER-
VICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY
THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT
LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF
THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.
Redistribution and use in source and binary forms, with or without modification, are permitted provided that the fol-
lowing conditions are met:
1. Redistributions of source code must retain the above copyright notice, this list of conditions and the following dis-
claimer.
2. Redistributions in binary form must reproduce the above copyright notice, this list of conditions and the following
disclaimer in the documentation and/or other materials provided with the distribution.
3. Neither the name of the University nor the names of its contributors may be used to endorse or promote products
derived from this software without specific prior written permission.
THIS SOFTWARE IS PROVIDED BY THE REGENTS AND CONTRIBUTORS '' AS IS'' AND ANY EXPRESS OR IM-
PLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES OF MERCHANTABILI-
TY AND FITNESS FOR A PARTICULAR PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE REGENTS OR
CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSE-
QUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SER-
VICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY
THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE
OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POS-
SIBILITY OF SUCH DAMAGE.
1580
This program and the accompanying materials are licensed and made available under the terms and conditions of the
BSD License which accompanies this distribution. The full text of the license may be found at http://opensource.org/
licenses/bsd-license.php
THE PROGRAM IS DISTRIBUTED UNDER THE BSD LICENSE ON AN "AS IS" BASIS, WITHOUT WARRANTIES OR
REPRESENTATIONS OF ANY KIND, EITHER EXPRESS OR IMPLIED.
THE PROGRAM IS DISTRIBUTED UNDER THE BSD LICENSE ON AN "AS IS" BASIS, WITHOUT WARRANTIES OR
REPRESENTATIONS OF ANY KIND, EITHER EXPRESS OR IMPLIED.
THE PROGRAM IS DISTRIBUTED UNDER THE BSD LICENSE ON AN "AS IS" BASIS, WITHOUT WARRANTIES
OR REPRESENTATIONS OF ANY KIND, EITHER EXPRESS OR IMPLIED.
This program and the accompanying materials are licensed and made available under the terms and conditions of the
BSD License which accompanies this distribution. The full text of the license may be found at http://opensource.org/
licenses/bsd-license.php.
THE PROGRAM IS DISTRIBUTED UNDER THE BSD LICENSE ON AN "AS IS" BASIS, WITHOUT WARRANTIES
OR REPRESENTATIONS OF ANY KIND, EITHER EXPRESS OR IMPLIED.
THE PROGRAM IS DISTRIBUTED UNDER THE BSD LICENSE ON AN "AS IS" BASIS, WITHOUT WARRANTIES OR
REPRESENTATIONS OF ANY KIND, EITHER EXPRESS OR IMPLIED.
This program and the accompanying materials are licensed and made available under the terms and conditions of the
BSD License which accompanies this distribution. The full text of the license may be found at http://opensource.org/
licenses/bsd-license.php
THE PROGRAM IS DISTRIBUTED UNDER THE BSD LICENSE ON AN "AS IS" BASIS, WITHOUT WARRANTIES OR
REPRESENTATIONS OF ANY KIND, EITHER EXPRESS OR IMPLIED.
This program and the accompanying materials are licensed and made available under the terms and conditions of the
BSD License which accompanies this distribution. The full text of the license may be found at http://opensource.org/
licenses/bsd-license.php
THE PROGRAM IS DISTRIBUTED UNDER THE BSD LICENSE ON AN "AS IS" BASIS, WITHOUT WARRANTIES OR
REPRESENTATIONS OF ANY KIND, EITHER EXPRESS OR IMPLIED.
This program and the accompanying materials are licensed and made available under the terms and conditions of the
BSD License which accompany this distribution. The full text of the license may be found at http://opensource.org/
licenses/bsd-license.php
THE PROGRAM IS DISTRIBUTED UNDER THE BSD LICENSE ON AN "AS IS" BASIS, WITHOUT WARRANTIES OR
REPRESENTATIONS OF ANY KIND, EITHER EXPRESS OR IMPLIED.
1581
SGOS Administration Guide
This program and the accompanying materials are licensed and made available under the terms and conditions of the
BSD License that accompanies this distribution. The full text of the license may be found at http://opensource.org/li-
censes/bsd-license.
THE PROGRAM IS DISTRIBUTED UNDER THE BSD LICENSE ON AN "AS IS" BASIS, WITHOUT WARRANTIES OR
REPRESENTATIONS OF ANY KIND, EITHER EXPRESS OR IMPLIED.
THE PROGRAM IS DISTRIBUTED UNDER THE BSD LICENSE ON AN "AS IS" BASIS, WITHOUT WARRANTIES
OR REPRESENTATIONS OF ANY KIND, EITHER EXPRESS OR IMPLIED.
THE PROGRAM IS DISTRIBUTED UNDER THE BSD LICENSE ON AN "AS IS" BASIS, WITHOUT WARRANTIES OR
REPRESENTATIONS OF ANY KIND, EITHER EXPRESS OR IMPLIED.
THE PROGRAM IS DISTRIBUTED UNDER THE BSD LICENSE ON AN "AS IS" BASIS, WITHOUT WARRANTIES OR
REPRESENTATIONS OF ANY KIND, EITHER EXPRESS OR IMPLIED.
This program and the accompanying materials are licensed and made available under the terms and conditions of the
BSD License which accompanies this distribution. The full text of the license may be found at http://opensource.org/
licenses/bsd-license.php.
THE PROGRAM IS DISTRIBUTED UNDER THE BSD LICENSE ON AN "AS IS" BASIS, WITHOUT WARRANTIES OR
REPRESENTATIONS OF ANY KIND, EITHER EXPRESS OR IMPLIED.
This program and the accompanying materials are licensed and made available under the terms and conditions of the
BSD License which accompanies this distribution. The full text of the license may be found at http://opensource.org/
licenses/bsd-license.php
THE PROGRAM IS DISTRIBUTED UNDER THE BSD LICENSE ON AN "AS IS" BASIS, WITHOUT WARRANTIES OR
REPRESENTATIONS OF ANY KIND, EITHER EXPRESS OR IMPLIED.
This program and the accompanying materials are licensed and made available under the terms and conditions of the
BSD License which accompanies this distribution. The full text of the license may be found at http://opensource.org/
licenses/bsd-license.php
THE PROGRAM IS DISTRIBUTED UNDER THE BSD LICENSE ON AN "AS IS" BASIS, WITHOUT WARRANTIES OR
REPRESENTATIONS OF ANY KIND, EITHER EXPRESS OR IMPLIED.
This program and the accompanying materials are licensed and made available under the terms and conditions of the
BSD License which accompanies this distribution. The full text of the license may be found at http://opensource.org/
licenses/bsd-license.php
1582
THE PROGRAM IS DISTRIBUTED UNDER THE BSD LICENSE ON AN "AS IS" BASIS, WITHOUT WARRANTIES OR
REPRESENTATIONS OF ANY KIND, EITHER EXPRESS OR IMPLIED.
THE PROGRAM IS DISTRIBUTED UNDER THE BSD LICENSE ON AN "AS IS" BASIS,
WITHOUT WARRANTIES OR REPRESENTATIONS OF ANY KIND, EITHER EXPRESS OR IMPLIED.
THE PROGRAM IS DISTRIBUTED UNDER THE BSD LICENSE ON AN "AS IS" BASIS, WITHOUT WARRANTIES OR
REPRESENTATIONS OF ANY KIND, EITHER EXPRESS OR IMPLIED.
This program and the accompanying materials are licensed and made available under the terms and conditions of the
BSD License which accompanies this distribution. The full text of the license may be found at http://opensource.org/
licenses/bsd-license.php
THE PROGRAM IS DISTRIBUTED UNDER THE BSD LICENSE ON AN "AS IS" BASIS, WITHOUT WARRANTIES OR
REPRESENTATIONS OF ANY KIND, EITHER EXPRESS OR IMPLIED.
THE PROGRAM IS DISTRIBUTED UNDER THE BSD LICENSE ON AN "AS IS" BASIS, WITHOUT WARRANTIES OR
REPRESENTATIONS OF ANY KIND, EITHER EXPRESS OR IMPLIED.
This program and the accompanying materials are licensed and made available under the terms and conditions of the
BSD License which accompanies this distribution. The full text of the license may be found at http://opensource.org/
licenses/bsd-license.php
THE PROGRAM IS DISTRIBUTED UNDER THE BSD LICENSE ON AN "AS IS" BASIS, WITHOUT WARRANTIES OR
REPRESENTATIONS OF ANY KIND, EITHER EXPRESS OR IMPLIED.
THE PROGRAM IS DISTRIBUTED UNDER THE BSD LICENSE ON AN "AS IS" BASIS, WITHOUT WARRANTIES OR
REPRESENTATIONS OF ANY KIND, EITHER EXPRESS OR IMPLIED.
THE PROGRAM IS DISTRIBUTED UNDER THE BSD LICENSE ON AN "AS IS" BASIS, WITHOUT WARRANTIES OR
REPRESENTATIONS OF ANY KIND, EITHER EXPRESS OR IMPLIED.
1583
SGOS Administration Guide
This program and the accompanying materials are licensed and made available under the terms and conditions of the
BSD License that accompanies this distribution. The full text of the license may be found at http://opensource.org/li-
censes/bsd-license.php.
THE PROGRAM IS DISTRIBUTED UNDER THE BSD LICENSE ON AN "AS IS" BASIS, WITHOUT WARRANTIES OR
REPRESENTATIONS OF ANY KIND, EITHER EXPRESS OR IMPLIED.
THE PROGRAM IS DISTRIBUTED UNDER THE BSD LICENSE ON AN "AS IS" BASIS, WITHOUT WARRANTIES OR
REPRESENTATIONS OF ANY KIND, EITHER EXPRESS OR IMPLIED.
THE PROGRAM IS DISTRIBUTED UNDER THE BSD LICENSE ON AN "AS IS" BASIS, WITHOUT WARRANTIES OR
REPRESENTATIONS OF ANY KIND, EITHER EXPRESS OR IMPLIED.
THE PROGRAM IS DISTRIBUTED UNDER THE BSD LICENSE ON AN "AS IS" BASIS, WITHOUT WARRANTIES OR
REPRESENTATIONS OF ANY KIND, EITHER EXPRESS OR IMPLIED.
THE PROGRAM IS DISTRIBUTED UNDER THE BSD LICENSE ON AN "AS IS" BASIS, WITHOUT WARRANTIES OR
REPRESENTATIONS OF ANY KIND, EITHER EXPRESS OR IMPLIED.
THE PROGRAM IS DISTRIBUTED UNDER THE BSD LICENSE ON AN "AS IS" BASIS, WITHOUT WARRANTIES OR
REPRESENTATIONS OF ANY KIND, EITHER EXPRESS OR IMPLIED.
THE PROGRAM IS DISTRIBUTED UNDER THE BSD LICENSE ON AN "AS IS" BASIS, WITHOUT WARRANTIES OR
REPRESENTATIONS OF ANY KIND, EITHER EXPRESS OR IMPLIED.
This program and the accompanying materials are licensed and made available under the terms and conditions of the
BSD License which accompanies this distribution. The full text of the license may be found at http://opensource.org/
licenses/bsd-license.php
THE PROGRAM IS DISTRIBUTED UNDER THE BSD LICENSE ON AN "AS IS" BASIS, WITHOUT WARRANTIES OR
REPRESENTATIONS OF ANY KIND, EITHER EXPRESS OR IMPLIED.
This software and associated documentation (if any) is furnished under a license and may only be used or copied in ac-
cordance with the terms of the license. Except as permitted by such license, no part of this software or documentation
1584
may be reproduced, stored in a retrieval system, or transmitted in any form or by any means without the express written
consent of Intel Corporation.
Redistribution and use in source and binary forms, with or without modification, are permitted provided that the fol-
lowing conditions are met:
1. Redistributions of source code must retain the above copyright notice, this list of conditions and the following dis-
claimer.
2. Redistributions in binary form must reproduce the above copyright notice, this list of conditions and the following
disclaimer in the documentation and/or other materials provided with the distribution.
3. All advertising materials mentioning features or use of this software must display the following acknowledgement:
This product includes software developed for the NetBSD Project by Wasabi Systems, Inc.
4. The name of Wasabi Systems, Inc. may not be used to endorse or promote products derived from this software with-
out specific prior written permission.
THIS SOFTWARE IS PROVIDED BY WASABI SYSTEMS, INC. ''AS IS'' AND ANY EXPRESS OR IMPLIED WARRAN-
TIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS
FOR A PARTICULAR PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL WASABI SYSTEMS, INC BE LIABLE
FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (IN-
CLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, DATA,
OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY,
WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING
IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAM-
AGE.
Portions Copyright (C) 1995, 1996, 1997, and 1998 WIDE Project.
All rights reserved.
Redistribution and use in source and binary forms, with or without modification, are permitted provided that the fol-
lowing conditions are met:
1. Redistributions of source code must retain the above copyright notice, this list of conditions and the following dis-
claimer.
2. Redistributions in binary form must reproduce the above copyright notice, this list of conditions and the following
disclaimer in the documentation and/or other materials provided with the distribution.
3. All advertising materials mentioning features or use of this software must display the following acknowledgement:
This product includes software developed by WIDE Project and its contributors.
4. Neither the name of the project nor the names of its contributors may be used to endorse or promote products derived
from this software without specific prior written permission.
THIS SOFTWARE IS PROVIDED BY THE PROJECT AND CONTRIBUTORS ``AS IS'' AND ANY EXPRESS OR IM-
PLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES OF MERCHANTABILI-
TY AND FITNESS FOR A PARTICULAR PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE PROJECT OR
CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSE-
QUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SER-
VICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY
THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT
LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF
THIS SOFTWARE, EVEN IFADVISED OF THE POSSIBILITY OF SUCH DAMAGE.
Redistribution and use in source and binary forms, with or without modification, are permitted provided that the fol-
lowing conditions are met:
1. Redistributions of source code must retain the above copyright notice, this list of conditions and the following dis-
claimer.
2. Redistributions in binary form must reproduce the above copyright notice, this list of conditions and the following
1585
SGOS Administration Guide
disclaimer in the documentation and/or other materials provided with the distribution.
THIS SOFTWARE IS PROVIDED BY THE AUTHOR(S) ''AS IS'' AND ANY EXPRESS OR IMPLIED WARRANTIES, IN-
CLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A
PARTICULAR PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE AUTHOR(S) BE LIABLE FOR ANY DI-
RECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT
NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, DATA, OR PROFITS;
OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CON-
TRACT, STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT
OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.
Redistribution and use in source and binary forms, with or without modification, are permitted provided that the fol-
lowing conditions are met:
- Redistributions of source code must retain the above copyright notice, this list of conditions and the following dis-
claimer.
- Redistributions in binary form must reproduce the above copyright notice, this list of conditions and the following
disclaimer in the documentation and/or other materials provided with the distribution.
- Neither the name of the University nor the names of its contributors may be used to endorse or promote products
derived from this software without specific prior written permission.
THIS SOFTWARE IS PROVIDED BY THE COPYRIGHT HOLDERS AND CONTRIBUTORS "AS IS" AND ANY EX-
PRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES OF MER-
CHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE
COPYRIGHT HOLDERS OR CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL,
EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUB-
STITUTE GOODS OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER
CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT (IN-
CLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN
IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.
Redistribution and use in source and binary forms, with or without modification, are permitted provided that the fol-
lowing conditions are met:
1. Redistributions of source code must retain the above copyright notice, this list of conditions and the following dis-
claimer.
2. Redistributions in binary form must reproduce the above copyright notice, this list of conditions and the following
disclaimer in the documentation and/or other materials provided with the distribution.
3. Neither the name of the University nor the names of its contributors may be used to endorse or promote products
derived from this software without specific prior written permission.
THIS SOFTWARE IS PROVIDED BY THE REGENTS AND CONTRIBUTORS ''AS IS'' AND ANY EXPRESS OR IM-
PLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES OF MERCHANTABILI-
TY AND FITNESS FOR A PARTICULAR PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE REGENTS OR
CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSE-
QUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SER-
VICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY
THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT
LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF
THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.
Permission to use, copy, modify, and distribute this software for any purpose with or without fee is hereby granted, pro-
vided that the above copyright notice and this permission notice appear in all copies.
Permission to use, copy, modify, and distribute this software for any purpose with or without fee is hereby granted, pro-
vided that the above copyright notice and this permission notice appear in all copies, and that the name of Digital Equip-
ment Corporation not be used in advertising or publicity pertaining to distribution of the document or software without
specific, written prior permission.
THE SOFTWARE IS PROVIDED "AS IS" AND DIGITAL EQUIPMENT CORP. DISCLAIMS ALL WARRANTIES WITH
REGARD TO THIS SOFTWARE, INCLUDING ALL IMPLIED WARRANTIES OF MERCHANTABILITY AND FIT-
NESS. IN NO EVENT SHALL DIGITAL EQUIPMENT CORPORATION BE LIABLE FOR ANY SPECIAL, DIRECT, IN-
DIRECT, OR CONSEQUENTIAL DAMAGES OR ANY DAMAGES WHATSOEVER RESULTING FROM LOSS OF USE,
DATA OR PROFITS, WHETHER IN AN ACTION OF CONTRACT, NEGLIGENCE OR OTHER TORTIOUS ACTION,
1586
ARISING OUT OF OR IN CONNECTION WITH THE USE OR PERFORMANCE OF THIS SOFTWARE.
International Business Machines, Inc. (hereinafter called IBM) grants permission under its copyrights to use, copy, mod-
ify, and distribute this Software with or without fee, provided that the above copyright notice and all paragraphs of this
notice appear in all copies, and that the name of IBM not be used in connection with the marketing of any product in-
corporating the Software or modifications thereof, without specific, written prior permission.
To the extent it has a right to do so, IBM grants an immunity from suit under its patents, if any, for the use, sale or man-
ufacture of products to the extent that such products are used for performing Domain Name System dynamic updates
in TCP/IP networks by means of the Software. No immunity is granted for any product per se or for any other function
of any product.
THE SOFTWARE IS PROVIDED "AS IS", AND IBM DISCLAIMS ALL WARRANTIES, INCLUDING ALL IMPLIED
WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE. IN NO EVENT SHALL
IBM BE LIABLE FOR ANY SPECIAL, DIRECT, INDIRECT, OR CONSEQUENTIAL DAMAGES OR ANY DAMAGES
WHATSOEVER ARISING OUT OF OR IN CONNECTION WITH THE USE OR PERFORMANCE OF THIS SOFT-
WARE, EVEN IF IBM IS APPRISED OF THE POSSIBILITY OF SUCH DAMAGES.
Permission to use, copy, modify, and distribute this software for any purpose with or without fee is hereby granted, pro-
vided that the above copyright notice and this permission notice appear in all copies.
THE SOFTWARE IS PROVIDED "AS IS" AND INTERNET SOFTWARE CONSORTIUM DISCLAIMS ALL WARRAN-
TIES WITH REGARD TO THIS SOFTWARE INCLUDING ALL IMPLIED WARRANTIES OF MERCHANTABILITY
AND FITNESS. IN NO EVENT SHALL INTERNET SOFTWARE
CONSORTIUM BE LIABLE FOR ANY SPECIAL, DIRECT, INDIRECT, OR CONSEQUENTIAL DAMAGES OR ANY
DAMAGES WHATSOEVER RESULTING FROM LOSS OF USE, DATA OR PROFITS, WHETHER IN AN ACTION OF
CONTRACT, NEGLIGENCE OR OTHER TORTIOUS ACTION, ARISING OUT OF OR IN CONNECTION WITH THE
USE OR PERFORMANCE OF THIS SOFTWARE.
Redistribution and use in source and binary forms, with or without modification, are permitted provided that the fol-
lowing conditions are met:
1. Redistributions of source code must retain the above copyright notice, this list of conditions and the following
disclaimer.
2. Redistributions in binary form must reproduce the above copyright notice, this list of conditions and the following
disclaimer in the documentation and/or other materials provided with the distribution.
3. All advertising materials mentioning features or use of this software must display the following acknowledgement:
This product includes software developed by the NetBSD Foundation, Inc. and its contributors.
4. Neither the name of The NetBSD Foundation nor the names of its contributors may be used to endorse or promote
products derived from this software without specific prior written permission.
THIS SOFTWARE IS PROVIDED BY THE NETBSD FOUNDATION, INC. AND CONTRIBUTORS''AS IS'' AND ANY
EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES OF
MERCHANTABILITY AND FITNESS FOR A PARTICULAR
PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE FOUNDATION OR CONTRIBUTORS BE LIABLE FOR
ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUD-
ING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, DATA, OR
PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER
IN CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY
WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.
Redistribution and use in source and binary forms, with or without modification, are permitted provided that the fol-
lowing conditions are met:
1587
SGOS Administration Guide
1. Redistributions of source code must retain the above copyright notice, this list of conditions and the following dis-
claimer.
2. Redistributions in binary form must reproduce the above copyright notice, this list of conditions and the following
disclaimer in the documentation and/or other materials provided with the distribution.
4. Neither the name of the University nor the names of its contributors may be used to endorse or promote products
derived from this software without specific prior written permission.
THIS SOFTWARE IS PROVIDED BY THE REGENTS AND CONTRIBUTORS ``AS IS'' AND ANY EXPRESS OR IM-
PLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES OF MERCHANTABILI-
TY AND FITNESS FOR A PARTICULAR PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE REGENTS OR
CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSE-
QUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SER-
VICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY
THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT
LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF
THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.
Redistribution and use in source and binary forms, with or without modification, are permitted provided that the fol-
lowing conditions are met:
1. Redistributions of source code must retain the above copyright notice, this list of conditions and the following dis-
claimer.
2. Redistributions in binary form must reproduce the above copyright notice, this list of conditions and the following
disclaimer in the documentation and/or other materials provided with the distribution.
3. All advertising materials mentioning features or use of this software must display the following acknowledgement:
This product includes software developed by Intel Corporation and its contributors.
4. Neither the name of Intel Corporation or its contributors may be used to endorse or promote products derived from
this software without specific prior written permission.
THIS SOFTWARE IS PROVIDED BY INTEL CORPORATION AND CONTRIBUTORS ``AS IS'' AND ANY EXPRESS OR
IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES OF MERCHANTABI-
LITY AND FITNESS FOR A PARTICULAR PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL INTEL CORPORA-
TION OR CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR
CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS
OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON
ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING NEGLI-
GENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF
THE POSSIBILITY OF SUCH DAMAGE.
Permission is hereby granted, free of charge, to any person obtaining a copy of this software and associated documen-
tation files (the "Software"), to deal in the Software without restriction, including without limitation the rights to use,
copy, modify, merge, publish, distribute, sublicense, and/or sell copies of the Software, and to permit persons to whom
the Software is furnished to do so, subject to the following conditions:
The above copyright notice and this permission notice shall be included in all copies or substantial portions of the Soft-
ware.
THE SOFTWARE IS PROVIDED "AS IS", WITHOUT WARRANTY OF ANY KIND, EXPRESS OR IMPLIED, INCLUD-
ING BUT NOT LIMITED TO THE WARRANTIES OF MERCHANTABILITY, FITNESS FOR A PARTICULAR PUR-
POSE AND NONINFRINGEMENT. IN NO EVENT SHALL THE AUTHORS OR COPYRIGHT HOLDERS BE LIABLE
FOR ANY CLAIM, DAMAGES OR OTHER LIABILITY, WHETHER IN AN ACTION OF CONTRACT,
TORT OR OTHERWISE, ARISING FROM, OUT OF OR IN CONNECTION WITH THE SOFTWARE OR THE USE OR
OTHER DEALINGS IN THE SOFTWARE.
flex-iframe project
Copyright (c) 2007-2010 flex-iframe contributors
Permission is hereby granted, free of charge, to any person obtaining a copy of this software and associated documen-
tation files (the "Software"), to deal
in the Software without restriction, including without limitation the rights to use, copy, modify, merge, publish, distrib-
ute, sublicense, and/or sell
1588
copies of the Software, and to permit persons to whom the Software is furnished to do so, subject to the following con-
ditions:
The above copyright notice and this permission notice shall be included in all copies or substantial portions of the Soft-
ware.
THE SOFTWARE IS PROVIDED "AS IS", WITHOUT WARRANTY OF ANY KIND, EXPRESS OR IMPLIED, INCLUD-
ING BUT NOT LIMITED TO THE WARRANTIES OF MERCHANTABILITY, FITNESS FOR A PARTICULAR PUR-
POSE AND NONINFRINGEMENT. IN NO EVENT SHALL THE AUTHORS OR COPYRIGHT HOLDERS BE LIABLE
FOR ANY CLAIM, DAMAGES OR OTHER LIABILITY, WHETHER IN AN ACTION OF CONTRACT, TORT OR OTH-
ERWISE, ARISING FROM, OUT OF OR IN CONNECTION WITH THE SOFTWARE OR THE USE OR OTHER DEAL-
INGS IN THE SOFTWARE.
Permission is hereby granted, free of charge, to any person obtaining a copy of this software and associated documen-
tation files (the "Software"), to deal in the Software without restriction, including without limitation the rights to use,
copy, modify, merge, publish, distribute, sublicense, and/or sell copies
of the Software, and to permit persons to whom the Software is furnished to do so, subject to the following conditions:
The above copyright notice and this permission notice shall be included in all copies or substantial portions of the Soft-
ware.
THE SOFTWARE IS PROVIDED "AS IS", WITHOUT WARRANTY OF ANY KIND, EXPRESS OR IMPLIED, INCLUD-
ING BUT NOT LIMITED TO THE WARRANTIES OF MERCHANTABILITY, FITNESS FOR A PARTICULAR PUR-
POSE AND NONINFRINGEMENT. IN NO EVENT SHALL THE AUTHORS OR COPYRIGHT HOLDERS BE LIABLE
FOR ANY CLAIM, DAMAGES OR OTHER LIABILITY, WHETHER IN AN ACTION OF CONTRACT, TORT OR OTH-
ERWISE, ARISING FROM, OUT OF OR IN CONNECTION WITH THE SOFTWARE OR THE USE OR OTHER DEAL-
INGS IN THE SOFTWARE.
Permission is hereby granted, free of charge, to any person obtaining a copy of this software and associated documen-
tation files (the "Software"), to deal in the Software without restriction, including without limitation the rights to use,
copy, modify, merge, publish, distribute, and/or sell copies of the Software, and to permit persons to whom the Soft-
ware is furnished to do so, provided that the above copyright notice(s) and this permission notice appear in all copies
of the Software and that both the above copyright notice(s) and this permission notice appear in supporting documen-
tation.
THE SOFTWARE IS PROVIDED "AS IS", WITHOUT WARRANTY OF ANY KIND, EXPRESS OR IMPLIED, INCLUD-
ING BUT NOT LIMITED TO THE WARRANTIES OF MERCHANTABILITY, FITNESS FOR A PARTICULAR PUR-
POSE AND NONINFRINGEMENT OF THIRD PARTY RIGHTS. IN NO EVENT SHALL THE COPYRIGHT HOLDER
OR HOLDERS INCLUDED IN THIS NOTICE BE LIABLE FOR ANY CLAIM, OR ANY SPECIAL INDIRECT OR CON-
SEQUENTIAL DAMAGES, OR ANY DAMAGES WHATSOEVER RESULTING FROM LOSS OF USE, DATA OR
PROFITS, WHETHER IN AN ACTION OF CONTRACT, NEGLIGENCE OR OTHER TORTIOUS ACTION, ARISING
OUT OF OR IN CONNECTION WITH THE USE OR PERFORMANCE OF THIS SOFTWARE.
Except as contained in this notice, the name of a copyright holder shall not be used in advertising or otherwise to pro-
mote the sale, use or other dealings in this Software without prior written authorization of the copyright holder.
Apache License
Version 2.0, January 2004
http://www.apache.org/licenses/
1. Definitions.
"License" shall mean the terms and conditions for use, reproduction, and distribution as defined by Sections 1 through
9 of this document.
"Licensor" shall mean the copyright owner or entity authorized by the copyright owner that is granting the License.
"Legal Entity" shall mean the union of the acting entity and all other entities that control, are controlled by, or are under
common control with that entity. For the purposes of this definition, "control" means (i) the power, direct or indirect, to
1589
SGOS Administration Guide
cause the direction or management of such entity, whether by contract or otherwise, or (ii) ownership of fifty percent
(50%) or more of the outstanding shares, or (iii) beneficial ownership of such entity.
"You" (or "Your") shall mean an individual or Legal Entity exercising permissions granted by this License.
"Source" form shall mean the preferred form for making modifications, including but not limited to software source
code, documentation source, and configuration files.
"Object" form shall mean any form resulting from mechanical transformation or translation of a Source form, including
but not limited to compiled object code, generated documentation, and conversions to other media types.
"Work" shall mean the work of authorship, whether in Source or Object form, made available under the License, as in-
dicated by a copyright notice that is included in or attached to the work (an example is provided in the Appendix below).
"Derivative Works" shall mean any work, whether in Source or Object form, that is based on (or derived from) the Work
and for which the editorial revisions, annotations, elaborations, or other modifications represent, as a whole, an original
work of authorship. For the purposes of this License, Derivative Works shall not include works that remain separable
from, or merely link (or bind by name) to the interfaces of, the Work and Derivative Works thereof.
"Contribution" shall mean any work of authorship, including the original version of the Work and any modifications or
additions to that Work or Derivative Works thereof, that is intentionally submitted to Licensor for inclusion in the Work
by the copyright owner or by an individual or Legal Entity authorized to submit on behalf of the copyright owner. For
the purposes of this definition, "submitted" means any form of electronic, verbal, or written communication sent to the
Licensor or its representatives, including but not limited to communication on electronic mailing lists, source code con-
trol systems, and issue tracking systems that are managed by, or on behalf of, the Licensor for the purpose of discussing
and improving the Work, but excluding communication that is conspicuously marked or otherwise designated in writ-
ing by the copyright owner as "Not a Contribution."
"Contributor" shall mean Licensor and any individual or Legal Entity on behalf of whom a Contribution has been re-
ceived by Licensor and subsequently incorporated within the Work.
2. Grant of Copyright License. Subject to the terms and conditions of this License, each Contributor hereby grants to You
a perpetual, worldwide, non-exclusive, no-charge, royalty-free, irrevocable copyright license to reproduce, prepare De-
rivative Works of, publicly display, publicly perform, sublicense, and distribute the Work and such Derivative Works
in Source or Object form.
3. Grant of Patent License. Subject to the terms and conditions of this License, each Contributor hereby grants to You a
perpetual, worldwide, non-exclusive, no-charge, royalty-free, irrevocable (except as stated in this section) patent license
to make, have made, use, offer to sell, sell, import, and otherwise transfer the Work, where such license applies only to
those patent claims licensable by such Contributor that are necessarily infringed by their Contribution(s) alone or by
combination of their Contribution(s) with the Work to which such Contribution(s) was submitted. If You institute patent
litigation against any entity (including a cross-claim or counterclaim in a lawsuit) alleging that the Work or a Contribu-
tion incorporated within the Work constitutes direct or contributory patent infringement, then any patent licenses grant-
ed to You under this License for that Work shall terminate as of the date such litigation is filed.
4. Redistribution. You may reproduce and distribute copies of the Work or Derivative Works thereof in any medium,
with or without modifications, and in Source or Object form, provided that You meet the following conditions:
(a) You must give any other recipients of the Work or Derivative Works a copy of this License; and
(b) You must cause any modified files to carry prominent notices stating that You changed the files; and
(c) You must retain, in the Source form of any Derivative Works that You distribute, all copyright, patent, trademark,
and attribution notices from the Source form of the Work, excluding those notices that do not pertain to any part of the
Derivative Works; and
(d) If the Work includes a "NOTICE" text file as part of its distribution, then any Derivative Works that You distribute
must include a readable copy of the attribution notices contained within such NOTICE file, excluding those notices that
do not pertain to any part of the Derivative Works, in at least one
of the following places: within a NOTICE text file distributed as part of the Derivative Works; within the Source form
or documentation, if provided along with the Derivative Works; or, within a display generated by the Derivative Works,
if and wherever such third-party notices normally appear. The contents of the NOTICE file are for informational pur-
poses only and do not modify the License. You may add Your own attribution notices within Derivative Works that You
distribute, alongside or as an addendum to the NOTICE text from the Work, provided that such additional attribution
notices cannot be construed as modifying the License.
You may add Your own copyright statement to Your modifications and may provide additional or different license
terms and conditions for use, reproduction, or distribution of Your modifications, or for any such Derivative Works as
a whole, provided Your use, reproduction, and distribution of the Work otherwise complies with the conditions stated
in this License.
5. Submission of Contributions. Unless You explicitly state otherwise, any Contribution intentionally submitted for in-
clusion in the Work by You to the Licensor shall be under the terms and conditions of this License, without any addi-
tional terms or conditions. Notwithstanding the above, nothing herein shall supersede or modify the terms of any
separate license agreement you may have executed with Licensor regarding such Contributions.
1590
6. Trademarks. This License does not grant permission to use the trade names, trademarks, service marks, or product
names of the Licensor, except as required for reasonable and customary use in describing the origin of the Work and
reproducing the content of the NOTICE file.
7. Disclaimer of Warranty. Unless required by applicable law or agreed to in writing, Licensor provides the Work (and
each Contributor provides its Contributions) on an "AS IS" BASIS, WITHOUT WARRANTIES OR CONDITIONS OF
ANY KIND, either express or implied, including, without limitation, any warranties or conditions of TITLE, NON-IN-
FRINGEMENT, MERCHANTABILITY, or FITNESS FOR A PARTICULAR PURPOSE. You are solely responsible for de-
termining the appropriateness of using or redistributing the Work and assume any risks associated with Your exercise
of permissions under this License.
8. Limitation of Liability. In no event and under no legal theory, whether in tort (including negligence), contract, or oth-
erwise, unless required by applicable law (such as deliberate and grossly negligent acts) or agreed to in writing, shall
any Contributor be liable to You for damages, including any direct, indirect, special, incidental, or consequential dam-
ages of any character arising as a result of this License or out of the use or inability to use the Work (including but not
limited to damages for loss of goodwill, work stoppage, computer failure or malfunction, or any and all other commer-
cial damages or losses), even if such Contributor has been advised of the possibility of such damages.
9. Accepting Warranty or Additional Liability. While redistributing the Work or Derivative Works thereof, You may
choose to offer, and charge a fee for, acceptance of support, warranty, indemnity, or other liability obligations and/or
rights consistent with this License. However, in accepting such obligations, You may act only on Your own behalf and
on Your sole responsibility, not on behalf of any other Contributor, and only if You agree to indemnify, defend, and hold
each Contributor harmless for any liability incurred by, or claims asserted against, such Contributor by reason of your
accepting any such warranty or additional liability.
Kerberos Version 5
http://web.mit.edu/kerberos/www/
Copyright (C) 1985-2009 by the Massachusetts Institute of Technology.
Export of this software from the United States of America may require a specific license from the United States Govern-
ment. It is the responsibility of any person or organization contemplating export to obtain such a license before export-
ing.
WITHIN THAT CONSTRAINT, permission to use, copy, modify, and distribute this software and its documentation for
any purpose and without fee is hereby granted, provided that the above copyright notice appear in all copies and that
both that copyright notice and this permission notice appear in supporting documentation, and that the name of M.I.T.
not be used in advertising or publicity pertaining to distribution of the software without specific, written prior permis-
sion. Furthermore if you modify this software you must label your software as modified software and not distribute it
in such a
fashion that it might be confused with the original MIT software. M.I.T. makes no representations about the suitability
of this software for any purpose. It is provided "as is" without express or implied warranty.
THIS SOFTWARE IS PROVIDED "AS IS" AND WITHOUT ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING,
WITHOUT LIMITATION, THE IMPLIED WARRANTIES OF MERCHANTIBILITY AND FITNESS FOR A PARTICU-
LAR PURPOSE.
Individual source code files are copyright MIT, Cygnus Support, Novell, OpenVision Technologies, Oracle, Red Hat,
Sun Microsystems, FundsXpress, and others.
Project Athena, Athena, Athena MUSE, Discuss, Hesiod, Kerberos, Moira, and Zephyr are trademarks of the Massachu-
setts Institute of Technology (MIT). No commercial use of these trademarks may be made without prior written permis-
sion of MIT.
"Commercial use" means use of a name in a product or other for-profit manner. It does NOT prevent a commercial firm
from referring to the MIT trademarks in order to convey information (although in doing so, recognition of their trade-
mark status should be given).
Export of this software from the United States of America may require a specific license from the United States Govern-
ment. It is the responsibility of any person or organization contemplating export to obtain such a license before export-
ing.
WITHIN THAT CONSTRAINT, permission to use, copy, modify, and distribute this software and its documentation for
any purpose and without fee is hereby granted, provided that the above copyright notice appear in all copies and that
both that copyright notice and this permission notice appear in supporting documentation, and that the name of
FundsXpress. not be used in advertising or publicity pertaining to distribution of the software without specific, written
1591
SGOS Administration Guide
prior permission. FundsXpress makes no representations about the suitability of this software for any purpose. It is
provided "as is" without express or implied warranty.
THIS SOFTWARE IS PROVIDED "AS IS" AND WITHOUT ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING,
WITHOUT LIMITATION, THE IMPLIED WARRANTIES OF MERCHANTIBILITY AND FITNESS FOR A PARTICU-
LAR PURPOSE.
The following copyright and permission notice applies to the OpenVision Kerberos Administration system located in
kadmin/create, kadmin/dbutil, kadmin/passwd, kadmin/server, lib/kadm5, and portions of lib/rpc:
WARNING: Retrieving the OpenVision Kerberos Administration system source code, as described below, indicates
your acceptance of the following terms. If you do not agree to the following terms, do not retrieve the OpenVision Ker-
beros administration system.
You may freely use and distribute the Source Code and Object Code compiled from it, with or without modification, but
this Source Code is provided to you "AS IS" EXCLUSIVE OF ANY WARRANTY, INCLUDING, WITHOUT LIMITA-
TION, ANY WARRANTIES OF MERCHANTABILITY OR FITNESS FOR A PARTICULAR PURPOSE, OR ANY OTH-
ER WARRANTY, WHETHER EXPRESS OR IMPLIED. IN NO EVENT WILL OPENVISION HAVE ANY LIABILITY
FOR ANY LOST PROFITS, LOSS OF DATA OR COSTS OF PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES,
OR FOR ANY SPECIAL, INDIRECT, OR CONSEQUENTIAL DAMAGES ARISING OUT OF THIS AGREEMENT, IN-
CLUDING, WITHOUT LIMITATION, THOSE RESULTING FROM THE USE OF THE SOURCE CODE, OR THE FAIL-
URE OF THE SOURCE CODE TO PERFORM, OR FOR ANY OTHER REASON.
OpenVision retains all copyrights in the donated Source Code. OpenVision also retains copyright to derivative works
of the Source Code, whether created by OpenVision or by a third party. The OpenVision copyright notice must be pre-
served if derivative works are made based on the donated Source Code.
OpenVision Technologies, Inc. has donated this Kerberos Administration system to MIT for inclusion in the standard
Kerberos 5 distribution. This donation underscores our commitment to continuing Kerberos technology development
and our gratitude for the valuable work which has been performed by MIT and the Kerberos community.
Portions contributed by Matt Crawford <[email protected]> were work performed at Fermi National Accelerator Lab-
oratory, which is operated by Universities Research Association, Inc., under contract DE-AC02-76CHO3000 with the
U.S. Department of Energy.
The implementation of the Yarrow pseudo-random number generator in src/lib/crypto/yarrow has the following
copyright:
Permission to use, copy, modify, distribute, and sell this software and its documentation for any purpose is hereby
granted without fee, provided that the above copyright notice appear in all copies and that both that copyright notice
and this permission notice appear in supporting documentation, and that the name of Zero-Knowledge Systems, Inc.
not be used in advertising or publicity pertaining to distribution of the software without specific, written prior permis-
sion. Zero-Knowledge Systems, Inc. makes no representations about the suitability of this software for any purpose. It
is provided "as is" without express or implied warranty.
ZERO-KNOWLEDGE SYSTEMS, INC. DISCLAIMS ALL WARRANTIES WITH REGARD TO THIS SOFTWARE, IN-
CLUDING ALL IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS, IN NO EVENT SHALL ZERO-
KNOWLEDGE SYSTEMS, INC. BE LIABLE FOR ANY SPECIAL, INDIRECT OR CONSEQUENTIAL DAMAGES OR
ANY DAMAGES WHATSOEVER RESULTING FROM LOSS OF USE, DATA OR PROFITS, WHETHER IN AN AC-
TION OF CONTRACT, NEGLIGENCE OR OTHER TORTUOUS ACTION, ARISING OUT OF OR IN CONNECTION
WITH THE USE OR PERFORMANCE OF THIS SOFTWARE.
The implementation of the AES encryption algorithm in src/lib/crypto/aes has the following copyright:
LICENSE TERMS
The free distribution and use of this software in both source and binary form is allowed (with or without changes)
provided that:
1. distributions of this source code include the above copyright notice, this list of conditions and the following disclaim-
er;
2. distributions in binary form include the above copyright notice, this list of conditions and the following disclaimer in
the documentation and/or other associated materials;
3. the copyright holder's name is not used to endorse products built using this software without specific written per-
mission.
1592
DISCLAIMER
This software is provided 'as is' with no explcit or implied warranties in respect of any properties, including, but not
limited to, correctness and fitness for purpose.
Portions contributed by Red Hat, including the pre-authentication plug-ins framework, contain the following copyright:
Redistribution and use in source and binary forms, with or without modification, are permitted provided that the fol-
lowing conditions are met:
Redistributions of source code must retain the above copyright notice, this list of conditions and the following disclaim-
er.
Redistributions in binary form must reproduce the above copyright notice, this list of conditions and the following dis-
claimer in the documentation and/or other materials provided with the distribution.
Neither the name of Red Hat, Inc., nor the names of its contributors may be used to endorse or promote products derived
from this software without specific prior written permission.
THIS SOFTWARE IS PROVIDED BY THE COPYRIGHT HOLDERS AND CONTRIBUTORS "AS IS" AND ANY EX-
PRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES OF MER-
CHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE
COPYRIGHT OWNER OR CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL,
EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUB-
STITUTE GOODS OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER
CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT (IN-
CLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN
IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.
The implementations of GSSAPI mechglue in GSSAPI-SPNEGO insrc/lib/gssapi, including the following files:
lib/gssapi/generic/gssapi_err_generic.et
lib/gssapi/mechglue/g_accept_sec_context.c
lib/gssapi/mechglue/g_acquire_cred.c
lib/gssapi/mechglue/g_canon_name.c
lib/gssapi/mechglue/g_compare_name.c
lib/gssapi/mechglue/g_context_time.c
lib/gssapi/mechglue/g_delete_sec_context.c
lib/gssapi/mechglue/g_dsp_name.c
lib/gssapi/mechglue/g_dsp_status.c
lib/gssapi/mechglue/g_dup_name.c
lib/gssapi/mechglue/g_exp_sec_context.c
lib/gssapi/mechglue/g_export_name.c
lib/gssapi/mechglue/g_glue.c
lib/gssapi/mechglue/g_imp_name.c
lib/gssapi/mechglue/g_imp_sec_context.c
lib/gssapi/mechglue/g_init_sec_context.c
lib/gssapi/mechglue/g_initialize.c
lib/gssapi/mechglue/g_inquire_context.c
lib/gssapi/mechglue/g_inquire_cred.c
lib/gssapi/mechglue/g_inquire_names.c
lib/gssapi/mechglue/g_process_context.c
lib/gssapi/mechglue/g_rel_buffer.c
lib/gssapi/mechglue/g_rel_cred.c
lib/gssapi/mechglue/g_rel_name.c
lib/gssapi/mechglue/g_rel_oid_set.c
lib/gssapi/mechglue/g_seal.c
lib/gssapi/mechglue/g_sign.c
lib/gssapi/mechglue/g_store_cred.c
lib/gssapi/mechglue/g_unseal.c
lib/gssapi/mechglue/g_userok.c
lib/gssapi/mechglue/g_utils.c
lib/gssapi/mechglue/g_verify.c
lib/gssapi/mechglue/gssd_pname_to_uid.c
lib/gssapi/mechglue/mglueP.h
lib/gssapi/mechglue/oid_ops.c
lib/gssapi/spnego/gssapiP_spnego.h
lib/gssapi/spnego/spnego_mech.c
1593
SGOS Administration Guide
and the initial implementation of incremental propagation, including the following new or changed files:
include/iprop_hdr.h
kadmin/server/ipropd_svc.c
lib/kdb/iprop.x
lib/kdb/kdb_convert.c
lib/kdb/kdb_log.c
lib/kdb/kdb_log.h
lib/krb5/error_tables/kdb5_err.et
slave/kpropd_rpc.c
slave/kproplog.c
lib/krb5/os/hst_realm.c
Permission is hereby granted, free of charge, to any person obtaining a copy of this software and associated documen-
tation files (the "Software"), to deal in the Software without restriction, including without limitation the rights to use,
copy, modify, merge, publish, distribute, sublicense, and/or sell copies of the Software, and to permit persons to whom
the Software is furnished to do so, subject to the following conditions:
The above copyright notice and this permission notice shall be included in all copies or substantial portions of the Soft-
ware.
THE SOFTWARE IS PROVIDED "AS IS", WITHOUT WARRANTY OF ANY KIND, EXPRESS OR IMPLIED, INCLUD-
ING BUT NOT LIMITED TO THE WARRANTIES OF MERCHANTABILITY, FITNESS FOR A PARTICULAR PUR-
POSE AND NONINFRINGEMENT. IN NO EVENT SHALL THE AUTHORS OR COPYRIGHT HOLDERS BE LIABLE
FOR ANY CLAIM, DAMAGES OR OTHER LIABILITY, WHETHER IN AN ACTION OF CONTRACT,
TORT OR OTHERWISE, ARISING FROM, OUT OF OR IN CONNECTION WITH THE SOFTWARE OR THE USE OR
OTHER DEALINGS IN THE SOFTWARE.
MIT Kerberos includes documentation and software developed at the University of California at Berkeley, which in-
cludes this copyright notice:
Redistribution and use in source and binary forms, with or without modification, are permitted provided that the fol-
lowing conditions are met:
1. Redistributions of source code must retain the above copyright notice, this list of conditions and the following dis-
claimer.
2. Redistributions in binary form must reproduce the above copyright notice, this list of conditions and the following
disclaimer in the documentation and/or other materials provided with the distribution.
3. Neither the name of the University nor the names of its contributors may be used to endorse or promote products
derived from this software without specific prior written permission.
THIS SOFTWARE IS PROVIDED BY THE REGENTS AND CONTRIBUTORS "AS IS" AND ANY EXPRESS OR IM-
PLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES OF MERCHANTABILI-
TY AND FITNESS FOR A PARTICULAR PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE REGENTS OR
CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSE-
QUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SER-
VICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY
THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT
LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF
THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.
Portions contributed by Novell, Inc., including the LDAP database backend, are subject to the following license:
Redistribution and use in source and binary forms, with or without modification, are permitted provided that the fol-
lowing conditions are met:
Redistributions of source code must retain the above copyright notice, this list of conditions and the following disclaim-
er.
1594
Redistributions in binary form must reproduce the above copyright notice, this list of conditions and the following dis-
claimer in the documentation and/or other materials provided with the distribution.
The copyright holder's name is not used to endorse or promote products derived from this software without specific
prior written permission.
THIS SOFTWARE IS PROVIDED BY THE COPYRIGHT HOLDERS AND CONTRIBUTORS "AS IS" AND ANY EX-
PRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES OF MER-
CHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE
COPYRIGHT OWNER OR CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL,
EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUB-
STITUTE GOODS OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER
CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT (IN-
CLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN
IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.
Portions funded by Sandia National Laboratory and developed by the University of Michigan's Center for Information
Technology Integration, including the PKINIT implementation, are subject to the following license:
Permission is granted to use, copy, create derivative works and redistribute this software and such derivative works for
any purpose, so long as the name of The University of Michigan is not used in any advertising or publicity pertaining
to the use of distribution of this software without specific, written prior authorization. If the above copyright notice or
any other identification of the University of Michigan is included in any copy of any portion of this software, then the
disclaimer below must also be included.
THIS SOFTWARE IS PROVIDED AS IS, WITHOUT REPRESENTATION FROM THE UNIVERSITY OF MICHIGAN AS
TO ITS FITNESS FOR ANY
PURPOSE, AND WITHOUT WARRANTY BY THE UNIVERSITY OF MICHIGAN OF ANY KIND, EITHER EXPRESS
OR IMPLIED, INCLUDING
WITHOUT LIMITATION THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICU-
LAR PURPOSE. THE
REGENTS OF THE UNIVERSITY OF MICHIGAN SHALL NOT BE LIABLE FOR ANY DAMAGES, INCLUDING SPE-
CIAL, INDIRECT, INCIDENTAL, OR CONSEQUENTIAL DAMAGES, WITH RESPECT TO ANY CLAIM ARISING
OUT OF OR IN CONNECTION WITH THE USE OF THE SOFTWARE, EVEN IF IT HAS BEEN OR IS HEREAFTER
ADVISED OF THE POSSIBILITY OF SUCH DAMAGES.
The pkcs11.h file included in the PKINIT code has the following license:
This file is free software; as a special exception the author gives unlimited permission to copy and/or distribute it, with
or without modifications, as long as this notice is preserved.
This file is distributed in the hope that it will be useful, but WITHOUT ANY WARRANTY, to the extent permitted by
law; without even the implied warranty of MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.
Export of this software from the United States of America may require a specific license from the United States Govern-
ment. It is the responsibility of any person or organization contemplating export to obtain such a license before export-
ing.
WITHIN THAT CONSTRAINT, permission to use, copy, modify, and distribute this software and its documentation for
any purpose and without fee is hereby granted, provided that the above copyright notice appear in all copies and that
both that copyright notice and this permission notice appear in supporting documentation, and that the name of Apple
Inc. not be used in advertising or publicity pertaining to distribution of the software without specific, written prior per-
mission. Apple Inc. makes no representations about the suitability of this software for any purpose. It is provided "as
is" without express or implied warranty.
THIS SOFTWARE IS PROVIDED ''AS IS'' AND WITHOUT ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING,
WITHOUT LIMITATION, THE IMPLIED WARRANTIES OF MERCHANTIBILITY AND FITNESS FOR A PARTICU-
LAR PURPOSE.
The implementations of strlcpy and strlcat in src/util/support/strlcat.c have the following copyright and permission
notice:
1595
SGOS Administration Guide
Permission to use, copy, modify, and distribute this software for any purpose with or without fee is hereby granted, pro-
vided that the above copyright notice and this permission notice appear in all copies.
THE SOFTWARE IS PROVIDED "AS IS" AND THE AUTHOR DISCLAIMS ALL WARRANTIES WITH REGARD TO
THIS SOFTWARE INCLUDING ALL IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS. IN NO
EVENT SHALL THE AUTHOR BE LIABLE FOR ANY SPECIAL, DIRECT, INDIRECT, OR CONSEQUENTIAL DAM-
AGES OR ANY DAMAGES WHATSOEVER RESULTING FROM LOSS OF USE, DATA OR PROFITS, WHETHER IN
AN ACTION OF CONTRACT, NEGLIGENCE OR OTHER TORTIOUS ACTION, ARISING OUT OF OR IN CONNEC-
TION WITH THE USE OR PERFORMANCE OF THIS SOFTWARE.
The implementations of UTF-8 string handling in src/util/support and src/lib/krb5/unicode are subject to the follow-
ing copyright and permission notice:
Redistribution and use of this software and associated documentation ("Software"), with or without modification, are
permitted provided that the following conditions are met:
2. Redistributions in binary form must reproduce applicable copyright statements and notices, this list of conditions, and
the following disclaimer in the documentation and/or other materials provided with the distribution, and
The OpenLDAP Foundation may revise this license from time to time. Each revision is distinguished by a version num-
ber. You may use this Software under terms of this license revision or under the terms of any subsequent revision of the
license.
THIS SOFTWARE IS PROVIDED BY THE OPENLDAP FOUNDATION AND ITS CONTRIBUTORS ``AS IS'' AND ANY
EXPRESSED OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES OF
MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL
THE OPENLDAP FOUNDATION, ITS CONTRIBUTORS, OR THE AUTHOR(S) OR OWNER(S) OF THE SOFTWARE
BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAM-
AGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF
USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY OF LIA-
BILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE)
ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THEPOSSIBILITY OF SUCH
DAMAGE.
The names of the authors and copyright holders must not be used in advertising or otherwise to promote the sale, use
or other dealing in this Software without specific, written prior permission. Title to copyright in this Software shall at
all times remain with copyright holders.
Redistribution and use in source and binary forms, with or without modification, are permitted provided that the fol-
lowing conditions are met:
1. Redistributions of source code must retain the above copyright notice, this list of conditions and the following dis-
claimer.
2. Redistributions in binary form must reproduce the above copyright notice, this list of conditions and the following
disclaimer in the documentation and/or other materials provided with the distribution.
3. Neither the name of KTH nor the names of its contributors may be used to endorse or promote products derived from
this software without specific prior written permission.
THIS SOFTWARE IS PROVIDED BY KTH AND ITS CONTRIBUTORS ''AS IS'' AND ANYEXPRESS OR IMPLIED WAR-
RANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FIT-
NESS FOR A PARTICULAR PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL KTH OR ITS CONTRIBUTORS BE
LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES
(INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, DA-
1596
TA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY,
WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING
IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAM-
AGE.
Acknowledgements
Thanks to Novell for donating the KDB abstraction layer and the LDAP database plug-in, and also code implementing
the Microsoft protocol extensions.
Thanks to Sun Microsystems for donating their implementations of mechglue, SPNEGO, master key rollover, and incre-
mental propagation.
Thanks to the members of the Kerberos V5 development team at MIT, both past and present: Danilo Almeida, Jeffrey
Altman, Justin Anderson, Richard Basch, Jay Berkenbilt, Mitch Berger, Andrew Boardman, Joe Calzaretta, John Carr,
Don Davis, Alexandra Ellwood, Nancy Gilman, Matt Hancher, Sam Hartman, Paul Hill, Marc Horowitz, Eva Jacobus,
Miroslav Jurisic, Barry Jaspan, Geoffrey King, Kevin Koch, John Kohl, Peter Litwack, Scott McGuire, Kevin Mitchell,
Cliff Neuman, Paul Park, Ezra Peisach, Chris Provenzano, Ken Raeburn, Jon Rochlis, Jeff Schiller, Jen Selby, Robert Silk,
Brad Thompson, Harry Tsai, Zhanna Tsitkova, Ted Ts'o, Marshall Vale, Tom Yu.
libarchive
http://www.libarchive.org/
Copyright (c) 2003-2008 Tim Kientzle
All rights reserved.
Redistribution and use in source and binary forms, with or without modification, are permitted provided that the fol-
lowing conditions are met:
1. Redistributions of source code must retain the above copyright notice, this list of conditions and the following dis-
claimer in this position and unchanged.
2. Redistributions in binary form must reproduce the above copyright notice, this list of conditions and the following
disclaimer in the documentation and/or other materials provided with the distribution.
THIS SOFTWARE IS PROVIDED BY THE AUTHOR(S) ``AS IS'' AND ANY EXPRESS OR IMPLIED WARRANTIES, IN-
CLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A
PARTICULAR PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE AUTHOR(S) BE LIABLE FOR ANY DI-
RECT, INDIRECT,INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT
NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, DATA, OR PROFITS;
OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CON-
TRACT, STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT
OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.
Redistribution and use in source and binary forms, with or without modification, are permitted provided that the fol-
lowing conditions are met:
1. Redistributions of source code must retain the above copyright notice, this list of conditions and the following dis-
claimer.
2. Redistributions in binary form must reproduce the above copyright notice, this list of conditions and the following
disclaimer in the documentation and/or other materials provided with the distribution.
4. Neither the name of the University nor the names of its contributors may be used to endorse or promote products
derived from this software without specific prior written permission.
THIS SOFTWARE IS PROVIDED BY THE REGENTS AND CONTRIBUTORS ``AS IS'' AND ANY EXPRESS OR IM-
PLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES OF MERCHANTABILI-
TY AND FITNESS FOR A PARTICULAR PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE REGENTS OR
CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSE-
QUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SER-
VICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY
THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE
OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POS-
SIBILITY OF SUCH DAMAGE.
libgd
1597
SGOS Administration Guide
http://libgd.bitbucket.org/
Portions copyright 1994, 1995, 1996, 1997, 1998, 1999, 2000, 2001, 2002 by Cold Spring Harbor Laboratory. Funded under
Grant
P41-RR02188 by the National Institutes of Health.
Portions copyright 1996, 1997, 1998, 1999, 2000, 2001, 2002 by Boutell.Com, Inc.
Portions relating to GD2 format copyright 1999, 2000, 2001, 2002 Philip Warner.
Portions relating to PNG copyright 1999, 2000, 2001, 2002 Greg Roelofs.
Portions relating to gdttf.c copyright 1999, 2000, 2001, 2002 John Ellson ([email protected]).
Portions copyright 2000, 2001, 2002, 2003, 2004, 2005, 2006, 2007 Pierre-Alain Joye ([email protected]).
Portions relating to JPEG and to color quantization copyright 2000, 2001, 2002, Doug Becker and copyright (C) 1994,
1995, 1996, 1997, 1998, 1999, 2000, 2001, 2002, Thomas G. Lane. This software is based in part on the work of the Inde-
pendent JPEG Group. See the file README-JPEG.TXT for more information.
Portions relating to WBMP copyright 2000, 2001, 2002 Maurice Szmurlo and Johan Van den Brande.
Permission has been granted to copy, distribute and modify gd in any context without fee, including a commercial ap-
plication, provided that this notice is present in user-accessible supporting documentation.
This does not affect your ownership of the derived work itself, and the intent is to assure proper credit for the authors
of gd, not to interfere with your productive use of gd. If you have questions,ask. "Derived works" includes all programs
that utilize the library. Credit must be given in user-accessible documentation.
This software is provided "AS IS." The copyright holders disclaim all warranties, either express or implied, including
but not limited to implied warranties of merchantability and fitness for a particular purpose, with respect to this code
and accompanying documentation.
Although their code does not appear in gd, the authors wish to thank David Koblas, David Rowley, and Hutchison Av-
enue Software Corporation
for their prior contributions.
libinjection
https://libinjection.client9.com/
Redistribution and use in source and binary forms, with or without modification, are permitted provided that the fol-
lowing conditions are met:
Redistributions of source code must retain the above copyright notice, this list of conditions and the following disclaim-
er.
Redistributions in binary form must reproduce the above copyright notice, this list of conditions and the following dis-
claimer in the documentation and/or other materials provided with the distribution.
Neither the name of libinjection nor the names of its contributors may be used to endorse or promote products derived
from this software without specific prior written permission.
THIS SOFTWARE IS PROVIDED BY THE COPYRIGHT HOLDERS AND CONTRIBUTORS "AS IS" AND ANY EX-
PRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES OF MER-
CHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE
COPYRIGHT OWNER OR CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL,
SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCURE-
MENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION)
HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR
TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE
OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.
Libxml2
1598
http://xmlsoft.org/
Copyright (C) 1998-2003 Daniel Veillard.
All Rights Reserved.
Permission is hereby granted, free of charge, to any person obtaining a copy of this software and associated documen-
tation files (the "Software"), to deal
in the Software without restriction, including without limitation the rights to use, copy, modify, merge, publish, distrib-
ute, sublicense, and/or sell copies of the Software, and to permit persons to whom the Software is furnished to do so,
subject to the following conditions:
The above copyright notice and this permission notice shall be included in all copies or substantial portions of the Soft-
ware.
THE SOFTWARE IS PROVIDED "AS IS", WITHOUT WARRANTY OF ANY KIND, EXPRESS OR IMPLIED, INCLUD-
ING BUT NOT LIMITED TO THE WARRANTIES OF MERCHANTABILITY, FITNESS FOR A PARTICULAR PUR-
POSE AND NONINFRINGEMENT. IN NO EVENT SHALL THE
DANIEL VEILLARD BE LIABLE FOR ANY CLAIM, DAMAGES OR OTHER LIABILITY, WHETHER IN AN ACTION
OF CONTRACT, TORT OR OTHERWISE, ARISING FROM, OUT OF OR IN CONNECTION WITH THE SOFTWARE
OR THE USE OR OTHER DEALINGS IN THE SOFTWARE.
Except as contained in this notice, the name of Daniel Veillard shall not be used in advertising or otherwise to promote
the sale, use or other dealings in this Software without prior written authorization from him.
Redistribution and use in source and binary forms, with or without modification, are permitted provided that the fol-
lowing conditions are met:
1. Redistributions of source code must retain the above copyright notice, this list of conditions and the following dis-
claimer.
2. Redistributions in binary form must reproduce the above copyright notice, this list of conditions and the following
disclaimer in the documentation and/or other materials provided with the distribution.
3. The names of its contributors may not be used to endorse or promote products derived from this software without
specific prior written permission.
THIS SOFTWARE IS PROVIDED BY THE COPYRIGHT HOLDERS AND CONTRIBUTORS "AS IS" AND ANY EX-
PRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES OF MER-
CHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE
COPYRIGHT OWNER OR CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL,
EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUB-
STITUTE GOODS OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER
CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT (IN-
CLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN
IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.
ModSecurity
https://modsecurity.org/
ModSecurity for Apache 2.x, http://www.modsecurity.org/
Copyright (c) 2004-2013 Trustwave Holdings, Inc. (http://www.trustwave.com/)
Apache License
Version 2.0, January 2004
http://www.apache.org/licenses/
1. Definitions.
"License" shall mean the terms and conditions for use, reproduction, and distribution as defined by Sections 1 through
9 of this document.
"Licensor" shall mean the copyright owner or entity authorized by the copyright owner that is granting the License.
"Legal Entity" shall mean the union of the acting entity and all other entities that control, are controlled by, or are under
common control with that entity. For the purposes of this definition, "control" means (i) the power, direct or indirect, to
cause the direction or management of such entity, whether by contract or otherwise, or (ii) ownership of fifty percent
(50%) or more of the outstanding shares, or (iii) beneficial ownership of such entity.
1599
SGOS Administration Guide
"You" (or "Your") shall mean an individual or Legal Entity exercising permissions granted by this License.
"Source" form shall mean the preferred form for making modifications, including but not limited to software source
code, documentation source, and configuration files.
"Object" form shall mean any form resulting from mechanical transformation or translation of a Source form, including
but not limited to compiled object code, generated documentation, and conversions to other media types.
"Work" shall mean the work of authorship, whether in Source or Object form, made available under the License, as in-
dicated by a copyright notice that is included in or attached to the work (an example is provided in the Appendix below).
"Derivative Works" shall mean any work, whether in Source or Object form, that is based on (or derived from) the Work
and for which the editorial revisions, annotations, elaborations, or other modifications represent, as a whole, an original
work of authorship. For the purposes of this License, Derivative Works shall not include works that remain separable
from, or merely link (or bind by name) to the interfaces of, the Work and Derivative Works thereof.
"Contribution" shall mean any work of authorship, including the original version of the Work and any modifications or
additions to that Work or Derivative Works thereof, that is intentionally submitted to Licensor for inclusion in the Work
by the copyright owner or by an individual or Legal Entity authorized to submit on behalf of the copyright owner. For
the purposes of this definition, "submitted" means any form of electronic, verbal, or written communication sent to the
Licensor or its representatives, including but not limited to communication on electronic mailing lists, source code con-
trol systems, and issue tracking systems that are managed by, or on behalf of, the Licensor for the purpose of discussing
and improving the Work, but excluding communication that is conspicuously marked or otherwise designated in writ-
ing by the copyright owner as "Not a Contribution."
"Contributor" shall mean Licensor and any individual or Legal Entity on behalf of whom a Contribution has been re-
ceived by Licensor and subsequently incorporated within the Work.
2. Grant of Copyright License. Subject to the terms and conditions of this License, each Contributor hereby grants to You
a perpetual, worldwide, non-exclusive, no-charge, royalty-free, irrevocable copyright license to reproduce, prepare De-
rivative Works of, publicly display, publicly perform, sublicense, and distribute the Work and such Derivative Works
in Source or Object form.
3. Grant of Patent License. Subject to the terms and conditions of this License, each Contributor hereby grants to You a
perpetual, worldwide, non-exclusive, no-charge, royalty-free, irrevocable (except as stated in this section) patent license
to make, have made, use, offer to sell, sell, import, and otherwise transfer the Work, where such license applies only to
those patent claims licensable by such Contributor that are necessarily infringed by their Contribution(s) alone or by
combination of their Contribution(s) with the Work to which such Contribution(s) was submitted. If You institute patent
litigation against any entity (including a cross-claim or counterclaim in a lawsuit) alleging that the Work or a Contribu-
tion incorporated within the Work constitutes direct or contributory patent infringement, then any patent licenses grant-
ed to You under this License for that Work shall terminate as of the date such litigation is filed.
4. Redistribution. You may reproduce and distribute copies of the Work or Derivative Works thereof in any medium,
with or without modifications, and in Source or Object form, provided that You meet the following conditions:
(a) You must give any other recipients of the Work or Derivative Works a copy of this License; and
(b) You must cause any modified files to carry prominent notices stating that You changed the files; and
(c) You must retain, in the Source form of any Derivative Works that You distribute, all copyright, patent, trademark,
and attribution notices from the Source form of the Work, excluding those notices that do not pertain to any part of the
Derivative Works; and
(d) If the Work includes a "NOTICE" text file as part of its distribution, then any Derivative Works that You distribute
must include a readable copy of the attribution notices contained within such NOTICE file, excluding those notices that
do not pertain to any part of the Derivative Works, in at least one
of the following places: within a NOTICE text file distributed as part of the Derivative Works; within the Source form
or documentation, if provided along with the Derivative Works; or, within a display generated by the Derivative Works,
if and wherever such third-party notices normally appear. The contents of the NOTICE file are for informational pur-
poses only and do not modify the License. You may add Your own attribution notices within Derivative Works that You
distribute, alongside or as an addendum to the NOTICE text from the Work, provided that such additional attribution
notices cannot be construed as modifying the License.
You may add Your own copyright statement to Your modifications and may provide additional or different license
terms and conditions for use, reproduction, or distribution of Your modifications, or for any such Derivative Works as
a whole, provided Your use, reproduction, and distribution of the Work otherwise complies with the conditions stated
in this License.
5. Submission of Contributions. Unless You explicitly state otherwise, any Contribution intentionally submitted for in-
clusion in the Work by You to the Licensor shall be under the terms and conditions of this License, without any addi-
tional terms or conditions. Notwithstanding the above, nothing herein shall supersede or modify the terms of any
separate license agreement you may have executed with Licensor regarding such Contributions.
6. Trademarks. This License does not grant permission to use the trade names, trademarks, service marks, or product
names of the Licensor, except as required for reasonable and customary use in describing the origin of the Work and
1600
reproducing the content of the NOTICE file.
7. Disclaimer of Warranty. Unless required by applicable law or agreed to in writing, Licensor provides the Work (and
each Contributor provides its Contributions) on an "AS IS" BASIS, WITHOUT WARRANTIES OR CONDITIONS OF
ANY KIND, either express or implied, including, without limitation, any warranties or conditions of TITLE, NON-IN-
FRINGEMENT, MERCHANTABILITY, or FITNESS FOR A PARTICULAR PURPOSE. You are solely responsible for de-
termining the appropriateness of using or redistributing the Work and assume any risks associated with Your exercise
of permissions under this License.
8. Limitation of Liability. In no event and under no legal theory, whether in tort (including negligence), contract, or oth-
erwise, unless required by applicable law (such as deliberate and grossly negligent acts) or agreed to in writing, shall
any Contributor be liable to You for damages, including any direct, indirect, special, incidental, or consequential dam-
ages of any character arising as a result of this License or out of the use or inability to use the Work (including but not
limited to damages for loss of goodwill, work stoppage, computer failure or malfunction, or any and all other commer-
cial damages or losses), even if such Contributor has been advised of the possibility of such damages.
9. Accepting Warranty or Additional Liability. While redistributing the Work or Derivative Works thereof, You may
choose to offer, and charge a fee for, acceptance of support, warranty, indemnity, or other liability obligations and/or
rights consistent with this License. However, in accepting such obligations, You may act only on Your own behalf and
on Your sole responsibility, not on behalf of any other Contributor, and only if You agree to indemnify,
defend, and hold each Contributor harmless for any liability incurred by, or claims asserted against, such Contributor
by reason of your accepting any such warranty or additional liability.
To apply the Apache License to your work, attach the following boilerplate notice, with the fields enclosed by brackets
"[]" replaced with your own identifying information. (Don't include the brackets!) The text should be enclosed in the
appropriate comment syntax for the file format. We also recommend that a file or class name and description of purpose
be included on the same "printed page" as the copyright notice for easier identification within third-party archives.
Licensed under the Apache License, Version 2.0 (the "License"); you may not use this file except in compliance with the
License. You may obtain a copy of the License at
http://www.apache.org/licenses/LICENSE-2.0
Unless required by applicable law or agreed to in writing, software distributed under the License is distributed on an
"AS IS" BASIS, WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. See the License
for the specific language governing permissions and limitations under the License.
Redistribution and use in source and binary forms, with or without modification,are permitted provided that the fol-
lowing conditions are met:
Redistributions of source code must retain the above copyright notice, this list of conditions and the following disclaim-
er.
Redistributions in binary form must reproduce the above copyright notice, this list of conditions and the following dis-
claimer in the documentation and/or other materials provided with the distribution.
Neither the name "Morten's JavaScript Tree Menu" nor the names of its contributors may be used to endorse or promote
products derived from this software without specific prior written permission.
THIS SOFTWARE IS PROVIDED BY THE COPYRIGHT HOLDERS AND CONTRIBUTORS "AS IS"AND ANY EX-
PRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO,THE IMPLIED WARRANTIES OF MER-
CHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE
REGENTS OR CONTRIBUTORS BE LIABLE FOR ANYDIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY,
OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE
GOODS OR SERVICES;
LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED ANDON ANY THEORY
OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHER-
WISE) ARISING IN ANY WAY OUT OF THE USE OF THIS
SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.
net-snmp
http://www.net-snmp.org/
1601
SGOS Administration Guide
Permission to use, copy, modify and distribute this software and its documentation for any purpose and without fee is
hereby granted, provided that the above copyright notice appears in all copies and that both that copyright notice and
this permission notice appear in supporting documentation, and that the name of CMU and The Regents of the Univer-
sity of California not be used in advertising or publicity pertaining to distribution of the software without specific writ-
ten permission.
CMU AND THE REGENTS OF THE UNIVERSITY OF CALIFORNIA DISCLAIM ALL WARRANTIES WITH REGARD
TO THIS SOFTWARE, INCLUDING ALL IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS. IN NO
EVENT SHALL CMU OR THE REGENTS OF THE UNIVERSITY OF CALIFORNIA BE LIABLE FOR ANY SPECIAL,
INDIRECT OR CONSEQUENTIAL DAMAGES OR ANY DAMAGES WHATSOEVER RESULTING
FROM THE LOSS OF USE, DATA OR PROFITS, WHETHER IN AN ACTION OF CONTRACT, NEGLIGENCE OR
OTHER TORTIOUS ACTION, ARISING OUT OF OR IN CONNECTION WITH THE USE OR PERFORMANCE OF
THIS SOFTWARE.
---- Part 2: Networks Associates Technology, Inc copyright notice (BSD) -----
Redistribution and use in source and binary forms, with or without modification, are permitted provided that the fol-
lowing conditions are met:
Redistributions of source code must retain the above copyright notice, this list of conditions and the following disclaim-
er.
Redistributions in binary form must reproduce the above copyright notice, this list of conditions and the following dis-
claimer in the documentation and/or other materials provided with the distribution.
Neither the name of the Networks Associates Technology, Inc nor the names of its contributors may be used to endorse
or promote products derived from this software without specific prior written permission.
THIS SOFTWARE IS PROVIDED BY THE COPYRIGHT HOLDERS AND CONTRIBUTORS '' AS IS'' AND ANY EX-
PRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES OF MER-
CHANTABILITY AND FITNESS FOR A PARTICULAR
PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE COPYRIGHT HOLDERS OR CONTRIBUTORS BE LIA-
BLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (IN-
CLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, DATA,
OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY,
WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING
IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAM-
AGE.
Portions of this code are copyright (c) 2001-2003, Cambridge Broadband Ltd.
All rights reserved.
Redistribution and use in source and binary forms, with or without modification, are permitted provided that the fol-
lowing conditions are met:
Redistributions of source code must retain the above copyright notice, this list of conditions and the following disclaim-
er.
Redistributions in binary form must reproduce the above copyright notice, this list of conditions and the following dis-
claimer in the documentation and/or other materials provided with the distribution.
The name of Cambridge Broadband Ltd. may not be used to endorse or promote products derived from this software
without specific prior written permission.
THIS SOFTWARE IS PROVIDED BY THE COPYRIGHT HOLDER ''AS IS'' AND ANY EXPRESS OR IMPLIED WAR-
RANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FIT-
1602
NESS FOR A PARTICULAR PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE COPYRIGHT HOLDER BE
LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES
(INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, DA-
TA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY,
WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING
IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAM-
AGE.
Copyright © 2003 Sun Microsystems, Inc., 4150 Network Circle, Santa Clara,
California 95054, U.S.A. All rights reserved.
Sun, Sun Microsystems, the Sun logo and Solaris are trademarks or registered trademarks of Sun Microsystems, Inc. in
the U.S. and other countries.
Redistribution and use in source and binary forms, with or without modification, are permitted provided that the fol-
lowing conditions are met:
Redistributions of source code must retain the above copyright notice, this list of conditions and the following disclaim-
er.
Redistributions in binary form must reproduce the above copyright notice, this list of conditions and the following dis-
claimer in the documentation and/or other materials provided with the distribution.
Neither the name of the Sun Microsystems, Inc. nor the names of its contributors may be used to endorse or promote
products derived from this software without specific prior written permission.
THIS SOFTWARE IS PROVIDED BY THE COPYRIGHT HOLDERS AND CONTRIBUTORS ''AS IS'' AND ANY EX-
PRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES OF MER-
CHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE
COPYRIGHT HOLDERS OR CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL,
EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUB-
STITUTE GOODS OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER
CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT (IN-
CLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN
IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.
Redistribution and use in source and binary forms, with or without modification, are permitted provided that the fol-
lowing conditions are met:
Redistributions of source code must retain the above copyright notice, this list of conditions and the following disclaim-
er.
Redistributions in binary form must reproduce the above copyright notice, this list of conditions and the following dis-
claimer in the documentation and/or other materials provided with the distribution.
Neither the name of Sparta, Inc nor the names of its contributors may be used to endorse or promote products derived
from this software without specific prior written permission.
THIS SOFTWARE IS PROVIDED BY THE COPYRIGHT HOLDERS AND CONTRIBUTORS ''AS IS'' AND ANY EX-
PRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES OF MER-
CHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE
COPYRIGHT HOLDERS OR CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL,
EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUB-
STITUTE GOODS OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER
CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT (IN-
CLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN
IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.
Copyright (c) 2004, Cisco, Inc and Information Network Center of Beijing University of Posts and Telecommunications.
All rights reserved.
Redistribution and use in source and binary forms, with or without modification, are permitted provided that the fol-
1603
SGOS Administration Guide
Redistributions of source code must retain the above copyright notice, this list of conditions and the following disclaim-
er.
Redistributions in binary form must reproduce the above copyright notice, this list of conditions and the following dis-
claimer in the documentation and/or other materials provided with the distribution.
Neither the name of Cisco, Inc, Beijing University of Posts and Telecommunications, nor the names of their contributors
may be used to endorse or promote products derived from this software without specific prior written permission.
THIS SOFTWARE IS PROVIDED BY THE COPYRIGHT HOLDERS AND CONTRIBUTORS ''AS IS'' AND ANY EX-
PRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES OF MER-
CHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE
COPYRIGHT HOLDERS OR CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL,
EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUB-
STITUTE GOODS OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER
CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT (IN-
CLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN
IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.
---- Part 7: Fabasoft R&D Software GmbH & Co KG copyright notice (BSD) -----
Redistribution and use in source and binary forms, with or without modification, are permitted provided that the fol-
lowing conditions are met:
Redistributions of source code must retain the above copyright notice, this list of conditions and the following disclaim-
er.
Redistributions in binary form must reproduce the above copyright notice, this list of conditions and the following dis-
claimer in the documentation and/or other materials provided with the distribution.
The name of Fabasoft R&D Software GmbH & Co KG or any of its subsidiaries, brand or product names may not be
used to endorse or promote products
derived from this software without specific prior written permission.
THIS SOFTWARE IS PROVIDED BY THE COPYRIGHT HOLDER ''AS IS'' AND ANY EXPRESS OR IMPLIED WAR-
RANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FIT-
NESS FOR A PARTICULAR PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE COPYRIGHT HOLDER BE
LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES
(INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, DA-
TA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY,
WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING
IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAM-
AGE.
Redistribution and use in source and binary forms, with or without modification, are permitted provided that the fol-
lowing conditions are met:
1. Redistributions of source code must retain the above copyright notice, this list of conditions and the following dis-
claimer.
2. Redistributions in binary form must reproduce the above copyright notice, this list of conditions and the following
disclaimer in the documentation and/or other materials provided with the distribution.
3. Neither the name of Apple Inc. ("Apple") nor the names of its contributors may be used to endorse or promote prod-
ucts derived from this software without specific prior written permission.
THIS SOFTWARE IS PROVIDED BY APPLE AND ITS CONTRIBUTORS "AS IS" AND ANY EXPRESS OR IMPLIED
WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES OF MERCHANTABILITY AND
FITNESS FOR A PARTICULAR PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL APPLE OR ITS CONTRIBU-
TORS BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL
DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS
OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY OF LI-
ABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE)
ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH
DAMAGE.
1604
---- Part 9: ScienceLogic, LLC copyright notice (BSD) -----
Redistribution and use in source and binary forms, with or without modification, are permitted provided that the fol-
lowing conditions are met:
Redistributions of source code must retain the above copyright notice, this list of conditions and the following disclaim-
er.
Redistributions in binary form must reproduce the above copyright notice, this list of conditions and the following dis-
claimer in the documentation and/or other materials provided with the distribution.
Neither the name of ScienceLogic, LLC nor the names of its contributors may be used to endorse or promote products
derived from this software without specific prior written permission.
THIS SOFTWARE IS PROVIDED BY THE COPYRIGHT HOLDERS AND CONTRIBUTORS ''AS IS'' AND ANY EX-
PRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOTLIMITED TO, THE IMPLIED WARRANTIES OF MER-
CHANTABILITY AND FITNESS FORA PARTICULAR PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE
COPYRIGHTHOLDERS OR CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT,INCIDENTAL, SPECIAL,
EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING,BUT NOT LIMITED TO, PROCUREMENT OF SUB-
STITUTE GOODS OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER
CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT (IN-
CLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE
USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.
Newlib 1.14
The newlib subdirectory is a collection of software from several sources. Each file may have its own copyright/license
that is embedded in the source
file.
This list documents those licenses which are more restrictive than a BSD-like license or require the copyright notice to
be duplicated in documentation and/or other materials associated with the distribution. Certain licenses documented
here only apply to specific targets. Certain clauses only apply if you are building the code as part of your binary.
Note that this list may omit certain licenses that only pertain to the copying/modifying of the individual source code. If
you are distributing the source code, then you do not need to worry about these omitted licenses, so long as you do not
modify the copyright information already in place.
[1a]
Redistribution and use in source and binary forms are permitted provided that the above copyright notice and this para-
graph are duplicated in all such forms and that any documentation, and other materials related to such distribution and
use acknowledge that the software was developed by the University of California, Berkeley. The name of the University
may not be used to endorse or promote products derived from this software without specific prior written permission.
THIS SOFTWARE IS PROVIDED ''AS IS'' AND WITHOUT ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING,
WITHOUT LIMITATION, THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICU-
LAR PURPOSE.
[1b]
Redistribution and use in source and binary forms are permitted provided that the above copyright notice and this para-
graph are duplicated in all such forms and that any documentation, advertising materials, and other materials related
to such distribution and use acknowledge that the software was developed by the University of California, Berkeley.
The name of the University may not be used to endorse or promote products derived
from this software without specific prior written permission. THIS SOFTWARE IS PROVIDED ``AS IS'' AND WITH-
OUT ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, WITHOUT LIMITATION, THE IMPLIED WAR-
RANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE.
[1c]
Copyright (c) 1981, 1983, 1986, 1988, 1989, 1991, 1992, 1993, 1994
The Regents of the University of California.
All rights reserved.
1605
SGOS Administration Guide
Redistribution and use in source and binary forms, with or without modification, are permitted provided that the fol-
lowing conditions are met:
1. Redistributions of source code must retain the above copyright notice, this list of conditions and the following dis-
claimer.
2. Redistributions in binary form must reproduce the above copyright notice, this list of conditions and the following
disclaimer in the documentation and/or other materials provided with the distribution.
3. All advertising materials mentioning features or use of this software must display the following acknowledgement:
This product includes software developed by the University of California, Berkeley and its contributors.
4. Neither the name of the University nor the names of its contributors may be used to endorse or promote products
derived from this software without specific prior written permission.
THIS SOFTWARE IS PROVIDED BY THE REGENTS AND CONTRIBUTORS ''AS IS'' AND ANY EXPRESS OR IM-
PLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES OF MERCHANTABILI-
TY AND FITNESS FOR A PARTICULAR PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE REGENTS OR
CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSE-
QUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SER-
VICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION)HOWEVER CAUSED AND ON ANY
THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT
LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF
THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.
[1d]
Redistribution and use in source and binary forms, with or without modification, are permitted provided that the fol-
lowing conditions are met:
1. Redistributions of source code must retain the above copyright notice, this list of conditions and the following dis-
claimer.
2. Redistributions in binary form must reproduce the above copyright notice, this list of conditions and the following
disclaimer in the documentation and/or other materials provided with the distribution.
3. Neither the name of the University nor the names of its contributors may be used to endorse or promote products
derived from this software without specific prior written permission.
THIS SOFTWARE IS PROVIDED BY THE REGENTS AND CONTRIBUTORS ''AS IS'' ANDANY EXPRESS OR IM-
PLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THEIMPLIED WARRANTIES OF MERCHANTABILI-
TY AND FITNESS FOR A PARTICULAR PURPOSEARE DISCLAIMED. IN NO EVENT SHALL THE REGENTS OR
CONTRIBUTORS BE LIABLEFOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSE-
QUENTIALDAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODSOR SER-
VICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION)HOWEVER CAUSED AND ON ANY
THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT
LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAYOUT OF THE USE OF
THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OFSUCH DAMAGE.
[1e]
Redistribution and use in source and binary forms, with or without modification, are permitted provided that the fol-
lowing conditions are met:
1. Redistributions of source code must retain the above copyright notice, this list of conditions and the following dis-
claimer.
2. Redistributions in binary form must reproduce the above copyright notice, this list of conditions and the following
disclaimer in the documentation and/or other materials provided with the distribution.
3. All advertising materials mentioning features or use of this software must display the following acknowledgement:
This product includes software developed by the University of California, Berkeley and its contributors.
1606
4. Neither the name of the University nor the names of its contributors may be used to endorse or promote products
derived from this software without specific prior written permission.
THIS SOFTWARE IS PROVIDED BY THE REGENTS AND CONTRIBUTORS ''AS IS'' AND ANY EXPRESS OR IM-
PLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES OF MERCHANTABILI-
TY AND FITNESS FOR A PARTICULAR PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE REGENTS OR
CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSE-
QUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SER-
VICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY
THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE
OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POS-
SIBILITY OF SUCH DAMAGE.
[1f]
Redistribution and use in source and binary forms are permitted provided that: (1) source distributions retain this entire
copyright
notice and comment, and (2) distributions including binaries display the following acknowledgement: ``This product
includes software developed by the University of California, Berkeley and its contributors'' in the documentation or oth-
er materials provided with the distribution and in all advertising materials mentioning features or use of this software.
Neither the name of the University nor the names of its contributors may be used to endorse or promote products de-
rived from this software without specific prior written permission. THIS SOFTWARE IS PROVIDED ``AS IS'' AND
WITHOUT ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, WITHOUT LIMITATION, THE IMPLIED
WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE.
Please note that in some of the above alternate licenses, there is a statement regarding that acknowledgement must be
made in any advertising materials for products using the code. This restriction no longer applies due to the following
license change:
ftp://ftp.cs.berkeley.edu/pub/4bsd/README.Impt.License.Change
In some cases the defunct clause has been removed in modified newlib code and in some cases, the clause has been left
as-is.
This software is a copyrighted work licensed under the terms of the Cygwin license. Please consult the file "CYG-
WIN_LICENSE" for details.
Permission to use, copy, modify, and distribute this software for any purpose without fee is hereby granted, provided
that this entire notice is included in all copies of any software which is or includes a copy or modification of this software
and in all copies of the supporting documentation for such software.
THIS SOFTWARE IS BEING PROVIDED "AS IS", WITHOUT ANY EXPRESS OR IMPLIED WARRANTY. IN PARTIC-
ULAR, NEITHER THE AUTHOR NOR AT&T MAKES ANY REPRESENTATION OR WARRANTY OF ANY KIND
CONCERNING THE MERCHANTABILITY OF THIS SOFTWARE OR ITS FITNESS FOR ANY PARTICULAR PUR-
POSE.
This software is the property of Advanced Micro Devices, Inc (AMD) which specifically grants the user the right to
modify, use and distribute this
software provided this notice is not removed or altered. All other rights are reserved by AMD.
AMD MAKES NO WARRANTY OF ANY KIND, EXPRESS OR IMPLIED, WITH REGARD TO THIS SOFTWARE. IN
NO EVENT SHALL AMD BE LIABLE FOR INCIDENTAL OR CONSEQUENTIAL DAMAGES IN CONNECTION
WITH OR ARISING FROM THE FURNISHING, PERFORMANCE, OR USE OF THIS SOFTWARE.
So that all may benefit from your experience, please report any problems or suggestions about this software to the 29K
Technical Support Center at
800-29-29-AMD (800-292-9263) in the USA, or 0800-89-1131 in the UK, or 0031-11-1129 in Japan, toll free. The direct
1607
SGOS Administration Guide
This file may be freely distributed as long as the author's name remains.
This software may be used freely so long as this copyright notice is left intact. There is no warrantee on this software.
Developed at SunPro, a Sun Microsystems, Inc. business. Permission to use, copy, modify, and distribute this software
is freely granted, provided that this notice is preserved.
To anyone who acknowledges that this file is provided "AS IS" without any express or implied warranty: permission to
use, copy, modify, and distribute this file for any purpose is hereby granted without fee, provided that the above copy-
right notice and this notice appears in all copies, and that the name of Hewlett-Packard Company not be used in adver-
tising or publicity pertaining to distribution of the software without specific, written prior permission.
Hewlett-Packard Company makes no representations about the suitability of this software for any purpose.
Permission to use, copy, modify, and distribute this software is freely granted, provided that the above copyright notice,
this notice and the following disclaimer are preserved with no changes.
THIS SOFTWARE IS PROVIDED "AS IS'' AND WITHOUT ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING,
WITHOUT LIMITATION, THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICU-
LAR PURPOSE.
The authors hereby grant permission to use, copy, modify, distribute, and license this software and its documentation
for any purpose, provided
that existing copyright notices are retained in all copies and that this notice is included verbatim in any distributions.
No written agreement,
license, or royalty fee is required for any of the authorized uses. Modifications to this software may be copyrighted by
their authors and need not follow the licensing terms described here, provided that the new terms are clearly indicated
on the first page of each file where they apply.
Redistribution and use in source and binary forms, with or without modification, are permitted provided that the fol-
lowing conditions are met:
1. Redistributions of source code must retain the above copyright notice, this list of conditions and the following dis-
claimer.
2. Redistributions in binary form must reproduce the above copyright notice, this list of conditions and the following
disclaimer in the documentation and/or other materials provided with the distribution.
3. The name of the author may not be used to endorse or promote products derived from this software without specific
1608
prior written permission.
THIS SOFTWARE IS PROVIDED BY THE AUTHOR "AS IS'' AND ANY EXPRESS OR IMPLIED WARRANTIES, IN-
CLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A
PARTICULAR PURPOSE ARE DISCLAIMED.
IN NO EVENT SHALL THE AUTHOR BE LIABLE FOR ANY DIRECT, INDIRECT,
INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT
NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE,
DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY
THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT
(INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF
THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.
SUPERH MAKES NO WARRANTY OF ANY KIND, EXPRESS OR IMPLIED, WITH REGARD TO THIS SOFTWARE.
IN NO EVENT SHALL SUPERH BE LIABLE FOR INDIRECT, SPECIAL, INCIDENTAL OR CONSEQUENTIAL DAM-
AGES IN CONNECTION WITH OR ARISING FROM THE FURNISHING, PERFORMANCE, OR USE OF THIS SOFT-
WARE.
So that all may benefit from your experience, please report any problems or suggestions about this software to the Su-
perH Support Center via e-mail at [email protected] .
SuperH, Inc.
405 River Oaks Parkway
San Jose
CA 95134
USA
Redistribution and use in source and binary forms, with or without modification, are permitted provided that the fol-
lowing conditions are met:
1. Redistributions of source code must retain the above copyright notice, this list of conditions and the following dis-
claimer.
2. Redistributions in binary form must reproduce the above copyright notice, this list of conditions and the following
disclaimer in the documentation and/or other materials provided with the distribution.
3. Neither the name of KTH nor the names of its contributors may be used to endorse or promote products derived from
this software without specific prior written permission.
THIS SOFTWARE IS PROVIDED BY KTH AND ITS CONTRIBUTORS "AS IS'' AND ANY EXPRESS OR IMPLIED
WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES OF MERCHANTABILITY AND
FITNESS FOR A PARTICULAR PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL KTH OR ITS CONTRIBUTORS
BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAM-
AGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF
USE, DATA, OR PROFITS; OR
BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY,
WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR
OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF
ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.
1609
SGOS Administration Guide
THIS SOFTWARE IS PROVIDED BY THE AUTHOR AND CONTRIBUTORS ``AS IS'' AND
ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE
IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE
ARE DISCLAIMED. IN NO EVENT SHALL THE AUTHOR OR CONTRIBUTORS BE LIABLE
FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL
DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS
OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION)
HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT
LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY
OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF
SUCH DAMAGE.
(16) FreeBSD
THIS SOFTWARE IS PROVIDED BY THE AUTHOR AND CONTRIBUTORS ``AS IS'' AND
ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE
IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE
ARE DISCLAIMED. IN NO EVENT SHALL THE AUTHOR OR CONTRIBUTORS BE LIABLE
FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL
DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS
OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION)
HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT
LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY
OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF
SUCH DAMAGE.
(17) S. L. Moshier
1610
Author: S. L. Moshier.
Permission to use, copy, modify, and distribute this software for any purpose without fee is hereby granted, provided
that this entire notice is included in all copies of any software which is or includes a copy or modification of this software
and in all copies of the supporting documentation for such software.
THIS SOFTWARE IS BEING PROVIDED "AS IS", WITHOUT ANY EXPRESS OR IMPLIED WARRANTY. IN PARTIC-
ULAR, THE AUTHOR MAKES NO REPRESENTATION OR WARRANTY OF ANY KIND CONCERNING THE MER-
CHANTABILITY OF THIS SOFTWARE OR ITS FITNESS FOR ANY PARTICULAR PURPOSE.
Redistribution and use in source and binary forms, with or without modification, are permitted provided that the fol-
lowing conditions are met:
1. Redistributions of source code must retain the above copyright notice, this list of conditions and the following dis-
claimer.
2. Redistributions in binary form must reproduce the above copyright notice, this list of conditions and the following
disclaimer in the documentation and/or other materials provided with the distribution.
THIS SOFTWARE IS PROVIDED BY THE AUTHOR AND CONTRIBUTORS ''AS IS'' AND ANY EXPRESS OR IM-
PLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES OF MERCHANTABILI-
TY AND FITNESS FOR A PARTICULAR PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE AUTHOR OR
CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSE-
QUENTIALDAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SER-
VICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY
THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT
LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF
THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.
Redistribution and use in source and binary forms, with or without modification, are permitted provided that the fol-
lowing conditions are met:
1. Redistributions of source code must retain the above copyright notice, this list of conditions and the following dis-
claimer.
2. Redistributions in binary form must reproduce the above copyright notice, this list of conditions and the following
disclaimer in the documentation and/or other materials provided with the distribution.
3. The name of the author may not be used to endorse or promote products derived from this software without specific
prior written permission.
THIS SOFTWARE IS PROVIDED ''AS IS'' AND ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT
LIMITED TO, THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PUR-
POSE ARE DISCLAIMED. IN NO EVENT SHALL
THE AUTHOR BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSE-
QUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SER-
VICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY
THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE
OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POS-
SIBILITY OF SUCH DAMAGE.
Redistribution and use in source and binary forms is permitted provided that the above copyright notice and following
paragraph are duplicated in all such forms.
This file is distributed WITHOUT ANY WARRANTY; without even the implied warranty of MERCHANTABILITY or
FITNESS FOR A PARTICULAR PURPOSE.
1611
SGOS Administration Guide
The GNU C Library is free software; you can redistribute it and/or modify it under the terms of the GNU Lesser General
Public License as published by the Free Software Foundation; either version 2.1 of the License, or (at your option) any
later version.
The GNU C Library is distributed in the hope that it will be useful, but WITHOUT ANY WARRANTY; without even
the implied warranty of MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the GNU Lesser Gen-
eral Public License for more details. You should have received a copy of the GNU Lesser General Public License along
with the GNU C Library; if not, write to the Free Software Foundation, Inc., 51 Franklin Street, Fifth Floor, Boston, MA
02110-1301 USA.
This program is free software; you can redistribute it and/or modify it under the terms of the GNU Library General Pub-
lic License as published by the Free Software Foundation; either version 2 of the License, or (at your option) any later
version.
This program is distributed in the hope that it will be useful, but WITHOUT ANY WARRANTY; without even the im-
plied warranty of MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the GNU Library General
Public License for more details.
Intel hereby grants you permission to copy, modify, and distribute this software and its documentation. Intel grants this
permission provided that the above copyright notice appears in all copies and that both the copyright notice and this
permission notice appear in supporting documentation. In addition, Intel grants this permission provided that you
prominently mark as "not part of the original" any modifications made to this software or documentation, and that the
name of Intel Corporation not be used in advertising or publicity pertaining to distribution of the software or the docu-
mentation without specific, written prior permission.
Intel Corporation provides this AS IS, WITHOUT ANY WARRANTY, EXPRESS OR IMPLIED, INCLUDING, WITH-
OUT LIMITATION, ANY WARRANTY OF MERCHANTABILITY OR FITNESS FOR A PARTICULAR PURPOSE. Intel
makes no guarantee or representations regarding the use of, or the results of the use of, the software and documentation
in terms of correctness, accuracy, reliability, currentness, or otherwise; and you rely on the software, documentation and
results solely at your own risk.
IN NO EVENT SHALL INTEL BE LIABLE FOR ANY LOSS OF USE, LOSS OF BUSINESS, LOSS OF PROFITS, INDI-
RECT, INCIDENTAL, SPECIAL OR CONSEQUENTIAL DAMAGES OF ANY KIND. IN NO EVENT SHALL INTEL'S
TOTAL LIABILITY EXCEED THE SUM PAID TO INTEL FOR THE PRODUCT LICENSED HEREUNDER.
To anyone who acknowledges that this file is provided "AS IS" without any express or implied warranty: permission to
use, copy, modify, and distribute this file for any purpose is hereby granted without fee, provided that the above copy-
right notice and this notice appears in all copies, and that the name of Hewlett-Packard Company not be used in adver-
tising or publicity pertaining to distribution of the software without specific, written prior permission.
Hewlett-Packard Company makes no representations about the suitability of this software for any purpose.
Permission is granted to anyone to use this software for any purpose on any computer system, and to alter it and redis-
tribute it, subject to the following restrictions:
1. The author is not responsible for the consequences of use of this software, no matter how awful, even if they arise from
flaws in it.
2. The origin of this software must not be misrepresented, either by explicit claim or by omission. Since few users ever
read sources, credits must appear in the documentation.
3. Altered versions must be plainly marked as such, and must not be misrepresented as being the original software. Since
few users ever read sources, credits must appear in the documentation.
1612
(26) Mike Barcroft
Redistribution and use in source and binary forms, with or without modification, are permitted provided that the fol-
lowing conditions are met:
1. Redistributions of source code must retain the above copyright notice, this list of conditions and the following dis-
claimer.
2. Redistributions in binary form must reproduce the above copyright notice, this list of conditions and the following
disclaimer in the documentation and/or other materials provided with the distribution.
THIS SOFTWARE IS PROVIDED BY THE AUTHOR AND CONTRIBUTORS ''AS IS'' ANDANY EXPRESS OR IMPLIED
WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES OF MERCHANTABILITY AND
FITNESS FOR A PARTICULAR PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE AUTHOR OR CONTRIB-
UTORS BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL
DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS
OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY OF LI-
ABILITY, WHETHER IN CONTRACT, STRICT
LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF
THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.
Redistribution and use in source and binary forms, with or without modification, are permitted provided that the fol-
lowing conditions are met:
1. Redistributions of source code must retain the above copyright notice, this list of conditions and the following dis-
claimer.
2. Redistributions in binary form must reproduce the above copyright notice, this list of conditions and the following
disclaimer in the documentation and/or other materials provided with the distribution.
THIS SOFTWARE IS PROVIDED BY THE AUTHOR AND CONTRIBUTORS ''AS IS'' AND ANY EXPRESS OR IM-
PLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES OF MERCHANTABILI-
TY AND FITNESS FOR A PARTICULAR PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE AUTHOR OR
CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSE-
QUENTIALDAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SER-
VICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION)HOWEVER CAUSED AND ON ANY
THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT
LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF
THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.
Redistribution and use in source and binary forms, with or without modification, are permitted provided that the fol-
lowing conditions are met:
1. Redistributions of source code must retain the above copyright notice, this list of conditions and the following dis-
claimer.
2. Redistributions in binary form must reproduce the above copyright notice, this list of conditions and the following
disclaimer in the documentation and/or other materials provided with the distribution.
THIS SOFTWARE IS PROVIDED BY THE AUTHOR AND CONTRIBUTORS ''AS IS'' AND ANY EXPRESS OR IM-
PLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES OF MERCHANTABILI-
TY AND FITNESS FOR A PARTICULAR PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE AUTHOR OR
CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSE-
QUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SER-
VICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY
THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE
OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POS-
SIBILITY OF SUCH DAMAGE.
Unless otherwise stated in each remaining newlib file, the remaining files in the newlib subdirectory default to the fol-
lowing copyright. It should be noted that Red Hat Incorporated now owns copyrights belonging to Cygnus Solutions
and Cygnus Support.
Copyright (c) 1994, 1997, 2001, 2002, 2003, 2004, 2005 Red Hat Incorporated.
1613
SGOS Administration Guide
Redistribution and use in source and binary forms, with or without modification, are permitted provided that the fol-
lowing conditions are met:
Redistributions of source code must retain the above copyright notice, this list of conditions and the following disclaim-
er.
Redistributions in binary form must reproduce the above copyright notice, this list of conditions and the following dis-
claimer in the documentation and/or other materials provided with the distribution.
The name of Red Hat Incorporated may not be used to endorse or promote products derived from this software with-
out specific prior written permission.
THIS SOFTWARE IS PROVIDED BY THE COPYRIGHT HOLDERS AND CONTRIBUTORS "AS IS" AND ANY EX-
PRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES OF MER-
CHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE ARE
DISCLAIMED. IN NO EVENT SHALL RED HAT INCORPORATED BE LIABLE FOR ANY DIRECT, INDIRECT, IN-
CIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO,
PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTER-
RUPTION) HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT LIA-
BILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF
THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.
Newlib 2.0
Each file may have its own copyright/license that is embedded in the source file. Unless otherwise noted in the body of
the source file(s), the following copyright notices will apply to the contents of the newlib subdirectory:
This copyrighted material is made available to anyone wishing to use, modify, copy, or redistribute it subject to the
terms and conditions of the BSD License. This program is distributed in the hope that it will be useful, but WITHOUT
ANY WARRANTY expressed or implied, including the implied warranties of MERCHANTABILITY or FITNESS FOR
A PARTICULAR PURPOSE. A copy of this license is available at http://www.opensource.org/licenses. Any Red Hat
trademarks that are incorporated in the source code or documentation are not subject to the BSD License and may only
be used or replicated with the express permission of Red Hat, Inc.
Redistribution and use in source and binary forms, with or without modification, are permitted provided that the fol-
lowing conditions are met:
Redistributions of source code must retain the above copyright notice, this list of conditions and the following disclaim-
er.
Redistributions in binary form must reproduce the above copyright notice, this list of conditions and the following dis-
claimer in the documentation and/or other materials provided with the distribution.
Neither the name of the University nor the names of its contributors may be used to endorse or promote products de-
rived from this software without specific prior written permission.
THIS SOFTWARE IS PROVIDED BY THE COPYRIGHT HOLDERS AND CONTRIBUTORS "AS IS" AND ANY EX-
PRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES OF MER-
CHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE
COPYRIGHT OWNER OR CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL,
EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUB-
STITUTE GOODS OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER
CAUSED AND ON ANY THEORY OF LIABILITY,
WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING
IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITYOF SUCH DAM-
AGE.
1614
Permission to use, copy, modify, and distribute this software for any purpose without fee is hereby granted, provided
that this entire notice is included in all copies of any software which is or includes a copy or modification of this software
and in all copies of the supporting documentation for such software.
THIS SOFTWARE IS BEING PROVIDED "AS IS", WITHOUT ANY EXPRESS OR IMPLIED WARRANTY. IN PARTIC-
ULAR, NEITHER THE AUTHOR NOR AT&T MAKES ANY REPRESENTATION OR WARRANTY OF ANY KIND
CONCERNING THE MERCHANTABILITY OF THIS SOFTWARE OR ITS FITNESS FOR ANY PARTICULAR PUR-
POSE.
-------------------------------------------------------------------
Permission to use, copy, modify, and distribute this software and its documentation for any purpose and without fee is
hereby granted, provided that the above copyright notice appear in all copies and that both that the copyright notice
and this permission notice and warranty disclaimer appear in supporting documentation, and that the name of Lucent
or any of its entities not be used in advertising or publicity pertaining to distribution of the software without specific,
written prior permission.
LUCENT DISCLAIMS ALL WARRANTIES WITH REGARD TO THIS SOFTWARE, INCLUDING ALL IMPLIED WAR-
RANTIES OF MERCHANTABILITY AND FITNESS. IN NO EVENT SHALL LUCENT OR ANY OF ITS ENTITIES BE
LIABLE FOR ANY SPECIAL, INDIRECT OR CONSEQUENTIAL DAMAGES OR ANY DAMAGES WHATSOEVER
RESULTING FROM LOSS OF USE, DATA OR PROFITS, WHETHER IN AN ACTION OF CONTRACT, NEGLIGENCE
OR OTHER TORTIOUS ACTION, ARISING OUT OF OR IN CONNECTION WITH THE USE OR PERFORMANCE OF
THIS SOFTWARE.
This software is the property of Advanced Micro Devices, Inc (AMD) which specifically grants the user the right to
modify, use and distribute this
software provided this notice is not removed or altered. All other rights are reserved by AMD.
AMD MAKES NO WARRANTY OF ANY KIND, EXPRESS OR IMPLIED, WITH REGARD TO THIS SOFTWARE. IN
NO EVENT SHALL AMD BE LIABLE FOR INCIDENTAL OR CONSEQUENTIAL DAMAGES IN CONNECTION
WITH OR ARISING FROM THE FURNISHING, PERFORMANCE, OR USE OF THIS SOFTWARE.
So that all may benefit from your experience, please report any problems or suggestions about this software to the 29K
Technical Support Center at
800-29-29-AMD (800-292-9263) in the USA, or 0800-89-1131 in the UK, or 0031-11-1129 in Japan, toll free. The direct
dial number is 512-462-4118.
(5)
(6)
To anyone who acknowledges that this file is provided "AS IS" without any express or implied warranty: permission to
use, copy, modify, and distribute this file for any purpose is hereby granted without fee, provided that the above copy-
right notice and this notice appears in all copies, and that the name of Hewlett-Packard Company not be used in adver-
tising or publicity pertaining to distribution of the software without specific, written prior permission. Hewlett-Packard
Company makes no representations about the suitability of this software for any purpose.
1615
SGOS Administration Guide
Permission to use, copy, modify, and distribute this software is freely granted, provided that the above copyright notice,
this notice and the following disclaimer are preserved with no changes.
THIS SOFTWARE IS PROVIDED "AS IS'' AND WITHOUT ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING,
WITHOUT LIMITATION, THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICU-
LAR PURPOSE.
The authors hereby grant permission to use, copy, modify, distribute, and license this software and its documentation
for any purpose, provided that existing copyright notices are retained in all copies and that this notice is included ver-
batim in any distributions. No written agreement, license, or royalty fee is required for any of the authorized uses. Mod-
ifications to this software may be copyrighted by their authors and need not follow the licensing terms described here,
provided that the new terms are clearly indicated on the first page of each file where they apply.
Redistribution and use in source and binary forms, with or without modification, are permitted provided that the fol-
lowing conditions are met:
1. Redistributions of source code must retain the above copyright notice, this list of conditions and the following dis-
claimer.
2. Redistributions in binary form must reproduce the above copyright notice, this list of conditions and the following
disclaimer in the documentation and/or other materials provided with the distribution.
3. The name of the author may not be used to endorse or promote products derived from this software without specific
prior written permission.
THIS SOFTWARE IS PROVIDED BY THE AUTHOR ''AS IS'' AND ANY EXPRESS OR IMPLIED WARRANTIES, IN-
CLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A
PARTICULAR PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE AUTHOR BE LIABLE FOR ANY DIRECT,
INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT
LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR
BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CON-
TRACT, STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT
OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.
This software is the property of SuperH, Inc (SuperH) which specifically grants the user the right to modify, use and
distribute this software provided this notice is not removed or altered. All other rights are reserved by SuperH.
SUPERH MAKES NO WARRANTY OF ANY KIND, EXPRESS OR IMPLIED, WITH REGARD TO THIS SOFTWARE.
IN NO EVENT SHALL SUPERH BE LIABLE FOR INDIRECT, SPECIAL, INCIDENTAL OR CONSEQUENTIAL DAM-
AGES IN CONNECTION WITH OR ARISING FROM THE FURNISHING, PERFORMANCE, OR USE OF THIS SOFT-
WARE.
So that all may benefit from your experience, please report any problems or suggestions about this software to the Su-
perH Support Center viae-mail at [email protected].
SuperH, Inc.
405 River Oaks Parkway
San Jose
CA 95134
USA
Redistribution and use in source and binary forms, with or without modification, are permitted provided that the fol-
lowing conditions are met:
1616
1. Redistributions of source code must retain the above copyright notice, this list of conditions and the following dis-
claimer.
2. Redistributions in binary form must reproduce the above copyright notice, this list of conditions and the following
disclaimer in the documentation and/or other materials provided with the distribution.
3. Neither the name of KTH nor the names of its contributors may be used to endorse or promote products derived from
this software without specific prior written permission.
THIS SOFTWARE IS PROVIDED BY KTH AND ITS CONTRIBUTORS '' AS IS'' AND ANY EXPRESS OR IMPLIED
WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES OF MERCHANTABILITY AND
FITNESS FOR A PARTICULAR PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL KTH OR ITS CONTRIBUTORS
BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAM-
AGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF
USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY OF LIA-
BILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE)
ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH
DAMAGE.
Redistribution and use in source and binary forms, with or without modification, are permitted provided that the fol-
lowing conditions are met:
1. Redistributions of source code must retain the above copyright notice, this list of conditions and the following dis-
claimer.
2. Redistributions in binary form must reproduce the above copyright notice, this list of conditions and the following
disclaimer in the documentation and/or other materials provided with the distribution.
THIS SOFTWARE IS PROVIDED BY THE AUTHOR AND CONTRIBUTORS ''AS IS'' AND ANY EXPRESS OR IM-
PLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES OF MERCHANTABILI-
TY AND FITNESS FOR A PARTICULAR PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE AUTHOR OR
CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSE-
QUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SER-
VICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY
THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT
LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF
THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.
Redistribution and use in source and binary forms, with or without modification, are permitted provided that the fol-
lowing conditions are met:
1. Redistributions of source code must retain the above copyright notice, this list of conditions and the following dis-
claimer.
2. Redistributions in binary form must reproduce the above copyright notice, this list of conditions and the following
disclaimer in the documentation and/or other materials provided with the distribution.
THIS SOFTWARE IS PROVIDED BY THE AUTHOR ''AS IS'' ANDANY EXPRESS OR IMPLIED WARRANTIES, IN-
CLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A
PARTICULAR PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE REGENTS OR CONTRIBUTORS BE LIA-
BLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL
DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS
OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY OF LI-
ABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE)
ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH
DAMAGE.
(16) FreeBSD
Redistribution and use in source and binary forms, with or without modification, are permitted provided that the fol-
lowing conditions are met:
1. Redistributions of source code must retain the above copyright notice, this list of conditions and the following dis-
claimer.
2. Redistributions in binary form must reproduce the above copyright notice, this list of conditions and the following
disclaimer in the documentation and/or other materials provided with the distribution.
1617
SGOS Administration Guide
THIS SOFTWARE IS PROVIDED BY THE AUTHOR AND CONTRIBUTORS ''AS IS'' AND ANY EXPRESS OR IM-
PLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES OF MERCHANTABILI-
TY AND FITNESS FOR A PARTICULAR PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE AUTHOR OR
CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSE-
QUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SER-
VICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY
THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE
OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POS-
SIBILITY OF SUCH DAMAGE.
(17) S. L. Moshier
Author: S. L. Moshier.
Permission to use, copy, modify, and distribute this software for any purpose without fee is hereby granted, provided
that this entire notice is included in all copies of any software which is or includes a copy or modification of this software
and in all copies of the supporting documentation for such software.
THIS SOFTWARE IS BEING PROVIDED "AS IS", WITHOUT ANY EXPRESS OR IMPLIED WARRANTY. IN PARTIC-
ULAR, THE AUTHOR MAKES NO REPRESENTATION OR WARRANTY OF ANY KIND CONCERNING THE MER-
CHANTABILITY OF THIS SOFTWARE OR ITS FITNESS FOR ANY PARTICULAR PURPOSE.
Redistribution and use in source and binary forms, with or without modification, are permitted provided that the fol-
lowing conditions are met:
1. Redistributions of source code must retain the above copyright notice, this list of conditions and the following dis-
claimer.
2. Redistributions in binary form must reproduce the above copyright notice, this list of conditions and the following
disclaimer in the documentation and/or other materials provided with the distribution.
THIS SOFTWARE IS PROVIDED BY THE AUTHOR AND CONTRIBUTORS ''AS IS'' AND ANY EXPRESS OR IM-
PLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES OF MERCHANTABILI-
TY AND FITNESS FOR A PARTICULAR PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE AUTHOR OR
CONTRIBUTORS BE LIABLEFOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSE-
QUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SER-
VICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY
THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE
OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POS-
SIBILITY OFSUCH DAMAGE.
Redistribution and use in source and binary forms, with or without modification, are permitted provided that the fol-
lowing conditions are met:
1. Redistributions of source code must retain the above copyright notice, this list of conditions and the following dis-
claimer.
2. Redistributions in binary form must reproduce the above copyright notice, this list of conditions and the following
disclaimer in the documentation and/or other materials provided with the distribution.
3. The name of the author may not be used to endorse or promote products derived from this software without specific
prior written permission.
THIS SOFTWARE IS PROVIDED ''AS IS'' AND ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT
LIMITED TO, THE IMPLIED WARRANTIES OF MERCHANTABILITYAND FITNESS FOR A PARTICULAR PUR-
POSE ARE DISCLAIMED. IN NO EVENT SHALL THE AUTHOR BE LIABLE FOR ANY DIRECT, INDIRECT, INCI-
DENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO,
PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTER-
RUPTION) HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT LIA-
BILITY, OR TORT (INCLUDING NEGLIGENCE OR
OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSI-
BILITY OF SUCH DAMAGE.
Redistribution, modification, and use in source and binary forms is permitted provided that the above copyright notice
and following paragraph are
1618
duplicated in all such forms.
This file is distributed WITHOUT ANY WARRANTY; without even the implied warranty of MERCHANTABILITY or
FITNESS FOR A PARTICULAR PURPOSE.
The GNU C Library is free software; you can redistribute it and/or modify it under the terms of the GNU Lesser General
Public License as published by the Free Software Foundation; either version 2.1 of the License, or (at your option) any
later version.
The GNU C Library is distributed in the hope that it will be useful, but WITHOUT ANY WARRANTY; without even
the implied warranty of MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the GNU Lesser Gen-
eral Public License for more details.
You should have received a copy of the GNU Lesser General Public License along with the GNU C Library; if not, write
to the Free Software Foundation, Inc., 51 Franklin Street, Fifth Floor, Boston, MA 02110-1301 USA.
This program is free software; you can redistribute it and/or modify it under the terms of the GNU Library General Pub-
lic License as published by the Free Software Foundation; either version 2 of the License, or (at your option) any later
version.
This program is distributed in the hope that it will be useful, but WITHOUT ANY WARRANTY; without even the im-
plied warranty of MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the GNU Library General
Public License for more details.
Intel hereby grants you permission to copy, modify, and distribute this software and its documentation. Intel grants this
permission provided that the above copyright notice appears in all copies and that both the copyright notice and this
permission notice appear in supporting documentation. In addition, Intel grants this permission provided that you
prominently mark as "not part of the original" any modifications made to this software or documentation, and that the
name of Intel Corporation not be used in advertising or publicity pertaining to distribution of the software or the docu-
mentation without specific, written prior permission.
Intel Corporation provides this AS IS, WITHOUT ANY WARRANTY, EXPRESS OR IMPLIED, INCLUDING, WITH-
OUT LIMITATION, ANY WARRANTY OF MERCHANTABILITY OR FITNESS FOR A PARTICULAR PURPOSE. Intel
makes no guarantee or representations regarding the use of, or the results of the use of, the software and documentation
in terms of correctness, accuracy, reliability, currentness, or otherwise; and you rely on the software, documentation and
results solely at your own risk.
IN NO EVENT SHALL INTEL BE LIABLE FOR ANY LOSS OF USE, LOSS OF BUSINESS, LOSS OF PROFITS, INDI-
RECT, INCIDENTAL, SPECIAL OR CONSEQUENTIAL DAMAGES OF ANY KIND. IN NO EVENT SHALL INTEL'S
TOTAL LIABILITY EXCEED THE SUM PAID TO INTEL FOR THE PRODUCT LICENSED HEREUNDER.
To anyone who acknowledges that this file is provided "AS IS" without any express or implied warranty: permission to
use, copy, modify, and distribute this file for any purpose is hereby granted without fee, provided that the above copy-
right notice and this notice appears in all copies, and that the name of Hewlett-Packard Company not be used in adver-
tising or publicity pertaining to distribution of the software without specific, written prior permission.
Hewlett-Packard Company makes no representations about the suitability of this software for any purpose.
Permission is granted to anyone to use this software for any purpose on any computer system, and to alter it and redis-
tribute it, subject to the following restrictions:
1. The author is not responsible for the consequences of use of this software, no matter how awful, even if they arise from
1619
SGOS Administration Guide
flaws in it.
2. The origin of this software must not be misrepresented, either by explicit claim or by omission. Since few users ever
read sources, credits must appear in the documentation.
3. Altered versions must be plainly marked as such, and must not be misrepresented as being the original software.
Since few users ever read sources, credits must appear in the documentation.
Redistribution and use in source and binary forms, with or without modification, are permitted provided that the fol-
lowing conditions are met:
1. Redistributions of source code must retain the above copyright notice, this list of conditions and the following dis-
claimer.
2. Redistributions in binary form must reproduce the above copyright notice, this list of conditions and the following
disclaimer in the documentation and/or other materials provided with the distribution.
THIS SOFTWARE IS PROVIDED BY THE AUTHOR AND CONTRIBUTORS ''AS IS'' AND ANY EXPRESS OR IM-
PLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES OF MERCHANTABILI-
TY AND FITNESS FOR A PARTICULAR PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE AUTHOR OR
CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSE-
QUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SER-
VICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY
THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE
OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POS-
SIBILITY OF SUCH DAMAGE.
Redistribution and use in source and binary forms, with or without modification, are permitted provided that the fol-
lowing conditions are met:
1. Redistributions of source code must retain the above copyright notice, this list of conditions and the following dis-
claimer.
2. Redistributions in binary form must reproduce the above copyright notice, this list of conditions and the following
disclaimer in the documentation and/or other materials provided with the distribution.
THIS SOFTWARE IS PROVIDED BY THE AUTHOR AND CONTRIBUTORS ''AS IS'' AND ANY EXPRESS OR IM-
PLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES OF MERCHANTABILI-
TY AND FITNESS FOR A PARTICULAR PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE AUTHOR OR
CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSE-
QUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SER-
VICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY
THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE
OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POS-
SIBILITY OF SUCH DAMAGE.
Redistribution and use in source and binary forms, with or without modification, are permitted provided that the fol-
lowing conditions are met:
1. Redistributions of source code must retain the above copyright notice, this list of conditions and the following dis-
claimer.
2. Redistributions in binary form must reproduce the above copyright notice, this list of conditions and the following
disclaimer in the documentation and/or other materials provided with the distribution.
THIS SOFTWARE IS PROVIDED BY THE AUTHOR AND CONTRIBUTORS ''AS IS'' AND ANY EXPRESS OR IM-
PLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES OF MERCHANTABILI-
TY AND FITNESS FOR A PARTICULAR PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE AUTHOR OR
CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSE-
QUENTIALDAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SER-
VICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY
THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE
OR OTHERWISE) ARISING IN ANY WAYOUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POS-
1620
SIBILITY OF SUCH DAMAGE.
Redistribution and use in source and binary forms, with or without modification, are permitted provided that the fol-
lowing conditions are met:
Redistributions of source code must retain the above copyright notice, this list of conditions and the following disclaim-
er.
Redistributions in binary form must reproduce the above copyright notice, this list of conditions and the following dis-
claimer in the documentation and/or other materials provided with the distribution.
Neither the names of the copyright holders nor the names of their contributors may be used to endorse or promote prod-
ucts derived from this software without specific prior written permission.
THIS SOFTWARE IS PROVIDED BY THE COPYRIGHT HOLDERS AND CONTRIBUTORS "AS IS" AND ANY EX-
PRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES OF MER-
CHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE
COPYRIGHT OWNER OR CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL,
EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUB-
STITUTE GOODS OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER
CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT (IN-
CLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN
IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.
Redistribution and use in source and binary forms, with or without modification, are permitted provided that the fol-
lowing conditions are met:
1. Redistributions of source code must retain the above copyright notice, this list of conditions and the following dis-
claimer.
2. Redistributions in binary form must reproduce the above copyright notice, this list of conditions and the following
disclaimer in the documentation and/or other materials provided with the distribution.
THIS SOFTWARE IS PROVIDED BY THE AUTHOR ''AS IS'' AND ANY EXPRESS OR IMPLIED WARRANTIES, IN-
CLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A
PARTICULAR PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE AUTHOR BE LIABLE FOR ANY DIRECT,
INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT
LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR
BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CON-
TRACT, STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT
OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.
Redistribution and use in source and binary forms, with or without modification, are permitted provided that the fol-
lowing conditions are met:
1. Redistributions of source code must retain the above copyright notice, this list of conditions and the following dis-
claimer.
2. Redistributions in binary form must reproduce the above copyright notice, this list of conditions and the following
disclaimer in the documentation and/or other materials provided with the distribution.
THIS SOFTWARE IS PROVIDED BY THE AUTHOR AND CONTRIBUTORS ''AS IS'' AND ANY EXPRESS OR IM-
PLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES OF MERCHANTABILI-
TY AND FITNESS FOR A PARTICULAR PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE AUTHOR OR
CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSE-
QUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SER-
VICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY
THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT
LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF
THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.
1621
SGOS Administration Guide
Redistribution and use in source and binary forms, with or without modification, are permitted provided that the fol-
lowing conditions are met:
1. Redistributions of source code must retain the above copyright notice, this list of conditions and the following dis-
claimer.
2. Redistributions in binary form must reproduce the above copyright notice, this list of conditions and the following
disclaimer in the documentation and/or other materials provided with the distribution.
THIS SOFTWARE IS PROVIDED BY THE AUTHOR ''AS IS'' AND ANY EXPRESS OR IMPLIED WARRANTIES, IN-
CLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A
PARTICULAR PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE REGENTS OR CONTRIBUTORS BE LIA-
BLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (IN-
CLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS
OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON
ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING NEGLI-
GENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF
THE POSSIBILITY OF SUCH DAMAGE.
Redistribution and use in source and binary forms, with or without modification, are permitted provided that the fol-
lowing conditions are met:
1. Redistributions of source code must retain the above copyright notice, this list of conditions and the following dis-
claimer.
2. Redistributions in binary form must reproduce the above copyright notice, this list of conditions and the following
disclaimer in the documentation and/or other materials provided with the distribution.
THIS SOFTWARE IS PROVIDED BY THE AUTHOR AND CONTRIBUTORS ''AS IS'' AND ANY EXPRESS OR IM-
PLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES OF MERCHANTABILI-
TY AND FITNESS FOR A PARTICULAR PURPOSE ARE DISCLAIMED IN NO EVENT SHALL THE REGENTS OR
CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSE-
QUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SER-
VICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY
THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE
OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POS-
SIBILITY OF SUCH DAMAGE.
Redistribution and use in source and binary forms, with or without modification, are permitted provided that the fol-
lowing conditions are met:
1. Redistributions of source code must retain the above copyright notice, this list of conditions and the following dis-
claimer.
2. Redistributions in binary form must reproduce the above copyright notice, this list of conditions and the following
disclaimer in the documentation and/or other materials provided with the distribution.
THIS SOFTWARE IS PROVIDED BY THE AUTHOR AND CONTRIBUTORS ''AS IS'' AND ANY EXPRESS OR IM-
PLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES OF MERCHANTABILI-
TY AND FITNESS FOR A PARTICULAR PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE AUTHOR OR
CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSE-
QUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SER-
VICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY
THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE
OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POS-
SIBILITY OF SUCH DAMAGE.
Redistribution and use in source and binary forms, with or without modification, are permitted provided that the fol-
lowing conditions are met:
1. Redistributions of source code must retain the above copyright notice, this list of conditions and the following dis-
claimer.
1622
2. Redistributions in binary form must reproduce the above copyright notice, this list of conditions and the following
disclaimer in the documentation and/or other materials provided with the distribution.
3. The name of the company may not be used to endorse or promote products derived from this software without spe-
cific prior written permission.
THIS SOFTWARE IS PROVIDED BY ARM LTD "AS IS'' AND ANY EXPRESS OR IMPLIED WARRANTIES, INCLUD-
ING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PAR-
TICULAR PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL ARM LTD BE LIABLE FOR ANY DIRECT,
INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT
LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR
BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CON-
TRACT, STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT
OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.
Redistribution and use in source and binary forms, with or without modification, are permitted provided that the fol-
lowing conditions are met:
1. Redistributions source code must retain the above copyright notice, this list of conditions and the following disclaim-
er.
2. Redistributions in binary form must reproduce the above copyright notice, this list of conditions and the following
disclaimer in the documentation and/or other materials provided with the distribution.
3. Neither the name of Xilinx nor the names of its contributors may be used to endorse or promote products derived
from this software without specific prior written permission.
THIS SOFTWARE IS PROVIDED BY THE COPYRIGHT HOLDER AND CONTRIBUTORS "AS IS" AND ANY EXPRESS
OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES OF MERCHANT-
ABILITY AND FITNESS FOR A PARTICULAR PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE COPY-
RIGHT HOLDER OR CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL,
SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCURE-
MENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION)
HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR
TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF THIS SOFT-
WARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.
Redistribution and use in source and binary forms, with or without modification, are permitted provided that the
following conditions
are met:
Redistributions of source code must retain the above copyright notice, this list of conditions and the following dis-
claimer.
Redistributions in binary form must reproduce the above copyright notice, this list of conditions and the following
disclaimer in the documentation and/or other materials provided with the distribution.
Neither the name of Texas Instruments Incorporated nor the names of its contributors may be used to endorse or
promote products derived from this software without specific prior written permission.
THIS SOFTWARE IS PROVIDED BY THE COPYRIGHT HOLDERS AND CONTRIBUTORS "AS IS" AND ANY EX-
PRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES OF MER-
CHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE
COPYRIGHT OWNER OR CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL,
EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF
SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEV-
ER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT
(INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE,
EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.
The authors hereby grant permission to use, copy, modify, distribute, and license this software and its documentation
for any purpose, provided that existing copyright notices are retained in all copies and that this notice is included ver-
batim in any distributions. No written agreement, license, or royalty fee is required for any of the authorized uses. Mod-
ifications to this software may be copyrighted by their authors and need not follow the licensing terms described here,
1623
SGOS Administration Guide
provided that the new terms are clearly indicated on the first page of each file where they apply.
Redistribution and use in source and binary forms, with or without modification, are permitted provided that the fol-
lowing conditions are met:
Redistributions of source code must retain the above copyright notice, this list of conditions and the following disclaim-
er.
Redistributions in binary form must reproduce the above copyright notice, this list of conditions and the following dis-
claimer in the documentation and/or other materials provided with the distribution.
Neither the name of Adapteva nor the names of its contributors may be used to endorse or promote products derived
from this software without specific prior written permission.
THIS SOFTWARE IS PROVIDED BY THE COPYRIGHT HOLDERS AND CONTRIBUTORS "AS IS" ANDANY EX-
PRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES OF MER-
CHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE ARE
DISCLAIMED. IN NO EVENT SHALL THE COPYRIGHT HOLDER OR CONTRIBUTORS BE LIABLE FOR ANY DI-
RECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT
NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR
SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON
ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING NEGLI-
GENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE
OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.
OpenLDAP
http://www.openldap.org/
License:
Redistribution and use of this software and associated documentation ("Software"), with or without modification, are
permitted provided that the following conditions are met:
2. Redistributions in binary form must reproduce applicable copyright statements and notices, this list of conditions, and
the following disclaimer in the documentation and/or other materials provided with the distribution, and
The OpenLDAP Foundation may revise this license from time to time. Each revision is distinguished by a version num-
ber. You may use this Software under terms of this license revision or under the terms of any subsequent revision of the
license.
THIS SOFTWARE IS PROVIDED BY THE OPENLDAP FOUNDATION AND ITS CONTRIBUTORS ''AS IS'' AND ANY
EXPRESSED OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES OF
MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL
THE OPENLDAP FOUNDATION, ITS CONTRIBUTORS, OR THE AUTHOR(S) OR OWNER(S) OF THE SOFTWARE
BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAM-
AGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF
USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY OF LIA-
BILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE)
ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH
DAMAGE.
The names of the authors and copyright holders must not be used in advertising or otherwise to promote the sale, use
or other dealing in this Software without specific, written prior permission. Title to copyright in this Software shall at
all times remain with copyright holders.
Copyright 1999-2003 The OpenLDAP Foundation, Redwood City, California, USA. All Rights Reserved. Permission to
copy and distribute verbatim copies of this document is granted.
----------------------------------------------------------------------------
Redistribution and use in source and binary forms, with or without modification, are permitted only as authorized by
1624
the OpenLDAP Public License.
A copy of this license is available in the file LICENSE in the top-level directory of the distribution or, alternatively, at
<http://www.OpenLDAP.org/license.html>.
Individual files and/or contributed packages may be copyright by other parties and/or subject to additional restric-
tions.
This work is derived from the University of Michigan LDAP v3.3 distribution. Information concerning this software is
available at <http://www.umich.edu/~dirsvcs/ldap/ldap.html>.
---
Redistribution and use in source and binary forms, with or withoutmodification, are permitted only as authorized by
the OpenLDAP Public License.
---
Redistribution and use in source and binary forms, with or without modification, are permitted provided that this notice
is preserved. The names of the copyright holders may not be used to endorse or promote products derived from this
software without their specific prior written permission. This software is provided ''as is'' without express or implied
warranty.
Redistribution and use in source and binary forms are permitted provided that this notice is preserved and that due
credit is given to the University of Michigan at Ann Arbor. The name of the University may not be used to endorse or
promote products derived from this software without specific prior written permission. This software is provided ``as
is'' without express or implied warranty.
OpenSSH
http://www.openssh.com/portable.html
This file is part of the OpenSSH software.
The licences which components of this software fall under are as follows. First, we will summarize and say that all com-
ponents are under a BSD licence, or a licence more free than that.
1)
Copyright (c) 1995 Tatu Ylonen <[email protected]>, Espoo, Finland
All rights reserved
As far as I am concerned, the code I have written for this software can be used freely for any purpose. Any derived ver-
sions of this software must be clearly marked as such, and if the derived work is incompatible with the protocol descrip-
tion in the RFC file, it must be called by a name other than "ssh" or "Secure Shell".
[Tatu continues]
However, I am not implying to give any licenses to any patents or copyrights held by third parties, and the software
includes parts that are not under my direct control. As far as I know, all included source code is used in accordance with
the relevant license agreements and can be used freely for any purpose (the GNU license being the most restrictive); see
below for details.
1625
SGOS Administration Guide
[However, none of that term is relevant at this point in time. All of these restrictively licenced software components
which he talks about have been removed from OpenSSH, i.e.,
Note that any information and cryptographic algorithms used in this software are publicly available on the Internet and
at any major bookstore, scientific library, and patent office worldwide. More information can be found e.g. at "http://
www.cs.hut.fi/crypto".
The legal status of this program is some combination of all these permissions and restrictions. Use only at your own
responsibility. You will be responsible for any legal consequences yourself; I am not making any claims whether pos-
sessing or using this is legal or not in your country, and I am not taking any responsibility on your behalf.
NO WARRANTY
BECAUSE THE PROGRAM IS LICENSED FREE OF CHARGE, THERE IS NO WARRANTY FOR THE PROGRAM, TO
THE EXTENT PERMITTED BY APPLICABLE LAW. EXCEPT WHEN OTHERWISE STATED IN WRITING THE
COPYRIGHT HOLDERS AND/OR OTHER PARTIES PROVIDE THE PROGRAM "AS IS" WITHOUT WARRANTY OF
ANY KIND, EITHER EXPRESSED OR IMPLIED, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES
OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE. THE ENTIRE RISK AS TO THE QUALITY
AND PERFORMANCE OF THE PROGRAM IS WITH YOU. SHOULD THE PROGRAM PROVE DEFECTIVE, YOU AS-
SUME THE COST OF ALL NECESSARY SERVICING, REPAIR OR CORRECTION.
IN NO EVENT UNLESS REQUIRED BY APPLICABLE LAW OR AGREED TO IN WRITING WILL ANY COPYRIGHT
HOLDER, OR ANY OTHER PARTY WHO MAY MODIFY AND/OR REDISTRIBUTE THE PROGRAM AS PERMIT-
TED ABOVE, BE LIABLE TO YOU FOR DAMAGES, INCLUDING ANY GENERAL, SPECIAL, INCIDENTAL OR
CONSEQUENTIAL DAMAGES ARISING OUT OF THE USE OR INABILITY TO USE THE PROGRAM (INCLUDING
BUT NOT LIMITED TO LOSS OF DATA OR DATA BEING RENDERED INACCURATE OR LOSSES SUSTAINED BY
YOU OR THIRD PARTIES OR A FAILURE OF THE PROGRAM TO OPERATE WITH ANY OTHER PROGRAMS),
EVEN IF SUCH HOLDER OR OTHER PARTY HAS BEEN ADVISED OF THE POSSIBILITY OF SUCH DAMAGES.
2)
The 32-bit CRC compensation attack detector in deattack.c was contributed by CORE SDI S.A. under a BSD-style li-
cense.
All rights reserved. Redistribution and use in source and binary forms, with or without modification, are permitted pro-
vided that this copyright notice is retained.
THIS SOFTWARE IS PROVIDED ''AS IS'' AND ANY EXPRESS OR IMPLIED WARRANTIES ARE DISCLAIMED. IN
NO EVENT SHALL CORE SDI S.A. BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLA-
RY OR CONSEQUENTIAL DAMAGES RESULTING FROM THE USE OR MISUSE OF THIS SOFTWARE.
3)
ssh-keyscan was contributed by David Mazieres under a BSD-style license.
Modification and redistribution in source and binary forms is permitted provided that due credit is given to the au-
thor and the OpenBSD project by leaving this copyright notice intact.
4)
The Rijndael implementation by Vincent Rijmen, Antoon Bosselaers and Paulo Barreto is in the public domain and
distributed with the following license:
1626
@version 3.0 (December 2000)
THIS SOFTWARE IS PROVIDED BY THE AUTHORS ''AS IS'' AND ANY EXPRESS OR IMPLIED WARRANTIES, IN-
CLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A
PARTICULAR PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE AUTHORS OR CONTRIBUTORS BE LIA-
BLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (IN-
CLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, DATA,
OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY,
WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING
IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAM-
AGE.
5)
One component of the ssh source code is under a 3-clause BSD license, held by the University of California, since we
pulled these parts from
original Berkeley code.
Redistribution and use in source and binary forms, with or without modification, are permitted provided that the
following conditions are met:
1. Redistributions of source code must retain the above copyright notice, this list of conditions and the following
disclaimer.
2. Redistributions in binary form must reproduce the above copyright notice, this list of conditions and the following
disclaimer in the documentation and/or other materials provided with the distribution.
3. Neither the name of the University nor the names of its contributors may be used to endorse or promote products
derived from this software without specific prior written permission.
THIS SOFTWARE IS PROVIDED BY THE REGENTS AND CONTRIBUTORS ''AS IS'' AND ANY EXPRESS OR IM-
PLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES OF MERCHANTABILI-
TY AND FITNESS FOR A PARTICULAR PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE REGENTS OR
CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSE-
QUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SER-
VICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY
THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT
LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF
THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.
6)
Remaining components of the software are provided under a standard 2-term BSD licence with the following names
as copyright holders:
Markus Friedl
Theo de Raadt
Niels Provos
Dug Song
Aaron Campbell
Damien Miller
Kevin Steves
Daniel Kouril
Wesley Griffin
Per Allansson
Nils Nordman
Simon Wilkinson
Portable OpenSSH additionally includes code from the following copyright holders, also under the 2-term BSD license:
Ben Lindstrom
Tim Rice
Andre Lucas
Chris Adams
Corinna Vinschen
Cray Inc.
Denis Parker
Gert Doering
1627
SGOS Administration Guide
Jakob Schlyter
Jason Downs
Juha Yrjölä
Michael Stone
Networks Associates Technology, Inc.
Solar Designer
Todd C. Miller
Wayne Schroeder
William Jones
Darren Tucker
Sun Microsystems
The SCO Group
Daniel Walsh
Redistribution and use in source and binary forms, with or without modification, are permitted provided that the fol-
lowing conditions are met:
1. Redistributions of source code must retain the above copyright notice, this list of conditions and the following
disclaimer.
2. Redistributions in binary form must reproduce the above copyright notice, this list of conditions and the following
disclaimer in the documentation and/or other materials provided with the distribution.
THIS SOFTWARE IS PROVIDED BY THE AUTHOR ''AS IS'' AND ANY EXPRESS OR IMPLIED WARRANTIES, IN-
CLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A
PARTICULAR PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE AUTHOR BE LIABLE FOR ANY DIRECT,
INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT
LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR
BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CON-
TRACT, STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT
OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.
a) md5crypt.c, md5crypt.h
b) snprintf replacement
Apart from the previously mentioned licenses, various pieces of code in the openbsd-compat/ subdirectory are li-
censed as follows:
Some code is licensed under a 3-term BSD license, to the following copyright holders:
Todd C. Miller
Theo de Raadt
Damien Miller
Eric P. Allman
The Regents of the University of California
Constantin S. Svintsoff
Redistribution and use in source and binary forms, with or without modification, are permitted provided that the fol-
lowing conditions are met:
1. Redistributions of source code must retain the above copyright notice, this list of conditions and the following dis-
claimer.
2. Redistributions in binary form must reproduce the above copyright notice, this list of conditions and the following
disclaimer in the documentation and/or other materials provided with the distribution.
3. Neither the name of the University nor the names of its contributors may be used to endorse or promote products
derived from this software without specific prior written permission.
THIS SOFTWARE IS PROVIDED BY THE REGENTS AND CONTRIBUTORS ''AS IS'' AND ANY EXPRESS OR IM-
PLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES OF MERCHANTABILI-
TY AND FITNESS FOR A PARTICULAR PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE REGENTS OR
CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSE-
QUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SER-
VICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY
1628
THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE
OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POS-
SIBILITY OF SUCH DAMAGE.
Some code is licensed under an ISC-style license, to the following copyright holders:
Permission to use, copy, modify, and distribute this software for any purpose with or without fee is hereby granted,
provided that the above copyright notice and this permission notice appear in all copies.
THE SOFTWARE IS PROVIDED "AS IS" AND TODD C. MILLER DISCLAIMS ALL WARRANTIES WITH REGARD
TO THIS SOFTWARE INCLUDING ALL IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS. IN NO
EVENT SHALL TODD C. MILLER BE LIABLE FOR ANY SPECIAL, DIRECT, INDIRECT, OR CONSEQUENTIAL
DAMAGES OR ANY DAMAGES WHATSOEVER RESULTING FROM LOSS OF USE, DATA OR PROFITS, WHETH-
ER IN AN ACTION OF CONTRACT, NEGLIGENCE OR OTHER TORTIOUS ACTION, ARISING OUT OF OR IN
CONNECTION WITH THE USE OR PERFORMANCE OF THIS SOFTWARE.
Permission is hereby granted, free of charge, to any person obtaining a copy of this software and associated documen-
tation files (the "Software"), to deal in the Software without restriction, including without limitation the rights to use,
copy, modify, merge, publish, distribute, distribute with modifications, sublicense, and/or sell copies of the Software,
and to permit persons to whom the Software is furnished to do so, subject to the following conditions:
The above copyright notice and this permission notice shall be included in all copies or substantial portions of the Soft-
ware.
THE SOFTWARE IS PROVIDED "AS IS", WITHOUT WARRANTY OF ANY KIND, EXPRESS OR IMPLIED, INCLUD-
ING BUT NOT LIMITED TO THE WARRANTIES OF MERCHANTABILITY, FITNESS FOR A PARTICULAR PUR-
POSE AND NONINFRINGEMENT. IN NO EVENT SHALL THE ABOVE COPYRIGHT HOLDERS BE LIABLE FOR
ANY CLAIM, DAMAGES OR OTHER LIABILITY, WHETHER IN AN ACTION OF CONTRACT, TORT OR OTHER-
WISE, ARISING FROM, OUT OF OR IN CONNECTION WITH THE SOFTWARE OR THE USE OR OTHER DEAL-
INGS IN THE SOFTWARE.
Except as contained in this notice, the name(s) of the above copyright holders shall not be used in advertising or oth-
erwise to promote the sale, use or other dealings in this Software without prior written authoriza-
tion.
OpenSSL
https://www.openssl.org/
The OpenSSL toolkit stays under a dual license, i.e. both the conditions of the OpenSSL License and the original SSLeay
license apply to the toolkit.
See below for the actual license texts. Actually both licenses are BSD-style Open Source licenses. In case of any license
issues related to OpenSSL please contact [email protected].
OpenSSL License
Redistribution and use in source and binary forms, with or without modification, are permitted provided that the fol-
lowing conditions are met:
1. Redistributions of source code must retain the above copyright notice, this list of conditions and the following dis-
claimer.
2. Redistributions in binary form must reproduce the above copyright notice, this list of conditions and the following
disclaimer in the documentation and/or other materials provided with the distribution.
3. All advertising materials mentioning features or use of this software must display the following acknowledgement:
"This product includes software developed by the OpenSSL Project for use in the OpenSSL Toolkit. (http://
www.openssl.org/)"
4. The names "OpenSSL Toolkit" and "OpenSSL Project" must not be used to endorse or promote products derived from
this software without prior written permission. For written permission, please contact [email protected].
5. Products derived from this software may not be called "OpenSSL" nor may "OpenSSL" appear in their names without
prior written permission of the OpenSSL Project.
1629
SGOS Administration Guide
THIS SOFTWARE IS PROVIDED BY THE OpenSSL PROJECT ''AS IS'' AND ANY EXPRESSED OR IMPLIED WAR-
RANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FIT-
NESS FOR A PARTICULAR PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE OpenSSL PROJECT OR ITS
CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSE-
QUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SER-
VICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY
THEORY OF LIABILITY, WHETHER IN CONTRACT,
STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE
USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.
This product includes cryptographic software written by Eric Young ([email protected]). This product includes soft-
ware written by Tim Hudson ([email protected]).
This library is free for commercial and non-commercial use as long as the following conditions are adhered to. The
following conditions apply to all code found in this distribution, be it the RC4, RSA, lhash, DES, etc., code; not just the
SSL code. The SSL documentation included with this distribution is covered by the same copyright terms except that
the holder is Tim Hudson ([email protected]).
Copyright remains Eric Young's, and as such any Copyright notices in the code are not to be removed.
If this package is used in a product, Eric Young should be given attribution as the author of the parts of the library used.
This can be in the form of a textual message at program startup or in documentation (online or textual) provided with
the package.
Redistribution and use in source and binary forms, with or without modification, are permitted provided that the fol-
lowing conditions are met:
1. Redistributions of source code must retain the copyright notice, this list of conditions and the following disclaimer.
2. Redistributions in binary form must reproduce the above copyright notice, this list of conditions and the following
disclaimer in the documentation and/or other materials provided with the distribution.
3. All advertising materials mentioning features or use of this software must display the following acknowledgement:
"This product includes cryptographic software written by Eric Young ([email protected])"
The word 'cryptographic' can be left out if the routines from the library being used are not cryptographic related :-).
4. If you include any Windows specific code (or a derivative thereof) from the apps directory (application code) you
must include an acknowledgement: "This product includes software written by Tim Hudson ([email protected])"
THIS SOFTWARE IS PROVIDED BY ERIC YOUNG ''AS IS'' AND ANY EXPRESS OR IMPLIED WARRANTIES, IN-
CLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A
PARTICULAR PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE AUTHOR OR CONTRIBUTORS BE LIA-
BLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL
DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS
OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY OF LI-
ABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE)
ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH
DAMAGE.
The licence and distribution terms for any publicly available version or derivative of this code cannot be changed. i.e.
this code cannot simply be
copied and put under another distribution licence [including the GNU Public Licence.]
OSF DCE-RPC
http://www.dcerpc.org/
Copyright (c) 2010 Apple Inc. All rights reserved.
Redistribution and use in source and binary forms, with or without modification, are permitted provided that the fol-
lowing conditions are met:
1. Redistributions of source code must retain the above copyright notice, this list of conditions and the following dis-
claimer.
2. Redistributions in binary form must reproduce the above copyright notice, this list of conditions and the following
disclaimer in the documentation and/or other materials provided with the distribution.
3. Neither the name of Apple Inc. ("Apple") nor the names of its contributors may be used to endorse or promote prod-
ucts derived from this software without specific prior written permission.
1630
THIS SOFTWARE IS PROVIDED BY APPLE AND ITS CONTRIBUTORS "AS IS" AND ANYEXPRESS OR IMPLIED
WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIEDWARRANTIES OF MERCHANTABILITY AND
FITNESS FOR A PARTICULAR PURPOSE AREDISCLAIMED. IN NO EVENT SHALL APPLE OR ITS CONTRIBU-
TORS BE LIABLE FOR ANYDIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL
DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS
OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY OF LI-
ABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE)
ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH
DAMAGE.
Redistribution and use in source and binary forms, with or without modification, are permitted provided that the fol-
lowing conditions are met:
1. Redistributions of source code must retain the above copyright notice, this list of conditions and the following dis-
claimer.
2. Redistributions in binary form must reproduce the above copyright notice, this list of conditions and the following
disclaimer in the documentation and/or other materials provided with the distribution.
3. Neither the name of the Novell, Inc. nor the names of its contributors may be used to endorse or promote products
derived from this software
without specific prior written permission.
THIS SOFTWARE IS PROVIDED BY THE COPYRIGHT HOLDERS AND CONTRIBUTORS "AS IS" AND ANY EX-
PRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOTLIMITED TO, THE IMPLIED WARRANTIES OF MER-
CHANTABILITY AND FITNESS FORA PARTICULAR PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE
COPYRIGHT OWNER OR CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL,
SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCURE-
MENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION)
HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR
TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE
OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.
Redistribution and use in source and binary forms, with or without modification, are permitted provided that the fol-
lowing conditions are met:
1. Redistributions of source code must retain the above copyright notice, this list of conditions and the following dis-
claimer.
2. Redistributions in binary form must reproduce the above copyright notice, this list of conditions and the following
disclaimer in the documentation and/or other materials provided with the distribution.
3. All advertising materials mentioning features or use of this software must display the following acknowledgement:
This product includes software developed by the University of California, Berkeley and its contributors.
4. Neither the name of the University nor the names of its contributors may be used to endorse or promote products
derived from this software without specific prior written permission.
THIS SOFTWARE IS PROVIDED BY THE REGENTS AND CONTRIBUTORS ''AS IS'' AND ANY EXPRESS OR IM-
PLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES OF MERCHANTABILI-
TY AND FITNESS FOR A PARTICULAR PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE REGENTS OR
CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSE-
QUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SER-
VICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY
THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT
LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF
THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.
1631
SGOS Administration Guide
Redistribution and use of this software and associated documentation("Software"), with or without modification, are
permitted provided that the following conditions are met:
2. Redistributions in binary form must reproduce applicable copyright statements and notices, this list of conditions, and
the following disclaimer in the documentation and/or other materials provided with the distribution, and
The OpenLDAP Foundation may revise this license from time to time. Each revision is distinguished by a version num-
ber. You may use this Software under terms of this license revision or under the terms of any subsequent revision of the
license.
THIS SOFTWARE IS PROVIDED BY THE OPENLDAP FOUNDATION AND ITS CONTRIBUTORS ''AS IS'' AND ANY
EXPRESSED OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES OF
MERCHANTABILITYAND FITNESS FOR A PARTICULAR PURPOSE ARE DISCLAIMED. IN NO EVENTSHALL
THE OPENLDAP FOUNDATION, ITS CONTRIBUTORS, OR THE AUTHOR(S)OR OWNER(S) OF THE SOFTWARE
BE LIABLE FOR ANY DIRECT, INDIRECT,INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAG-
ES (INCLUDING,BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES;LOSS OF USE,
DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVERCAUSED AND ON ANY THEORY OF LIABILITY,
WHETHER IN CONTRACT, STRICTLIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING
INANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THEPOSSIBILITY OF SUCH DAM-
AGE.
The names of the authors and copyright holders must not be used in advertising or otherwise to promote the sale, use
or other dealing in this Software without specific, written prior permission. Title to copyright in this Software shall at
all times remain with copyright holders.
Copyright 1999-2003 The OpenLDAP Foundation, Redwood City, California, USA. All Rights Reserved. Permission to
copy and distribute verbatim copies of this document is granted.
This copy of the libpng notices is provided for your convenience. In case of any discrepancy between this copy and the
notices in the file png.h that is
included in the libpng distribution, the latter shall prevail.
If you modify libpng you may insert additional notices immediately following this sentence.
libpng versions 1.0.7, July 1, 2000, through 1.6.18, July 23, 2015, are Copyright (c) 2000-2002, 2004, 2006-2015 Glenn Rand-
ers-Pehrson, and are
distributed according to the same disclaimer and license as libpng-1.0.6 with the following individuals added to the list
of Contributing Authors:
Simon-Pierre Cadieux
Eric S. Raymond
Mans Rullgard
Cosmin Truta
Gilles Vollant
James Yu
There is no warranty against interference with your enjoyment of the library or against infringement. There is no war-
ranty that our efforts or the library will fulfill any of your particular purposes or needs. This library is provided with
all faults, and the entire risk of satisfactory quality, performance, accuracy, and effort is with the user.
libpng versions 0.97, January 1998, through 1.0.6, March 20, 2000, are Copyright (c) 1998-2000 Glenn Randers-Pehrson,
and are distributed according
to the same disclaimer and license as libpng-0.96, with the following individuals added to the list of Contributing Au-
thors:
Tom Lane
Glenn Randers-Pehrson
Willem van Schaik
1632
libpng versions 0.89, June 1996, through 0.96, May 1997, are Copyright (c) 1996-1997 Andreas Dilger, and are distributed
according to the same disclaimer and license as libpng-0.88, with the following individuals added to the list of Contrib-
uting Authors:
John Bowler
Kevin Bracey
Sam Bushell
Magnus Holmgren
Greg Roelofs
Tom Tanner
libpng versions 0.5, May 1995, through 0.88, January 1996, are Copyright (c) 1995-1996 Guy Eric Schalnat, Group 42, Inc.
For the purposes of this copyright and license, "Contributing Authors" is defined as the following set of individuals:
Andreas Dilger
Dave Martindale
Guy Eric Schalnat
Paul Schmidt
Tim Wegner
The PNG Reference Library is supplied "AS IS". The Contributing Authors and Group 42, Inc. disclaim all warranties,
expressed or implied,
including, without limitation, the warranties of merchantability and of fitness for any purpose. The Contributing Au-
thors and Group 42, Inc.
assume no liability for direct, indirect, incidental, special, exemplary, or consequential damages, which may result from
the use of the PNG
Reference Library, even if advised of the possibility of such damage.
Permission is hereby granted to use, copy, modify, and distribute this source code, or portions hereof, for any purpose,
without fee, subject to the following restrictions:
2. Altered versions must be plainly marked as such and must not be misrepresented as being the original source.
3. This Copyright notice may not be removed or altered from any source or altered source distribution.
The Contributing Authors and Group 42, Inc. specifically permit, without fee, and encourage the use of this source code
as a component to supporting the PNG file format in commercial products. If you use this source code in a product,
acknowledgment is not required but would be appreciated.
A "png_get_copyright" function is available, for convenient use in "about" boxes and the like:
printf("%s", png_get_copyright(NULL));
Also, the PNG logo (in PNG format, of course) is supplied in the files "pngbar.png" and "pngbar.jpg (88x31) and "png-
now.png" (98x31).
Libpng is OSI Certified Open Source Software. OSI Certified Open Source is a certification mark of the Open Source
Initiative. OSI has not addressed
the additional disclaimers inserted at version 1.0.7.
Glenn Randers-Pehrson
glennrp at users.sourceforge.net
July 23, 2015
Redistribution and use in source and binary forms, with or without modification, are permitted provided that the fol-
lowing conditions are met:
1. Redistributions of source code must retain the above copyright notice, this list of conditions and the following dis-
claimer.
2. Redistributions in binary form must reproduce the above copyright notice, this list of conditions and the following
disclaimer in the documentation and/or other materials provided with the distribution.
3. Neither the name of the author nor the names of other contributors may be used to endorse or promote products de-
1633
SGOS Administration Guide
THIS SOFTWARE IS PROVIDED BY THE AUTHOR AND CONTRIBUTORS ''AS IS'' AND ANY EXPRESS OR IM-
PLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES OF MERCHANTABILI-
TY AND FITNESS FOR A PARTICULAR PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE AUTHOR OR
CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSE-
QUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SER-
VICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY
THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE
OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POS-
SIBILITY OF SUCH DAMAGE.
Redistribution and use in source and binary forms, with or without modification, are permitted provided that the fol-
lowing conditions are met:
Redistributions of source code must retain the above copyright notice, this list of conditions and the following disclaim-
er.
Redistributions in binary form must reproduce the above copyright notice, this list of conditions and the following dis-
claimer in the documentation and/or other materials provided with the distribution.
Neither the name of the University of Cambridge nor the name of Google Inc. nor the names of their contributors may
be used to endorse or promote products derived from this software without specific prior written permission.
THIS SOFTWARE IS PROVIDED BY THE COPYRIGHT HOLDERS AND CONTRIBUTORS "AS IS"AND ANY EX-
PRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THEIMPLIED WARRANTIES OF MER-
CHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE
ARE DISCLAIMED. IN NO EVENT SHALL THE COPYRIGHT OWNER OR CONTRIBUTORS BELIABLE FOR ANY
DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT
NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, DATA, OR PROFITS;
OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CON-
TRACT, STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT
OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.
Copyright (C) 1991-2, RSA Data Security, Inc. Created 1991. All rights reserved.
License to copy and use this software is granted provided that it is identified as the "RSA Data Security, Inc. MD5 Mes-
sage-Digest Algorithm" in all material mentioning or referencing this software or this function.
License is also granted to make and use derivative works provided that such works are identified as "derived from the
RSA Data Security, Inc. MD5 Message-Digest Algorithm" in all material mentioning or referencing the derived work.
RSA Data Security, Inc. makes no representations concerning either the merchantability of this software or the suitability
of this software for any particular purpose. It is provided "as is" without express or implied warranty of any kind.
These notices must be retained in any copies of any part of this documentation and/or software.
Redistribution and use in source and binary forms, with or without modification, are permitted provided that the fol-
lowing conditions are met:
Redistribution of source code must retain the above copyright notice, this list of conditions and the following disclaimer.
Redistribution in binary form must reproduce the above copyright notice, this list of conditions and the following dis-
claimer in the documentation and/or other materials provided with the distribution.
1634
Neither the name of Sun Microsystems, Inc. or the names of contributors may be used to endorse or promote products
derived from this software without specific prior written permission.
This software is provided "AS IS," without a warranty of any kind. ALL EXPRESS OR IMPLIED CONDITIONS, REP-
RESENTATIONS AND WARRANTIES, INCLUDING ANY IMPLIED WARRANTY OF MERCHANTABILITY, FIT-
NESS FOR A PARTICULAR PURPOSE OR NON-INFRINGEMENT, ARE HEREBY EXCLUDED. SUN
MICROSYSTEMS, INC. ("SUN") AND ITS LICENSORS SHALL NOT BE LIABLE FOR ANY DAMAGES SUFFERED BY
LICENSEE AS A RESULT OF USING, MODIFYING OR DISTRIBUTING THIS SOFTWARE OR ITS DERIVATIVES. IN
NO EVENT WILL SUN OR ITS LICENSORS BE LIABLE FOR ANY LOST REVENUE, PROFIT OR DATA, OR FOR DI-
RECT, INDIRECT, SPECIAL, CONSEQUENTIAL, INCIDENTAL OR PUNITIVE DAMAGES, HOWEVER CAUSED
AND REGARDLESS OF THE THEORY OF LIABILITY, ARISING OUT OF THE USE OF OR INABILITY TO USE THIS
SOFTWARE, EVEN IF SUN HAS BEEN ADVISED OF THE POSSIBILITY OF SUCH DAMAGES.
You acknowledge that this software is not designed, licensed or intended for use in the design, construction, operation
or maintenance of any nuclear facility.
libpcap
http://www.tcpdump.org/
Copyright (c) 1988, 1989, 1990, 1991, 1993, 1994, 1995, 1996
The Regents of the University of California. All rights reserved.
Redistribution and use in source and binary forms, with or without modification, are permitted provided that: (1)
source code distributions retain the above copyright notice and this paragraph in its entirety, (2) distributions including
binary code include the above copyright notice and this paragraph in its entirety in the documentation or other materials
provided with the distribution, and (3) all advertising materials mentioning features or use of this software display the
following acknowledgement:
''This product includes software developed by the University of California, Lawrence Berkeley Laboratory and its con-
tributors.''
Neither the name of the University nor the names of its contributors may be used to endorse or promote products de-
rived from this software without specific prior written permission.
THIS SOFTWARE IS PROVIDED ''AS IS'' AND WITHOUT ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING,
WITHOUT LIMITATION, THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICU-
LAR PURPOSE.
Copyright (c) 1990, 1991, 1992, 1993, 1994, 1995, 1996, 1997, 1998
The Regents of the University of California. All rights reserved.
Redistribution and use in source and binary forms, with or without modification, are permitted provided that: (1)
source code distributions retain the above copyright notice and this paragraph in its entirety, (2) distributions including
binary code include the above copyright notice and this paragraph in its entirety in the documentation or other materials
provided with the distribution, and (3) all advertising materials mentioning features or use of this software display the
following acknowledgement:
''This product includes software developed by the University of California, Lawrence Berkeley Laboratory and its con-
tributors.'' Neither the name of
the University nor the names of its contributors may be used to endorse or promote products derived from this software
without specific prior
written permission.
THIS SOFTWARE IS PROVIDED ''AS IS'' AND WITHOUT ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING,
WITHOUT LIMITATION, THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICU-
LAR PURPOSE.
Copyright (c) 1990, 1991, 1992, 1993, 1994, 1995, 1996, 1997
The Regents of the University of California. All rights reserved.
This code is derived from the Stanford/CMU enet packet filter, (net/enet.c) distributed as part of 4.3BSD, and code
contributed to Berkeley by Steven McCanne and Van Jacobson both of Lawrence Berkeley Laboratory.
Redistribution and use in source and binary forms, with or without modification, are permitted provided that the fol-
lowing conditions are met:
1. Redistributions of source code must retain the above copyright notice, this list of conditions and the following dis-
claimer.
2. Redistributions in binary form must reproduce the above copyright notice, this list of conditions and the following
disclaimer in the documentation and/or other materials provided with the distribution.
3. All advertising materials mentioning features or use of this software must display the following acknowledgement:
This product includes software developed by the University of California, Berkeley and its contributors.
4. Neither the name of the University nor the names of its contributors may be used to endorse or promote products
derived from this software without specific prior written permission.
1635
SGOS Administration Guide
THIS SOFTWARE IS PROVIDED BY THE REGENTS AND CONTRIBUTORS ''AS IS'' AND ANY EXPRESS OR IM-
PLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES OF MERCHANTABILI-
TY AND FITNESS FOR A PARTICULAR PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE REGENTS OR
CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSE-
QUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SER-
VICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY
THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE
OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POS-
SIBILITY OF SUCH DAMAGE.
Redistribution and use in source and binary forms, with or without modification, are permitted provided that: (1)
source code distributions retain the above copyright notice and this paragraph in its entirety, (2) distributions including
binary code include the above copyright notice and this paragraph in its entirety in the documentation or other materials
provided with the distribution, and (3) all advertising materials mentioning features or use of this software display the
following acknowledgement: '
'This product includes software developed by the University of California, Lawrence Berkeley Laboratory and its con-
tributors.''
Neither the name of the University nor the names of its contributors may be used to endorse or promote products de-
rived from this software without specific prior written permission.
THIS SOFTWARE IS PROVIDED ''AS IS'' AND WITHOUT ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING,
WITHOUT LIMITATION, THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICU-
LAR PURPOSE.
Redistribution and use in source and binary forms, with or without modification, are permitted provided that the fol-
lowing conditions are met:
1. Redistributions of source code must retain the above copyright notice, this list of conditions and the following dis-
claimer.
2. Redistributions in binary form must reproduce the above copyright notice, this list of conditions and the following
disclaimer in the documentation and/or other materials provided with the distribution.
3. All advertising materials mentioning features or use of this software must display the following acknowledgement:
This product includes software developed by the Computer Systems Engineering Group at Lawrence Berkeley Labora-
tory.
4. Neither the name of the University nor of the Laboratory may be used to endorse or promote products derived from
this software without specific prior written permission.
THIS SOFTWARE IS PROVIDED BY THE REGENTS AND CONTRIBUTORS ''AS IS'' AND ANY EXPRESS OR IM-
PLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES OF MERCHANTABILI-
TY AND FITNESS FOR A PARTICULAR PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE REGENTS OR
CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSE-
QUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SER-
VICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY
THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE
OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POS-
SIBILITY OF SUCH DAMAGE.
Redistribution and use in source and binary forms, with or without modification, are permitted provided that the fol-
lowing conditions are met:
1. Redistributions of source code must retain the above copyright notice, this list of conditions and the following dis-
claimer.
2. Redistributions in binary form must reproduce the above copyright notice, this list of conditions and the following
disclaimer in the documentation and/or other materials provided with the distribution.
3. All advertising materials mentioning features or use of this software must display the following acknowledgement:
This product includes software developed by the Computer Systems Engineering Group at Lawrence Berkeley Labora-
tory.
4. Neither the name of the University nor of the Laboratory may be used to endorse or promote products derived from
this software without specific prior written permission.
THIS SOFTWARE IS PROVIDED BY THE REGENTS AND CONTRIBUTORS ''AS IS'' AND ANY EXPRESS OR IM-
PLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES OF MERCHANTABILI-
TY AND FITNESS FOR A PARTICULAR PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE REGENTS OR
CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSE-
QUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SER-
VICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY
THEORY OF LIABILITY, WHETHER IN CONTRACT,STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR
OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSI-
1636
BILITY OF SUCH DAMAGE.
Redistribution and use in source and binary forms, with or without modification, are permitted provided that: (1)
source code distributions retain the above copyright notice and this paragraph in its entirety, (2) distributions including
binary code include the above copyright notice and this paragraph in its entirety in the documentation or other materials
provided with the distribution, and (3) all advertising materials mentioning features or use of this software display the
following acknowledgement:
''This product includes software developed by the University of California, Lawrence Berkeley Laboratory and its con-
tributors.''
Neither the name of the University nor the names of its contributors may be used to endorse or promote products de-
rived from this software without specific prior written permission.
THIS SOFTWARE IS PROVIDED ''AS IS'' AND WITHOUT ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING,
WITHOUT LIMITATION, THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICU-
LAR PURPOSE.
Redistribution and use in source and binary forms, with or without modification, are permitted provided that the fol-
lowing conditions are met:
1. Redistributions of source code must retain the above copyright notice, this list of conditions and the following dis-
claimer.
2. Redistributions in binary form must reproduce the above copyright notice, this list of conditions and the following
disclaimer in the documentation and/or other materials provided with the distribution. 3. All advertising materials
mentioning features or use of this software must display the following acknowledgement:
This product includes software developed by the Computer Systems Engineering Group at Lawrence Berkeley Labora-
tory.
4. Neither the name of the University nor of the Laboratory may be used to endorse or promote products derived from
this software without specific prior written permission.
THIS SOFTWARE IS PROVIDED BY THE REGENTS AND CONTRIBUTORS ''AS IS'' AND ANY EXPRESS OR IM-
PLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES OF MERCHANTABILI-
TY AND FITNESS FOR A PARTICULAR PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE REGENTS OR
CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSE-
QUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SER-
VICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY
THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT
LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF
THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.
Redistribution and use in source and binary forms, with or without modification, are permitted provided that the fol-
lowing conditions are met:
1. Redistributions of source code must retain the above copyright notice, this list of conditions and the following dis-
claimer.
2. Redistributions in binary form must reproduce the above copyright notice, this list of conditions and the following
disclaimer in the documentation and/or other materials provided with the distribution.
3. All advertising materials mentioning features or use of this software must display the following acknowledgement:
This product includes software developed by the Computer Systems Engineering Group at Lawrence Berkeley Labora-
tory.
4. Neither the name of the University nor of the Laboratory may be used to endorse or promote products derived from
this software without specific prior written permission.
THIS SOFTWARE IS PROVIDED BY THE REGENTS AND CONTRIBUTORS ''AS IS'' AND ANY EXPRESS OR IM-
PLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES OF MERCHANTABILI-
TY AND FITNESS FOR A PARTICULAR PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE REGENTS OR
CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSE-
QUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SER-
VICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY
THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT
LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF
THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE. /
Permission to use, copy, modify, and distribute this program for any purpose and without fee is hereby granted, pro-
vided that this copyright and permission notice appear on all copies and supporting documentation, the name of Carn-
egie Mellon not be used in advertising or publicity pertaining to distribution of the program without specific prior
permission, and notice be given in supporting documentation that copying and distribution is by permission of Carne-
gie Mellon and Stanford University. Carnegie Mellon makes no representations about the suitability of this software for
1637
SGOS Administration Guide
XMLSec Library
http://www.aleksey.com/xmlsec/
xmlsec, xmlsec-openssl, xmlsec-gnutls, xmlsec-gcrypt libraries
------------------------------------------------------------------------------
Permission is hereby granted, free of charge, to any person obtaining a copy of this software and associated documen-
tation files (the "Software"), to deal
in the Software without restriction, including without limitation the rights to use, copy, modify, merge, publish, distrib-
ute, sublicense, and/or sell
copies of the Software, and to permit persons to whom the Software is furnished to do so, subject to the following con-
ditions:
The above copyright notice and this permission notice shall be included in all copies or substantial portions of the Soft-
ware.
THE SOFTWARE IS PROVIDED "AS IS", WITHOUT WARRANTY OF ANY KIND, EXPRESS OR IMPLIED, INCLUD-
ING BUT NOT LIMITED TO THE WARRANTIES OF MERCHANTABILITY, FITNESS FOR A PARTICULAR PUR-
POSE AND NONINFRINGEMENT. IN NO EVENT SHALL THE
ALEKSEY SANIN BE LIABLE FOR ANY CLAIM, DAMAGES OR OTHER LIABILITY, WHETHER IN AN ACTION OF
CONTRACT, TORT OR OTHERWISE, ARISING FROM, OUT OF OR IN CONNECTION WITH THE SOFTWARE OR
THE USE OR OTHER DEALINGS IN THE SOFTWARE.
Except as contained in this notice, the name of Aleksey Sanin shall not be used in advertising or otherwise to promote
the sale, use or other deal-
ings in this Software without prior written authorization from him.
xmlsec-nss library
------------------------------------------------------------------------------
Copyright (C) 2002-2010 Aleksey Sanin. All Rights Reserved.
Copyright (c) 2003 America Online, Inc. All rights reserved.
Permission is hereby granted, free of charge, to any person obtaining a copy of this software and associated documen-
tation files (the "Software"), to deal
in the Software without restriction, including without limitation the rights to use, copy, modify, merge, publish, distrib-
ute, sublicense, and/or sell
copies of the Software, and to permit persons to whom the Software is furnished to do so, subject to the following con-
ditions:
The above copyright notice and this permission notice shall be included in all copies or substantial portions of the Soft-
ware.
Portions of the Software were created using source code and/or APIs governed by the Mozilla Public License (MPL).
The MPL is available
at http://www.mozilla.org/MPL/MPL-1.1.html. The MPL permits such portions to be distributed with code not gov-
erned by MPL, as long as the requirements of MPL are fulfilled for such portions.
THE SOFTWARE IS PROVIDED "AS IS", WITHOUT WARRANTY OF ANY KIND, EXPRESS OR IMPLIED, INCLUD-
ING BUT NOT LIMITED TO THE WARRANTIES OF MERCHANTABILITY, FITNESS FOR A PARTICULAR PUR-
POSE AND NONINFRINGEMENT. IN NO EVENT SHALL THE
ALEKSEY SANIN BE LIABLE FOR ANY CLAIM, DAMAGES OR OTHER LIABILITY, WHETHER IN AN ACTION OF
CONTRACT, TORT OR OTHERWISE, ARISING FROM, OUT OF OR IN CONNECTION WITH THE SOFTWARE OR
THE USE OR OTHER DEALINGS IN THE SOFTWARE.
Except as contained in this notice, the name of Aleksey Sanin shall not be used in advertising or otherwise to promote
the sale, use or other deal-
ings in this Software without prior written authorization from him.
xmlsec-mscrypto library
------------------------------------------------------------------------------
Permission is hereby granted, free of charge, to any person obtaining a copy of this software and associated documen-
tation files (the "Software"), to deal
1638
in the Software without restriction, including without limitation the rights to use, copy, modify, merge, publish, distrib-
ute, sublicense, and/or sell
copies of the Software, and to permit persons to whom the Software is furnished to do so, subject to the following con-
ditions:
The above copyright notice and this permission notice shall be included in all copies or substantial portions of the Soft-
ware.
THE SOFTWARE IS PROVIDED "AS IS", WITHOUT WARRANTY OF ANY KIND, EXPRESS OR IMPLIED, INCLUD-
ING BUT NOT LIMITED TO THE WARRANTIES OF MERCHANTABILITY, FITNESS FOR A PARTICULAR PUR-
POSE AND NONINFRINGEMENT. IN NO EVENT SHALL THE
ALEKSEY SANIN BE LIABLE FOR ANY CLAIM, DAMAGES OR OTHER LIABILITY, WHETHER IN AN ACTION OF
CONTRACT, TORT OR OTHERWISE, ARISING FROM, OUT OF OR IN CONNECTION WITH THE SOFTWARE OR
THE USE OR OTHER DEALINGS IN THE SOFTWARE.
Except as contained in this notice, the name of Aleksey Sanin shall not be used in advertising or otherwise to promote
the sale, use or other deal-
ings in this Software without prior written authorization from him.
Permission to use, copy, modify, and/or distribute this software for any purpose with or without fee is hereby granted,
provided that the above
copyright notice and this permission notice appear in all copies.
THE SOFTWARE IS PROVIDED "AS IS" AND THE AUTHOR DISCLAIMS ALL WARRANTIES WITH REGARD TO
THIS SOFTWARE INCLUDING ALL IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS. IN NO
EVENT SHALL THE AUTHOR BE LIABLE FOR ANY SPECIAL, DIRECT, INDIRECT, OR CONSEQUENTIAL DAM-
AGES OR ANY DAMAGES WHATSOEVER RESULTING FROM LOSS OF USE, DATA OR PROFITS, WHETHER IN
AN ACTION OF CONTRACT, NEGLIGENCE OR OTHER TORTIOUS ACTION, ARISING OUT OF OR IN CONNEC-
TION WITH THE USE OR PERFORMANCE OF THIS SOFTWARE.
YUI Compressor
http://yui.github.io/yuicompressor/
Copyright (c) 2010, Yahoo! Inc.
All rights reserved.
Redistribution and use of this software in source and binary forms, with or without modification, are permitted provid-
ed that the following
conditions are met:
Redistributions of source code must retain the above copyright notice, this list of conditions and the following disclaim-
er.
Redistributions in binary form must reproduce the above copyright notice, this list of conditions and the following dis-
claimer in the documentation and/or other materials provided with the distribution.
Neither the name of Yahoo! Inc. nor the names of its contributors may be used to endorse or promote products derived
from this software without specific prior written permission of Yahoo! Inc.
THIS SOFTWARE IS PROVIDED BY THE COPYRIGHT HOLDERS AND CONTRIBUTORS "AS IS" AND ANY EX-
PRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES OF MER-
CHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE ARE
DISCLAIMED. IN NO EVENT SHALL THE COPYRIGHT OWNER OR CONTRIBUTORS BE LIABLE FOR ANY DI-
RECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT
NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR
SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON
ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING NEGLI-
GENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF
THE POSSIBILITY OF SUCH DAMAGE.
YUI Library
http://yuilibrary.com/
Copyright © 2013 Yahoo! Inc. All rights reserved.
Redistribution and use of this software in source and binary forms, with or without modification, are permitted provid-
ed that the following conditions are met:
- Redistributions of source code must retain the above copyright notice, this list of conditions and the following disclaim-
er.
- Redistributions in binary form must reproduce the above copyright notice, this list of conditions and the following dis-
1639
SGOS Administration Guide
claimer in the documentation and/or other materials provided with the distribution.
Neither the name of Yahoo! Inc. nor the names of YUI's contributors may be used to endorse or promote products de-
rived from this software without specific prior written permission of Yahoo! Inc.
THIS SOFTWARE IS PROVIDED BY THE COPYRIGHT HOLDERS AND CONTRIBUTORS "AS IS" AND ANY EX-
PRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES OF MER-
CHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE
COPYRIGHT OWNER OR CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL,
EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUB-
STITUTE GOODS OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER
CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT (IN-
CLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN
IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.
Zlib
http://www.zlib.net/
This software is provided 'as-is', without any express or implied warranty. In no event will the authors be held liable
for any damages arising from the use of this software.
Permission is granted to anyone to use this software for any purpose, including commercial applications, and to alter it
and redistribute it freely, subject to the following restrictions:
1. The origin of this software must not be misrepresented; you must not claim that you wrote the original software. If
you use this software in a product, an acknowledgment in the product documentation would be appreciated but is not
required.
2. Altered source versions must be plainly marked as such, and must not be misrepresented as being the original soft-
ware.
3. This notice may not be removed or altered from any source distribution.
If you use the zlib library in a product, we would appreciate *not* receiving lengthy legal documents to sign. The sources
are provided for free but without warranty of any kind. The library has been entirely written by Jean-loup Gailly and
Mark Adler; it does not include third-party code.
If you redistribute modified sources, we would appreciate that you include in the file ChangeLog history information
documenting your changes. Please
read the FAQ for more information on the distribution of modified source versions.
Additional Licenses
This product contains software copied or derived from FreeBSD, OpenBSD, NetBSD and other sources. Many files have
their own licenses, which are copied below:
--------------------------------------------------------------
Redistribution and use in source and binary forms, with or without modification, are permitted provided that the fol-
lowing conditions are met:
1. Redistributions of source code must retain the above copyright notice, this list of conditions and the following dis-
claimer.
2. Redistributions in binary form must reproduce the above copyright notice, this list of conditions and the following
disclaimer in the documentation and/or other materials provided with the distribution.
3. All advertising materials mentioning features or use of this software must display the following acknowledgement:
This product includes software developed by Brini.
4. The name of Brini may not be used to endorse or promote products derived from this software without specific prior
written permission.
THIS SOFTWARE IS PROVIDED BY BRINI ``AS IS'' AND ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING,
BUT NOT LIMITED TO, THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICU-
LAR PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL BRINI BE LIABLE FOR ANY DIRECT, INDIRECT, INCI-
DENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO,
PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTER-
RUPTION) HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT LIA-
BILITY, OR TORT (INCLUDING NEGLIGENCE OR
OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSI-
BILITY OF SUCH DAMAGE.
Copyright (C) 1995, 1996, 1997, 1998, 1999, 2000 and 2001 WIDE Project.
1640
All rights reserved.
Redistribution and use in source and binary forms, with or without modification, are permitted provided that the fol-
lowing conditions are met:
1. Redistributions of source code must retain the above copyright notice, this list of conditions and the following dis-
claimer.
2. Redistributions in binary form must reproduce the above copyright notice, this list of conditions and the following
disclaimer in the documentation and/or other materials provided with the distribution.
3. Neither the name of the project nor the names of its contributors may be used to endorse or promote products derived
from this software without specific prior written permission.
THIS SOFTWARE IS PROVIDED BY THE PROJECT AND CONTRIBUTORS ''AS IS'' AND ANY EXPRESS OR IMPLIED
WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES OF MERCHANTABILITY AND
FITNESS FOR A PARTICULAR PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE PROJECT OR CONTRIB-
UTORS BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL
DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS
OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY OF LI-
ABILITY, WHETHER IN CONTRACT, STRICT
LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF
THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.
Copyright (C) 1995, 1996, 1997, 1998, and 1999 WIDE Project.
All rights reserved.
Redistribution and use in source and binary forms, with or without modification, are permitted provided that the fol-
lowing conditions are met:
1. Redistributions of source code must retain the above copyright notice, this list of conditions and the following dis-
claimer.
2. Redistributions in binary form must reproduce the above copyright notice, this list of conditions and the following
disclaimer in the documentation and/or other materials provided with the distribution.
3. Neither the name of the project nor the names of its contributors may be used to endorse or promote products derived
from this software without specific prior written permission.
THIS SOFTWARE IS PROVIDED BY THE PROJECT AND CONTRIBUTORS ''AS IS'' AND ANY EXPRESS OR IMPLIED
WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES OF MERCHANTABILITY AND
FITNESS FOR A PARTICULAR PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE PROJECT OR CONTRIB-
UTORS BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL
DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS
OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY OF LI-
ABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE)
ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH
DAMAGE.
Copyright (C) 1995, 1996, 1997, 1998 and 2003 WIDE Project.
All rights reserved.
Redistribution and use in source and binary forms, with or without modification, are permitted provided that the fol-
lowing conditions are met:
1. Redistributions of source code must retain the above copyright notice, this list of conditions and the following dis-
claimer.
2. Redistributions in binary form must reproduce the above copyright notice, this list of conditions and the following
disclaimer in the documentation and/or other materials provided with the distribution.
3. Neither the name of the project nor the names of its contributors may be used to endorse or promote products derived
from this software without specific prior written permission.
THIS SOFTWARE IS PROVIDED BY THE PROJECT AND CONTRIBUTORS ''AS IS'' AND ANY EXPRESS OR IM-
PLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES OF MERCHANTABILI-
TY AND FITNESS FOR A PARTICULAR PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE PROJECT OR
CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSE-
QUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SER-
VICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY
THEORY OF LIABILITY, WHETHER IN CONTRACT,STRICT
LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF
THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.
Redistribution and use in source and binary forms, with or without modification, are permitted provided that the fol-
lowing conditions are met:
1. Redistributions of source code must retain the above copyright notice, this list of conditions and the following dis-
claimer.
2. Redistributions in binary form must reproduce the above copyright notice, this list of conditions and the following
disclaimer in the documentation and/or other materials provided with the distribution.
3. Neither the name of the project nor the names of its contributors may be used to endorse or promote products derived
from this software without specific prior written permission.
1641
SGOS Administration Guide
THIS SOFTWARE IS PROVIDED BY THE PROJECT AND CONTRIBUTORS ''AS IS'' AND ANY EXPRESS OR IMPLIED
WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES OF MERCHANTABILITY AND
FITNESS FOR A PARTICULAR PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE PROJECT OR CONTRIB-
UTORS BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL
DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS
OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY OF LI-
ABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE)
ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH
DAMAGE.
Copyright remains Eric Young's, and as such any Copyright notices in the code are not to be removed. If this code is
used in a product, Eric Young should be given attribution as the author of the parts used. This can be in the form of a
textual message at program startup or in documentation (online or textual) provided with the package.
Redistribution and use in source and binary forms, with or without modification, are permitted provided that the fol-
lowing conditions are met:
1. Redistributions of source code must retain the copyright notice, this list of conditions and the following disclaimer.
2. Redistributions in binary form must reproduce the above copyright notice, this list of conditions and the following
disclaimer in the documentation and/or other materials provided with the distribution.
3. All advertising materials mentioning features or use of this software must display the following acknowledgement:
This product includes software developed by Eric Young ([email protected])
THIS SOFTWARE IS PROVIDED BY ERIC YOUNG ''AS IS'' AND ANY EXPRESS OR IMPLIED WARRANTIES, IN-
CLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A
PARTICULAR PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE AUTHOR OR CONTRIBUTORS BE LIA-
BLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL
DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS
OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY OF LI-
ABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE)
ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH
DAMAGE.
The licence and distribution terms for any publicly available version or derivative of this code cannot be changed. i.e.
this code cannot simply be copied and put under another distribution licence
Copyright remains Eric Young's, and as such any Copyright notices in the code are not to be removed. If this code is
used in a product, Eric Young should be given attribution as the author of the parts used. This can be in the form of a
textual message at program startup or in documentation (online or textual) provided with the package.
Redistribution and use in source and binary forms, with or without modification, are permitted provided that the fol-
lowing conditions are met:
1. Redistributions of source code must retain the copyright notice, this list of conditions and the following disclaimer.
2. Redistributions in binary form must reproduce the above copyright notice, this list of conditions and the following
disclaimer in the documentation and/or other materials provided with the distribution.
3. All advertising materials mentioning features or use of this software must display the following acknowledgement:
This product includes software developed by Eric Young ([email protected])
THIS SOFTWARE IS PROVIDED BY ERIC YOUNG ''AS IS'' AND ANY EXPRESS OR IMPLIED WARRANTIES, IN-
CLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A
PARTICULAR PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE AUTHOR OR CONTRIBUTORS BE LIA-
BLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (IN-
CLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, DATA,
OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY,
WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING
IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAM-
AGE.
The licence and distribution terms for any publicly available version or derivative of this code cannot be changed. i.e.
this code cannot simply be copied and put under another distribution licence
1642
All rights reserved.
This library is free for commercial and non-commercial use as long as the following conditions are adhered to. The fol-
lowing conditions apply to all code found in this distribution, be it the RC4, RSA, lhash, DES, etc., code; not just the SSL
code. The SSL documentation included with this distribution is covered by the same copyright terms except that the
holder is Tim Hudson ([email protected]).
Copyright remains Eric Young's, and as such any Copyright notices in the code are not to be removed.
If this package is used in a product, Eric Young should be given attribution as the author of the parts of the library used.
This can be in the form of a textual message at program startup or in documentation (online or textual) provided with
the package.
Redistribution and use in source and binary forms, with or without modification, are permitted provided that the fol-
lowing conditions are met:
1. Redistributions of source code must retain the copyright notice, this list of conditions and the following disclaimer.
2. Redistributions in binary form must reproduce the above copyright notice, this list of conditions and the following
disclaimer in the documentation and/or other materials provided with the distribution.
3. All advertising materials mentioning features or use of this software must display the following acknowledgement:
"This product includes cryptographic software written by Eric Young ([email protected])"
The word 'cryptographic' can be left out if the routines from the library being used are not cryptographic related :-).
4. If you include any Windows specific code (or a derivative thereof) from the apps directory (application code) you
must include an acknowledgement:
"This product includes software written by Tim Hudson ([email protected])"
THIS SOFTWARE IS PROVIDED BY ERIC YOUNG ''AS IS'' AND ANY EXPRESS OR IMPLIED WARRANTIES, IN-
CLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A
PARTICULAR PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE AUTHOR OR CONTRIBUTORS BE LIA-
BLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL
DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS
OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY OF LI-
ABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE)
ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH
DAMAGE.
The licence and distribution terms for any publicly available version or derivative of this code cannot be changed. i.e.
this code cannot simply be copied and put under another distribution licence
This library is free for commercial and non-commercial use as long as the following conditions are adhered to. The fol-
lowing conditions apply to all code found in this distribution, be it the RC4, RSA, lhash, DES, etc., code; not just the SSL
code. The SSL documentation included with this distribution is covered by the same copyright terms except that the
holder is Tim Hudson ([email protected]).
Copyright remains Eric Young's, and as such any Copyright notices in the code are not to be removed.
If this package is used in a product, Eric Young should be given attribution as the author of the parts of the library used.
This can be in the form of a textual message at program startup or in documentation (online or textual) provided with
the package.
Redistribution and use in source and binary forms, with or without modification, are permitted provided that the fol-
lowing conditions are met:
1. Redistributions of source code must retain the copyright notice, this list of conditions and the following disclaimer.
2. Redistributions in binary form must reproduce the above copyright notice, this list of conditions and the following
disclaimer in the documentation and/or other materials provided with the distribution.
3. All advertising materials mentioning features or use of this software must display the following acknowledgement:
"This product includes cryptographic software written by Eric Young ([email protected])"
The word 'cryptographic' can be left out if the routines from the library being used are not cryptographic related :-).
4. If you include any Windows specific code (or a derivative thereof) from the apps directory (application code) you
must include an acknowledgement:
"This product includes software written by Tim Hudson ([email protected])"
THIS SOFTWARE IS PROVIDED BY ERIC YOUNG ''AS IS'' AND ANY EXPRESS OR IMPLIED WARRANTIES, IN-
CLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A
PARTICULAR PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE AUTHOR OR CONTRIBUTORS BE LIA-
BLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL
DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS
OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY OF LI-
ABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE)
1643
SGOS Administration Guide
ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH
DAMAGE.
The licence and distribution terms for any publicly available version or derivative of this code cannot be changed. i.e.
this code cannot simply be copied and put under another distribution licence
Copyright remains Eric Young's, and as such any Copyright notices in the code are not to be removed. If this code is
used in a product, Eric Young should be given attribution as the author of the parts used. This can be in the form of a
textual message at program startup or in documentation (online or textual) provided with the package.
Redistribution and use in source and binary forms, with or without modification, are permitted provided that the fol-
lowing conditions are met:
1. Redistributions of source code must retain the copyright notice, this list of conditions and the following disclaimer.
2. Redistributions in binary form must reproduce the above copyright notice, this list of conditions and the following
disclaimer in the documentation and/or other materials provided with the distribution.
3. All advertising materials mentioning features or use of this software must display the following acknowledgement:
This product includes software developed by Eric Young ([email protected])
THIS SOFTWARE IS PROVIDED BY ERIC YOUNG ''AS IS'' AND ANY EXPRESS OR IMPLIED WARRANTIES, IN-
CLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A
PARTICULAR PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE AUTHOR OR CONTRIBUTORS BE LIA-
BLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (IN-
CLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, DATA,
OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY,
WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING
IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAM-
AGE.
The licence and distribution terms for any publicly available version or derivative of this code cannot be changed. i.e.
this code cannot simply be copied and put under another distribution licence
Redistribution and use in source and binary forms, with or without modification, are permitted provided that the fol-
lowing conditions are met:
1. Redistributions of source code must retain the above copyright notice, this list of conditions and the following dis-
claimer.
2. Redistributions in binary form must reproduce the above copyright notice, this list of conditions and the following
disclaimer in the documentation and/or other materials provided with the distribution.
THIS SOFTWARE IS PROVIDED BY SONY CSL AND CONTRIBUTORS ''AS IS'' AND ANY EXPRESS OR IMPLIED
WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES OF MERCHANTABILITY AND
FITNESS FOR A PARTICULAR PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL SONY CSL OR CONTRIBU-
TORS BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL
DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS
OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY OF LI-
ABILITY, WHETHER IN CONTRACT, STRICT
LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF
THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.
Redistribution and use in source and binary forms, with or without modification, are permitted provided that the fol-
lowing conditions are met:
1. Redistributions of source code must retain the above copyright notice, this list of conditions and the following dis-
claimer.
2. Redistributions in binary form must reproduce the above copyright notice, this list of conditions and the following
disclaimer in the documentation and/or other materials provided with the distribution.
3. Neither the name of the project nor the names of its contributors may be used to endorse or promote products derived
1644
from this software without specific prior written permission.
THIS SOFTWARE IS PROVIDED BY THE PROJECT AND CONTRIBUTORS ''AS IS'' AND ANY EXPRESS OR IMPLIED
WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES OF MERCHANTABILITY AND
FITNESS FOR A PARTICULAR PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE PROJECT OR CONTRIB-
UTORS BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL
DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS
OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY OF LI-
ABILITY, WHETHER IN CONTRACT, STRICT
LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF
THIS SOFTWARE, EVEN IFADVISED OF THE POSSIBILITY OF SUCH DAMAGE.
Permission to use, copy, modify, and distribute this software and its documentation for any purpose and without fee is
hereby granted, provided that the above copyright notice appear in all copies and that both that the copyright notice
and this permission notice and warranty disclaimer appear in supporting documentation, and that the name of Lucent
or any of its entities not be used in advertising or publicity pertaining to distribution of the software without specific,
written prior permission.
LUCENT DISCLAIMS ALL WARRANTIES WITH REGARD TO THIS SOFTWARE, INCLUDING ALL IMPLIED WAR-
RANTIES OF MERCHANTABILITY AND FITNESS. IN NO EVENT SHALL LUCENT OR ANY OF ITS ENTITIES BE
LIABLE FOR ANY SPECIAL, INDIRECT OR CONSEQUENTIAL DAMAGES OR ANY DAMAGES WHATSOEVER
RESULTING FROM LOSS OF USE, DATA OR PROFITS, WHETHER IN AN ACTION OF CONTRACT, NEGLIGENCE
OR OTHER TORTIOUS ACTION, ARISING OUT OF OR IN CONNECTION WITH THE USE OR PERFORMANCE OF
THIS SOFTWARE.
Permission to use, copy, modify, and distribute this software and its documentation for any purpose and without fee is
hereby granted, provided that the above copyright notice appear in all copies and that both that the copyright notice
and this permission notice and warranty disclaimer appear in supporting documentation, and that the name of Lucent
or any of its entities not be used in advertising or publicity pertaining to distribution of the software without specific,
written prior permission.
LUCENT DISCLAIMS ALL WARRANTIES WITH REGARD TO THIS SOFTWARE,INCLUDING ALL IMPLIED WAR-
RANTIES OF MERCHANTABILITY AND FITNESS.IN NO EVENT SHALL LUCENT OR ANY OF ITS ENTITIES BE
LIABLE FOR ANY SPECIAL, INDIRECT OR CONSEQUENTIAL DAMAGES OR ANY DAMAGESWHATSOEVER RE-
SULTING FROM LOSS OF USE, DATA OR PROFITS, WHETHER IN AN ACTION OF CONTRACT, NEGLIGENCE
OR OTHER TORTIOUS ACTION, ARISING OUT OF OR IN CONNECTION WITH THE USE OR PERFORMANCE OF
THIS SOFTWARE.
Permission to use, copy, modify, and distribute this software and its documentation for any purpose and without fee
is hereby granted, provided that the above copyright notice appear in all copies and that both that the copyright notice
and this permission notice and warranty disclaimer appear in supporting documentation, and that the name of Lucent
or any of its entities not be used in advertising or publicity pertaining to distribution of the software without specific,
written prior permission.
LUCENT DISCLAIMS ALL WARRANTIES WITH REGARD TO THIS SOFTWARE, INCLUDING ALL IMPLIED WAR-
RANTIES OF MERCHANTABILITY AND FITNESS. IN NO EVENT SHALL LUCENT OR ANY OF ITS ENTITIES BE
LIABLE FOR ANY SPECIAL, INDIRECT OR CONSEQUENTIAL DAMAGES OR ANY DAMAGES WHATSOEVER
RESULTING FROM LOSS OF USE, DATA OR PROFITS, WHETHER IN AN ACTION OF CONTRACT, NEGLIGENCE
OR OTHER TORTIOUS ACTION, ARISING OUT OF OR IN CONNECTION WITH THE USE OR PERFORMANCE OF
THIS SOFTWARE.
Permission to use, copy, modify, and distribute this software and its documentation for any purpose and without fee is
hereby granted, provided that the above copyright notice appear in all copies and that both that the copyright notice
and this permission notice and warranty disclaimer appear in supporting documentation, and that the name of Lucent
or any of its entities not be used in advertising or publicity pertaining to distribution of the software without specific,
written prior permission.
LUCENT DISCLAIMS ALL WARRANTIES WITH REGARD TO THIS SOFTWARE, INCLUDING ALL IMPLIED WAR-
RANTIES OF MERCHANTABILITY AND FITNESS. IN NO EVENT SHALL LUCENT OR ANY OF ITS ENTITIES BE
LIABLE FOR ANY SPECIAL, INDIRECT OR CONSEQUENTIAL DAMAGES OR ANY DAMAGES WHATSOEVER
RESULTING FROM LOSS OF USE, DATA OR PROFITS, WHETHER IN AN ACTION OF CONTRACT, NEGLIGENCE
1645
SGOS Administration Guide
OR OTHER TORTIOUS ACTION, ARISING OUT OF OR IN CONNECTION WITH THE USE OR PERFORMANCE OF
THIS SOFTWARE.
Redistribution and use in source and binary forms, with or without modification, are permitted provided that the fol-
lowing conditions are met:
1. Redistributions of source code must retain the above copyright notice, this list of conditions and the following dis-
claimer.
2. Redistributions in binary form must reproduce the above copyright notice, this list of conditions and the following
disclaimer in the documentation and/or other materials provided with the distribution.
THIS SOFTWARE IS PROVIDED BY SONY CSL AND CONTRIBUTORS ''AS IS'' AND ANY EXPRESS OR IMPLIED
WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES OF MERCHANTABILITY AND
FITNESS FOR A PARTICULAR PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL SONY CSL OR CONTRIBU-
TORS BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL
DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS
OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY OF LI-
ABILITY, WHETHER IN CONTRACT, STRICT
LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF
THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.
Redistribution and use in source and binary forms, with or without modification, are permitted provided that the fol-
lowing conditions are met:
1. Redistributions of source code must retain the above copyright notice, this list of conditions and the following dis-
claimer.
2. Redistributions in binary form must reproduce the above copyright notice, this list of conditions and the following
disclaimer in the documentation and/or other materials provided with the distribution.
3. Neither the name of the project nor the names of its contributors may be used to endorse or promote products derived
from this software without specific prior written permission.
THIS SOFTWARE IS PROVIDED BY THE PROJECT AND CONTRIBUTORS '' AS IS'' AND ANY EXPRESS OR IM-
PLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES OF MERCHANTABILI-
TY AND FITNESS FOR A PARTICULAR PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE PROJECT OR
CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSE-
QUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SER-
VICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY
THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE
OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POS-
SIBILITY OF SUCH DAMAGE.
Permission to use, copy, modify, and distribute this software and its documentation for any purpose and without fee is
hereby granted, provided that the above copyright notice appear in all copies and that both that the copyright notice
and this permission notice and warranty disclaimer appear in supporting documentation, and that the name of Lucent
or any of its entities not be used in advertising or publicity pertaining to distribution of the software without specific,
written prior permission.
LUCENT DISCLAIMS ALL WARRANTIES WITH REGARD TO THIS SOFTWARE, INCLUDING ALL IMPLIED WAR-
RANTIES OF MERCHANTABILITY AND FITNESS. IN NO EVENT SHALL LUCENT OR ANY OF ITS ENTITIES BE
LIABLE FOR ANY SPECIAL, INDIRECT OR CONSEQUENTIAL DAMAGES OR ANY DAMAGES WHATSOEVER
RESULTING FROM LOSS OF USE, DATA OR PROFITS, WHETHER IN AN ACTION OF CONTRACT, NEGLIGENCE
OR OTHER TORTIOUS ACTION, ARISING OUT OF OR IN CONNECTION WITH THE USE OR PERFORMANCE OF
THIS SOFTWARE.
Redistribution and use in source and binary forms, with or without modification, are permitted provided that the fol-
lowing conditions are met:
1. Redistributions of source code must retain the above copyright notice, this list of conditions and the following dis-
claimer.
2. Redistributions in binary form must reproduce the above copyright notice, this list of conditions and the following
disclaimer in the documentation and/or other materials provided with the distribution.
THIS SOFTWARE IS PROVIDED BY THE AUTHOR AND CONTRIBUTORS '' AS IS'' AND ANY EXPRESS OR IM-
PLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES OF MERCHANTABILI-
TY AND FITNESS FOR A PARTICULAR PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE AUTHOR OR
1646
CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSE-
QUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SER-
VICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY
THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT
LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF
THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.
Redistribution and use in source and binary forms, with or without modification, are permitted provided that the fol-
lowing conditions are met:
1. Redistributions of source code must retain the above copyright notice, this list of conditions and the following dis-
claimer.
2. Redistributions in binary form must reproduce the above copyright notice, this list of conditions and the following
disclaimer in the documentation and/or other materials provided with the distribution.
3. Neither the name of the project nor the names of its contributors may be used to endorse or promote products derived
from this software without specific prior written permission.
THIS SOFTWARE IS PROVIDED BY THE PROJECT AND CONTRIBUTORS ''AS IS'' AND ANY EXPRESS OR IMPLIED
WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES OF MERCHANTABILITY AND
FITNESS FOR A PARTICULAR PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE PROJECT OR CONTRIB-
UTORS BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL
DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS
OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY OF LI-
ABILITY, WHETHER IN CONTRACT, STRICT
LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF
THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.
Redistribution and use in source and binary forms, with or without modification, are permitted under any licence of
your choice which meets the open source licence definition
http://www.opensource.org/opd.html such as the GNU licence or the BSD licence.
This program is distributed in the hope that it will be useful, but WITHOUT ANY WARRANTY; without even the im-
plied warranty of MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the GNU General Public
License or the BSD license for more details.
Redistribution and use in source and binary forms, with or without modification, are permitted provided that the fol-
lowing conditions are met:
1. Redistributions of source code must retain the above copyright notice, this list of conditions and the following dis-
claimer.
2. Redistributions in binary form must reproduce the above copyright notice, this list of conditions and the following
disclaimer in the documentation and/or other materials provided with the distribution.
3. Neither the name of the project nor the names of its contributors may be used to endorse or promote products derived
from this software without specific prior written permission.
THIS SOFTWARE IS PROVIDED BY THE PROJECT AND CONTRIBUTORS ``AS IS'' AND ANY EXPRESS OR IM-
PLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES OF MERCHANTABILI-
TY AND FITNESS FOR A PARTICULAR PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE PROJECT OR
CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSE-
QUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SER-
VICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY
THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE
OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POS-
SIBILITY OF SUCH DAMAGE.
Permission to use, copy, modify, and distribute this software and its documentation for any purpose and without fee is
hereby granted, provided that the above copyright notice appear in all copies and that both that the copyright notice
and this permission notice and warranty disclaimer appear in supporting documentation, and that the name of Lucent
or any of its entities not be used in advertising or publicity pertaining to distribution of the software without specific,
written prior permission.
LUCENT DISCLAIMS ALL WARRANTIES WITH REGARD TO THIS SOFTWARE, INCLUDING ALL IMPLIED WAR-
RANTIES OF MERCHANTABILITY AND FITNESS. IN NO EVENT SHALL LUCENT OR ANY OF ITS ENTITIES BE
LIABLE FOR ANY SPECIAL, INDIRECT OR CONSEQUENTIAL DAMAGES OR ANY DAMAGES WHATSOEVER
RESULTING FROM LOSS OF USE, DATA OR PROFITS, WHETHER IN AN ACTION OF CONTRACT, NEGLIGENCE
OR OTHER TORTIOUS ACTION, ARISING OUT OF OR IN CONNECTION WITH THE USE OR PERFORMANCE OF
1647
SGOS Administration Guide
THIS SOFTWARE.
Redistribution and use in source and binary forms are permitted provided that the following conditions are met:
1. Redistribution of source code must retain the above copyright notice, this list of conditions and the following dis-
claimer.
2. Redistribution in binary form must reproduce the above copyright notice, this list of conditions and the following
disclaimer in the documentation and/or other materials provided with the distribution.
3. The name of the author may not be used to endorse or promote products derived from this software without specific
prior written permission
THIS SOFTWARE IS PROVIDED BY THE AUTHOR ''AS IS'' AND ANY EXPRESS OR IMPLIED WARRANTIES, IN-
CLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A
PARTICULAR PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE AUTHOR BE LIABLE FOR ANY DIRECT,
INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT
LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR
BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CON-
TRACT, STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT
OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.
Redistribution and use in source and binary forms, with or without modification, are permitted provided that the fol-
lowing conditions are met:
1. Redistributions of source code must retain the above copyright notice, this list of conditions and the following dis-
claimer.
2. Redistributions in binary form must reproduce the above copyright notice, this list of conditions and the following
disclaimer in the documentation and/or other materials provided with the distribution.
3. Neither the name of the project nor the names of its contributors may be used to endorse or promote products derived
from this software without specific prior written permission.
THIS SOFTWARE IS PROVIDED BY THE PROJECT AND CONTRIBUTORS ''AS IS'' AND ANY EXPRESS OR IMPLIED
WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES OF MERCHANTABILITY AND
FITNESS FOR A PARTICULAR PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE PROJECT OR CONTRIB-
UTORS BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL
DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS
OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY OF LI-
ABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE)
ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH
DAMAGE.
Redistribution and use in source and binary forms, with or without modification, are permitted provided that the fol-
lowing conditions are met:
1. Redistributions of source code must retain the above copyright notice, this list of conditions and the following dis-
claimer.
2. Redistributions in binary form must reproduce the above copyright notice, this list of conditions and the following
disclaimer in the documentation and/or other materials provided with the distribution.
3. Neither the name of the project nor the names of its contributors may be used to endorse or promote products derived
from this software without specific prior written permission.
THIS SOFTWARE IS PROVIDED BY THE PROJECT AND CONTRIBUTORS ''AS IS'' AND ANY EXPRESS OR IMPLIED
WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES OF MERCHANTABILITY AND
FITNESS FOR A PARTICULAR PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE PROJECT OR CONTRIB-
UTORS BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL
DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS
OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY OF LI-
ABILITY, WHETHER IN CONTRACT, STRICT
LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF
THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE. THE AUTHORS DO NOT GUAR-
ANTEE THAT THIS SOFTWARE DOES NOT INFRINGE ANY OTHERS' INTELLECTUAL PROPERTIES. IN NO
EVENT SHALL THE AUTHORS BE LIABLE FOR ANY INFRINGEMENT OF ANY OTHERS' INTELLECTUAL PROP-
ERTIES.
Redistribution and use in source and binary forms, with or without modification, are permitted provided that the fol-
1648
lowing conditions are met:
1. Redistributions of source code must retain the above copyright notice, this list of conditions, and the following dis-
claimer, without modification.
2. Redistributions in binary form must reproduce the above copyright notice, this list of conditions and the following
disclaimer in the documentation and/or other materials provided with the distribution.
3. The names of the above-listed copyright holders may not be used to endorse or promote products derived from this
software without specific prior written permission.
THIS SOFTWARE IS PROVIDED BY THE COPYRIGHT HOLDERS AND CONTRIBUTORS "AS IS" AND ANY EX-
PRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES OF MER-
CHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE
COPYRIGHT OWNER OR CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL,
EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUB-
STITUTE GOODS OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER
CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT (IN-
CLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN
IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.
Redistribution and use in source and binary forms, with or without modification, are permitted provided that the fol-
lowing conditions are met:
1. Redistributions of source code must retain the above copyright notice, this list of conditions and the following dis-
claimer.
2. Redistributions in binary form must reproduce the above copyright notice, this list of conditions and the following
disclaimer in the
documentation and/or other materials provided with the distribution.
3. Neither the name of the project nor the names of its contributors may be used to endorse or promote products derived
from this software without specific prior written permission.
THIS SOFTWARE IS PROVIDED BY THE PROJECT AND CONTRIBUTORS '' AS IS'' AND ANY EXPRESS OR IM-
PLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES OF MERCHANTABILI-
TY AND FITNESS FOR A PARTICULAR PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE PROJECT OR
CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSE-
QUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SER-
VICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY
THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT
LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF
THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.
Redistribution and use in source and binary forms, with or without modification, are permitted provided that the fol-
lowing conditions are met:
1. Redistributions of source code must retain the above copyright notice, this list of conditions and the following dis-
claimer.
2. Redistributions in binary form must reproduce the above copyright notice, this list of conditions and the following
disclaimer in the documentation and/or other materials provided with the distribution.
3. Neither the name of the project nor the names of its contributors may be used to endorse or promote products derived
from this software without specific prior written permission.
THIS SOFTWARE IS PROVIDED BY THE PROJECT AND CONTRIBUTORS '' AS IS'' AND ANY EXPRESS OR IM-
PLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES OF MERCHANTABILI-
TY AND FITNESS FOR A PARTICULAR PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE PROJECT OR
CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSE-
QUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SER-
VICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY
THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT
LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF
THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.
Redistribution and use in source and binary forms, with or without modification, are permitted provided that the fol-
lowing conditions are met:
1. Redistributions of source code must retain the above copyright
notice, this list of conditions and the following disclaimer.
2. Redistributions in binary form must reproduce the above copyright notice, this list of conditions and the following
disclaimer in the documentation and/or other materials provided with the distribution.
3. Neither the name of MARVELL nor the names of contributors may be used to endorse or promote products derived
from this software without specific prior written permission.
1649
SGOS Administration Guide
THIS SOFTWARE IS PROVIDED BY AUTHOR AND CONTRIBUTORS '' AS IS'' AND ANY EXPRESS OR IMPLIED
WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES OF MERCHANTABILITY AND
FITNESS FOR A PARTICULAR PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL AUTHOR OR CONTRIBU-
TORS BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL
DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS
OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY OF LI-
ABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE)
ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH
DAMAGE.
This program and the accompanying materials are licensed and made available under the terms and conditions of the
BSD License which accompanies this distribution. The full text of the license may be found at http://opensource.org/
licenses/bsd-license.php.
THE PROGRAM IS DISTRIBUTED UNDER THE BSD LICENSE ON AN "AS IS" BASIS, WITHOUT WARRANTIES OR
REPRESENTATIONS OF ANY KIND, EITHER EXPRESS OR IMPLIED.
Redistribution and use in source and binary forms, with or without modification, are permitted provided that the fol-
lowing conditions are met:
1. Redistributions of source code must retain the above copyright notice, this list of conditions and the following dis-
claimer.
2. Redistributions in binary form must reproduce the above copyright notice, this list of conditions and the following
disclaimer in the documentation and/or other materials provided with the distribution.
3. All advertising materials mentioning features or use of this software must display the following acknowledgement:
This product includes software developed by the University of California, Berkeley and its contributors.
4. Neither the name of the University nor the names of its contributors may be used to endorse or promote products
derived from this software
without specific prior written permission.
THIS SOFTWARE IS PROVIDED BY THE REGENTS AND CONTRIBUTORS ''AS IS'' AND ANY EXPRESS OR IM-
PLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES OF MERCHANTABILI-
TY AND FITNESS FOR A PARTICULAR PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE REGENTS OR
CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSE-
QUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SER-
VICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY
THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE
OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POS-
SIBILITY OF SUCH DAMAGE.
Permission to use, copy, modify, and distribute this software for any purpose with or without fee is hereby granted, pro-
vided that the above copyright notice and this permission notice appear in all copies, and that the name of Digital Equip-
ment Corporation not be used in advertising or publicity pertaining to distribution of the document or software without
specific, written prior permission.
THE SOFTWARE IS PROVIDED "AS IS" AND DIGITAL EQUIPMENT CORP. DISCLAIMS ALL WARRANTIES WITH
REGARD TO THIS SOFTWARE, INCLUDING ALL IMPLIED WARRANTIES OF MERCHANTABILITY AND FIT-
NESS. IN NO EVENT SHALL DIGITAL EQUIPMENT CORPORATION BE LIABLE FOR ANY SPECIAL, DIRECT, IN-
DIRECT, OR CONSEQUENTIAL DAMAGES OR ANY DAMAGES WHATSOEVER RESULTING FROM LOSS OF USE,
DATA OR PROFITS, WHETHER IN AN ACTION OF CONTRACT, NEGLIGENCE OR OTHER TORTIOUS ACTION,
ARISING OUT OF OR IN CONNECTION WITH THE USE OR PERFORMANCE OF THIS SOFTWARE.
Redistribution and use in source and binary forms, with or without modification, are permitted provided that the fol-
lowing conditions are met:
1. Redistributions of source code must retain the above copyright notice, this list of conditions and the following dis-
claimer.
2. Redistributions in binary form must reproduce the above copyright notice, this list of conditions and the following
disclaimer in the documentation and/or other materials provided with the distribution.
3. Neither the name of the University nor the names of its contributors may be used to endorse or promote products
derived from this software without specific prior written permission.
THIS SOFTWARE IS PROVIDED BY THE REGENTS AND CONTRIBUTORS ''AS IS'' AND ANY EXPRESS OR IM-
PLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES OF MERCHANTABILI-
TY AND FITNESS FOR A PARTICULAR PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE REGENTS OR
CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSE-
QUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SER-
1650
VICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY
THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE
OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POS-
SIBILITY OF SUCH DAMAGE.
Redistribution and use in source and binary forms, with or without modification, are permitted provided that the fol-
lowing conditions are met:
1. Redistributions of source code must retain the above copyright notice, this list of conditions and the following dis-
claimer.
2. Redistributions in binary form must reproduce the above copyright notice, this list of conditions and the following
disclaimer in the documentation and/or other materials provided with the distribution.
4. Neither the name of the University nor the names of its contributors may be used to endorse or promote products
derived from this software without specific prior written permission.
THIS SOFTWARE IS PROVIDED BY THE REGENTS AND CONTRIBUTORS ''AS IS'' AND ANY EXPRESS OR IM-
PLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES OF MERCHANTABILI-
TY AND FITNESS FOR A PARTICULAR PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE REGENTS OR
CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSE-
QUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SER-
VICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY
THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT
LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF
THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.
Redistribution and use in source and binary forms, with or without modification, are permitted provided that the fol-
lowing conditions are met:
1. Redistributions of source code must retain the above copyright notice, this list of conditions and the following dis-
claimer.
2. Redistributions in binary form must reproduce the above copyright notice, this list of conditions and the following
disclaimer in the documentation and/or other materials provided with the distribution.
4. Neither the name of the University nor the names of its contributors may be used to endorse or promote products
derived from this software without specific prior written permission.
THIS SOFTWARE IS PROVIDED BY THE REGENTS AND CONTRIBUTORS ''AS IS'' AND ANY EXPRESS OR IM-
PLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES OF MERCHANTABILI-
TY AND FITNESS FOR A PARTICULAR PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE REGENTS OR
CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSE-
QUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SER-
VICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY
THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT
LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF
THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.
Redistribution and use in source and binary forms, with or without modification, are permitted provided that the fol-
lowing conditions are met:
1. Redistributions of source code must retain the above copyright notice, this list of conditions and the following dis-
claimer.
2. Redistributions in binary form must reproduce the above copyright notice, this list of conditions and the following
disclaimer in the documentation and/or other materials provided with the distribution.
3. All advertising materials mentioning features or use of this software must display the following acknowledgement:
This product includes software developed by the University of California, Berkeley and its contributors.
4. Neither the name of the University nor the names of its contributors may be used to endorse or promote products
derived from this software without specific prior written permission.
THIS SOFTWARE IS PROVIDED BY THE REGENTS AND CONTRIBUTORS '' AS IS'' AND ANY EXPRESS OR IM-
PLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES OF MERCHANTABILI-
TY AND FITNESS FOR A PARTICULAR PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE REGENTS OR
CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSE-
QUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SER-
VICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY
THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT
LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF
THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.
1651
SGOS Administration Guide
Redistribution and use in source and binary forms, with or without modification, are permitted provided that the fol-
lowing conditions are met:
1. Redistributions of source code must retain the above copyright notice, this list of conditions and the following dis-
claimer.
2. Redistributions in binary form must reproduce the above copyright notice, this list of conditions and the following
disclaimer in the documentation and/or other materials provided with the distribution.
4. Neither the name of the University nor the names of its contributors may be used to endorse or promote products
derived from this software
without specific prior written permission.
THIS SOFTWARE IS PROVIDED BY THE REGENTS AND CONTRIBUTORS ''AS IS'' AND ANY EXPRESS OR IM-
PLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES OF MERCHANTABILI-
TY AND FITNESS FOR A PARTICULAR PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE REGENTS OR
CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSE-
QUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SER-
VICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY
THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE
OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POS-
SIBILITY OF SUCH DAMAGE.
Redistribution and use in source and binary forms, with or without modification, are permitted provided that the fol-
lowing conditions are met:
1. Redistributions of source code must retain the above copyright notice, this list of conditions and the following dis-
claimer.
2. Redistributions in binary form must reproduce the above copyright notice, this list of conditions and the following
disclaimer in the documentation and/or other materials provided with the distribution.
3. Neither the name of the University nor the names of its contributors may be used to endorse or promote products
derived from this software without specific prior written permission.
THIS SOFTWARE IS PROVIDED BY THE REGENTS AND CONTRIBUTORS ``AS IS'' AND ANY EXPRESS OR IM-
PLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES OF MERCHANTABILI-
TY AND FITNESS FOR A PARTICULAR PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE REGENTS OR
CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSE-
QUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SER-
VICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY
THEORY OF LIABILITY, WHETHER IN CONTRACT,STRICT
LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF
THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.
Redistribution and use in source and binary forms, with or without modification, are permitted provided that the fol-
lowing conditions are met:
1. Redistributions of source code must retain the above copyright notice, this list of conditions and the following dis-
claimer.
2. Redistributions in binary form must reproduce the above copyright notice, this list of conditions and the following
disclaimer in the documentation and/or other materials provided with the distribution.
4. Neither the name of the University nor the names of its contributors may be used to endorse or promote products
derived from this software without specific prior written permission.
THIS SOFTWARE IS PROVIDED BY THE REGENTS AND CONTRIBUTORS ``AS IS'' AND ANY EXPRESS OR IM-
PLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES OF MERCHANTABILI-
TY AND FITNESS FOR A PARTICULAR PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE REGENTS OR
CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSE-
QUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SER-
VICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY
THEORY OF LIABILITY, WHETHER IN CONTRACT,STRICT
LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF
THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.
Redistribution and use in source and binary forms, with or without modification, are permitted provided that the fol-
lowing conditions are met:
1. Redistributions of source code must retain the above copyright notice, this list of conditions and the following dis-
claimer.
2. Redistributions in binary form must reproduce the above copyright notice, this list of conditions and the following
disclaimer in the documentation and/or other materials provided with the distribution.
1652
4. Neither the name of the University nor the names of its contributors may be used to endorse or promote products
derived from this software without specific prior written permission.
THIS SOFTWARE IS PROVIDED BY THE REGENTS AND CONTRIBUTORS ``AS IS'' AND ANY EXPRESS OR IM-
PLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES OF MERCHANTABILI-
TY AND FITNESS FOR A PARTICULAR PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE REGENTS OR
CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSE-
QUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SER-
VICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY
THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE
OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POS-
SIBILITY OF SUCH DAMAGE.
Redistribution and use in source and binary forms, with or without modification, are permitted provided that the fol-
lowing conditions are met:
1. Redistributions of source code must retain the above copyright notice, this list of conditions and the following dis-
claimer.
2. Redistributions in binary form must reproduce the above copyright notice, this list of conditions and the following
disclaimer in the documentation and/or other materials provided with the distribution.
3. Neither the name of the University nor the names of its contributors may be used to endorse or promote products
derived from this software
without specific prior written permission.
THIS SOFTWARE IS PROVIDED BY THE REGENTS AND CONTRIBUTORS ''AS IS'' AND ANY EXPRESS OR IM-
PLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES OF MERCHANTABILI-
TY AND FITNESS FOR A PARTICULAR PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE REGENTS OR
CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSE-
QUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SER-
VICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY
THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT
LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF
THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.
NRL grants permission for redistribution and use in source and binary forms, with or without modification, of the soft-
ware and documentation created at NRL provided that the following conditions are met:
1. Redistributions of source code must retain the above copyright notice, this list of conditions and the following dis-
claimer.
2. Redistributions in binary form must reproduce the above copyright notice, this list of conditions and the following
disclaimer in the documentation and/or other materials provided with the distribution.
3. All advertising materials mentioning features or use of this software must display the following acknowledgements:
This product includes software developed by the University of California, Berkeley and its contributors.
This product includes software developed at the Information Technology Division, US Naval Research Laboratory.
4. Neither the name of the NRL nor the names of its contributors may be used to endorse or promote products derived
from this software without specific prior written permission.
THE SOFTWARE PROVIDED BY NRL IS PROVIDED BY NRL AND CONTRIBUTORS ''AS IS'' AND ANY EXPRESS
OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES OF MERCHANT-
ABILITY AND FITNESS FOR A PARTICULAR PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL NRL OR CON-
TRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR
CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS
OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON
ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING NEGLI-
GENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF
THE POSSIBILITY OF SUCH DAMAGE.
The views and conclusions contained in the software and documentation are those of the authors and should not be in-
terpreted as representing official policies, either expressed or implied, of the US Naval Research Laboratory (NRL).
Redistribution and use in source and binary forms, with or without modification, are permitted provided that the fol-
lowing conditions are met:
1. Redistributions of source code must retain the above copyright notice, this list of conditions and the following dis-
claimer.
2. Redistributions in binary form must reproduce the above copyright notice, this list of conditions and the following
disclaimer in the documentation and/or other materials provided with the distribution.
4. Neither the name of the University nor the names of its contributors may be used to endorse or promote products
derived from this software
without specific prior written permission.
1653
SGOS Administration Guide
THIS SOFTWARE IS PROVIDED BY THE REGENTS AND CONTRIBUTORS ''AS IS'' AND ANY EXPRESS OR IM-
PLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES OF MERCHANTABILI-
TY AND FITNESS FOR A PARTICULAR PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE REGENTS OR
CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSE-
QUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SER-
VICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY
THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT
LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF
THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.
Redistribution and use in source and binary forms, with or without modification, are permitted provided that the fol-
lowing conditions are met:
1. Redistributions of source code must retain the above copyright notice, this list of conditions and the following dis-
claimer.
2. Redistributions in binary form must reproduce the above copyright notice, this list of conditions and the following
disclaimer in the documentation and/or other materials provided with the distribution.
3. All advertising materials mentioning features or use of this software must display the following acknowledgement:
This product includes software developed by the University of California, Berkeley and its contributors.
4. Neither the name of the University nor the names of its contributors may be used to endorse or promote products
derived from this software without specific prior written permission.
THIS SOFTWARE IS PROVIDED BY THE REGENTS AND CONTRIBUTORS ''AS IS'' AND ANY EXPRESS OR IM-
PLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES OF MERCHANTABILI-
TY AND FITNESS FOR A PARTICULAR PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE REGENTS OR
CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSE-
QUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SER-
VICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY
THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE
OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POS-
SIBILITY OF SUCH DAMAGE.
Redistribution and use in source and binary forms, with or without modification, are permitted provided that the fol-
lowing conditions are met:
1. Redistributions of source code must retain the above copyright notice, this list of conditions and the following dis-
claimer.
2. Redistributions in binary form must reproduce the above copyright notice, this list of conditions and the following
disclaimer in the documentation and/or other materials provided with the distribution.
4. Neither the name of the University nor the names of its contributors may be used to endorse or promote products
derived from this software
without specific prior written permission.
THIS SOFTWARE IS PROVIDED BY THE REGENTS AND CONTRIBUTORS ''AS IS'' AND ANY EXPRESS OR IM-
PLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES OF MERCHANTABILI-
TY AND FITNESS FOR A PARTICULAR PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE REGENTS OR
CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSE-
QUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SER-
VICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY
THEORY OF LIABILITY, WHETHER IN CONTRACT,STRICT
LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF
THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.
Redistribution and use in source and binary forms, with or without modification, are permitted provided that the fol-
lowing conditions are met:
1. Redistributions of source code must retain the above copyright notice, this list of conditions and the following dis-
claimer.
2. Redistributions in binary form must reproduce the above copyright notice, this list of conditions and the following
disclaimer in the documentation and/or other materials provided with the distribution.
4. Neither the name of the University nor the names of its contributors may be used to endorse or promote products
derived from this software without specific prior written permission.
THIS SOFTWARE IS PROVIDED BY THE REGENTS AND CONTRIBUTORS ''AS IS'' AND ANY EXPRESS OR IM-
PLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES OF MERCHANTABILI-
TY AND FITNESS FOR A PARTICULAR PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE REGENTS OR
CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSE-
1654
QUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SER-
VICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY
THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE
OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POS-
SIBILITY OF SUCH DAMAGE.
Redistribution and use in source and binary forms, with or without modification, are permitted provided that the fol-
lowing conditions are met:
1. Redistributions of source code must retain the above copyright notice, this list of conditions and the following dis-
claimer.
2. Redistributions in binary form must reproduce the above copyright notice, this list of conditions and the following
disclaimer in the documentation and/or other materials provided with the distribution.
4. Neither the name of the University nor the names of its contributors may be used to endorse or promote products
derived from this software
without specific prior written permission.
THIS SOFTWARE IS PROVIDED BY THE REGENTS AND CONTRIBUTORS ''AS IS'' AND ANY EXPRESS OR IM-
PLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES OF MERCHANTABILI-
TY AND FITNESS FOR A PARTICULAR PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE REGENTS OR
CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSE-
QUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SER-
VICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY
THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE
OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POS-
SIBILITY OF SUCH DAMAGE.
Redistribution and use in source and binary forms, with or without modification, are permitted provided that the fol-
lowing conditions are met:
1. Redistributions of source code must retain the above copyright notice, this list of conditions and the following dis-
claimer.
2. Redistributions in binary form must reproduce the above copyright notice, this list of conditions and the following
disclaimer in the documentation and/or other materials provided with the distribution.
3. All advertising materials mentioning features or use of this software must display the following acknowledgement:
This product includes software developed by the University of California, Berkeley and its contributors.
4. Neither the name of the University nor the names of its contributors may be used to endorse or promote products
derived from this software without specific prior written permission.
THIS SOFTWARE IS PROVIDED BY THE REGENTS AND CONTRIBUTORS ''AS IS'' AND ANY EXPRESS OR IM-
PLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES OF MERCHANTABILI-
TY AND FITNESS FOR A PARTICULAR PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE REGENTS OR
CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSE-
QUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SER-
VICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY
THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT
LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF
THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.
Redistribution and use in source and binary forms, with or without modification, are permitted provided that the fol-
lowing conditions are met:
1. Redistributions of source code must retain the above copyright notice, this list of conditions and the following dis-
claimer.
2. Redistributions in binary form must reproduce the above copyright notice, this list of conditions and the following
disclaimer in the documentation and/or other materials provided with the distribution.
3. Neither the name of the University nor the names of its contributors may be used to endorse or promote products
derived from this software without specific prior written permission.
THIS SOFTWARE IS PROVIDED BY THE REGENTS AND CONTRIBUTORS ``AS IS'' AND ANY EXPRESS OR IM-
PLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES OF MERCHANTABILI-
TY AND FITNESS FOR A PARTICULAR PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE REGENTS OR
CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSE-
QUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SER-
VICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY
1655
SGOS Administration Guide
Redistribution and use in source and binary forms, with or without modification, are permitted provided that the fol-
lowing conditions are met:
1. Redistributions of source code must retain the above copyright notice, this list of conditions and the following dis-
claimer.
2. Redistributions in binary form must reproduce the above copyright notice, this list of conditions and the following
disclaimer in the documentation and/or other materials provided with the distribution.
4. Neither the name of the University nor the names of its contributors may be used to endorse or promote products
derived from this software without specific prior written permission.
THIS SOFTWARE IS PROVIDED BY THE REGENTS AND CONTRIBUTORS ''AS IS'' AND ANY EXPRESS OR IM-
PLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES OF MERCHANTABILI-
TY AND FITNESS FOR A PARTICULAR PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE REGENTS OR
CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSE-
QUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SER-
VICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY
THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT
LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF
THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.
Redistribution and use in source and binary forms, with or without modification, are permitted provided that the fol-
lowing conditions are met:
1. Redistributions of source code must retain the above copyright notice, this list of conditions and the following dis-
claimer.
2. Redistributions in binary form must reproduce the above copyright notice, this list of conditions and the following
disclaimer in the documentation and/or other materials provided with the distribution.
3. Neither the name of the University nor the names of its contributors may be used to endorse or promote products
derived from this software without specific prior written permission.
THIS SOFTWARE IS PROVIDED BY THE REGENTS AND CONTRIBUTORS ''AS IS'' AND ANY EXPRESS OR IM-
PLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES OF MERCHANTABILI-
TY AND FITNESS FOR A PARTICULAR PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE REGENTS OR
CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSE-
QUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SER-
VICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY
THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE
OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POS-
SIBILITY OF SUCH DAMAGE.
Redistribution and use in source and binary forms, with or without modification, are permitted provided that the fol-
lowing conditions are met:
1. Redistributions of source code must retain the above copyright notice, this list of conditions and the following dis-
claimer.
2. Redistributions in binary form must reproduce the above copyright notice, this list of conditions and the following
disclaimer in the documentation and/or other materials provided with the distribution.
3. Neither the name of the University nor the names of its contributors may be used to endorse or promote products
derived from this software without specific prior written permission.
THIS SOFTWARE IS PROVIDED BY THE REGENTS AND CONTRIBUTORS ''AS IS'' AND ANY EXPRESS OR IM-
PLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES OF MERCHANTABILI-
TY AND FITNESS FOR A PARTICULAR PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE REGENTS OR
CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSE-
QUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SER-
VICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY
THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE
OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POS-
SIBILITY OF SUCH DAMAGE.
1656
The Regents of the University of California. All rights reserved.
(c) UNIX System Laboratories, Inc.
All or some portions of this file are derived from material licensed to the University of California by American Tele-
phone and Telegraph Co. or Unix System Laboratories, Inc. and are reproduced herein with the permission of UNIX
System Laboratories, Inc.
Redistribution and use in source and binary forms, with or without modification, are permitted provided that the fol-
lowing conditions are met:
1. Redistributions of source code must retain the above copyright notice, this list of conditions and the following dis-
claimer.
2. Redistributions in binary form must reproduce the above copyright notice, this list of conditions and the following
disclaimer in the documentation and/or other materials provided with the distribution.
3. All advertising materials mentioning features or use of this software must display the following acknowledgement:
This product includes software developed by the University of California, Berkeley, Intel Corporation, and its con-
tributors.
4. Neither the name of University, Intel Corporation, or their respective contributors may be used to endorse or promote
products derived from this software without specific prior written permission.
THIS SOFTWARE IS PROVIDED BY THE REGENTS, INTEL CORPORATION AND CONTRIBUTORS ''AS IS'' AND
ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES
OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE ARE DISCLAIMED. IN NO EVENT
SHALL THE REGENTS, INTEL CORPORATION OR CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT, IN-
CIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO,
PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTER-
RUPTION) HOWEVER CAUSED AND ON ANY
THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE
OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POS-
SIBILITY OF SUCH DAMAGE.
THIS SOFTWARE IS PROVIDED BY THE REGENTS AND CONTRIBUTORS '' AS IS'' AND ANY EXPRESS OR IM-
PLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES OF MERCHANTABILI-
TY AND FITNESS FOR A PARTICULAR PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE REGENTS OR
CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSE-
QUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SER-
VICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY
THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT
LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF
THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.
Redistribution and use in source and binary forms, with or without modification, are permitted provided that the fol-
lowing conditions are met:
1. Redistributions of source code must retain the above copyright notice, this list of conditions and the following dis-
claimer.
2. Redistributions in binary form must reproduce the above copyright notice, this list of conditions and the following
1657
SGOS Administration Guide
disclaimer in the documentation and/or other materials provided with the distribution.
4. Neither the name of the University nor the names of its contributors may be used to endorse or promote products
derived from this software without specific prior written permission.
THIS SOFTWARE IS PROVIDED BY THE REGENTS AND CONTRIBUTORS '' AS IS'' AND ANY EXPRESS OR IM-
PLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES OF MERCHANTABILI-
TY AND FITNESS FOR A PARTICULAR PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE REGENTS OR
CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSE-
QUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SER-
VICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY
THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT
LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF
THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.
Redistribution and use in source and binary forms, with or without modification, are permitted provided that the fol-
lowing conditions are met:
1. Redistributions of source code must retain the above copyright notice, this list of conditions and the following dis-
claimer.
2. Redistributions in binary form must reproduce the above copyright notice, this list of conditions and the following
disclaimer in the documentation and/or other materials provided with the distribution.
3. All advertising materials mentioning features or use of this software must display the following acknowledgement:
This product includes software developed by the University of California, Berkeley and its contributors.
4. Neither the name of the University nor the names of its contributors may be used to endorse or promote products
derived from this software without specific prior written permission.
THIS SOFTWARE IS PROVIDED BY THE REGENTS AND CONTRIBUTORS ``AS IS'' AND ANY EXPRESS OR IM-
PLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES OF MERCHANTABILI-
TY AND FITNESS FOR A PARTICULAR PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE REGENTS OR
CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSE-
QUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SER-
VICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY
THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT
LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF
THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.
Redistribution and use in source and binary forms, with or without modification, are permitted provided that the fol-
lowing conditions are met:
1. Redistributions of source code must retain the above copyright notice, this list of conditions and the following dis-
claimer.
2. Redistributions in binary form must reproduce the above copyright notice, this list of conditions and the following
disclaimer in the documentation and/or other materials provided with the distribution.
3. Neither the name of the University nor the names of its contributors may be used to endorse or promote products
derived from this software without specific prior written permission.
THIS SOFTWARE IS PROVIDED BY THE REGENTS AND CONTRIBUTORS ``AS IS'' AND ANY EXPRESS OR IM-
PLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES OF MERCHANTABILI-
TY AND FITNESS FOR A PARTICULAR PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE REGENTS OR
CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSE-
QUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SER-
VICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY
THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT
LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF
THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.
Redistribution and use in source and binary forms, with or without modification, are permitted provided that the fol-
lowing conditions are met:
1. Redistributions of source code must retain the above copyright notice, this list of conditions and the following dis-
claimer.
2. Redistributions in binary form must reproduce the above copyright notice, this list of conditions and the following
disclaimer in the documentation and/or other materials provided with the distribution.
3. Neither the name of the University nor the names of its contributors may be used to endorse or promote products
derived from this software without specific prior written permission.
THIS SOFTWARE IS PROVIDED BY THE REGENTS AND CONTRIBUTORS ``AS IS'' AND ANY EXPRESS OR IM-
PLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES OF MERCHANTABILI-
TY AND FITNESS FOR A PARTICULAR PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE REGENTS OR
1658
CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSE-
QUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SER-
VICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY
THEORY OF LIABILITY, WHETHER IN CONTRACT,STRICT
LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF
THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.
Redistribution and use in source and binary forms, with or without modification, are permitted provided that the fol-
lowing conditions are met:
1. Redistributions of source code must retain the above copyright notice, this list of conditions and the following dis-
claimer.
2. Redistributions in binary form must reproduce the above copyright notice, this list of conditions and the following
disclaimer in the documentation and/or other materials provided with the distribution.
3. Neither the name of the University nor the names of its contributors may be used to endorse or promote products
derived from this software without specific prior written permission.
THIS SOFTWARE IS PROVIDED BY THE REGENTS AND CONTRIBUTORS ``AS IS'' AND ANY EXPRESS OR IM-
PLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES OF MERCHANTABILI-
TY AND FITNESS FOR A PARTICULAR PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE REGENTS OR
CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSE-
QUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SER-
VICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY
THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE
OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POS-
SIBILITY OF SUCH DAMAGE.
Redistribution and use in source and binary forms, with or without modification, are permitted provided that the fol-
lowing conditions are met:
1. Redistributions of source code must retain the above copyright notice, this list of conditions and the following dis-
claimer.
2. Redistributions in binary form must reproduce the above copyright notice, this list of conditions and the following
disclaimer in the documentation and/or other materials provided with the distribution.
4. Neither the name of the University nor the names of its contributors may be used to endorse or promote products
derived from this software without specific prior written permission.
THIS SOFTWARE IS PROVIDED BY THE REGENTS AND CONTRIBUTORS ``AS IS'' AND ANY EXPRESS OR IM-
PLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES OF MERCHANTABILI-
TY AND FITNESS FOR A PARTICULAR PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE REGENTS OR
CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSE-
QUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SER-
VICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY
THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE
OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POS-
SIBILITY OF SUCH DAMAGE.
Redistribution and use in source and binary forms, with or without modification, are permitted provided that the fol-
lowing conditions are met:
1. Redistributions of source code must retain the above copyright notice, this list of conditions and the following dis-
claimer.
2. Redistributions in binary form must reproduce the above copyright notice, this list of conditions and the following
disclaimer in the documentation and/or other materials provided with the distribution.
3. All advertising materials mentioning features or use of this software must display the following acknowledgement:
1659
SGOS Administration Guide
This product includes software developed by the University of California, Berkeley, Intel Corporation, and its con-
tributors.
4. Neither the name of University, Intel Corporation, or their respective contributors may be used to endorse or promote
products derived from this software without specific prior written permission.
THIS SOFTWARE IS PROVIDED BY THE REGENTS, INTEL CORPORATION AND CONTRIBUTORS ``AS IS'' AND
ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES
OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE ARE DISCLAIMED. IN NO EVENT
SHALL THE REGENTS, INTEL CORPORATION OR CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT, IN-
CIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO,
PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTER-
RUPTION) HOWEVER CAUSED AND ON ANY
THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE
OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POS-
SIBILITY OF SUCH DAMAGE.
Redistribution and use in source and binary forms, with or without modification, are permitted provided that the fol-
lowing conditions are met:
1. Redistributions of source code must retain the above copyright notice, this list of conditions and the following dis-
claimer.
2. Redistributions in binary form must reproduce the above copyright notice, this list of conditions and the following
disclaimer in the documentation and/or other materials provided with the distribution.
3. Neither the name of the University nor the names of its contributors may be used to endorse or promote products
derived from this software without specific prior written permission.
THIS SOFTWARE IS PROVIDED BY THE REGENTS AND CONTRIBUTORS ``AS IS'' AND ANY EXPRESS OR IM-
PLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES OF MERCHANTABILI-
TY AND FITNESS FOR A PARTICULAR PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE REGENTS OR
CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSE-
QUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SER-
VICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY
THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT
LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF
THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.
Redistribution and use in source and binary forms, with or without modification, are permitted provided that the fol-
lowing conditions are met:
1. Redistributions of source code must retain the above copyright notice, this list of conditions and the following dis-
claimer.
2. Redistributions in binary form must reproduce the above copyright notice, this list of conditions and the following
disclaimer in the documentation and/or other materials provided with the distribution.
4. Neither the name of the University nor the names of its contributors may be used to endorse or promote products
derived from this software
without specific prior written permission.
THIS SOFTWARE IS PROVIDED BY THE REGENTS AND CONTRIBUTORS ''AS IS'' AND ANY EXPRESS OR IM-
PLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES OF MERCHANTABILI-
TY AND FITNESS FOR A PARTICULAR PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE REGENTS OR
CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSE-
QUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SER-
VICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY
THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT
LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF
THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.
Redistribution and use in source and binary forms, with or without modification, are permitted provided that the fol-
lowing conditions are met:
1. Redistributions of source code must retain the above copyright notice, this list of conditions and the following dis-
claimer.
2. Redistributions in binary form must reproduce the above copyright notice, this list of conditions and the following
disclaimer in the
documentation and/or other materials provided with the distribution.
3. All advertising materials mentioning features or use of this software must display the following acknowledgement:
This product includes software developed by the University of California, Berkeley and its contributors.
1660
4. Neither the name of the University nor the names of its contributors may be used to endorse or promote products
derived from this software
without specific prior written permission.
THIS SOFTWARE IS PROVIDED BY THE REGENTS AND CONTRIBUTORS ''AS IS'' AND ANY EXPRESS OR IM-
PLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES OF MERCHANTABILI-
TY AND FITNESS FOR A PARTICULAR PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE REGENTS OR
CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSE-
QUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SER-
VICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY
THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE
OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POS-
SIBILITY OF SUCH DAMAGE.
Redistribution and use in source and binary forms, with or without modification, are permitted provided that the fol-
lowing conditions are met:
1. Redistributions of source code must retain the above copyright notice, this list of conditions and the following dis-
claimer.
2. Redistributions in binary form must reproduce the above copyright notice, this list of conditions and the following
disclaimer in the
documentation and/or other materials provided with the distribution.
3. Neither the name of the University nor the names of its contributors may be used to endorse or promote products
derived from this software
without specific prior written permission.
THIS SOFTWARE IS PROVIDED BY THE REGENTS AND CONTRIBUTORS ''AS IS'' AND ANY EXPRESS OR IM-
PLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES OF MERCHANTABILI-
TY AND FITNESS FOR A PARTICULAR PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE REGENTS OR
CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSE-
QUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SER-
VICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY
THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE
OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POS-
SIBILITY OF SUCH DAMAGE.
Redistribution and use in source and binary forms, with or without modification, are permitted provided that the fol-
lowing conditions are met:
1. Redistributions of source code must retain the above copyright notice, this list of conditions and the following dis-
claimer.
2. Redistributions in binary form must reproduce the above copyright notice, this list of conditions and the following
disclaimer in the documentation and/or other materials provided with the distribution.
4. Neither the name of the University nor the names of its contributors may be used to endorse or promote products
derived from this software without specific prior written permission.
THIS SOFTWARE IS PROVIDED BY THE REGENTS AND CONTRIBUTORS ''AS IS'' AND ANY EXPRESS OR IM-
PLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES OF MERCHANTABILI-
TY AND FITNESS FOR A PARTICULAR PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE REGENTS OR
CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSE-
QUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SER-
VICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY
THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE
OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POS-
SIBILITY OF SUCH DAMAGE.
Redistribution and use in source and binary forms, with or without modification, are permitted provided that the fol-
lowing conditions are met:
1. Redistributions of source code must retain the above copyright notice, this list of conditions and the following dis-
claimer.
2. Redistributions in binary form must reproduce the above copyright notice, this list of conditions and the following
disclaimer in the documentation and/or other materials provided with the distribution.
4. Neither the name of the University nor the names of its contributors may be used to endorse or promote products
derived from this software without specific prior written permission.
THIS SOFTWARE IS PROVIDED BY THE REGENTS AND CONTRIBUTORS ''AS IS'' AND ANY EXPRESS OR IM-
PLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES OF MERCHANTABILI-
TY AND FITNESS FOR A PARTICULAR PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE REGENTS OR
CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSE-
1661
SGOS Administration Guide
QUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SER-
VICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY
THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE
OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POS-
SIBILITY OF SUCH DAMAGE.
Redistribution and use in source and binary forms, with or without modification, are permitted provided that the fol-
lowing conditions are met:
1. Redistributions of source code must retain the above copyright notice, this list of conditions and the following dis-
claimer.
2. Redistributions in binary form must reproduce the above copyright notice, this list of conditions and the following
disclaimer in the documentation and/or other materials provided with the distribution.
3. All advertising materials mentioning features or use of this software must display the following acknowledgement:
This product includes software developed by the University of California, Berkeley and its contributors.
4. Neither the name of the University nor the names of its contributors may be used to endorse or promote products
derived from this software
without specific prior written permission.
THIS SOFTWARE IS PROVIDED BY THE REGENTS AND CONTRIBUTORS ''AS IS'' AND ANY EXPRESS OR IM-
PLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES OF MERCHANTABILI-
TY AND FITNESS FOR A PARTICULAR PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE REGENTS OR
CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSE-
QUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SER-
VICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY
THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT
LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF
THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.
Redistribution and use in source and binary forms, with or without modification, are permitted provided that the fol-
lowing conditions are met:
1. Redistributions of source code must retain the above copyright notice, this list of conditions and the following dis-
claimer.
2. Redistributions in binary form must reproduce the above copyright notice, this list of conditions and the following
disclaimer in the documentation and/or other materials provided with the distribution.
3. All advertising materials mentioning features or use of this software must display the following acknowledgement:
This product includes software developed by the University of California, Berkeley and its contributors.
4. Neither the name of the University nor the names of its contributors may be used to endorse or promote products
derived from this software without specific prior written permission.
THIS SOFTWARE IS PROVIDED BY THE REGENTS AND CONTRIBUTORS ''AS IS'' AND ANY EXPRESS OR IM-
PLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES OF MERCHANTABILI-
TY AND FITNESS FOR A PARTICULAR PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE REGENTS OR
CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSE-
QUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SER-
VICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY
THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT
LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF
THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.
Redistribution and use in source and binary forms, with or without modification, are permitted provided that the fol-
lowing conditions are met:
1. Redistributions of source code must retain the above copyright notice, this list of conditions and the following dis-
claimer.
2. Redistributions in binary form must reproduce the above copyright notice, this list of conditions and the following
disclaimer in the documentation and/or other materials provided with the distribution.
4. Neither the name of the University nor the names of its contributors may be used to endorse or promote products
derived from this software without specific prior written permission.
THIS SOFTWARE IS PROVIDED BY THE REGENTS AND CONTRIBUTORS ''AS IS'' AND ANY EXPRESS OR IM-
1662
PLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES OF MERCHANTABILI-
TY AND FITNESS FOR A PARTICULAR PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE REGENTS OR
CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSE-
QUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SER-
VICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY
THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT
LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF
THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.
Redistribution and use in source and binary forms, with or without modification, are permitted provided that the fol-
lowing conditions are met:
1. Redistributions of source code must retain the above copyright notice, this list of conditions and the following dis-
claimer.
2. Redistributions in binary form must reproduce the above copyright notice, this list of conditions and the following
disclaimer in the
documentation and/or other materials provided with the distribution.
4. Neither the name of the University nor the names of its contributors may be used to endorse or promote products
derived from this software
without specific prior written permission.
THIS SOFTWARE IS PROVIDED BY THE REGENTS AND CONTRIBUTORS ''AS IS'' AND ANY EXPRESS OR IM-
PLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES OF MERCHANTABILI-
TY AND FITNESS FOR A PARTICULAR PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE REGENTS OR
CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSE-
QUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SER-
VICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY
THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICTLIABILITY, OR TORT (INCLUDING NEGLIGENCE OR
OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSI-
BILITY OF SUCH DAMAGE.
Redistribution and use in source and binary forms, with or without modification, are permitted provided that the fol-
lowing conditions are met:
1. Redistributions of source code must retain the above copyright notice, this list of conditions and the following dis-
claimer.
2. Redistributions in binary form must reproduce the above copyright notice, this list of conditions and the following
disclaimer in the
documentation and/or other materials provided with the distribution.
3. Neither the name of the University nor the names of its contributors may be used to endorse or promote products
derived from this software
without specific prior written permission.
THIS SOFTWARE IS PROVIDED BY THE REGENTS AND CONTRIBUTORS ''AS IS'' AND ANY EXPRESS OR IM-
PLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES OF MERCHANTABILI-
TY AND FITNESS FOR A PARTICULAR PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE REGENTS OR
CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSE-
QUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SER-
VICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY
THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE
OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POS-
SIBILITY OF SUCH DAMAGE.
Redistribution and use in source and binary forms, with or without modification, are permitted provided that the fol-
lowing conditions are met:
1. Redistributions of source code must retain the above copyright notice, this list of conditions and the following dis-
claimer.
2. Redistributions in binary form must reproduce the above copyright notice, this list of conditions and the following
disclaimer in the documentation and/or other materials provided with the distribution.
3. Neither the name of the University nor the names of its contributors may be used to endorse or promote products
derived from this software
without specific prior written permission.
THIS SOFTWARE IS PROVIDED BY THE REGENTS AND CONTRIBUTORS ''AS IS'' AND ANY EXPRESS OR IM-
PLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES OF MERCHANTABILI-
TY AND FITNESS FOR A PARTICULAR PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE REGENTS OR
1663
SGOS Administration Guide
CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSE-
QUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SER-
VICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY
THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE
OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POS-
SIBILITY OF SUCH DAMAGE.
Redistribution and use in source and binary forms, with or without modification, are permitted provided that the fol-
lowing conditions
are met:
1. Redistributions of source code must retain the above copyright notice, this list of conditions and the following dis-
claimer.
2. Redistributions in binary form must reproduce the above copyright notice, this list of conditions and the following
disclaimer in the documentation and/or other materials provided with the distribution.
3. Neither the name of the University nor the names of its contributors may be used to endorse or promote products
derived from this software
without specific prior written permission.
THIS SOFTWARE IS PROVIDED BY THE REGENTS AND CONTRIBUTORS ''AS IS'' AND ANY EXPRESS OR IM-
PLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES OF MERCHANTABILI-
TY AND FITNESS FOR A PARTICULAR PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE REGENTS OR
CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSE-
QUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SER-
VICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY
THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE
OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POS-
SIBILITY OF SUCH DAMAGE.
Redistribution and use in source and binary forms, with or without modification, are permitted provided that the fol-
lowing conditions are met:
1. Redistributions of source code must retain the above copyright notice, this list of conditions and the following dis-
claimer.
2. Redistributions in binary form must reproduce the above copyright notice, this list of conditions and the following
disclaimer in the documentation and/or other materials provided with the distribution.
3. All advertising materials mentioning features or use of this software must display the following acknowledgement:
This product includes software developed by the University of California, Berkeley and its contributors.
4. Neither the name of the University nor the names of its contributors may be used to endorse or promote products
derived from this software without specific prior written permission.
THIS SOFTWARE IS PROVIDED BY THE REGENTS AND CONTRIBUTORS ''AS IS'' AND ANY EXPRESS OR IM-
PLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES OF MERCHANTABILI-
TY AND FITNESS FOR A PARTICULAR PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE REGENTS OR
CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSE-
QUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SER-
VICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY
THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT
LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF
THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.
Redistribution and use in source and binary forms, with or without modification, are permitted provided that the fol-
lowing conditions are met:
1. Redistributions of source code must retain the above copyright notice, this list of conditions and the following dis-
claimer.
2. Redistributions in binary form must reproduce the above copyright notice, this list of conditions and the following
disclaimer in the documentation and/or other materials provided with the distribution.
3. All advertising materials mentioning features or use of this software must display the following acknowledgement:
1664
This product includes software developed by the University of California, Berkeley, Intel Corporation, and its con-
tributors.
4. Neither the name of University, Intel Corporation, or their respective contributors may be used to endorse or promote
products derived from this software without specific prior written permission.
THIS SOFTWARE IS PROVIDED BY THE REGENTS, INTEL CORPORATION AND CONTRIBUTORS ''AS IS'' AND
ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES
OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE ARE DISCLAIMED. IN NO EVENT
SHALL THE REGENTS, INTEL CORPORATION OR CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT, IN-
CIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO,
PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTER-
RUPTION) HOWEVER CAUSED AND ON ANY
THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE
OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POS-
SIBILITY OF SUCH DAMAGE.
Redistribution and use in source and binary forms, with or without modification, are permitted provided that the fol-
lowing conditions are met:
1. Redistributions of source code must retain the above copyright notice, this list of conditions and the following dis-
claimer.
2. Redistributions in binary form must reproduce the above copyright notice, this list of conditions and the following
disclaimer in the documentation and/or other materials provided with the distribution.
3. All advertising materials mentioning features or use of this software must display the following acknowledgement:
This product includes software developed by the University of California, Berkeley and its contributors.
4. Neither the name of the University nor the names of its contributors may be used to endorse or promote products
derived from this software without specific prior written permission.
THIS SOFTWARE IS PROVIDED BY THE REGENTS AND CONTRIBUTORS ``AS IS'' AND ANY EXPRESS OR IM-
PLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES OF MERCHANTABILI-
TY AND FITNESS FOR A PARTICULAR PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE REGENTS OR
CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL,EXEMPLARY, OR CONSE-
QUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS
OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON
ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING NEGLI-
GENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF
THE POSSIBILITY OF SUCH DAMAGE.
Redistribution and use in source and binary forms, with or without modification, are permitted provided that the fol-
lowing conditions are met:
1. Redistributions of source code must retain the above copyright notice, this list of conditions and the following dis-
claimer.
2. Redistributions in binary form must reproduce the above copyright notice, this list of conditions and the following
disclaimer in the documentation and/or other materials provided with the distribution.
3. Neither the name of the University nor the names of its contributors may be used to endorse or promote products
derived from this software
without specific prior written permission.
THIS SOFTWARE IS PROVIDED BY THE REGENTS AND CONTRIBUTORS ``AS IS'' AND ANY EXPRESS OR IM-
PLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES OF MERCHANTABILI-
TY AND FITNESS FOR A PARTICULAR PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE REGENTS OR
CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL,EXEMPLARY, OR CONSE-
QUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SER-
VICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY
THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE
OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POS-
SIBILITY OFSUCH DAMAGE.
Redistribution and use in source and binary forms, with or without modification, are permitted provided that the fol-
lowing conditions
are met:
1. Redistributions of source code must retain the above copyright notice, this list of conditions and the following dis-
claimer.
2. Redistributions in binary form must reproduce the above copyright notice, this list of conditions and the following
disclaimer in the documentation and/or other materials provided with the distribution.
4. Neither the name of the University nor the names of its contributors may be used to endorse or promote products
derived from this software without specific prior written permission.
1665
SGOS Administration Guide
THIS SOFTWARE IS PROVIDED BY THE REGENTS AND CONTRIBUTORS ``AS IS'' AND ANY EXPRESS OR IM-
PLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES OF MERCHANTABILI-
TY AND FITNESS FOR A PARTICULAR PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE REGENTS OR
CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSE-
QUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SER-
VICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY
THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT
LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE
OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.
Redistribution and use in source and binary forms, with or without modification, are permitted provided that the fol-
lowing conditions are met:
1. Redistributions of source code must retain the above copyright notice, this list of conditions and the following dis-
claimer.
2. Redistributions in binary form must reproduce the above copyright notice, this list of conditions and the following
disclaimer in the documentation and/or other materials provided with the distribution.
4. Neither the name of the University nor the names of its contributors may be used to endorse or promote products
derived from this software without specific prior written permission.
THIS SOFTWARE IS PROVIDED BY THE REGENTS AND CONTRIBUTORS ``AS IS'' AND ANY EXPRESS OR IM-
PLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES OF MERCHANTABILI-
TY AND FITNESS FOR A PARTICULAR PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE REGENTS OR
CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSE-
QUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SER-
VICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY
THEORY OF LIABILITY, WHETHER IN CONTRACT,STRICT
LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF
THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.
Redistribution and use in source and binary forms, with or without modification, are permitted provided that the fol-
lowing conditions are met:
1. Redistributions of source code must retain the above copyright notice, this list of conditions and the following dis-
claimer.
2. Redistributions in binary form must reproduce the above copyright notice, this list of conditions and the following
disclaimer in the documentation and/or other materials provided with the distribution.
4. Neither the name of the University nor the names of its contributors may be used to endorse or promote products
derived from this software without specific prior written permission.
THIS SOFTWARE IS PROVIDED BY THE REGENTS AND CONTRIBUTORS ``AS IS'' AND ANY EXPRESS OR IM-
PLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES OF MERCHANTABILI-
TY AND FITNESS FOR A PARTICULAR PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE REGENTS OR
CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSE-
QUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SER-
VICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY
THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICTLIABILITY, OR TORT (INCLUDING NEGLIGENCE OR
OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSI-
BILITY OF SUCH DAMAGE.
Redistribution and use in source and binary forms, with or without modification, are permitted provided that the fol-
lowing conditions are met:
1. Redistributions of source code must retain the above copyright notice, this list of conditions and the following dis-
claimer.
2. Redistributions in binary form must reproduce the above copyright notice, this list of conditions and the following
disclaimer in the documentation and/or other materials provided with the distribution.
3. All advertising materials mentioning features or use of this software must display the following acknowledgement:
This product includes software developed by the University of California, Berkeley and its contributors.
4. Neither the name of the University nor the names of its contributors may be used to endorse or promote products
derived from this software
without specific prior written permission.
THIS SOFTWARE IS PROVIDED BY THE REGENTS AND CONTRIBUTORS ``AS IS'' AND ANY EXPRESS OR IM-
PLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES OF MERCHANTABILI-
1666
TY AND FITNESS FOR A PARTICULAR PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE REGENTS OR
CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSE-
QUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SER-
VICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY
THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE
OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POS-
SIBILITY OF SUCH DAMAGE.
Redistribution and use in source and binary forms, with or without modification, are permitted provided that the fol-
lowing conditions are met:
1. Redistributions of source code must retain the above copyright notice, this list of conditions and the following dis-
claimer.
2. Redistributions in binary form must reproduce the above copyright notice, this list of conditions and the following
disclaimer in the documentation and/or other materials provided with the distribution.
3. All advertising materials mentioning features or use of this software must display the following acknowledgement:
This product includes software developed by the University of California, Berkeley and its contributors.
4. Neither the name of the University nor the names of its contributors may be used to endorse or promote products
derived from this software without specific prior written permission.
THIS SOFTWARE IS PROVIDED BY THE REGENTS AND CONTRIBUTORS ``AS IS'' AND ANY EXPRESS OR IM-
PLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES OF MERCHANTABILI-
TY AND FITNESS FOR A PARTICULAR PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE REGENTS OR
CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSE-
QUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SER-
VICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY
THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE
OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POS-
SIBILITY OF SUCH DAMAGE.
Redistribution and use in source and binary forms, with or without modification, are permitted provided that the fol-
lowing conditions are met:
1. Redistributions of source code must retain the above copyright notice, this list of conditions and the following dis-
claimer.
2. Redistributions in binary form must reproduce the above copyright notice, this list of conditions and the following
disclaimer in the documentation and/or other materials provided with the distribution.
3. All advertising materials mentioning features or use of this software must display the following acknowledgement:
This product includes software developed by the University of California, Berkeley and its contributors.
4. Neither the name of the University nor the names of its contributors may be used to endorse or promote products
derived from this software without specific prior written permission.
THIS SOFTWARE IS PROVIDED BY THE REGENTS AND CONTRIBUTORS ``AS IS'' AND ANY EXPRESS OR IM-
PLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES OF MERCHANTABILI-
TY AND FITNESS FOR A PARTICULAR PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE REGENTS OR
CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSE-
QUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SER-
VICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY
THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE
OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POS-
SIBILITY OF SUCH DAMAGE.
Redistribution and use in source and binary forms, with or without modification, are permitted provided that the fol-
lowing conditions are met:
1. Redistributions of source code must retain the above copyright notice, this list of conditions and the following dis-
claimer.
2. Redistributions in binary form must reproduce the above copyright notice, this list of conditions and the following
disclaimer in the documentation and/or other materials provided with the distribution.
3. All advertising materials mentioning features or use of this software must display the following acknowledgement:
This product includes software developed by the University of California, Berkeley and its contributors.
4. Neither the name of the University nor the names of its contributors may be used to endorse or promote products
derived from this software without specific prior written permission.
THIS SOFTWARE IS PROVIDED BY THE REGENTS AND CONTRIBUTORS ``AS IS'' AND ANY EXPRESS OR IM-
PLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES OF MERCHANTABILI-
TY AND FITNESS FOR A PARTICULAR PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE REGENTS OR
CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSE-
QUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SER-
1667
SGOS Administration Guide
VICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY
THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT
LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF
THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.
Redistribution and use in source and binary forms, with or without modification, are permitted provided that the fol-
lowing conditions are met:
1. Redistributions of source code must retain the above copyright notice, this list of conditions and the following dis-
claimer.
2. Redistributions in binary form must reproduce the above copyright notice, this list of conditions and the following
disclaimer in the documentation and/or other materials provided with the distribution.
3. All advertising materials mentioning features or use of this software must display the following acknowledgement:
This product includes software developed by the University of California, Berkeley and its contributors.
4. Neither the name of the University nor the names of its contributors may be used to endorse or promote products
derived from this software without specific prior written permission.
THIS SOFTWARE IS PROVIDED BY THE REGENTS AND CONTRIBUTORS ``AS IS'' AND ANY EXPRESS OR IM-
PLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES OF MERCHANTABILI-
TY AND FITNESS FOR A PARTICULAR PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE REGENTS OR
CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSE-
QUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SER-
VICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY
THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT
LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF
THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.
Redistribution and use in source and binary forms, with or without modification, are permitted provided that the fol-
lowing conditions are met:
1. Redistributions of source code must retain the above copyright notice, this list of conditions and the following dis-
claimer.
2. Redistributions in binary form must reproduce the above copyright notice, this list of conditions and the following
disclaimer in the documentation and/or other materials provided with the distribution.
3. All advertising materials mentioning features or use of this software must display the following acknowledgement:
This product includes software developed by the University of California, Berkeley and its contributors.
4. Neither the name of the University nor the names of its contributors may be used to endorse or promote products
derived from this software without specific prior written permission.
THIS SOFTWARE IS PROVIDED BY THE REGENTS AND CONTRIBUTORS ``AS IS'' AND ANY EXPRESS OR IM-
PLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES OF MERCHANTABILI-
TY AND FITNESS FOR A PARTICULAR PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE REGENTS OR
CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSE-
QUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SER-
VICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY
THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT
LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF
THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.
Redistribution and use in source and binary forms, with or without modification, are permitted provided that the fol-
lowing conditions are met:
1. Redistributions of source code must retain the above copyright notice, this list of conditions and the following dis-
claimer.
2. Redistributions in binary form must reproduce the above copyright notice, this list of conditions and the following
disclaimer in the documentation and/or other materials provided with the distribution.
3. Neither the name of the University nor the names of its contributors may be used to endorse or promote products
derived from this software without specific prior written permission.
THIS SOFTWARE IS PROVIDED BY THE REGENTS AND CONTRIBUTORS ``AS IS'' AND ANY EXPRESS OR IM-
PLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES OF MERCHANTABILI-
TY AND FITNESS FOR A PARTICULAR PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE REGENTS OR
CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSE-
QUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SER-
VICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY
THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE
OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POS-
SIBILITY OF SUCH DAMAGE.
1668
The Regents of the University of California. All rights reserved.
Redistribution and use in source and binary forms, with or without modification, are permitted provided that the fol-
lowing conditions are met:
1. Redistributions of source code must retain the above copyright notice, this list of conditions and the following dis-
claimer.
2. Redistributions in binary form must reproduce the above copyright notice, this list of conditions and the following
disclaimer in the documentation and/or other materials provided with the distribution.
3. All advertising materials mentioning features or use of this software must display the following acknowledgement:
This product includes software developed by the University of California, Berkeley and its contributors.
4. Neither the name of the University nor the names of its contributors may be used to endorse or promote products
derived from this software without specific prior written permission.
THIS SOFTWARE IS PROVIDED BY THE REGENTS AND CONTRIBUTORS ``AS IS'' AND ANY EXPRESS OR IM-
PLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES OF MERCHANTABILI-
TY AND FITNESS FOR A PARTICULAR PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE REGENTS OR
CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSE-
QUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SER-
VICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY
THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE
OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POS-
SIBILITY OF SUCH DAMAGE.
Redistribution and use in source and binary forms, with or without modification, are permitted provided that the fol-
lowing conditions are met:
1. Redistributions of source code must retain the above copyright notice, this list of conditions and the following dis-
claimer.
2. Redistributions in binary form must reproduce the above copyright notice, this list of conditions and the following
disclaimer in the documentation and/or other materials provided with the distribution.
3. Neither the name of the University nor the names of its contributors may be used to endorse or promote products
derived from this software without specific prior written permission.
THIS SOFTWARE IS PROVIDED BY THE REGENTS AND CONTRIBUTORS ``AS IS'' AND ANY EXPRESS OR IM-
PLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES OF MERCHANTABILI-
TY AND FITNESS FOR A PARTICULAR PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE REGENTS OR
CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSE-
QUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SER-
VICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY
THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE
OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POS-
SIBILITY OF SUCH DAMAGE.
Redistribution and use in source and binary forms, with or without modification, are permitted provided that the fol-
lowing conditions are met:
1. Redistributions of source code must retain the above copyright notice, this list of conditions and the following dis-
claimer.
2. Redistributions in binary form must reproduce the above copyright notice, this list of conditions and the following
disclaimer in the documentation and/or other materials provided with the distribution.
3. All advertising materials mentioning features or use of this software must display the following acknowledgement:
This product includes software developed by the University of California, Berkeley and its contributors.
4. Neither the name of the University nor the names of its contributors may be used to endorse or promote products
derived from this software without specific prior written permission.
THIS SOFTWARE IS PROVIDED BY THE REGENTS AND CONTRIBUTORS ``AS IS'' AND ANY EXPRESS OR IM-
PLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES OF MERCHANTABILI-
TY AND FITNESS FOR A PARTICULAR PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE REGENTS OR
CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSE-
QUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SER-
VICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY
THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE
OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POS-
SIBILITY OF SUCH DAMAGE.
1669
SGOS Administration Guide
Redistribution and use in source and binary forms, with or without modification, are permitted provided that the fol-
lowing conditions are met:
1. Redistributions of source code must retain the above copyright notice, this list of conditions and the following dis-
claimer.
2. Redistributions in binary form must reproduce the above copyright notice, this list of conditions and the following
disclaimer in the documentation and/or other materials provided with the distribution.
3. All advertising materials mentioning features or use of this software must display the following acknowledgement:
This product includes software developed by the University of California, Berkeley and its contributors.
4. Neither the name of the University nor the names of its contributors may be used to endorse or promote products
derived from this software without specific prior written permission.
THIS SOFTWARE IS PROVIDED BY THE REGENTS AND CONTRIBUTORS ``AS IS'' AND ANY EXPRESS OR IM-
PLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES OF MERCHANTABILI-
TY AND FITNESS FOR A PARTICULAR PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE REGENTS OR
CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSE-
QUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SER-
VICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY
THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT
LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE
OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.
Redistribution and use in source and binary forms, with or without modification, are permitted provided that the fol-
lowing conditions are met:
1. Redistributions of source code must retain the above copyright notice, this list of conditions and the following dis-
claimer.
2. Redistributions in binary form must reproduce the above copyright notice, this list of conditions and the following
disclaimer in the documentation and/or other materials provided with the distribution.
3. All advertising materials mentioning features or use of this software must display the following acknowledgement:
This product includes software developed by the University of California, Berkeley and its contributors.
4. Neither the name of the University nor the names of its contributors may be used to endorse or promote products
derived from this software without specific prior written permission.
THIS SOFTWARE IS PROVIDED BY THE REGENTS AND CONTRIBUTORS ``AS IS'' AND ANY EXPRESS OR IM-
PLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES OF MERCHANTABILI-
TY AND FITNESS FOR A PARTICULAR PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE REGENTS OR
CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSE-
QUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SER-
VICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY
THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT
LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE
OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.
Permission to use, copy, modify, and distribute this software for any purpose with or without fee is hereby granted,
provided that the above copyright notice and this permission notice appear in all copies, and that the name of Digital
Equipment Corporation not be used in advertising or publicity pertaining to distribution of the document or software
without specific, written prior permission.
THE SOFTWARE IS PROVIDED "AS IS" AND DIGITAL EQUIPMENT CORP. DISCLAIMS ALL WARRANTIES WITH
REGARD TO THIS SOFTWARE, INCLUDING ALL IMPLIED WARRANTIES OF MERCHANTABILITY AND FIT-
NESS. IN NO EVENT SHALL DIGITAL EQUIPMENT CORPORATION BE LIABLE FOR ANY SPECIAL, DIRECT, IN-
DIRECT, OR CONSEQUENTIAL DAMAGES OR ANY DAMAGES WHATSOEVER RESULTING FROM LOSS OF USE,
DATA OR PROFITS, WHETHER IN AN ACTION OF CONTRACT, NEGLIGENCE OR OTHER TORTIOUS ACTION,
ARISING OUT OF OR IN CONNECTION WITH THE USE OR PERFORMANCE OF THIS SOFTWARE.
Redistribution and use in source and binary forms, with or without modification, are permitted provided that the fol-
lowing conditions are met:
1. Redistributions of source code must retain the above copyright notice, this list of conditions and the following dis-
claimer.
2. Redistributions in binary form must reproduce the above copyright notice, this list of conditions and the following
disclaimer in the documentation and/or other materials provided with the distribution.
3. Neither the name of the University nor the names of its contributors may be used to endorse or promote products
derived from this software without specific prior written permission.
THIS SOFTWARE IS PROVIDED BY THE REGENTS AND CONTRIBUTORS ``AS IS'' AND ANY EXPRESS OR IM-
PLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES OF MERCHANTABILI-
TY AND FITNESS FOR A PARTICULAR PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE REGENTS OR
CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSE-
QUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SER-
1670
VICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY
THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT
LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE
OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.
Redistribution and use in source and binary forms, with or without modification, are permitted provided that the fol-
lowing conditions are met:
1. Redistributions of source code must retain the above copyright notice, this list of conditions and the following dis-
claimer.
2. Redistributions in binary form must reproduce the above copyright notice, this list of conditions and the following
disclaimer in the documentation and/or other materials provided with the distribution.
3. All advertising materials mentioning features or use of this software must display the following acknowledgement:
This product includes software developed by the University of California, Berkeley and its contributors.
4. Neither the name of the University nor the names of its contributors may be used to endorse or promote products
derived from this software without specific prior written permission.
THIS SOFTWARE IS PROVIDED BY THE REGENTS AND CONTRIBUTORS ``AS IS'' AND ANY EXPRESS OR IM-
PLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES OF MERCHANTABILI-
TY AND FITNESS FOR A PARTICULAR PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE REGENTS OR
CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL,EXEMPLARY, OR CONSE-
QUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SER-
VICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY
THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE
OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POS-
SIBILITY OF SUCH DAMAGE.
Redistribution and use in source and binary forms, with or without modification, are permitted provided that the fol-
lowing conditions are met:
1. Redistributions of source code must retain the above copyright notice, this list of conditions and the following dis-
claimer.
2. Redistributions in binary form must reproduce the above copyright notice, this list of conditions and the following
disclaimer in the documentation and/or other materials provided with the distribution.
4. Neither the name of the University nor the names of its contributors may be used to endorse or promote products
derived from this software without specific prior written permission.
THIS SOFTWARE IS PROVIDED BY THE REGENTS AND CONTRIBUTORS ``AS IS'' AND ANY EXPRESS OR IM-
PLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES OF MERCHANTABILI-
TY AND FITNESS FOR A PARTICULAR PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE REGENTS OR
CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSE-
QUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SER-
VICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY
THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE
OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POS-
SIBILITY OF SUCH DAMAGE.
Redistribution and use in source and binary forms, with or without modification, are permitted provided that the fol-
lowing conditions are met:
1. Redistributions of source code must retain the above copyright notice, this list of conditions and the following dis-
claimer.
2. Redistributions in binary form must reproduce the above copyright notice, this list of conditions and the following
disclaimer in the documentation and/or other materials provided with the distribution.
3. All advertising materials mentioning features or use of this software must display the following acknowledgement:
This product includes software developed by the University of California, Berkeley and its contributors.
4. Neither the name of the University nor the names of its contributors may be used to endorse or promote products
derived from this software without specific prior written permission.
THIS SOFTWARE IS PROVIDED BY THE REGENTS AND CONTRIBUTORS ``AS IS'' AND ANY EXPRESS OR IM-
PLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES OF MERCHANTABILI-
TY AND FITNESS FOR A PARTICULAR PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE REGENTS OR
CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSE-
QUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SER-
VICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY
THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE
OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POS-
SIBILITY OF SUCH DAMAGE.
1671
SGOS Administration Guide
Redistribution and use in source and binary forms, with or without modification, are permitted provided that the fol-
lowing conditions are met:
1. Redistributions of source code must retain the above copyright notice, this list of conditions and the following dis-
claimer.
2. Redistributions in binary form must reproduce the above copyright notice, this list of conditions and the following
disclaimer in the documentation and/or other materials provided with the distribution.
4. Neither the name of the University nor the names of its contributors may be used to endorse or promote products
derived from this software without specific prior written permission.
THIS SOFTWARE IS PROVIDED BY THE REGENTS AND CONTRIBUTORS ``AS IS'' AND ANY EXPRESS OR IM-
PLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES OF MERCHANTABILI-
TY AND FITNESS FOR A PARTICULAR PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE REGENTS OR
CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSE-
QUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SER-
VICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY
THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT
LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF
THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.
Copyright (c) 1985, 1987, 1988 The Regents of the University of California.
All rights reserved.
Redistribution and use in source and binary forms are permitted provided that the above copyright notice and this para-
graph are duplicated in all such forms and that any documentation, advertising materials, and other materials related
to such distribution and use acknowledge that the software was developed by the University of California, Berkeley.
The name of the University may not be used to endorse or promote products derived from this software without specific
prior written permission.
THIS SOFTWARE IS PROVIDED ``AS IS'' AND WITHOUT ANY EXPRESS OR IMPLIED WARRANTIES, INCLUD-
ING, WITHOUT LIMITATION, THE IMPLIED WARRANTIES OF MERCHANT[A]BILITY AND FITNESS FOR A
PARTICULAR PURPOSE.
Redistribution and use in source and binary forms, with or without modification, are permitted provided that the fol-
lowing conditions are met:
1. Redistributions of source code must retain the above copyright notice, this list of conditions and the following dis-
claimer.
2. Redistributions in binary form must reproduce the above copyright notice, this list of conditions and the following
disclaimer in the documentation and/or other materials provided with the distribution.
3. All advertising materials mentioning features or use of this software must display the following acknowledgement:
This product includes software developed by the University of California, Berkeley, Intel Corporation, and its con-
tributors.
4. Neither the name of University, Intel Corporation, or their respective contributors may be used to endorse or promote
products derived from this software without specific prior written permission.
THIS SOFTWARE IS PROVIDED BY THE REGENTS, INTEL CORPORATION AND CONTRIBUTORS ``AS IS'' AND
ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES
OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE ARE DISCLAIMED. IN NO EVENT
SHALL THE REGENTS, INTEL CORPORATION OR CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT, IN-
CIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO,
PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTER-
RUPTION) HOWEVER CAUSED AND ON ANY
THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE
OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POS-
SIBILITY OF SUCH DAMAGE.
Redistribution and use in source and binary forms, with or without modification, are permitted provided that the fol-
lowing conditions are met:
1672
1. Redistributions of source code must retain the above copyright notice, this list of conditions and the following dis-
claimer.
2. Redistributions in binary form must reproduce the above copyright notice, this list of conditions and the following
disclaimer in the documentation and/or other materials provided with the distribution.
3. All advertising materials mentioning features or use of this software must display the following acknowledgement:
This product includes software developed by the University of California, Berkeley and its contributors.
4. Neither the name of the University nor the names of its contributors may be used to endorse or promote products
derived from this software without specific prior written permission.
THIS SOFTWARE IS PROVIDED BY THE REGENTS AND CONTRIBUTORS ``AS IS'' AND ANY EXPRESS OR IM-
PLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES OF MERCHANTABILI-
TY AND FITNESS FOR A PARTICULAR PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE REGENTS OR
CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSE-
QUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SER-
VICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY
THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT
LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF
THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.
Redistribution and use in source and binary forms, with or without modification, are permitted provided that the fol-
lowing conditions are met:
1. Redistributions of source code must retain the above copyright notice, this list of conditions and the following dis-
claimer.
2. Redistributions in binary form must reproduce the above copyright notice, this list of conditions and the following
disclaimer in the documentation and/or other materials provided with the distribution.
3. All advertising materials mentioning features or use of this software must display the following acknowledgement:
This product includes software developed by the University of California, Berkeley and its contributors.
4. Neither the name of the University nor the names of its contributors may be used to endorse or promote products
derived from this software without specific prior written permission.
THIS SOFTWARE IS PROVIDED BY THE REGENTS AND CONTRIBUTORS ``AS IS'' AND ANY EXPRESS OR IM-
PLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES OF MERCHANTABILI-
TY AND FITNESS FOR A PARTICULAR PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE REGENTS OR
CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSE-
QUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SER-
VICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY
THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE
OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POS-
SIBILITY OF SUCH DAMAGE.
Permission to use, copy, modify, and distribute this software for any purpose with or without fee is hereby granted,
provided that the above copyright notice and this permission notice appear in all copies, and that the name of Digital
Equipment Corporation not be used in advertising or publicity pertaining to distribution of the document or software
without specific, written prior permission.
THE SOFTWARE IS PROVIDED "AS IS" AND DIGITAL EQUIPMENT CORP. DISCLAIMS ALL WARRANTIES WITH
REGARD TO THIS SOFTWARE, INCLUDING ALL IMPLIED WARRANTIES OF MERCHANTABILITY AND FIT-
NESS. IN NO EVENT SHALL DIGITAL EQUIPMENT CORPORATION BE LIABLE FOR ANY SPECIAL, DIRECT, IN-
DIRECT, OR CONSEQUENTIAL DAMAGES OR ANY DAMAGES WHATSOEVER RESULTING FROM LOSS OF USE,
DATA OR PROFITS, WHETHER IN AN ACTION OF CONTRACT, NEGLIGENCE OR OTHER TORTIOUS ACTION,
ARISING OUT OF OR IN CONNECTION WITH THE USE OR PERFORMANCE OF THIS SOFTWARE.
Redistribution and use in source and binary forms, with or without modification, are permitted provided that the fol-
lowing conditions are met:
1. Redistributions of source code must retain the above copyright notice, this list of conditions and the following dis-
claimer.
2. Redistributions in binary form must reproduce the above copyright notice, this list of conditions and the following
disclaimer in the documentation and/or other materials provided with the distribution.
4. Neither the name of the University nor the names of its contributors may be used to endorse or promote products
derived from this software without specific prior written permission.
THIS SOFTWARE IS PROVIDED BY THE REGENTS AND CONTRIBUTORS ``AS IS'' AND ANY EXPRESS OR IM-
PLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES OF MERCHANTABILI-
TY AND FITNESS FOR A PARTICULAR PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE REGENTS OR
CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSE-
1673
SGOS Administration Guide
QUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SER-
VICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY
THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE
OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POS-
SIBILITY OF SUCH DAMAGE.
Redistribution and use in source and binary forms, with or without modification, are permitted provided that the fol-
lowing conditions are met:
1. Redistributions of source code must retain the above copyright notice, this list of conditions and the following dis-
claimer.
2. Redistributions in binary form must reproduce the above copyright notice, this list of conditions and the following
disclaimer in the documentation and/or other materials provided with the distribution.
3. All advertising materials mentioning features or use of this software must display the following acknowledgement:
This product includes software developed by the University of California, Berkeley, Intel Corporation, and its con-
tributors.
4. Neither the name of University, Intel Corporation, or their respective contributors may be used to endorse or promote
products derived from this software without specific prior written permission.
THIS SOFTWARE IS PROVIDED BY THE REGENTS, INTEL CORPORATION AND CONTRIBUTORS ``AS IS'' AND
ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES
OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE ARE DISCLAIMED. IN NO EVENT
SHALL THE REGENTS, INTEL CORPORATION OR CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT, IN-
CIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO,
PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTER-
RUPTION) HOWEVER CAUSED AND ON ANY
THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE
OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POS-
SIBILITY OF SUCH DAMAGE.
Redistribution and use in source and binary forms, with or without modification, are permitted provided that the fol-
lowing conditions are met:
1. Redistributions of source code must retain the above copyright notice, this list of conditions and the following dis-
claimer.
2. Redistributions in binary form must reproduce the above copyright notice, this list of conditions and the following
disclaimer in the documentation and/or other materials provided with the distribution.
3. All advertising materials mentioning features or use of this software must display the following acknowledgement:
This product includes software developed by the University of California, Berkeley, Intel Corporation, and its con-
tributors.
4. Neither the name of University, Intel Corporation, or their respective contributors may be used to endorse or promote
products derived from this software without specific prior written permission.
THIS SOFTWARE IS PROVIDED BY THE REGENTS, INTEL CORPORATION AND CONTRIBUTORS ``AS IS'' AND
ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES
OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE ARE DISCLAIMED. IN NO EVENT
SHALL THE REGENTS, INTEL CORPORATION OR CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT, IN-
CIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO,
PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTER-
RUPTION) HOWEVER CAUSED AND ON ANY
THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE
OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POS-
SIBILITY OF SUCH DAMAGE. HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CON-
1674
TRACT, STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT
OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.
Redistribution and use in source and binary forms, with or without modification, are permitted provided that the fol-
lowing conditions are met:
1. Redistributions of source code must retain the above copyright notice, this list of conditions and the following dis-
claimer.
2. Redistributions in binary form must reproduce the above copyright notice, this list of conditions and the following
disclaimer in the documentation and/or other materials provided with the distribution.
3. All advertising materials mentioning features or use of this software must display the following acknowledgement:
This product includes software developed by the University of California, Berkeley and its contributors.
4. Neither the name of the University nor the names of its contributors may be used to endorse or promote products
derived from this software without specific prior written permission.
THIS SOFTWARE IS PROVIDED BY THE REGENTS AND CONTRIBUTORS ``AS IS'' AND ANY EXPRESS OR IM-
PLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES OF MERCHANTABILI-
TY AND FITNESS FOR A PARTICULAR PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE REGENTS OR
CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSE-
QUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SER-
VICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY
THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT
LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF
THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.
Redistribution and use in source and binary forms, with or without modification, are permitted provided that the fol-
lowing conditions are met:
1. Redistributions of source code must retain the above copyright notice, this list of conditions and the following dis-
claimer.
2. Redistributions in binary form must reproduce the above copyright notice, this list of conditions and the following
disclaimer in the documentation and/or other materials provided with the distribution.
3. All advertising materials mentioning features or use of this software must display the following acknowledgement:
This product includes software developed by the University of California, Berkeley, Intel Corporation, and its con-
tributors.
4. Neither the name of University, Intel Corporation, or their respective contributors may be used to endorse or promote
products derived from
this software without specific prior written permission.
THIS SOFTWARE IS PROVIDED BY THE REGENTS, INTEL CORPORATION AND CONTRIBUTORS ``AS IS'' AND
ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES
OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE ARE DISCLAIMED. IN NO EVENT
SHALL THE REGENTS, INTEL CORPORATION OR CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT, IN-
CIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO,
PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTER-
RUPTION) HOWEVER CAUSED AND ON ANY
THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE
OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POS-
SIBILITY OF SUCH DAMAGE.
Redistribution and use in source and binary forms, with or without modification, are permitted provided that the fol-
lowing conditions are met:
1. Redistributions of source code must retain the above copyright notice, this list of conditions and the following dis-
claimer.
2. Redistributions in binary form must reproduce the above copyright notice, this list of conditions and the following
disclaimer in the documentation and/or other materials provided with the distribution.
3. All advertising materials mentioning features or use of this software must display the following acknowledgement:
1675
SGOS Administration Guide
This product includes software developed by the University of California, Berkeley and its contributors.
4. Neither the name of the University nor the names of its contributors may be used to endorse or promote products
derived from this software without specific prior written permission.
THIS SOFTWARE IS PROVIDED BY THE REGENTS AND CONTRIBUTORS ``AS IS'' AND ANY EXPRESS OR IM-
PLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES OF MERCHANTABILI-
TY AND FITNESS FOR A PARTICULAR PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE REGENTS OR
CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSE-
QUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SER-
VICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY
THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE
OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POS-
SIBILITY OF SUCH DAMAGE.
Redistribution and use in source and binary forms, with or without modification, are permitted provided that the fol-
lowing conditions are met:
1. Redistributions of source code must retain the above copyright notice, this list of conditions and the following dis-
claimer.
2. Redistributions in binary form must reproduce the above copyright notice, this list of conditions and the following
disclaimer in the documentation and/or other materials provided with the distribution.
3. All advertising materials mentioning features or use of this software must display the following acknowledgement:
This product includes software developed by the University of California, Berkeley, Intel Corporation, and its con-
tributors.
4. Neither the name of University, Intel Corporation, or their respective contributors may be used to endorse or promote
products derived from
this software without specific prior written permission.
THIS SOFTWARE IS PROVIDED BY THE REGENTS, INTEL CORPORATION AND CONTRIBUTORS ``AS IS'' AND
ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES
OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE ARE DISCLAIMED. IN NO EVENT
SHALL THE REGENTS, INTEL CORPORATION OR CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT, IN-
CIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO,
PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTER-
RUPTION) HOWEVER CAUSED AND ON ANY
THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE
OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POS-
SIBILITY OF SUCH DAMAGE.
Redistribution and use in source and binary forms, with or without modification, are permitted provided that the fol-
lowing conditions are met:
1. Redistributions of source code must retain the above copyright notice, this list of conditions and the following dis-
claimer.
2. Redistributions in binary form must reproduce the above copyright notice, this list of conditions and the following
disclaimer in the documentation and/or other materials provided with the distribution.
3. All advertising materials mentioning features or use of this software must display the following acknowledgement:
This product includes software developed by the University of California, Berkeley and its contributors.
4. Neither the name of the University nor the names of its contributors may be used to endorse or promote products
derived from this software
without specific prior written permission.
THIS SOFTWARE IS PROVIDED BY THE REGENTS AND CONTRIBUTORS ``AS IS'' AND ANY EXPRESS OR IM-
PLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES OF MERCHANTABILI-
TY AND FITNESS FOR A PARTICULAR PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE REGENTS OR
CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSE-
QUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SER-
1676
VICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY
THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT
LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF
THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.
Redistribution and use in source and binary forms, with or without modification, are permitted provided that the fol-
lowing conditions are met:
1. Redistributions of source code must retain the above copyright notice, this list of conditions and the following dis-
claimer.
2. Redistributions in binary form must reproduce the above copyright notice, this list of conditions and the following
disclaimer in the documentation and/or other materials provided with the distribution.
3. All advertising materials mentioning features or use of this software must display the following acknowledgement:
This product includes software developed by the University of California, Berkeley, Intel Corporation, and its con-
tributors.
4. Neither the name of University, Intel Corporation, or their respective contributors may be used to endorse or promote
products derived from this software without specific prior written permission.
THIS SOFTWARE IS PROVIDED BY THE REGENTS, INTEL CORPORATION AND CONTRIBUTORS ``AS IS'' AND
ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES
OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE ARE DISCLAIMED. IN NO EVENT
SHALL THE REGENTS, INTEL CORPORATION OR CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT, IN-
CIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO,
PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTER-
RUPTION) HOWEVER CAUSED AND ON ANY
THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE
OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POS-
SIBILITY OF SUCH DAMAGE.
Redistribution and use in source and binary forms, with or without modification, are permitted provided that the fol-
lowing conditions are met:
1. Redistributions of source code must retain the above copyright notice, this list of conditions and the following dis-
claimer.
2. Redistributions in binary form must reproduce the above copyright notice, this list of conditions and the following
disclaimer in the documentation and/or other materials provided with the distribution.
3. All advertising materials mentioning features or use of this software must display the following acknowledgement:
This product includes software developed by the University of California, Berkeley and its contributors.
4. Neither the name of the University nor the names of its contributors may be used to endorse or promote products
derived from this software without specific prior written permission.
THIS SOFTWARE IS PROVIDED BY THE REGENTS AND CONTRIBUTORS ``AS IS'' AND ANY EXPRESS OR IM-
PLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES OF MERCHANTABILI-
TY AND FITNESS FOR A PARTICULAR PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE REGENTS OR
CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSE-
QUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SER-
VICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY
THEORY OF LIABILITY, WHETHER IN CONTRACT,STRICT
LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF
THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.
Redistribution and use in source and binary forms, with or without modification, are permitted provided that the fol-
lowing conditions are met:
1. Redistributions of source code must retain the above copyright notice, this list of conditions and the following dis-
claimer.
2. Redistributions in binary form must reproduce the above copyright notice, this list of conditions and the following
disclaimer in the documentation and/or other materials provided with the distribution.
4. Neither the name of the University nor the names of its contributors may be used to endorse or promote products
1677
SGOS Administration Guide
THIS SOFTWARE IS PROVIDED BY THE REGENTS AND CONTRIBUTORS ``AS IS'' AND ANY EXPRESS OR IM-
PLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES OF MERCHANTABILI-
TY AND FITNESS FOR A PARTICULAR PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE REGENTS OR
CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSE-
QUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SER-
VICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY
THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE
OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POS-
SIBILITY OF SUCH DAMAGE.
Redistribution and use in source and binary forms, with or without modification, are permitted provided that the fol-
lowing conditions are met:
1. Redistributions of source code must retain the above copyright notice, this list of conditions and the following dis-
claimer.
2. Redistributions in binary form must reproduce the above copyright notice, this list of conditions and the following
disclaimer in the documentation and/or other materials provided with the distribution.
3. All advertising materials mentioning features or use of this software must display the following acknowledgement:
This product includes software developed by the University of California, Berkeley and its contributors.
4. Neither the name of the University nor the names of its contributors may be used to endorse or promote products
derived from this software
without specific prior written permission.
THIS SOFTWARE IS PROVIDED BY THE REGENTS AND CONTRIBUTORS ``AS IS'' AND ANY EXPRESS OR IM-
PLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES OF MERCHANTABILI-
TY AND FITNESS FOR A PARTICULAR PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE REGENTS OR
CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSE-
QUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SER-
VICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY
THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE
OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POS-
SIBILITY OF SUCH DAMAGE.
Redistribution and use in source and binary forms, with or without modification, are permitted provided that the fol-
lowing conditions are met:
1. Redistributions of source code must retain the above copyright notice, this list of conditions and the following dis-
claimer.
2. Redistributions in binary form must reproduce the above copyright notice, this list of conditions and the following
disclaimer in the documentation and/or other materials provided with the distribution.
3. All advertising materials mentioning features or use of this software must display the following acknowledgement:
This product includes software developed by the University of California, Berkeley, Intel Corporation, and its con-
tributors.
4. Neither the name of University, Intel Corporation, or their respective contributors may be used to endorse or promote
products derived from this software without specific prior written permission.
THIS SOFTWARE IS PROVIDED BY THE REGENTS, INTEL CORPORATION AND CONTRIBUTORS ``AS IS'' AND
ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES
OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE ARE DISCLAIMED. IN NO EVENT
SHALL THE REGENTS, INTEL CORPORATION OR CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT, IN-
CIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO,
PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTER-
RUPTION) HOWEVER CAUSED AND ON ANY
THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE
OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POS-
SIBILITY OF SUCH DAMAGE.
1678
Redistribution and use in source and binary forms, with or without modification, are permitted provided that the fol-
lowing conditions are met:
1. Redistributions of source code must retain the above copyright
notice, this list of conditions and the following disclaimer.
2. Redistributions in binary form must reproduce the above copyright
notice, this list of conditions and the following disclaimer in the
documentation and/or other materials provided with the distribution.
3. All advertising materials mentioning features or use of this software
must display the following acknowledgement:
This product includes software developed by the University of
California, Berkeley and its contributors.
4. Neither the name of the University nor the names of its contributors
may be used to endorse or promote products derived from this software
without specific prior written permission.
THIS SOFTWARE IS PROVIDED BY THE REGENTS AND CONTRIBUTORS ``AS IS'' AND ANY EXPRESS OR IM-
PLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES OF MERCHANTABILI-
TY AND FITNESS FOR A PARTICULAR PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE REGENTS OR
CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSE-
QUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SER-
VICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY
THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT
LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF
THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.
Redistribution and use in source and binary forms, with or without modification, are permitted provided that the fol-
lowing conditions are met:
1. Redistributions of source code must retain the above copyright notice, this list of conditions and the following dis-
claimer.
2. Redistributions in binary form must reproduce the above copyright notice, this list of conditions and the following
disclaimer in the documentation and/or other materials provided with the distribution.
3. Neither the name of the University nor the names of its contributors may be used to endorse or promote products
derived from this software without specific prior written permission.
THIS SOFTWARE IS PROVIDED BY THE REGENTS AND CONTRIBUTORS ``AS IS'' AND ANY EXPRESS OR IM-
PLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES OF MERCHANTABILI-
TY AND FITNESS FOR A PARTICULAR PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE REGENTS OR
CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSE-
QUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SER-
VICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY
THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT
LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF
THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.
Redistribution and use in source and binary forms, with or without modification, are permitted provided that the fol-
lowing conditions are met:
1. Redistributions of source code must retain the above copyright notice, this list of conditions and the following dis-
claimer.
2. Redistributions in binary form must reproduce the above copyright notice, this list of conditions and the following
disclaimer in the documentation and/or other materials provided with the distribution.
3. Neither the name of the University nor the names of its contributors may be used to endorse or promote products
derived from this software without specific prior written permission.
THIS SOFTWARE IS PROVIDED BY THE REGENTS AND CONTRIBUTORS ``AS IS'' AND ANY EXPRESS OR IM-
PLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES OF MERCHANTABILI-
TY AND FITNESS FOR A PARTICULAR PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE REGENTS OR
CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSE-
QUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SER-
VICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY
THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE
OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POS-
SIBILITY OF SUCH DAMAGE.
1679
SGOS Administration Guide
Redistribution and use in source and binary forms, with or without modification, are permitted provided that the fol-
lowing conditions are met:
1. Redistributions of source code must retain the above copyright notice, this list of conditions and the following dis-
claimer.
2. Redistributions in binary form must reproduce the above copyright notice, this list of conditions and the following
disclaimer in the documentation and/or other materials provided with the distribution.
3. Neither the name of the University nor the names of its contributors may be used to endorse or promote products
derived from this software without specific prior written permission.
THIS SOFTWARE IS PROVIDED BY THE REGENTS AND CONTRIBUTORS ``AS IS'' AND ANY EXPRESS OR IM-
PLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES OF MERCHANTABILI-
TY AND FITNESS FOR A PARTICULAR PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE REGENTS OR
CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSE-
QUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SER-
VICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY
THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE
OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POS-
SIBILITY OF SUCH DAMAGE.
Redistribution and use in source and binary forms, with or without modification, are permitted provided that the fol-
lowing conditions are met:
1. Redistributions of source code must retain the above copyright notice, this list of conditions and the following dis-
claimer.
2. Redistributions in binary form must reproduce the above copyright notice, this list of conditions and the following
disclaimer in the documentation and/or other materials provided with the distribution.
3. Neither the name of the University nor the names of its contributors may be used to endorse or promote products
derived from this software without specific prior written permission.
THIS SOFTWARE IS PROVIDED BY THE REGENTS AND CONTRIBUTORS ``AS IS'' AND ANY EXPRESS OR IM-
PLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES OF MERCHANTABILI-
TY AND FITNESS FOR A PARTICULAR PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE REGENTS OR
CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSE-
QUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SER-
VICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY
THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE
OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POS-
SIBILITY OF SUCH DAMAGE.
Redistribution and use in source and binary forms, with or without modification, are permitted provided that the fol-
lowing conditions are met:
1. Redistributions of source code must retain the above copyright notice, this list of conditions and the following dis-
claimer.
2. Redistributions in binary form must reproduce the above copyright notice, this list of conditions and the following
disclaimer in the documentation and/or other materials provided with the distribution.
4. Neither the name of the University nor the names of its contributors may be used to endorse or promote products
derived from this software without specific prior written permission.
THIS SOFTWARE IS PROVIDED BY THE REGENTS AND CONTRIBUTORS ``AS IS'' AND ANY EXPRESS OR IM-
PLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES OF MERCHANTABILI-
TY AND FITNESS FOR A PARTICULAR PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE REGENTS OR
CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSE-
QUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SER-
VICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY
THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE
OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POS-
SIBILITY OF SUCH DAMAGE.
Redistribution and use in source and binary forms, with or without modification, are permitted provided that the fol-
lowing conditions are met:
1. Redistributions of source code must retain the above copyright notice, this list of conditions and the following dis-
claimer.
2. Redistributions in binary form must reproduce the above copyright notice, this list of conditions and the following
disclaimer in the
documentation and/or other materials provided with the distribution.
3. All advertising materials mentioning features or use of this software must display the following acknowledgement:
This product includes software developed by the University of California, Berkeley and its contributors.
4. Neither the name of the University nor the names of its contributors may be used to endorse or promote products
1680
derived from this software
without specific prior written permission.
THIS SOFTWARE IS PROVIDED BY THE REGENTS AND CONTRIBUTORS '' AS IS'' AND ANY EXPRESS OR IM-
PLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES OF MERCHANTABILI-
TY AND FITNESS FOR A PARTICULAR PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE REGENTS OR
CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSE-
QUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SER-
VICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY
THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT
LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF
THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.
Redistribution and use in source and binary forms, with or without modification, are permitted provided that the fol-
lowing conditions are met:
1. Redistributions of source code must retain the above copyright notice, this list of conditions and the following dis-
claimer.
2. Redistributions in binary form must reproduce the above copyright notice, this list of conditions and the following
disclaimer in the documentation and/or other materials provided with the distribution.
4. Neither the name of the University nor the names of its contributors may be used to endorse or promote products
derived from this software without specific prior written permission.
THIS SOFTWARE IS PROVIDED BY THE REGENTS AND CONTRIBUTORS ''AS IS'' AND ANY EXPRESS OR IM-
PLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES OF MERCHANTABILI-
TY AND FITNESS FOR A PARTICULAR PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE REGENTS OR
CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSE-
QUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SER-
VICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY
THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT
LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE
OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.
Redistribution and use in source and binary forms, with or without modification, are permitted provided that the fol-
lowing conditions are met:
1. Redistributions of source code must retain the above copyright notice, this list of conditions and the following dis-
claimer.
2. Redistributions in binary form must reproduce the above copyright notice, this list of conditions and the following
disclaimer in the documentation and/or other materials provided with the distribution.
4. Neither the name of the University nor the names of its contributors may be used to endorse or promote products
derived from this software without specific prior written permission.
THIS SOFTWARE IS PROVIDED BY THE REGENTS AND CONTRIBUTORS ``AS IS'' AND ANY EXPRESS OR IM-
PLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES OF MERCHANTABILI-
TY AND FITNESS FOR A PARTICULAR PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE REGENTS OR
CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSE-
QUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SER-
VICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY
THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT
LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF
THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.
Redistribution and use in source and binary forms, with or without modification, are permitted provided that the fol-
lowing conditions are met:
1. Redistributions of source code must retain the above copyright notice, this list of conditions and the following dis-
claimer.
2. Redistributions in binary form must reproduce the above copyright notice, this list of conditions and the following
disclaimer in the documentation and/or other materials provided with the distribution.
3. All advertising materials mentioning features or use of this software must display the following acknowledgement:
This product includes software developed by the University of California, Berkeley and its contributors.
4. Neither the name of the University nor the names of its contributors may be used to endorse or promote products
derived from this software without specific prior written permission.
THIS SOFTWARE IS PROVIDED BY THE REGENTS AND CONTRIBUTORS ``AS IS'' AND ANY EXPRESS OR IM-
PLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES OF MERCHANTABILI-
TY AND FITNESS FOR A PARTICULAR PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE REGENTS OR
CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSE-
1681
SGOS Administration Guide
QUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SER-
VICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY
THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT
LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF
THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.
Redistribution and use in source and binary forms, with or without modification, are permitted provided that the fol-
lowing conditions
are met:
1. Redistributions of source code must retain the above copyright notice, this list of conditions and the following dis-
claimer.
2. Redistributions in binary form must reproduce the above copyright notice, this list of conditions and the following
disclaimer in the documentation and/or other materials provided with the distribution.
3. All advertising materials mentioning features or use of this software must display the following acknowledgement:
This product includes software developed by the University of California, Berkeley, Intel Corporation, and its con-
tributors.
4. Neither the name of University, Intel Corporation, or their respective contributors may be used to endorse or promote
products derived from
this software without specific prior written permission.
THIS SOFTWARE IS PROVIDED BY THE REGENTS, INTEL CORPORATION AND CONTRIBUTORS ``AS IS'' AND
ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES
OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE ARE DISCLAIMED. IN NO EVENT
SHALL THE REGENTS, INTEL CORPORATION OR CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT, IN-
CIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO,
PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTER-
RUPTION) HOWEVER CAUSED AND ON ANY
THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE
OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POS-
SIBILITY OF SUCH DAMAGE.
Redistribution and use in source and binary forms, with or without modification, are permitted provided that the fol-
lowing conditions are met:
1. Redistributions of source code must retain the above copyright notice, this list of conditions and the following dis-
claimer.
2. Redistributions in binary form must reproduce the above copyright notice, this list of conditions and the following
disclaimer in the documentation and/or other materials provided with the distribution.
3. All advertising materials mentioning features or use of this software must display the following acknowledgement:
This product includes software developed by the University of California, Berkeley and its contributors.
4. Neither the name of the University nor the names of its contributors may be used to endorse or promote products
derived from this software
without specific prior written permission.
THIS SOFTWARE IS PROVIDED BY THE REGENTS AND CONTRIBUTORS ``AS IS'' AND ANY EXPRESS OR IM-
PLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES OF MERCHANTABILI-
TY AND FITNESS FOR A PARTICULAR PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE REGENTS OR
CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSE-
QUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SER-
VICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY
THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE
OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POS-
SIBILITY OF SUCH DAMAGE.
Redistribution and use in source and binary forms, with or without modification, are permitted provided that the fol-
lowing conditions are met:
1. Redistributions of source code must retain the above copyright notice, this list of conditions and the following dis-
claimer.
1682
2. Redistributions in binary form must reproduce the above copyright notice, this list of conditions and the following
disclaimer in the documentation and/or other materials provided with the distribution.
3. Neither the name of the University nor the names of its contributors may be used to endorse or promote products
derived from this software without specific prior written permission.
THIS SOFTWARE IS PROVIDED BY THE REGENTS AND CONTRIBUTORS ``AS IS'' AND ANY EXPRESS OR IM-
PLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES OF MERCHANTABILI-
TY AND FITNESS FOR A PARTICULAR PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE REGENTS OR
CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSE-
QUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SER-
VICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY
THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE
OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POS-
SIBILITY OF SUCH DAMAGE.
Redistribution and use in source and binary forms, with or without modification, are permitted provided that the fol-
lowing conditions are met:
1. Redistributions of source code must retain the above copyright notice, this list of conditions and the following dis-
claimer.
2. Redistributions in binary form must reproduce the above copyright notice, this list of conditions and the following
disclaimer in the documentation and/or other materials provided with the distribution.
3. Neither the name of the University nor the names of its contributors may be used to endorse or promote products
derived from this software without specific prior written permission.
THIS SOFTWARE IS PROVIDED BY THE REGENTS AND CONTRIBUTORS ``AS IS'' AND ANY EXPRESS OR IM-
PLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES OF MERCHANTABILI-
TY AND FITNESS FOR A PARTICULAR PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE REGENTS OR
CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSE-
QUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SER-
VICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY
THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT
LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF
THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.
Redistribution and use in source and binary forms, with or without modification, are permitted provided that the fol-
lowing conditions are met:
1. Redistributions of source code must retain the above copyright notice, this list of conditions and the following dis-
claimer.
2. Redistributions in binary form must reproduce the above copyright notice, this list of conditions and the following
disclaimer in the documentation and/or other materials provided with the distribution.
3. All advertising materials mentioning features or use of this software must display the following acknowledgement:
This product includes software developed by the University of California, Berkeley and its contributors.
4. Neither the name of the University nor the names of its contributors may be used to endorse or promote products
derived from this software without specific prior written permission.
THIS SOFTWARE IS PROVIDED BY THE REGENTS AND CONTRIBUTORS ``AS IS'' AND ANY EXPRESS OR IM-
PLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES OF MERCHANTABILI-
TY AND FITNESS FOR A PARTICULAR PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE REGENTS OR
CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSE-
QUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SER-
VICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY
THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT
LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF
THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.
Redistribution and use in source and binary forms, with or without modification, are permitted provided that the fol-
lowing conditions are met:
1. Redistributions of source code must retain the above copyright notice, this list of conditions and the following dis-
claimer.
2. Redistributions in binary form must reproduce the above copyright notice, this list of conditions and the following
disclaimer in the documentation and/or other materials provided with the distribution.
3. Neither the name of the University nor the names of its contributors may be used to endorse or promote products
derived from this software without specific prior written permission.
THIS SOFTWARE IS PROVIDED BY THE REGENTS AND CONTRIBUTORS ``AS IS'' AND ANY EXPRESS OR IM-
1683
SGOS Administration Guide
PLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES OF MERCHANTABILI-
TY AND FITNESS FOR A PARTICULAR PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE REGENTS OR
CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSE-
QUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SER-
VICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY
THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT
LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF
THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.
Redistribution and use in source and binary forms, with or without modification, are permitted provided that the fol-
lowing conditions are met:
1. Redistributions of source code must retain the above copyright notice, this list of conditions and the following dis-
claimer.
2. Redistributions in binary form must reproduce the above copyright notice, this list of conditions and the following
disclaimer in the documentation and/or other materials provided with the distribution.
3. Neither the name of the University nor the names of its contributors may be used to endorse or promote products
derived from this software
without specific prior written permission.
THIS SOFTWARE IS PROVIDED BY THE REGENTS AND CONTRIBUTORS ''AS IS'' AND ANY EXPRESS OR IM-
PLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES OF MERCHANTABILI-
TY AND FITNESS FOR A PARTICULAR PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE REGENTS OR
CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSE-
QUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SER-
VICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY
THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE
OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POS-
SIBILITY OF SUCH DAMAGE.
Redistribution and use in source and binary forms are permitted provided that the above copyright notice and this para-
graph are duplicated in all such forms and that any documentation, advertising materials, and other materials related
to such distribution and use acknowledge that the software was developed by the University of California, Berkeley.
The name of the University may not be used to endorse or promote products derived from this software without specific
prior written permission.
THIS SOFTWARE IS PROVIDED ``AS IS'' AND WITHOUT ANY EXPRESS OR IMPLIED WARRANTIES, INCLUD-
ING, WITHOUT LIMITATION, THE IMPLIED WARRANTIES OF MERCHANT[A]BILITY AND FITNESS FOR A
PARTICULAR PURPOSE.
Redistribution and use in source and binary forms, with or without modification, are permitted provided that the fol-
lowing conditions are met:
1. Redistributions of source code must retain the above copyright notice, this list of conditions and the following dis-
claimer.
2. Redistributions in binary form must reproduce the above copyright notice, this list of conditions and the following
disclaimer in the documentation and/or other materials provided with the distribution.
3. Neither the name of the University nor the names of its contributors may be used to endorse or promote products
derived from this software
without specific prior written permission.
THIS SOFTWARE IS PROVIDED BY THE REGENTS AND CONTRIBUTORS ''AS IS'' AND ANY EXPRESS OR IM-
PLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES OF MERCHANTABILI-
TY AND FITNESS FOR A PARTICULAR PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE REGENTS OR
CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSE-
QUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SER-
VICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY
THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE
OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POS-
SIBILITY OF SUCH DAMAGE.
Redistribution and use in source and binary forms, with or without modification, are permitted provided that the fol-
lowing conditions are met:
1684
1. Redistributions of source code must retain the above copyright notice, this list of conditions and the following dis-
claimer.
2. Redistributions in binary form must reproduce the above copyright notice, this list of conditions and the following
disclaimer in the documentation and/or other materials provided with the distribution.
3. Neither the name of the University nor the names of its contributors may be used to endorse or promote products
derived from this software
without specific prior written permission.
THIS SOFTWARE IS PROVIDED BY THE REGENTS AND CONTRIBUTORS ''AS IS'' AND ANY EXPRESS OR IM-
PLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES OF MERCHANTABILI-
TY AND FITNESS FOR A PARTICULAR PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE REGENTS OR
CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSE-
QUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SER-
VICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY
THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE
OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POS-
SIBILITY OF SUCH DAMAGE.
Redistribution and use in source and binary forms, with or without modification, are permitted provided that the fol-
lowing conditions
are met:
1. Redistributions of source code must retain the above copyright notice, this list of conditions and the following dis-
claimer.
2. Redistributions in binary form must reproduce the above copyright notice, this list of conditions and the following
disclaimer in the
documentation and/or other materials provided with the distribution.
3. Neither the name of the University nor the names of its contributors may be used to endorse or promote products
derived from this software
without specific prior written permission.
THIS SOFTWARE IS PROVIDED BY THE REGENTS AND CONTRIBUTORS ''AS IS'' AND ANY EXPRESS OR IM-
PLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES OF MERCHANTABILI-
TY AND FITNESS FOR A PARTICULAR PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE REGENTS OR
CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSE-
QUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SER-
VICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY
THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT
LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF
THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.
Redistribution and use in source and binary forms, with or without modification, are permitted provided that the fol-
lowing conditions are met:
1. Redistributions of source code must retain the above copyright notice, this list of conditions and the following dis-
claimer.
2. Redistributions in binary form must reproduce the above copyright notice, this list of conditions and the following
disclaimer in the
documentation and/or other materials provided with the distribution.
3. Neither the name of the University nor the names of its contributors may be used to endorse or promote products
derived from this software without specific prior written permission.
THIS SOFTWARE IS PROVIDED BY THE REGENTS AND CONTRIBUTORS ``AS IS'' AND ANY EXPRESS OR IM-
PLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES OF MERCHANTABILI-
TY AND FITNESS FOR A PARTICULAR PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE REGENTS OR
CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSE-
QUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SER-
VICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY
THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT
LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF
THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.
1685
SGOS Administration Guide
Redistribution and use in source and binary forms, with or without modification, are permitted provided that the fol-
lowing conditions are met:
1. Redistributions of source code must retain the above copyright notice, this list of conditions and the following dis-
claimer.
2. Redistributions in binary form must reproduce the above copyright notice, this list of conditions and the following
disclaimer in the documentation and/or other materials provided with the distribution.
3. All advertising materials mentioning features or use of this software must display the following acknowledgement:
This product includes software developed by the University of California, Berkeley, Intel Corporation, and its con-
tributors.
4. Neither the name of University, Intel Corporation, or their respective contributors may be used to endorse or promote
products derived from this software without specific prior written permission.
THIS SOFTWARE IS PROVIDED BY THE REGENTS, INTEL CORPORATION AND CONTRIBUTORS ``AS IS'' AND
ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES
OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE ARE DISCLAIMED. IN NO EVENT
SHALL THE REGENTS, INTEL CORPORATION OR CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT, IN-
CIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO,
PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTER-
RUPTION) HOWEVER CAUSED AND ON ANY
THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE
OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POS-
SIBILITY OF SUCH DAMAGE.
Redistribution and use in source and binary forms, with or without modification, are permitted provided that the fol-
lowing conditions
are met:
1. Redistributions of source code must retain the above copyright notice, this list of conditions and the following dis-
claimer.
2. Redistributions in binary form must reproduce the above copyright notice, this list of conditions and the following
disclaimer in the documentation and/or other materials provided with the distribution.
3. All advertising materials mentioning features or use of this software must display the following acknowledgement:
This product includes software developed by the University of California, Berkeley and its contributors.
4. Neither the name of the University nor the names of its contributors may be used to endorse or promote products
derived from this software
without specific prior written permission.
THIS SOFTWARE IS PROVIDED BY THE REGENTS AND CONTRIBUTORS ''AS IS'' AND ANY EXPRESS OR IM-
PLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES OF MERCHANTABILI-
TY AND FITNESS FOR A PARTICULAR PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE REGENTS OR
CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSE-
QUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SER-
VICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY
THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE
OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POS-
SIBILITY OF SUCH DAMAGE.
Redistribution and use in source and binary forms, with or without modification, are permitted provided that the fol-
lowing conditions are met:
1. Redistributions of source code must retain the above copyright notice, this list of conditions and the following dis-
claimer.
2. Redistributions in binary form must reproduce the above copyright notice, this list of conditions and the following
disclaimer in the documentation and/or other materials provided with the distribution.
3. Neither the name of the University nor the names of its contributors may be used to endorse or promote products
derived from this software without specific prior written permission.
THIS SOFTWARE IS PROVIDED BY THE REGENTS AND CONTRIBUTORS ``AS IS'' AND ANY EXPRESS OR IM-
PLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES OF MERCHANTABILI-
TY AND FITNESS FOR A PARTICULAR PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE REGENTS OR
CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSE-
QUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SER-
VICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY
THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE
OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POS-
SIBILITY OF SUCH DAMAGE.
1686
Copyright (c) 1989, 1993
The Regents of the University of California. All rights reserved.
Redistribution and use in source and binary forms, with or without modification, are permitted provided that the fol-
lowing conditions are met:
1. Redistributions of source code must retain the above copyright notice, this list of conditions and the following dis-
claimer.
2. Redistributions in binary form must reproduce the above copyright notice, this list of conditions and the following
disclaimer in the documentation and/or other materials provided with the distribution.
3. Neither the name of the University nor the names of its contributors may be used to endorse or promote products
derived from this software
without specific prior written permission.
THIS SOFTWARE IS PROVIDED BY THE REGENTS AND CONTRIBUTORS ''AS IS'' AND ANY EXPRESS OR IM-
PLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES OF MERCHANTABILI-
TY AND FITNESS FOR A PARTICULAR PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE REGENTS OR
CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSE-
QUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SER-
VICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY
THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE
OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POS-
SIBILITY OF SUCH DAMAGE.
Redistribution and use in source and binary forms, with or without modification, are permitted provided that the fol-
lowing conditions are met:
1. Redistributions of source code must retain the above copyright notice, this list of conditions and the following dis-
claimer.
2. Redistributions in binary form must reproduce the above copyright notice, this list of conditions and the following
disclaimer in the documentation and/or other materials provided with the distribution.
3. Neither the name of the University nor the names of its contributors may be used to endorse or promote products
derived from this software
without specific prior written permission.
THIS SOFTWARE IS PROVIDED BY THE REGENTS AND CONTRIBUTORS ''AS IS'' AND ANY EXPRESS OR IM-
PLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES OF MERCHANTABILI-
TY AND FITNESS FOR A PARTICULAR PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE REGENTS OR
CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSE-
QUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SER-
VICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY
THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE
OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POS-
SIBILITY OF SUCH DAMAGE.
Redistribution and use in source and binary forms, with or without modification, are permitted provided that the fol-
lowing conditions are met:
1. Redistributions of source code must retain the above copyright notice, this list of conditions and the following dis-
claimer.
2. Redistributions in binary form must reproduce the above copyright notice, this list of conditions and the following
disclaimer in the documentation and/or other materials provided with the distribution.
3. All advertising materials mentioning features or use of this software must display the following acknowledgement:
This product includes software developed by the University of California, Berkeley and its contributors.
4. Neither the name of the University nor the names of its contributors may be used to endorse or promote products
derived from this software
without specific prior written permission.
THIS SOFTWARE IS PROVIDED BY THE REGENTS AND CONTRIBUTORS ''AS IS'' AND ANY EXPRESS OR IM-
PLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES OF MERCHANTABILI-
TY AND FITNESS FOR A PARTICULAR PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE REGENTS OR
CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSE-
QUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SER-
VICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY
THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT
LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF
THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.
1687
SGOS Administration Guide
Redistribution and use in source and binary forms are permitted provided that the above copyright notice and this para-
graph are duplicated in all such forms and that any documentation, advertising materials, and other materials related
to such distribution and use acknowledge that the software was developed by the University of California, Berkeley.
The name of the University may not be used to endorse or promote products derived from this software without specific
prior written permission.
THIS SOFTWARE IS PROVIDED ``AS IS'' AND WITHOUT ANY EXPRESS OR IMPLIED WARRANTIES, INCLUD-
ING, WITHOUT LIMITATION, THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PAR-
TICULAR PURPOSE.
Redistribution and use in source and binary forms, with or without modification, are permitted provided that the fol-
lowing conditions are met:
1. Redistributions of source code must retain the above copyright notice, this list of conditions and the following
disclaimer.
2. Redistributions in binary form must reproduce the above copyright notice, this list of conditions and the following
disclaimer in the documentation and/or other materials provided with the distribution.
3. Neither the name of the University nor the names of its contributors may be used to endorse or promote products
derived from this software
without specific prior written permission.
THIS SOFTWARE IS PROVIDED BY THE REGENTS AND CONTRIBUTORS ''AS IS'' AND ANY EXPRESS OR IM-
PLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES OF MERCHANTABILI-
TY AND FITNESS FOR A PARTICULAR PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE REGENTS OR
CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSE-
QUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SER-
VICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY
THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT
LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF
THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.
Redistribution and use in source and binary forms, with or without modification, are permitted provided that the fol-
lowing conditions are met:
1. Redistributions of source code must retain the above copyright notice, this list of conditions and the following dis-
claimer.
2. Redistributions in binary form must reproduce the above copyright notice, this list of conditions and the following
disclaimer in the documentation and/or other materials provided with the distribution.
3. Neither the name of the University nor the names of its contributors may be used to endorse or promote products
derived from this software
without specific prior written permission.
THIS SOFTWARE IS PROVIDED BY THE REGENTS AND CONTRIBUTORS ''AS IS'' AND ANY EXPRESS OR IM-
PLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES OF MERCHANTABILI-
TY AND FITNESS FOR A PARTICULAR PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE REGENTS OR
CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSE-
QUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SER-
VICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY
THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE
OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POS-
SIBILITY OF SUCH DAMAGE.
Permission to use, copy, modify, and distribute this software and its documentation for any purpose and without fee is
hereby granted, provided that the above copyright notice appears in all copies and that both that copyright notice and
this permission notice appear in supporting documentation, and that the name of The University of Michigan not be
used in advertising or publicity pertaining to distribution of the software without specific, written prior permission. This
software is supplied as is without expressed or implied warranties of any kind.
1688
Research Systems Unix Group
The University of Michigan
c/o Mike Clark
535 W. William Street
Ann Arbor, Michigan
+1-313-763-0525
[email protected]
Redistribution and use in source and binary forms, with or without modification, are permitted provided that the fol-
lowing conditions are met:
1. Redistributions of source code must retain the above copyright notice, this list of conditions and the following dis-
claimer.
2. Redistributions in binary form must reproduce the above copyright notice, this list of conditions and the following
disclaimer in the documentation and/or other materials provided with the distribution.
3. Neither the name of the University nor the names of its contributors may be used to endorse or promote products
derived from this software without specific prior written permission.
THIS SOFTWARE IS PROVIDED BY THE REGENTS AND CONTRIBUTORS ''AS IS'' AND ANY EXPRESS OR IM-
PLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES OF MERCHANTABILI-
TY AND FITNESS FOR A PARTICULAR PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE REGENTS OR
CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSE-
QUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SER-
VICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY
THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE
OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POS-
SIBILITY OF SUCH DAMAGE.
Redistribution and use in source and binary forms, with or without modification, are permitted provided that the fol-
lowing conditions are met:
1. Redistributions of source code must retain the above copyright notice, this list of conditions and the following dis-
claimer.
2. Redistributions in binary form must reproduce the above copyright notice, this list of conditions and the following
disclaimer in the documentation and/or other materials provided with the distribution.
3. Neither the name of the University nor the names of its contributors may be used to endorse or promote products
derived from this software
without specific prior written permission.
THIS SOFTWARE IS PROVIDED BY THE REGENTS AND CONTRIBUTORS ''AS IS'' AND ANY EXPRESS OR IM-
PLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES OF MERCHANTABILI-
TY AND FITNESS FOR A PARTICULAR PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE REGENTS OR
CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSE-
QUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SER-
VICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY
THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE
OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POS-
SIBILITY OF SUCH DAMAGE.
Redistribution and use in source and binary forms, with or without modification, are permitted provided that the fol-
lowing conditions are met:
1. Redistributions of source code must retain the above copyright notice, this list of conditions and the following dis-
claimer.
2. Redistributions in binary form must reproduce the above copyright notice, this list of conditions and the following
1689
SGOS Administration Guide
disclaimer in the documentation and/or other materials provided with the distribution.
3. Neither the name of the University nor the names of its contributors may be used to endorse or promote products
derived from this software
without specific prior written permission.
THIS SOFTWARE IS PROVIDED BY THE REGENTS AND CONTRIBUTORS ''AS IS'' AND ANY EXPRESS OR IM-
PLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES OF MERCHANTABILI-
TY AND FITNESS FOR A PARTICULAR PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE REGENTS OR
CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSE-
QUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SER-
VICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY
THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT
LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF
THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.
Redistribution and use in source and binary forms, with or without modification, are permitted provided that the fol-
lowing conditions are met:
1. Redistributions of source code must retain the above copyright notice, this list of conditions and the following dis-
claimer.
2. Redistributions in binary form must reproduce the above copyright notice, this list of conditions and the following
disclaimer in the documentation and/or other materials provided with the distribution.
4. Neither the name of the University nor the names of its contributors may be used to endorse or promote products
derived from this software
without specific prior written permission.
THIS SOFTWARE IS PROVIDED BY THE REGENTS AND CONTRIBUTORS ``AS IS'' AND ANY EXPRESS OR IM-
PLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES OF MERCHANTABILI-
TY AND FITNESS FOR A PARTICULAR PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE REGENTS OR
CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSE-
QUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SER-
VICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY
THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT
LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF
THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.
Redistribution and use in source and binary forms, with or without modification, are permitted provided that the fol-
lowing conditions are met:
1. Redistributions of source code must retain the above copyright notice, this list of conditions and the following dis-
claimer.
2. Redistributions in binary form must reproduce the above copyright notice, this list of conditions and the following
disclaimer in the documentation and/or other materials provided with the distribution.
3. All advertising materials mentioning features or use of this software must display the following acknowledgement:
This product includes software developed by the University of California, Berkeley and its contributors.
4. Neither the name of the University nor the names of its contributors may be used to endorse or promote products
derived from this software without specific prior written permission.
THIS SOFTWARE IS PROVIDED BY THE REGENTS AND CONTRIBUTORS ''AS IS'' AND ANY EXPRESS OR IM-
PLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES OF MERCHANTABILI-
TY AND FITNESS FOR A PARTICULAR PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE REGENTS OR
CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSE-
QUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SER-
VICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY
THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT
LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF
THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.
Redistribution and use in source and binary forms, with or without modification, are permitted provided that the fol-
lowing conditions are met:
1. Redistributions of source code must retain the above copyright notice, this list of conditions and the following dis-
claimer.
2. Redistributions in binary form must reproduce the above copyright notice, this list of conditions and the following
1690
disclaimer in the documentation and/or other materials provided with the distribution.
3. Neither the name of the University nor the names of its contributors may be used to endorse or promote products
derived from this software without specific prior written permission.
THIS SOFTWARE IS PROVIDED BY THE REGENTS AND CONTRIBUTORS ''AS IS'' AND ANY EXPRESS OR IM-
PLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES OF MERCHANTABILI-
TY AND FITNESS FOR A PARTICULAR PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE REGENTS OR
CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSE-
QUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SER-
VICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY
THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE
OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POS-
SIBILITY OF SUCH DAMAGE.
Redistribution and use in source and binary forms, with or without modification, are permitted provided that the fol-
lowing conditions are met:
1. Redistributions of source code must retain the above copyright notice, this list of conditions and the following dis-
claimer.
2. Redistributions in binary form must reproduce the above copyright notice, this list of conditions and the following
disclaimer in the documentation and/or other materials provided with the distribution.
3. Neither the name of the University nor the names of its contributors may be used to endorse or promote products
derived from this software
without specific prior written permission.
THIS SOFTWARE IS PROVIDED BY THE REGENTS AND CONTRIBUTORS ``AS IS'' AND ANY EXPRESS OR IM-
PLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES OF MERCHANTABILI-
TY AND FITNESS FOR A PARTICULAR PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE REGENTS OR
CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSE-
QUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SER-
VICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY
THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE
OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POS-
SIBILITY OF SUCH DAMAGE.
Redistribution and use in source and binary forms, with or without modification, are permitted provided that the fol-
lowing conditions are met:
- Redistributions of source code must retain the above copyright notice, this list of conditions and the following dis-
claimer.
- Redistributions in binary form must reproduce the above copyright notice, this list of conditions and the following
disclaimer in the documentation and/or other materials provided with the distribution.
- Neither the name of the University nor the names of its contributors may be used to endorse or promote products
derived from this software
without specific prior written permission.
THIS SOFTWARE IS PROVIDED BY THE COPYRIGHT HOLDERS AND CONTRIBUTORS "AS IS" AND ANY EX-
PRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES OF MER-
CHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE
COPYRIGHT HOLDERS OR CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL,
EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUB-
STITUTE GOODS OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER
CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT (IN-
CLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN
IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.
Redistribution and use in source and binary forms, with or without modification, are permitted provided that the fol-
lowing conditions are met:
1. Redistributions of source code must retain the above copyright notice, this list of conditions and the following dis-
claimer.
2. Redistributions in binary form must reproduce the above copyright notice, this list of conditions and the following
disclaimer in the documentation and/or other materials provided with the distribution.
3. Neither the name of the University nor the names of its contributors may be used to endorse or promote products
derived from this software without specific prior written permission.
THIS SOFTWARE IS PROVIDED BY THE REGENTS AND CONTRIBUTORS ''AS IS'' AND ANY EXPRESS OR IM-
PLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES OF MERCHANTABILI-
TY AND FITNESS FOR A PARTICULAR PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE REGENTS OR
1691
SGOS Administration Guide
CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSE-
QUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SER-
VICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY
THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE
OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POS-
SIBILITY OF SUCH DAMAGE.
Redistribution and use in source and binary forms, with or without modification, are permitted provided that the fol-
lowing conditions are met:
1. Redistributions of source code must retain the above copyright notice, this list of conditions and the following dis-
claimer.
2. Redistributions in binary form must reproduce the above copyright notice, this list of conditions and the following
disclaimer in the documentation and/or other materials provided with the distribution.
3. Neither the name of the University nor the names of its contributors may be used to endorse or promote products
derived from this software without specific prior written permission.
THIS SOFTWARE IS PROVIDED BY THE REGENTS AND CONTRIBUTORS ''AS IS'' AND ANY EXPRESS OR IM-
PLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES OF MERCHANTABILI-
TY AND FITNESS FOR A PARTICULAR PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE REGENTS OR
CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSE-
QUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SER-
VICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY
THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT
LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF
THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.
Permission to use, copy, modify and distribute this software and its documentation is hereby granted, provided that
both the copyright notice and this permission notice appear in all copies of the software, derivative works or modified
versions, and any portions thereof, and that both notices appear in supporting documentation.
CARNEGIE MELLON ALLOWS FREE USE OF THIS SOFTWARE IN ITS "AS IS" CONDITION.
CARNEGIE MELLON DISCLAIMS ANY LIABILITY OF ANY KIND FOR ANY DAMAGES WHATSOEVER RESULT-
ING FROM THE USE OF THIS SOFTWARE.
Any improvements or extensions that they make and grant Carnegie Mellon the rights to redistribute these changes.
Redistribution and use in source and binary forms, with or without modification, are permitted provided that the fol-
lowing conditions are met:
1. Redistributions of source code must retain the above copyright notice, this list of conditions and the following dis-
claimer.
2. Redistributions in binary form must reproduce the above copyright notice, this list of conditions and the following
disclaimer in the documentation and/or other materials provided with the distribution.
3. All advertising materials mentioning features or use of this software must display the following acknowledgement:
This product includes software developed by the University of California, Berkeley and its contributors.
4. Neither the name of the University nor the names of its contributors may be used to endorse or promote products
derived from this software without specific prior written permission.
THIS SOFTWARE IS PROVIDED BY THE REGENTS AND CONTRIBUTORS ``AS IS'' AND ANY EXPRESS OR IM-
PLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES OF MERCHANTABILI-
TY AND FITNESS FOR A PARTICULAR PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE REGENTS OR
CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSE-
QUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SER-
VICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY
THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT
LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF
THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.
1692
Copyright (c) 1991, 1993
The Regents of the University of California. All rights reserved.
Redistribution and use in source and binary forms, with or without modification, are permitted provided that the fol-
lowing conditions are met:
1. Redistributions of source code must retain the above copyright notice, this list of conditions and the following dis-
claimer.
2. Redistributions in binary form must reproduce the above copyright notice, this list of conditions and the following
disclaimer in the documentation and/or other materials provided with the distribution.
3. Neither the name of the University nor the names of its contributors may be used to endorse or promote products
derived from this software without specific prior written permission.
THIS SOFTWARE IS PROVIDED BY THE REGENTS AND CONTRIBUTORS ``AS IS'' AND ANY EXPRESS OR IM-
PLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES OF MERCHANTABILI-
TY AND FITNESS FOR A PARTICULAR PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE REGENTS OR
CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSE-
QUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SER-
VICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY
THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE
OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POS-
SIBILITY OF SUCH DAMAGE.
Redistribution and use in source and binary forms, with or without modification, are permitted provided that the fol-
lowing conditions are met:
1. Redistributions of source code must retain the above copyright notice, this list of conditions and the following dis-
claimer.
2. Redistributions in binary form must reproduce the above copyright notice, this list of conditions and the following
disclaimer in the documentation and/or other materials provided with the distribution.
3. Neither the name of the University nor the names of its contributors may be used to endorse or promote products
derived from this software
without specific prior written permission.
THIS SOFTWARE IS PROVIDED BY THE REGENTS AND CONTRIBUTORS ''AS IS'' AND ANY EXPRESS OR IM-
PLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES OF MERCHANTABILI-
TY AND FITNESS FOR A PARTICULAR PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE REGENTS OR
CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSE-
QUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SER-
VICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY
THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE
OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POS-
SIBILITY OF SUCH DAMAGE.
Redistribution and use in source and binary forms, with or without modification, are permitted provided that the fol-
lowing conditions are met:
1. Redistributions of source code must retain the above copyright notice, this list of conditions and the following dis-
claimer.
2. Redistributions in binary form must reproduce the above copyright notice, this list of conditions and the following
disclaimer in the documentation and/or other materials provided with the distribution.
THIS SOFTWARE IS PROVIDED BY THE REGENTS AND CONTRIBUTORS ``AS IS'' AND ANY EXPRESS OR IM-
PLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES OF MERCHANTABILI-
TY AND FITNESS FOR A PARTICULAR PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE REGENTS OR
CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSE-
QUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SER-
VICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY
THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE
OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POS-
SIBILITY OF SUCH DAMAGE.
Redistribution and use in source and binary forms, with or without modification, are permitted provided that the fol-
lowing conditions are met:
1. Redistributions of source code must retain the above copyright notice, this list of conditions and the following dis-
claimer.
2. Redistributions in binary form must reproduce the above copyright notice, this list of conditions and the following
disclaimer in the documentation and/or other materials provided with the distribution.
3. Neither the name of the University nor the names of its contributors may be used to endorse or promote products
1693
SGOS Administration Guide
THIS SOFTWARE IS PROVIDED BY THE REGENTS AND CONTRIBUTORS ''AS IS'' AND ANY EXPRESS OR IM-
PLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES OF MERCHANTABILI-
TY AND FITNESS FOR A PARTICULAR PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE REGENTS OR
CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSE-
QUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SER-
VICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY
THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE
OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POS-
SIBILITY OF SUCH DAMAGE.
Derived from hp300 version by Mike Hibler, this version by William Jolitz uses a recursive map [a pde points to the page
directory] to map the page tables using the pagetables themselves. This is done to reduce the impact on kernel virtual
memory for lots of sparse address space, and to reduce the cost of memory to each process.
Redistribution and use in source and binary forms, with or without modification, are permitted provided that the fol-
lowing conditions are met:
1. Redistributions of source code must retain the above copyright notice, this list of conditions and the following dis-
claimer.
2. Redistributions in binary form must reproduce the above copyright notice, this list of conditions and the following
disclaimer in the documentation and/or other materials provided with the distribution.
3. Neither the name of the University nor the names of its contributors may be used to endorse or promote products
derived from this software
without specific prior written permission.
THIS SOFTWARE IS PROVIDED BY THE REGENTS AND CONTRIBUTORS ''AS IS'' AND ANY EXPRESS OR IM-
PLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES OF MERCHANTABILI-
TY AND FITNESS FOR A PARTICULAR PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE REGENTS OR
CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSE-
QUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SER-
VICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY
THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT
LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF
THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.
Redistribution and use in source and binary forms, with or without modification, are permitted provided that the fol-
lowing conditions are met:
1. Redistributions of source code must retain the above copyright notice, this list of conditions and the following dis-
claimer.
2. Neither the name of the University nor the names of its contributors may be used to endorse or promote products
derived from this software
without specific prior written permission.
THIS SOFTWARE IS PROVIDED BY THE REGENTS AND CONTRIBUTORS ``AS IS'' AND ANY EXPRESS OR IM-
PLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES OF MERCHANTABILI-
TY AND FITNESS FOR A PARTICULAR PURPOSE ARE DISCLAIMED IN NO EVENT SHALL THE REGENTS OR
CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSE-
QUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SER-
VICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY
THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT
LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF
THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.
Redistribution and use in source and binary forms, with or without modification, are permitted provided that the fol-
lowing conditions are met:
1. Redistributions of source code must retain the above copyright notice, this list of conditions and the following dis-
claimer.
2. Redistributions in binary form must reproduce the above copyright notice, this list of conditions and the following
disclaimer in the documentation and/or other materials provided with the distribution.
3. All advertising materials mentioning features or use of this software must display the following acknowledgement:
This product includes software developed by the University of California, Berkeley and its contributors.
4. Neither the name of the University nor the names of its contributors may be used to endorse or promote products
derived from this software without specific prior written permission.
1694
THIS SOFTWARE IS PROVIDED BY THE REGENTS AND CONTRIBUTORS ``AS IS'' AND ANY EXPRESS OR IM-
PLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES OF MERCHANTABILI-
TY AND FITNESS FOR A PARTICULAR PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE REGENTS OR
CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSE-
QUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SER-
VICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY
THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT
LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF
THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.
All advertising materials mentioning features or use of this software must display the following acknowledgement:
This product includes software developed by the University of California, Lawrence Berkeley Laboratory.
Redistribution and use in source and binary forms, with or without modification, are permitted provided that the fol-
lowing conditions are met:
1. Redistributions of source code must retain the above copyright notice, this list of conditions and the following dis-
claimer.
2. Redistributions in binary form must reproduce the above copyright notice, this list of conditions and the following
disclaimer in the documentation and/or other materials provided with the distribution.
3. Neither the name of the University nor the names of its contributors may be used to endorse or promote products
derived from this software without specific prior written permission.
THIS SOFTWARE IS PROVIDED BY THE REGENTS AND CONTRIBUTORS ''AS IS'' AND ANY EXPRESS OR IM-
PLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES OF MERCHANTABILI-
TY AND FITNESS FOR A PARTICULAR PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE REGENTS OR
CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSE-
QUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SER-
VICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY
THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE
OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POS-
SIBILITY OF SUCH DAMAGE.
Redistribution and use in source and binary forms, with or without modification, are permitted provided that the fol-
lowing conditions are met:
1. Redistributions of source code must retain the above copyright notice, this list of conditions and the following dis-
claimer.
2. Neither the name of the University nor the names of its contributors may be used to endorse or promote products
derived from this software without specific prior written permission.
THIS SOFTWARE IS PROVIDED BY THE REGENTS AND CONTRIBUTORS ''AS IS'' AND ANY EXPRESS OR IM-
PLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES OF MERCHANTABILI-
TY AND FITNESS FOR A PARTICULAR PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE REGENTS OR
CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSE-
QUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SER-
VICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY
THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE
OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE,EVEN IF ADVISED OF THE POS-
SIBILITY OF SUCH DAMAGE.
Redistribution and use in source and binary forms, with or without modification, are permitted provided that the fol-
lowing conditions are met:
1. Redistributions of source code must retain the above copyright notice, this list of conditions and the following dis-
claimer.
2. Redistributions in binary form must reproduce the above copyright notice, this list of conditions and the following
disclaimer in the documentation and/or other materials provided with the distribution.
3. Neither the name of the University nor the names of its contributors may be used to endorse or promote products
derived from this software without specific prior written permission.
THIS SOFTWARE IS PROVIDED BY THE REGENTS AND CONTRIBUTORS ''AS IS'' AND ANY EXPRESS OR IM-
PLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES OF MERCHANTABILI-
TY AND FITNESS FOR A PARTICULAR PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE REGENTS OR
CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSE-
QUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SER-
1695
SGOS Administration Guide
VICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY
THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE
OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POS-
SIBILITY OF SUCH DAMAGE.
Redistribution and use in source and binary forms, with or without modification, are permitted provided that the fol-
lowing conditions are met:
1. Redistributions of source code must retain the above copyright notice, this list of conditions and the following dis-
claimer.
2. Redistributions in binary form must reproduce the above copyright notice, this list of conditions and the following
disclaimer in the documentation and/or other materials provided with the distribution.
3. Neither the name of the University nor the names of its contributors may be used to endorse or promote products
derived from this software
without specific prior written permission.
THIS SOFTWARE IS PROVIDED BY THE REGENTS AND CONTRIBUTORS ``AS IS'' AND ANY EXPRESS OR IM-
PLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES OF MERCHANTABILI-
TY AND FITNESS FOR A PARTICULAR PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE REGENTS OR
CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSE-
QUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SER-
VICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY
THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE
OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POS-
SIBILITY OF SUCH DAMAGE.
Redistribution and use in source forms, with and without modification, are permitted provided that this entire comment
appears intact.
Redistribution and use in source and binary forms, with or without modification, are permitted provided that the fol-
lowing conditions are met:
1. Redistributions of source code must retain the above copyright notice, this list of conditions and the following dis-
claimer.
2. Redistributions in binary form must reproduce the above copyright notice, this list of conditions and the following
disclaimer in the documentation and/or other materials provided with the distribution.
3. All advertising materials mentioning features or use of this software must display the following acknowledgement:
This product includes software developed by the University of California, Berkeley and its contributors.
4. Neither the name of the University nor the names of its contributors may be used to endorse or promote products
derived from this software without specific prior written permission.
THIS SOFTWARE IS PROVIDED BY THE REGENTS AND CONTRIBUTORS ''AS IS'' AND ANY EXPRESS OR IM-
PLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES OF MERCHANTABILI-
TY AND FITNESS FOR A PARTICULAR PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE REGENTS OR
CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSE-
QUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SER-
VICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY
THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT
LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF
THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.
Redistribution and use in source and binary forms, with or without modification, are permitted provided that the fol-
lowing conditions are met:
1. Redistributions of source code must retain the above copyright notice, this list of conditions and the following dis-
claimer.
2. Redistributions in binary form must reproduce the above copyright notice, this list of conditions and the following
disclaimer in the documentation and/or other materials provided with the distribution.
3. Neither the name of the University nor the names of its contributors may be used to endorse or promote products
derived from this software without specific prior written permission.
THIS SOFTWARE IS PROVIDED BY THE REGENTS AND CONTRIBUTORS ``AS IS'' AND ANY EXPRESS OR IM-
1696
PLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES OF MERCHANTABILI-
TY AND FITNESS FOR A PARTICULAR PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE REGENTS OR
CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSE-
QUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SER-
VICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY
THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT
LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF
THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.
Redistribution and use in source and binary forms, with or without modification, are permitted provided that the fol-
lowing conditions are met:
1. Redistributions of source code must retain the above copyright notice, this list of conditions and the following dis-
claimer.
2. Redistributions in binary form must reproduce the above copyright notice, this list of conditions and the following
disclaimer in the documentation and/or other materials provided with the distribution.
3. The name of the author may not be used to endorse or promote products derived from this software without specific
prior written permission.
THIS SOFTWARE IS PROVIDED BY THE AUTHOR ``AS IS'' AND ANY EXPRESS OR IMPLIED WARRANTIES, IN-
CLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A
PARTICULAR PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE AUTHOR BE LIABLE FOR ANY DIRECT,
INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT
LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR
BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CON-
TRACT, STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT
OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.
Permission to use, copy, modify and distribute this software and its documentation is hereby granted, provided that
both the copyright notice and this permission notice appear in all copies of the software, derivative works or modified
versions, and any portions thereof, and that both notices appear in supporting documentation.
CARNEGIE MELLON ALLOWS FREE USE OF THIS SOFTWARE IN ITS "AS IS" CONDITION. CARNEGIE MELLON
DISCLAIMS ANY LIABILITY OF ANY KIND FOR ANY DAMAGES WHATSOEVER RESULTING FROM THE USE OF
THIS SOFTWARE.
any improvements or extensions that they make and grant Carnegie the rights to redistribute these changes.
Redistribution and use in source and binary forms, with or without modification, are permitted provided that the fol-
lowing conditions are met:
1. Redistributions of source code must retain the above copyright notice, this list of conditions and the following dis-
claimer.
2. Redistributions in binary form must reproduce the above copyright notice, this list of conditions and the following
disclaimer in the documentation and/or other materials provided with the distribution.
3. All advertising materials mentioning features or use of this software must display the following acknowledgement:
This product includes software developed by the RiscBSD team.
4. The name "RiscBSD" nor the name of the author may be used to endorse or promote products derived from this soft-
ware without specific prior written permission.
THIS SOFTWARE IS PROVIDED BY RISCBSD ''AS IS'' AND ANY EXPRESS OR IMPLIED WARRANTIES, INCLUD-
ING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PAR-
TICULAR PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL RISCBSD OR CONTRIBUTORS BE LIABLE FOR
ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUD-
ING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, DATA, OR
PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER
IN CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY
WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.
1697
SGOS Administration Guide
Redistribution and use in source and binary forms, with or without modification, are permitted provided that the fol-
lowing conditions are met:
1. Redistributions of source code must retain the above copyright notice, this list of conditions and the following dis-
claimer.
2. Redistributions in binary form must reproduce the above copyright notice, this list of conditions and the following
disclaimer in the documentation and/or other materials provided with the distribution.
3. The name of the author may not be used to endorse or promote products derived from this software without specific
prior written permission.
THIS SOFTWARE IS PROVIDED BY THE AUTHOR AND CONTRIBUTORS ``AS IS'' AND ANY EXPRESS OR IM-
PLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES OF MERCHANTABILI-
TY AND FITNESS FOR A PARTICULAR PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE AUTHOR OR
CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSE-
QUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SER-
VICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY
THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE
OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POS-
SIBILITY OF SUCH DAMAGE.
Redistribution and use in source and binary forms, with or without modification, are permitted provided that the fol-
lowing conditions are met:
1. Redistributions of source code must retain the above copyright notice, this list of conditions and the following dis-
claimer.
2. Redistributions in binary form must reproduce the above copyright notice, this list of conditions and the following
disclaimer in the documentation and/or other materials provided with the distribution.
THIS SOFTWARE IS PROVIDED BY THE NETBSD FOUNDATION, INC. AND CONTRIBUTORS ''AS IS'' AND ANY
EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES OF
MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL
THE FOUNDATION OR CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EX-
EMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTI-
TUTE GOODS OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER
CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT (IN-
CLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN
IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.
Redistribution and use in source and binary forms, with or without modification, are permitted provided that the fol-
lowing conditions are met:
1. Redistributions of source code must retain the above copyright notice, this list of conditions and the following dis-
claimer.
2. Redistributions in binary form must reproduce the above copyright notice, this list of conditions and the following
disclaimer in the documentation and/or other materials provided with the distribution.
THIS SOFTWARE IS PROVIDED BY THE CONTRIBUTORS ''AS IS'' AND ANY EXPRESS OR IMPLIED WARRAN-
TIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS
FOR A PARTICULAR PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE REGENTS OR CONTRIBUTORS
BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAM-
AGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF
USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY OF LIA-
BILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE)
ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH
DAMAGE.
Redistribution and use in source and binary forms, with or without modification, are permitted provided that the fol-
lowing conditions are met:
1. Redistributions of source code must retain the above copyright notice, this list of conditions and the following dis-
claimer.
2. Redistributions in binary form must reproduce the above copyright notice, this list of conditions and the following
disclaimer in the documentation and/or other materials provided with the distribution.
3. All advertising materials mentioning features or use of this software must display the following acknowledgement:
This product includes software developed by (name).
4. The name of the author may not be used to endorse or promote products derived from this software without specific
1698
prior written permission.
THIS SOFTWARE IS PROVIDED BY THE AUTHOR AND CONTRIBUTORS ''AS IS'' AND ANY EXPRESS OR IM-
PLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES OF MERCHANTABILI-
TY AND FITNESS FOR A PARTICULAR PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE AUTHOR OR
CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSE-
QUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SER-
VICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY
THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT
LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF
THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.
Redistribution and use in source and binary forms, with or without modification, are permitted provided that the fol-
lowing conditions are met:
1. Redistributions of source code must retain the above copyright notice, this list of conditions and the following dis-
claimer.
2. Redistributions in binary form must reproduce the above copyright notice, this list of conditions and the following
disclaimer in the documentation and/or other materials provided with the distribution.
3. All advertising materials mentioning features or use of this software must display the following acknowledgement:
This product includes software developed by Henrik Vestergaard Draboel.
4. The name of the author may not be used to endorse or promote products derived from this software without specific
prior written permission.
THIS SOFTWARE IS PROVIDED BY THE AUTHOR AND CONTRIBUTORS ``AS IS'' AND ANY EXPRESS OR IM-
PLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES OF MERCHANTABILI-
TY AND FITNESS FOR A PARTICULAR PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE AUTHOR OR
CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSE-
QUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SER-
VICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY
THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT
LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF
THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.
Redistribution and use in source and binary forms, with or without modification, are permitted provided that the fol-
lowing conditions are met:
1. Redistributions of source code must retain the above copyright notice, this list of conditions and the following dis-
claimer.
2. Redistributions in binary form must reproduce the above copyright notice, this list of conditions and the following
disclaimer in the documentation and/or other materials provided with the distribution.
3. All advertising materials mentioning features or use of this software must display the following acknowledgement:
This product includes software developed by Brini.
4. The name of the company nor the name of the author may be used to endorse or promote products derived from this
software without specific prior written permission.
THIS SOFTWARE IS PROVIDED BY BRINI ``AS IS'' AND ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING,
BUT NOT LIMITED TO, THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICU-
LAR PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL BRINI OR CONTRIBUTORS BE LIABLE FOR ANY DI-
RECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT
NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, DATA, OR PROFITS;
OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CON-
TRACT, STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT
OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.
Redistribution and use in source and binary forms, with or without modification, are permitted provided that the fol-
lowing conditions are met:
1. Redistributions of source code must retain the above copyright notice, this list of conditions, and the following dis-
claimer, without modification.
2. Redistributions in binary form must reproduce at minimum a disclaimer substantially similar to the "NO WARRAN-
TY" disclaimer below ("Disclaimer") and any redistribution must be conditioned upon including a substantially similar
Disclaimer requirement for further binary redistribution.
3. Neither the names of the above-listed copyright holders nor the names of any contributors may be used to endorse
or promote products derived from this software without specific prior written permission.
Alternatively, this software may be distributed under the terms of the GNU General Public License ("GPL") version 2 as
1699
SGOS Administration Guide
NO WARRANTY
THIS SOFTWARE IS PROVIDED BY THE COPYRIGHT HOLDERS AND CONTRIBUTORS "AS IS" AND ANY EX-
PRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES OF MER-
CHANTIBILITY AND FITNESS FOR A PARTICULAR PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE
COPYRIGHT HOLDERS OR CONTRIBUTORS BE LIABLE FOR SPECIAL, EXEMPLARY, OR CONSEQUENTIAL
DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS
OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY OF LI-
ABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE)
ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH
DAMAGES.
Redistribution and use in source and binary forms, with or without modification, are permitted provided that the fol-
lowing conditions are met:
1. Redistributions of source code must retain the above copyright notice, this list of conditions, and the following dis-
claimer, without modification.
2. Redistributions in binary form must reproduce at minimum a disclaimer substantially similar to the "NO WARRAN-
TY" disclaimer below ("Disclaimer") and any redistribution must be conditioned upon including a substantially similar
Disclaimer requirement for further binary redistribution.
3. Neither the names of the above-listed copyright holders nor the names of any contributors may be used to endorse
or promote products derived from this software without specific prior written permission.
Alternatively, this software may be distributed under the terms of the GNU General Public License ("GPL") version 2 as
published by the Free Software Foundation.
NO WARRANTY
THIS SOFTWARE IS PROVIDED BY THE COPYRIGHT HOLDERS AND CONTRIBUTORS "AS IS" AND ANY EX-
PRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES OF MER-
CHANTIBILITY AND FITNESS FOR A PARTICULAR PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE
COPYRIGHT HOLDERS OR CONTRIBUTORS BE LIABLE FOR SPECIAL, EXEMPLARY, OR CONSEQUENTIAL
DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS
OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY OF LI-
ABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE)
ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH
DAMAGES.
Redistribution and use in source and binary forms, with or without modification, are permitted provided that the fol-
lowing conditions are met:
1. Redistributions of source code must retain the above copyright notice, this list of conditions, and the following dis-
claimer, without modification.
2. Redistributions in binary form must reproduce at minimum a disclaimer substantially similar to the "NO WARRAN-
TY" disclaimer below ("Disclaimer") and any redistribution must be conditioned upon including a substantially similar
Disclaimer requirement for further binary redistribution.
3. Neither the names of the above-listed copyright holders nor the names of any contributors may be used to endorse
or promote products derived from this software without specific prior written permission.
Alternatively, this software may be distributed under the terms of the GNU General Public License ("GPL") version 2 as
published by the Free Software Foundation.
NO WARRANTY
THIS SOFTWARE IS PROVIDED BY THE COPYRIGHT HOLDERS AND CONTRIBUTORS "AS IS" AND ANY EX-
PRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES OF MER-
CHANTIBILITY AND FITNESS FOR A PARTICULAR PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE
COPYRIGHT HOLDERS OR CONTRIBUTORS BE LIABLE FOR SPECIAL, EXEMPLARY, OR CONSEQUENTIAL
DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS
OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY OF LI-
ABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE)
ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH
DAMAGES.
Redistribution and use in source and binary forms, with or without modification, are permitted provided that the fol-
lowing conditions are met:
1700
1. Redistributions of source code must retain the above copyright notice, this list of conditions, and the following dis-
claimer, without modification.
2. Redistributions in binary form must reproduce at minimum a disclaimer substantially similar to the "NO WARRAN-
TY" disclaimer below ("Disclaimer") and any redistribution must be conditioned upon including a substantially similar
Disclaimer requirement for further binary redistribution.
3. Neither the names of the above-listed copyright holders nor the names of any contributors may be used to endorse
or promote products derived from this software without specific prior written permission.
Alternatively, this software may be distributed under the terms of the GNU General Public License ("GPL") version 2 as
published by the Free Software Foundation.
NO WARRANTY
THIS SOFTWARE IS PROVIDED BY THE COPYRIGHT HOLDERS AND CONTRIBUTORS "AS IS" AND ANY EX-
PRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES OF MER-
CHANTIBILITY AND FITNESS FOR A PARTICULAR PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE
COPYRIGHT HOLDERS OR CONTRIBUTORS BE LIABLE FOR SPECIAL, EXEMPLARY, OR CONSEQUENTIAL
DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS
OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY OF LI-
ABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE)
ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH
DAMAGES.
Redistribution and use in source and binary forms, with or without modification, are permitted provided that the fol-
lowing conditions are met:
1. Redistributions of source code must retain the above copyright notice, this list of conditions, and the following dis-
claimer, without modification.
2. Redistributions in binary form must reproduce at minimum a disclaimer substantially similar to the "NO WARRAN-
TY" disclaimer below ("Disclaimer") and any redistribution must be conditioned upon including a substantially similar
Disclaimer requirement for further binary redistribution.
3. Neither the names of the above-listed copyright holders nor the names of any contributors may be used to endorse or
promote products derived from this software without specific prior written permission.
Alternatively, this software may be distributed under the terms of the GNU General Public License ("GPL") version 2 as
published by the Free Software Foundation.
NO WARRANTY
THIS SOFTWARE IS PROVIDED BY THE COPYRIGHT HOLDERS AND CONTRIBUTORS "AS IS" AND ANY EX-
PRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES OF MER-
CHANTIBILITY AND FITNESS FOR A PARTICULAR PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE
COPYRIGHT HOLDERS OR CONTRIBUTORS BE LIABLE FOR SPECIAL, EXEMPLARY, OR CONSEQUENTIAL
DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS
OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY OF LI-
ABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE)
ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH
DAMAGES. /
Redistribution and use in source and binary forms, with or without modification, are permitted provided that the fol-
lowing conditions are met:
1. Redistributions of source code must retain the above copyright notice, this list of conditions, and the following dis-
claimer, without modification.
2. Redistributions in binary form must reproduce at minimum a disclaimer substantially similar to the "NO WARRAN-
TY" disclaimer below ("Disclaimer") and any redistribution must be conditioned upon including a substantially similar
Disclaimer requirement for further binary redistribution.
3. Neither the names of the above-listed copyright holders nor the names of any contributors may be used to endorse or
promote products derived from this software without specific prior written permission.
Alternatively, this software may be distributed under the terms of the GNU General Public License ("GPL") version 2 as
published by the Free Software Foundation.
NO WARRANTY
THIS SOFTWARE IS PROVIDED BY THE COPYRIGHT HOLDERS AND CONTRIBUTORS "AS IS" AND ANY EX-
PRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES OF MER-
CHANTIBILITY AND FITNESS FOR A PARTICULAR PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE
COPYRIGHT HOLDERS OR CONTRIBUTORS BE LIABLE FOR SPECIAL, EXEMPLARY, OR CONSEQUENTIAL
DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS
OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY OF LI-
ABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE)
ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH
1701
SGOS Administration Guide
DAMAGES.
Redistribution and use in source and binary forms, with or without modification, are permitted provided that the fol-
lowing conditions are met:
1. Redistributions of source code must retain the above copyright notice, this list of conditions and the following dis-
claimer.
2. Redistributions in binary form must reproduce the above copyright notice, this list of conditions and the following
disclaimer in the documentation and/or other materials provided with the distribution.
3. All advertising materials mentioning features or use of this software must display the following acknowledgement:
This product includes software developed by Christopher G. Demetriou.
4. The name of the author may not be used to endorse or promote products derived from this software without specific
prior written permission
THIS SOFTWARE IS PROVIDED BY THE AUTHOR ``AS IS'' AND ANY EXPRESS OR IMPLIED WARRANTIES, IN-
CLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A
PARTICULAR PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE AUTHOR BE LIABLE FOR ANY DIRECT,
INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT
LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR
BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CON-
TRACT, STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT
OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.
Redistribution and use in source and binary forms, with or without modification, are permitted provided that the fol-
lowing conditions are met:
1. Redistributions of source code must retain the above copyright notice, this list of conditions and the following dis-
claimer.
2. Redistributions in binary form must reproduce the above copyright notice, this list of conditions and the following
disclaimer in the documentation and/or other materials provided with the distribution.
3. All advertising materials mentioning features or use of this software must display the following acknowledgement:
This product includes software developed by the RiscBSD team.
4. The name "RiscBSD" nor the name of the author may be used to endorse or promote products derived from this soft-
ware without specific prior written permission.
THIS SOFTWARE IS PROVIDED BY RISCBSD ``AS IS'' AND ANY EXPRESS OR IMPLIED WARRANTIES, INCLUD-
ING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PAR-
TICULAR PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL RISCBSD OR CONTRIBUTORS BE LIABLE FOR
ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUD-
ING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, DATA, OR
PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER
IN CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY
WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.
Redistribution and use in source and binary forms, with or without modification, are permitted provided that the fol-
lowing conditions are met:
1. Redistributions of source code must retain the above copyright notice, this list of conditions and the following dis-
claimer.
2. Redistributions in binary form must reproduce the above copyright notice, this list of conditions and the following
disclaimer in the
documentation and/or other materials provided with the distribution.
3. All advertising materials mentioning features or use of this software must display the following acknowledgement:
This product includes software developed by Michael L. Hitch.
4. The name of the author may not be used to endorse or promote products derived from this software without specific
prior written permission
THIS SOFTWARE IS PROVIDED BY THE AUTHOR ''AS IS'' AND ANY EXPRESS OR IMPLIED WARRANTIES, IN-
CLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A
PARTICULAR PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE AUTHOR BE LIABLE FOR ANY DIRECT,
INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT
LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR
BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CON-
TRACT, STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT
OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.
1702
Redistribution and use in source and binary forms, with or without modification, are permitted provided that the fol-
lowing conditions are met:
1. Redistributions of source code must retain the above copyright notice, this list of conditions and the following dis-
claimer.
2. Redistributions in binary form must reproduce the above copyright notice, this list of conditions and the following
disclaimer in the documentation and/or other materials provided with the distribution.
THIS SOFTWARE IS PROVIDED BY THE NETBSD FOUNDATION, INC. AND CONTRIBUTORS ''AS IS'' AND ANY
EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES OF
MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL
THE FOUNDATION OR CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT,INCIDENTAL, SPECIAL, EX-
EMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTI-
TUTE GOODS OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER
CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT (IN-
CLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN
IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.
Redistribution and use in source and binary forms, with or without modification, are permitted provided that the fol-
lowing conditions are met:
1. Redistributions of source code must retain the above copyright notice, this list of conditions and the following dis-
claimer.
2. Redistributions in binary form must reproduce the above copyright notice, this list of conditions and the following
disclaimer in the documentation and/or other materials provided with the distribution.
3. All advertising materials mentioning features or use of this software must display the following acknowledgement:
This product includes software developed by Winning Strategies, Inc.
4. The name of the author may not be used to endorse or promote products derived from this software without specific
prior written permission.
THIS SOFTWARE IS PROVIDED BY THE AUTHOR ``AS IS'' AND ANY EXPRESS OR IMPLIED WARRANTIES, IN-
CLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A
PARTICULAR PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE AUTHOR BE LIABLE FOR ANY DIRECT,
INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT
LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR
BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CON-
TRACT, STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT
OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.
Redistribution and use in source and binary forms, with or without modification, are permitted provided that the fol-
lowing conditions are met:
1. Redistributions of source code must retain the above copyright notice, this list of conditions and the following dis-
claimer.
2. Redistributions in binary form must reproduce the above copyright notice, this list of conditions and the following
disclaimer in the
documentation and/or other materials provided with the distribution.
3. The name of the author may not be used to endorse or promote products derived from this software without specific
prior written permission.
THIS SOFTWARE IS PROVIDED BY THE AUTHOR ''AS IS'' AND ANY EXPRESS OR IMPLIED WARRANTIES, IN-
CLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A
PARTICULAR PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE AUTHOR BE LIABLE FOR ANY DIRECT,
INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT
LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR
BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CON-
TRACT, STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT
OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.
Redistribution and use in source and binary forms, with or without modification, are permitted provided that the fol-
lowing conditions are met:
1703
SGOS Administration Guide
1. Redistributions of source code must retain the above copyright notice, this list of conditions and the following dis-
claimer.
2. Redistributions in binary form must reproduce the above copyright notice, this list of conditions and the following
disclaimer in the documentation and/or other materials provided with the distribution.
3. The name of the author may not be used to endorse or promote products derived from this software without specific
prior written permission.
THIS SOFTWARE IS PROVIDED BY THE AUTHOR ``AS IS'' AND ANY EXPRESS OR IMPLIED WARRANTIES, IN-
CLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A
PARTICULAR PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE AUTHOR BE LIABLE FOR ANY DIRECT,
INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT
LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR
BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CON-
TRACT, STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT
OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.
Redistribution and use in source and binary forms, with or without modification, are permitted provided that the fol-
lowing conditions are met:
1. Redistributions of source code must retain the above copyright notice, this list of conditions and the following dis-
claimer.
2. Redistributions in binary form must reproduce the above copyright notice, this list of conditions and the following
disclaimer in the documentation and/or other materials provided with the distribution.
3. Neither the name of the Institute nor the names of its contributors may be used to endorse or promote products de-
rived from this software without specific prior written permission.
THIS SOFTWARE IS PROVIDED BY THE INSTITUTE AND CONTRIBUTORS ``AS IS'' AND ANY EXPRESS OR IM-
PLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES OF MERCHANTABILI-
TY AND FITNESS FOR A PARTICULAR PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE INSTITUTE OR
CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL,EXEMPLARY, OR CONSE-
QUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SER-
VICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY
THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE
OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POS-
SIBILITY OF SUCH DAMAGE.
Permission to use, copy, modify and distribute this software and its documentation is hereby granted, provided that
both the copyright notice and this permission notice appear in all copies of the software, derivative works or modified
versions, and any portions thereof, and that both notices appear in supporting documentation.
CARNEGIE MELLON ALLOWS FREE USE OF THIS SOFTWARE IN ITS "AS IS" CONDITION. CARNEGIE MELLON
DISCLAIMS ANY LIABILITY OF ANY KIND FOR ANY DAMAGES WHATSOEVER RESULTING FROM THE USE OF
THIS SOFTWARE.
any improvements or extensions that they make and grant Carnegie the rights to redistribute these changes.
Permission to use, copy, modify, and distribute this software for any purpose with or without fee is hereby granted, pro-
vided that the above copyright notice and this permission notice appear in all copies.
THE SOFTWARE IS PROVIDED "AS IS" AND INTERNET SOFTWARE CONSORTIUM DISCLAIMS ALL WARRAN-
TIES WITH REGARD TO THIS SOFTWARE INCLUDING ALL IMPLIED WARRANTIES OF MERCHANTABILITY
AND FITNESS. IN NO EVENT SHALL INTERNET SOFTWARE
CONSORTIUM BE LIABLE FOR ANY SPECIAL, DIRECT, INDIRECT, OR CONSEQUENTIAL DAMAGES OR ANY
DAMAGES WHATSOEVER RESULTING FROM LOSS OF USE, DATA OR PROFITS, WHETHER IN AN ACTION OF
CONTRACT, NEGLIGENCE OR OTHER TORTIOUS ACTION, ARISING OUT OF OR IN CONNECTION WITH THE
USE OR PERFORMANCE OF THIS SOFTWARE.
1704
Copyright (c) 1995, 1999
Berkeley Software Design, Inc. All rights reserved.
Redistribution and use in source and binary forms, with or without modification, are permitted provided that the fol-
lowing conditions are met:
1. Redistributions of source code must retain the above copyright notice, this list of conditions and the following dis-
claimer.
THIS SOFTWARE IS PROVIDED BY Berkeley Software Design, Inc. ''AS IS'' AND ANY EXPRESS OR IMPLIED WAR-
RANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FIT-
NESS FOR A PARTICULAR PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL Berkeley Software Design, Inc. BE
LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES
(INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, DA-
TA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY,
WHETHER IN CONTRACT, STRICT
LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF
THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.
Redistribution and use in source and binary forms, with or without modification, are permitted provided that the fol-
lowing conditions are met:
1. Redistributions of source code must retain the above copyright notice, this list of conditions and the following dis-
claimer.
THIS SOFTWARE IS PROVIDED BY Berkeley Software Design, Inc. ''AS IS'' AND ANY EXPRESS OR IMPLIED WAR-
RANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FIT-
NESS FOR A PARTICULAR PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL Berkeley Software Design, Inc. BE
LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES
(INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, DA-
TA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY,
WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING
IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAM-
AGE.
Redistribution and use in source and binary forms, with or without modification, are permitted provided that the fol-
lowing conditions are met:
1. Redistributions of source code must retain the above copyright notice unmodified, this list of conditions, and the fol-
lowing disclaimer.
2. Redistributions in binary form must reproduce the above copyright notice, this list of conditions and the following
disclaimer in the documentation and/or other materials provided with the distribution.
THIS SOFTWARE IS PROVIDED BY THE AUTHOR AND CONTRIBUTORS ''AS IS'' AND ANY EXPRESS OR IM-
PLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES OF MERCHANTABILI-
TY AND FITNESS FOR A PARTICULAR PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE AUTHOR OR
CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSE-
QUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SER-
VICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY
THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT
LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF
THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.
Redistribution and use in source and binary forms, with or without modification, are permitted provided that the fol-
lowing conditions are met:
1. Redistributions of source code must retain the above copyright notice unmodified, this list of conditions, and the fol-
lowing disclaimer.
2. Redistributions in binary form must reproduce the above copyright notice, this list of conditions and the following
disclaimer in the documentation and/or other materials provided with the distribution.
THIS SOFTWARE IS PROVIDED BY THE AUTHOR AND CONTRIBUTORS ''AS IS'' AND ANY EXPRESS OR IM-
PLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES OF MERCHANTABILI-
TY AND FITNESS FOR A PARTICULAR PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE AUTHOR OR
CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSE-
QUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SER-
1705
SGOS Administration Guide
VICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY
THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT
LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF
THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.
Redistribution and use in source and binary forms, with or without modification, are permitted provided that the fol-
lowing conditions are met:
1. Redistributions of source code must retain the above copyright notice, this list of conditions and the following dis-
claimer.
2. Redistributions in binary form must reproduce the above copyright notice, this list of conditions and the following
disclaimer in the documentation and/or other materials provided with the distribution.
3. All advertising materials mentioning features or use of this software must display the following acknowledgement:
This product includes software developed by Bill Paul.
4. Neither the name of the author nor the names of any co-contributors may be used to endorse or promote products
derived from this software without specific prior written permission.
THIS SOFTWARE IS PROVIDED BY Bill Paul AND CONTRIBUTORS ''AS IS'' AND ANY EXPRESS OR IMPLIED WAR-
RANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FIT-
NESS FOR A PARTICULAR PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE REGENTS OR
CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSE-
QUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SER-
VICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY
THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE
OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POS-
SIBILITY OF SUCH DAMAGE.
Permission to use, copy, modify and distribute this software and its documentation is hereby granted, provided that
both the copyright notice and this permission notice appear in all copies of the software, derivative works or modified
versions, and any portions thereof, and that both notices appear in supporting documentation.
CARNEGIE MELLON ALLOWS FREE USE OF THIS SOFTWARE IN ITS "AS IS" CONDITION. CARNEGIE MELLON
DISCLAIMS ANY LIABILITY OF ANY KIND FOR ANY DAMAGES WHATSOEVER RESULTING FROM THE USE OF
THIS SOFTWARE.
any improvements or extensions that they make and grant Carnegie the rights to redistribute these changes.
Redistribution and use in source and binary forms, with or without modification, are permitted provided that the fol-
lowing conditions are met:
1. Redistributions of source code must retain the above copyright notice, this list of conditions and the following dis-
claimer.
2. Redistributions in binary form must reproduce the above copyright notice, this list of conditions and the following
disclaimer in the documentation and/or other materials provided with the distribution.
3. All advertising materials mentioning features or use of this software must display the following acknowledgement:
This product includes software developed by the University of California, Berkeley and its contributors.
4. Neither the name of the University nor the names of its contributors may be used to endorse or promote products
derived from this software without specific prior written permission.
THIS SOFTWARE IS PROVIDED BY THE REGENTS AND CONTRIBUTORS ''AS IS'' AND ANY EXPRESS OR IM-
PLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES OF MERCHANTABILI-
TY AND FITNESS FOR A PARTICULAR PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE REGENTS OR
CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSE-
1706
QUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SER-
VICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY
THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE
OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POS-
SIBILITY OF SUCH DAMAGE.
Redistribution and use in source and binary forms, with or without modification, are permitted provided that the fol-
lowing conditions are met:
1. Redistributions of source code must retain the above copyright notice, this list of conditions and the following dis-
claimer.
2. Redistributions in binary form must reproduce the above copyright notice, this list of conditions and the following
disclaimer in the documentation and/or other materials provided with the distribution.
3. All advertising materials mentioning features or use of this software must display the following acknowledgements:
This product includes software developed by Jason R. Thorpe for And Communications, http://www.and.com/
4. The name of the author may not be used to endorse or promote products derived from this software without specific
prior written permission.
THIS SOFTWARE IS PROVIDED BY THE AUTHOR ``AS IS'' AND ANY EXPRESS OR IMPLIED WARRANTIES, IN-
CLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A
PARTICULAR PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE AUTHOR BE LIABLE FOR ANY DIRECT,
INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT
LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR
BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CON-
TRACT, STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT
OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.
Redistribution and use in source and binary forms, with or without modification, are permitted provided that the fol-
lowing conditions are met:
1. Redistributions of source code must retain the above copyright notice, this list of conditions and the following dis-
claimer.
2. Redistributions in binary form must reproduce the above copyright notice, this list of conditions and the following
disclaimer in the documentation and/or other materials provided with the distribution.
3. All advertising materials mentioning features or use of this software must display the following acknowledgement:
This product includes software developed by the NetBSD Foundation, Inc. and its contributors.
4. Neither the name of The NetBSD Foundation nor the names of its contributors may be used to endorse or promote
products derived from this software without specific prior written permission.
THIS SOFTWARE IS PROVIDED BY THE NETBSD FOUNDATION, INC. AND CONTRIBUTORS ''AS IS'' AND ANY
EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES OF
MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL
THE FOUNDATION OR CONTRIBUTORS BE LIABLE FOR ANY DIRECT,INDIRECT,INCIDENTAL, SPECIAL, EX-
EMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OFSUBSTI-
TUTE GOODS OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER
CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT (IN-
CLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN
IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.
Permission to use, copy, modify, and distribute this software for any purpose with or without fee is hereby granted, pro-
vided that the above copyright notice and this permission notice appear in all copies.
THE SOFTWARE IS PROVIDED "AS IS" AND INTERNET SOFTWARE CONSORTIUM DISCLAIMS ALL WARRAN-
TIES WITH REGARD TO THIS SOFTWARE INCLUDING ALL IMPLIED WARRANTIES OF MERCHANTABILITY
AND FITNESS. IN NO EVENT SHALL INTERNET SOFTWARE
CONSORTIUM BE LIABLE FOR ANY SPECIAL,DIRECT, INDIRECT, OR CONSEQUENTIAL DAMAGES OR ANY
DAMAGES WHATSOEVER RESULTING FROM LOSS OF USE, DATA OR PROFITS, WHETHER IN AN ACTION OF
CONTRACT, NEGLIGENCE OR OTHER TORTIOUS ACTION, ARISING OUT OF OR IN CONNECTION WITH THE
USE OR PERFORMANCE OF THIS SOFTWARE.
Redistribution and use in source and binary forms, with or without modification, are permitted provided that the fol-
lowing conditions are met:
1. Redistributions of source code must retain the above copyright notice, this list of conditions and the following dis-
claimer.
2. Redistributions in binary form must reproduce the above copyright notice, this list of conditions and the following
disclaimer in the documentation and/or other materials provided with the distribution.
1707
SGOS Administration Guide
THIS SOFTWARE IS PROVIDED BY THE AUTHOR AND CONTRIBUTORS ''AS IS'' AND ANY EXPRESS OR IM-
PLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES OF MERCHANTABILI-
TY AND FITNESS FOR A PARTICULAR PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE AUTHOR OR
CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSE-
QUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SER-
VICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY
THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT
LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF
THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.
Redistribution and use in source and binary forms, with or without modification, are permitted provided that the fol-
lowing conditions are met:
1. Redistributions of source code must retain the above copyright notice, this list of conditions and the following dis-
claimer.
2. Redistributions in binary form must reproduce the above copyright notice, this list of conditions and the following
disclaimer in the documentation and/or other materials provided with the distribution.
THIS SOFTWARE IS PROVIDED BY THE AUTHOR AND CONTRIBUTORS ''AS IS'' AND ANY EXPRESS OR IM-
PLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES OF MERCHANTABILI-
TY AND FITNESS FOR A PARTICULAR PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE AUTHOR OR
CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSE-
QUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SER-
VICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY
THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT
LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF
THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.
Redistribution and use in source and binary forms, with or without modification, are permitted provided that the fol-
lowing conditions are met:
1. Redistributions of source code must retain the above copyright notice, this list of conditions and the following dis-
claimer.
2. Redistributions in binary form must reproduce the above copyright notice, this list of conditions and the following
disclaimer in the documentation and/or other materials provided with the distribution.
3. Neither the name of author nor the names of its contributors may be used to endorse or promote products derived
from this software without specific prior written permission.
THIS SOFTWARE IS PROVIDED BY NICK HIBMA AND CONTRIBUTORS ''AS IS'' AND ANY EXPRESS OR IMPLIED
WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES OF MERCHANTABILITY AND
FITNESS FOR A PARTICULAR PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE AUTHOR OR CONTRIB-
UTORS BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR
CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS
OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON
ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING NEGLI-
GENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF
THE POSSIBILITY OF SUCH DAMAGE.
Subject to the following obligations and disclaimer of warranty, use and redistribution of this software, in source or ob-
ject code forms, with or without modifications are expressly permitted by Whistle Communications; provided, however,
that:
1. Any and all reproductions of the source or object code must include the copyright notice above and the following dis-
claimer of warranties; and
2. No rights are granted, in any manner or form, to use Whistle Communications, Inc. trademarks, including the mark
"WHISTLE COMMUNICATIONS" on advertising, endorsements, or otherwise except as such appears in the above
copyright notice or in the software.
THIS SOFTWARE IS BEING PROVIDED BY WHISTLE COMMUNICATIONS "AS IS", AND TO THE MAXIMUM EX-
TENT PERMITTED BY LAW, WHISTLE COMMUNICATIONS MAKES NO REPRESENTATIONS OR WARRANTIES,
EXPRESS OR IMPLIED, REGARDING THIS SOFTWARE,
INCLUDING WITHOUT LIMITATION, ANY AND ALL IMPLIED WARRANTIES OF MERCHANTABILITY, FIT-
NESS FOR A PARTICULAR PURPOSE, OR NON-INFRINGEMENT. WHISTLE COMMUNICATIONS DOES NOT
WARRANT, GUARANTEE, OR MAKE ANY REPRESENTATIONS REGARDING THE USE OF, OR THE RESULTS OF
THE USE OF THIS SOFTWARE IN TERMS OF ITS CORRECTNESS, ACCURACY, RELIABILITY OR OTHERWISE. IN
NO EVENT SHALL WHISTLE COMMUNICATIONS BE LIABLE FOR ANY DAMAGES RESULTING FROM OR ARIS-
ING OUT OF ANY USE OF THIS SOFTWARE, INCLUDING WITHOUT LIMITATION, ANY DIRECT, INDIRECT, IN-
CIDENTAL, SPECIAL, EXEMPLARY,
1708
PUNITIVE, OR CONSEQUENTIAL DAMAGES, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES, LOSS OF
USE, DATA OR PROFITS, HOWEVER CAUSED AND UNDER ANY THEORY OF LIABILITY, WHETHER IN CON-
TRACT, STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT
OF THE USE OF THIS SOFTWARE, EVEN IF WHISTLE COMMUNICATIONS IS ADVISED OF THE POSSIBILITY OF
SUCH DAMAGE.
Copyright (c) 1996 Berkeley Software Design, Inc. All rights reserved.
Redistribution and use in source and binary forms, with or without modification, are permitted provided that the fol-
lowing conditions are met:
1. Redistributions of source code must retain the above copyright notice, this list of conditions and the following dis-
claimer.
2. Redistributions in binary form must reproduce the above copyright notice, this list of conditions and the following
disclaimer in the documentation and/or other materials provided with the distribution.
3. Berkeley Software Design Inc's name may not be used to endorse or promote products derived from this software
without specific prior written permission.
THIS SOFTWARE IS PROVIDED BY BERKELEY SOFTWARE DESIGN INC ''AS IS'' AND ANY EXPRESS OR IMPLIED
WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES OF MERCHANTABILITY AND
FITNESS FOR A PARTICULAR PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL BERKELEY SOFTWARE DE-
SIGN INC BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUEN-
TIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES;
LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY
OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHER-
WISE) ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY
OF SUCH DAMAGE.
Redistribution and use in source and binary forms, with or without modification, are permitted provided that the fol-
lowing conditions are met:
1. Redistributions of source code must retain the above copyright notice, this list of conditions and the following dis-
claimer.
2. Redistributions in binary form must reproduce the above copyright notice, this list of conditions and the following
disclaimer in the documentation and/or other materials provided with the distribution.
3. All advertising materials mentioning features or use of this software must display the following acknowledgement:
This product includes software developed by Charles D. Cranor and Washington University.
4. The name of the author may not be used to endorse or promote products derived from this software without specific
prior written permission.
THIS SOFTWARE IS PROVIDED BY THE AUTHOR ''AS IS'' AND ANY EXPRESS OR IMPLIED WARRANTIES, IN-
CLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A
PARTICULAR PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE AUTHOR BE LIABLE FOR ANY DIRECT,
INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT
LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR
BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CON-
TRACT, STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT
OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.
Redistribution and use in source and binary forms, with or without modification, are permitted provided that the fol-
lowing conditions are met:
1. Redistributions of source code must retain the above copyright notice, this list of conditions and the following dis-
claimer.
2. Redistributions in binary form must reproduce the above copyright notice, this list of conditions and the following
disclaimer in the documentation and/or other materials provided with the distribution.
3. All advertising materials mentioning features or use of this software must display the following acknowledgement:
This product includes software developed by Christopher G. Demetriou for the NetBSD Project.
4. The name of the author may not be used to endorse or promote products derived from this software without specific
prior written permission
THIS SOFTWARE IS PROVIDED BY THE AUTHOR ''AS IS'' AND ANY EXPRESS OR IMPLIED WARRANTIES, IN-
CLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A
PARTICULAR PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE AUTHOR BE LIABLE FOR ANY DIRECT,
INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT
LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR
BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CON-
TRACT, STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT
OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.
Redistribution and use in source and binary forms, with or without modification, are permitted provided that the fol-
1709
SGOS Administration Guide
THIS SOFTWARE IS PROVIDED BY THE AUTHOR ''AS IS'' AND ANY EXPRESS OR IMPLIED WARRANTIES, IN-
CLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A
PARTICULAR PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE AUTHOR BE LIABLE FOR ANY DIRECT,
INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT
LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR
BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CON-
TRACT, STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT
OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.
Partially based on an autochanger driver written by Stefan Grefen and on an autochanger driver written by the Systems
Programming Group at the University of Utah Computer Science Department.
Redistribution and use in source and binary forms, with or without modification, are permitted provided that the fol-
lowing conditions are met:
1. Redistributions of source code must retain the above copyright notice, this list of conditions and the following dis-
claimer.
2. Redistributions in binary form must reproduce the above copyright notice, this list of conditions and the following
disclaimer in the documentation and/or other materials provided with the distribution.
3. All advertising materials mentioning features or use of this software must display the following acknowledgements:
This product includes software developed by Jason R. Thorpe for And Communications, http://www.and.com/
4. The name of the author may not be used to endorse or promote products derived from this software without specific
prior written permission.
THIS SOFTWARE IS PROVIDED BY THE AUTHOR ''AS IS'' AND ANY EXPRESS OR IMPLIED WARRANTIES, IN-
CLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A
PARTICULAR PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE AUTHOR BE LIABLE FOR ANY DIRECT,
INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING,
BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, DATA, OR PROF-
ITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN
CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY
OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.
Redistribution and use in source and binary forms, with or without modification, are permitted provided that the fol-
lowing conditions are met:
1. Redistributions of source code must retain the above copyright notice, this list of conditions and the following dis-
claimer.
2. Redistributions in binary form must reproduce the above copyright notice, this list of conditions and the following
disclaimer in the documentation and/or other materials provided with the distribution.
3. All advertising materials mentioning features or use of this software must display the following acknowledgement:
This product includes software developed by Mark Brinicombe for the NetBSD Project.
4. The name of the author may not be used to endorse or promote products derived from this software without specific
prior written permission
THIS SOFTWARE IS PROVIDED BY THE AUTHOR ''AS IS'' AND ANY EXPRESS OR IMPLIED WARRANTIES, IN-
CLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A
PARTICULAR PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE AUTHOR BE LIABLE FOR ANY DIRECT,
INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT
LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR
BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CON-
TRACT, STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT
OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.
Redistribution and use in source and binary forms, with or without modification, are permitted provided that the fol-
lowing conditions are met:
1. Redistributions of source code must retain the above copyright notice, this list of conditions and the following dis-
claimer.
2. Redistributions in binary form must reproduce the above copyright notice, this list of conditions and the following
1710
disclaimer in the documentation and/or other materials provided with the distribution.
3. The name of the author may not be used to endorse or promote products derived from this software without specific
prior written permission.
THIS SOFTWARE IS PROVIDED BY THE AUTHOR ''AS IS'' AND ANY EXPRESS OR IMPLIED WARRANTIES, IN-
CLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A
PARTICULAR PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE AUTHOR BE LIABLE FOR ANY DIRECT,
INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT
LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR
BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CON-
TRACT, STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT
OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.
Redistribution and use in source and binary forms, with or without modification, are permitted provided that the fol-
lowing conditions are met:
1. Redistributions of source code must retain the above copyright notice, this list of conditions and the following dis-
claimer.
2. Redistributions in binary form must reproduce the above copyright notice, this list of conditions and the following
disclaimer in the documentation and/or other materials provided with the distribution.
3. All advertising materials mentioning features or use of this software must display the following acknowledgement:
This product includes software developed by the NetBSD Foundation, Inc. and its contributors.
4. Neither the name of The NetBSD Foundation nor the names of its contributors may be used to endorse or promote
products derived from this software without specific prior written permission.
THIS SOFTWARE IS PROVIDED BY THE NETBSD FOUNDATION, INC. AND CONTRIBUTORS ''AS IS'' AND ANY
EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES OF
MERCHANTABILITY AND FITNESS FOR A PARTICULAR
PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE FOUNDATION OR CONTRIBUTORS BE LIABLE FOR
ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUD-
ING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, DATA, OR
PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER
IN CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY
WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.
Permission to use, copy, modify, and distribute this software for any purpose with or without fee is hereby granted, pro-
vided that the above copyright notice and this permission notice appear in all copies.
THE SOFTWARE IS PROVIDED "AS IS" AND INTERNET SOFTWARE CONSORTIUM DISCLAIMS ALL WARRAN-
TIES WITH REGARD TO THIS SOFTWARE INCLUDING ALL IMPLIED WARRANTIES OF MERCHANTABILITY
AND FITNESS. IN NO EVENT SHALL INTERNET SOFTWARE
CONSORTIUM BE LIABLE FOR ANY SPECIAL, DIRECT, INDIRECT, OR CONSEQUENTIAL DAMAGES OR ANY
DAMAGES WHATSOEVER RESULTING FROM LOSS OF USE, DATA OR PROFITS, WHETHER IN AN ACTION OF
CONTRACT, NEGLIGENCE OR OTHER TORTIOUS ACTION, ARISING OUT OF OR IN CONNECTION WITH THE
USE OR PERFORMANCE OF THIS SOFTWARE.
Redistribution and use in source and binary forms, with or without modification, are permitted provided that the fol-
lowing conditions are met:
1. Redistributions of source code must retain the above copyright notice, this list of conditions and the following dis-
claimer.
2. Redistributions in binary form must reproduce the above copyright notice, this list of conditions and the following
disclaimer in the documentation and/or other materials provided with the distribution.
3. All advertising materials mentioning features or use of this software must display the following acknowledgement:
This product includes software developed by Bill Paul.
4. Neither the name of the author nor the names of any co-contributors may be used to endorse or promote products
derived from this software without specific prior written permission.
THIS SOFTWARE IS PROVIDED BY Bill Paul AND CONTRIBUTORS ''AS IS'' AND ANY EXPRESS OR IMPLIED WAR-
RANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FIT-
NESS FOR A PARTICULAR PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL Bill Paul OR THE VOICES IN HIS
HEAD BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR
CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS
OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON
ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING NEGLI-
GENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF
THE POSSIBILITY OF SUCH DAMAGE.
1711
SGOS Administration Guide
Redistribution and use in source and binary forms, with or without modification, are permitted provided that the fol-
lowing conditions are met:
1. Redistributions of source code must retain the above copyright notice, this list of conditions and the following dis-
claimer.
2. Redistributions in binary form must reproduce the above copyright notice, this list of conditions and the following
disclaimer in the documentation and/or other materials provided with the distribution.
3. All advertising materials mentioning features or use of this software must display the following acknowledgement:
This product includes software developed by Bill Paul.
4. Neither the name of the author nor the names of any co-contributors may be used to endorse or promote products
derived from this software
without specific prior written permission.
THIS SOFTWARE IS PROVIDED BY Bill Paul AND CONTRIBUTORS ''AS IS'' AND ANYEXPRESS OR IMPLIED WAR-
RANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FIT-
NESS FOR A PARTICULAR PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL Bill Paul, THE VOICES IN HIS
HEAD OR THE CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY,
OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE
GOODS OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED
AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING
NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF AD-
VISED OF THE POSSIBILITY OF SUCH DAMAGE.
Redistribution and use in source and binary forms, with or without modification, are permitted provided that the fol-
lowing conditions are met:
1. Redistributions of source code must retain the above copyright notice, this list of conditions and the following dis-
claimer.
2. Redistributions in binary form must reproduce the above copyright notice, this list of conditions and the following
disclaimer in the documentation and/or other materials provided with the distribution.
3. All advertising materials mentioning features or use of this software must display the following acknowledgement:
This product includes software developed by Bill Paul.
4. Neither the name of the author nor the names of any co-contributors may be used to endorse or promote products
derived from this software
without specific prior written permission.
THIS SOFTWARE IS PROVIDED BY Bill Paul AND CONTRIBUTORS ''AS IS'' AND ANY EXPRESS OR IMPLIED WAR-
RANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FIT-
NESS FOR A PARTICULAR PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL Bill Paul OR THE VOICES IN HIS
HEAD BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR
CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS
OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON
ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING NEGLI-
GENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF
THE POSSIBILITY OF SUCH DAMAGE.
Redistribution and use in source and binary forms, with or without modification, are permitted provided that the fol-
lowing conditions are met:
1. Redistributions of source code must retain the above copyright notice, this list of conditions and the following dis-
claimer.
2. Redistributions in binary form must reproduce the above copyright notice, this list of conditions and the following
disclaimer in the
documentation and/or other materials provided with the distribution.
3. All advertising materials mentioning features or use of this software must display the following acknowledgement:
This product includes software developed by Bill Paul.
4. Neither the name of the author nor the names of any co-contributors may be used to endorse or promote products
derived from this software
without specific prior written permission.
THIS SOFTWARE IS PROVIDED BY Bill Paul AND CONTRIBUTORS ''AS IS'' AND ANY EXPRESS OR IMPLIED WAR-
RANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FIT-
NESS FOR A PARTICULAR PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL Bill Paul OR THE VOICES IN HIS
HEAD BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR
1712
CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS
OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON
ANY THEORY OF LIABILITY, WHETHER IN CONTRACT,STRICT LIABILITY, OR TORT (INCLUDING NEGLI-
GENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF
THE POSSIBILITY OF SUCH DAMAGE.
Copyright (c) 1997, 1998, 1999, 2000 The NetBSD Foundation, Inc.
All rights reserved.
Redistribution and use in source and binary forms, with or without modification, are permitted provided that the fol-
lowing conditions are met:
1. Redistributions of source code must retain the above copyright notice, this list of conditions and the following dis-
claimer.
2. Redistributions in binary form must reproduce the above copyright notice, this list of conditions and the following
disclaimer in the documentation and/or other materials provided with the distribution.
3. All advertising materials mentioning features or use of this software must display the following acknowledgement:
This product includes software developed by the NetBSD Foundation, Inc. and its contributors.
4. Neither the name of The NetBSD Foundation nor the names of its contributors may be used to endorse or promote
products derived from this software without specific prior written permission.
THIS SOFTWARE IS PROVIDED BY THE NETBSD FOUNDATION, INC. AND CONTRIBUTORS ''AS IS'' AND ANY
EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES OF
MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL
THE FOUNDATION OR CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EX-
EMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTI-
TUTE GOODS OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER
CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT (IN-
CLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN
IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.
Redistribution and use in source and binary forms, with or without modification, are permitted provided that the fol-
lowing conditions are met:
1. Redistributions of source code must retain the above copyright notice, this list of conditions and the following dis-
claimer.
2. Redistributions in binary form must reproduce the above copyright notice, this list of conditions and the following
disclaimer in the documentation and/or other materials provided with the distribution.
3. All advertising materials mentioning features or use of this software must display the following acknowledgement:
This product includes software developed by Bill Paul.
4. Neither the name of the author nor the names of any co-contributors may be used to endorse or promote products
derived from this software
without specific prior written permission.
THIS SOFTWARE IS PROVIDED BY Bill Paul AND CONTRIBUTORS ''AS IS'' AND ANY EXPRESS OR IMPLIED WAR-
RANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FIT-
NESS FOR A PARTICULAR PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL Bill Paul OR THE VOICES IN HIS
HEAD BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR
CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS
OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON
ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING NEGLI-
GENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF
THE POSSIBILITY OF SUCH DAMAGE.
Redistribution and use in source and binary forms, with or without modification, are permitted provided that the fol-
lowing conditions are met:
1. Redistributions of source code must retain the above copyright notice, this list of conditions, and the following dis-
claimer, without modification, immediately at the beginning of the file.
2. The name of the author may not be used to endorse or promote products derived from this software without specific
prior written permission.
THIS SOFTWARE IS PROVIDED BY THE AUTHOR AND CONTRIBUTORS ''AS IS'' AND ANY EXPRESS OR IM-
PLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES OF MERCHANTABILI-
TY AND FITNESS FOR A PARTICULAR PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE AUTHOR OR
CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSE-
QUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SER-
VICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY
THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE
OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POS-
SIBILITY OF SUCH DAMAGE.
1713
SGOS Administration Guide
Redistribution and use in source and binary forms, with or without modification, are permitted provided that the fol-
lowing conditions are met:
1. Redistributions of source code must retain the above copyright notice, this list of conditions, and the following dis-
claimer, without modification, immediately at the beginning of the file.
2. The name of the author may not be used to endorse or promote products derived from this software without specific
prior written permission.
THIS SOFTWARE IS PROVIDED BY THE AUTHOR AND CONTRIBUTORS ''AS IS'' AND ANY EXPRESS OR IM-
PLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES OF MERCHANTABILI-
TY AND FITNESS FOR A PARTICULAR PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE AUTHOR OR
CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSE-
QUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SER-
VICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY
THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT
LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF
THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.
Redistribution and use in source and binary forms, with or without modification, are permitted provided that the fol-
lowing conditions are met:
1. Redistributions of source code must retain the above copyright notice, this list of conditions, and the following dis-
claimer, without modification.
2. Redistributions in binary form must reproduce at minimum a disclaimer substantially similar to the "NO WARRAN-
TY" disclaimer below ("Disclaimer") and any redistribution must be conditioned upon including a substantially similar
Disclaimer requirement for further binary redistribution.
3. Neither the names of the above-listed copyright holders nor the names of any contributors may be used to endorse
or promote products derived
from this software without specific prior written permission.
Alternatively, this software may be distributed under the terms of the GNU General Public License ("GPL") version 2 as
published by the Free Software Foundation.
NO WARRANTY
THIS SOFTWARE IS PROVIDED BY THE COPYRIGHT HOLDERS AND CONTRIBUTORS "AS IS" AND ANY EX-
PRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES OF MER-
CHANTIBILITY AND FITNESS FOR A PARTICULAR PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE
COPYRIGHT HOLDERS OR CONTRIBUTORS BE LIABLE FOR SPECIAL, EXEMPLARY, OR CONSEQUENTIAL
DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS
OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY OF LI-
ABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE)
ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH
DAMAGES.
Redistribution and use in source and binary forms, with or without modification, are permitted provided that the fol-
lowing conditions are met:
1. Redistributions of source code must retain the above copyright notice, this list of conditions, and the following dis-
claimer, without modification.
2. Redistributions in binary form must reproduce at minimum a disclaimer substantially similar to the "NO WARRAN-
TY" disclaimer below ("Disclaimer") and any redistribution must be conditioned upon including a substantially similar
Disclaimer requirement for further binary redistribution.
3. Neither the names of the above-listed copyright holders nor the names of any contributors may be used to endorse
or promote products derived
from this software without specific prior written permission.
Alternatively, this software may be distributed under the terms of the GNU General Public License ("GPL") version 2 as
published by the Free Software Foundation.
NO WARRANTY
THIS SOFTWARE IS PROVIDED BY THE COPYRIGHT HOLDERS AND CONTRIBUTORS "AS IS" AND ANY EX-
PRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES OF MER-
CHANTIBILITY AND FITNESS FOR A PARTICULAR PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE
COPYRIGHT HOLDERS OR CONTRIBUTORS BE LIABLE FOR SPECIAL, EXEMPLARY, OR CONSEQUENTIAL
DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS
OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY OF LI-
ABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE)
1714
ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH
DAMAGES.
Redistribution and use in source and binary forms, with or without modification, are permitted provided that the fol-
lowing conditions are met:
1. Redistributions of source code must retain the above copyright notice, this list of conditions, and the following dis-
claimer, without modification, immediately at the beginning of the file.
2. The name of the author may not be used to endorse or promote products derived from this software without specific
prior written permission.
THIS SOFTWARE IS PROVIDED BY THE AUTHOR AND CONTRIBUTORS ''AS IS'' AND ANY EXPRESS OR IM-
PLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES OF MERCHANTABILI-
TY AND FITNESS FOR A PARTICULAR PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE AUTHOR OR
CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSE-
QUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SER-
VICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY
THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE
OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POS-
SIBILITY OF SUCH DAMAGE.
Redistribution and use in source and binary forms, with or without modification, are permitted provided that the fol-
lowing conditions are met:
1. Redistributions of source code must retain the above copyright notice, this list of conditions, and the following dis-
claimer, without modification.
2. Redistributions in binary form must reproduce at minimum a disclaimer substantially similar to the "NO WARRAN-
TY" disclaimer below ("Disclaimer") and any redistribution must be conditioned upon including a substantially similar
Disclaimer requirement for further binary redistribution.
3. Neither the names of the above-listed copyright holders nor the names of any contributors may be used to endorse
or promote products derived
from this software without specific prior written permission.
Alternatively, this software may be distributed under the terms of the GNU General Public License ("GPL") version 2 as
published by the Free Software Foundation.
NO WARRANTY
THIS SOFTWARE IS PROVIDED BY THE COPYRIGHT HOLDERS AND CONTRIBUTORS "AS IS" AND ANY EX-
PRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES OF MER-
CHANTIBILITY AND FITNESS FOR A PARTICULAR PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE
COPYRIGHT HOLDERS OR CONTRIBUTORS BE LIABLE FOR SPECIAL, EXEMPLARY, OR CONSEQUENTIAL
DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS
OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY OF LI-
ABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE)
ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH
DAMAGES.
Redistribution and use in source and binary forms, with or without modification, are permitted provided that the fol-
lowing conditions are met:
1. Redistributions of source code must retain the above copyright notice, this list of conditions and the following dis-
claimer.
2. Redistributions in binary form must reproduce the above copyright notice, this list of conditions and the following
disclaimer in the documentation and/or other materials provided with the distribution.
THIS SOFTWARE IS PROVIDED BY THE AUTHOR AND CONTRIBUTORS ''AS IS'' AND ANY EXPRESS OR IM-
PLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES OF MERCHANTABILI-
TY AND FITNESS FOR A PARTICULAR PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE AUTHOR OR
CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSE-
QUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SER-
VICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY
THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE
OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POS-
SIBILITY OF SUCH DAMAGE.
1715
SGOS Administration Guide
Redistribution and use in source and binary forms, with or without modification, are permitted provided that the fol-
lowing conditions are met:
1. Redistributions of source code must retain the above copyright notice, this list of conditions and the following dis-
claimer.
2. Redistributions in binary form must reproduce the above copyright notice, this list of conditions and the following
disclaimer in the documentation and/or other materials provided with the distribution.
3. All advertising materials mentioning features or use of this software must display the following acknowledgement:
This product includes software developed by the NetBSD Foundation, Inc. and its contributors.
4. Neither the name of The NetBSD Foundation nor the names of its contributors may be used to endorse or promote
products derived from this software without specific prior written permission.
THIS SOFTWARE IS PROVIDED BY THE NETBSD FOUNDATION, INC. AND CONTRIBUTORS ''AS IS'' AND ANY
EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES OF
MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL
THE FOUNDATION OR CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EX-
EMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTI-
TUTE GOODS OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER
CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT (IN-
CLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN
IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.
Copyright (c) 1997, 1998, 2005, 2008 The NetBSD Foundation, Inc.
All rights reserved.
Redistribution and use in source and binary forms, with or without modification, are permitted provided that the fol-
lowing conditions are met:
1. Redistributions of source code must retain the above copyright notice, this list of conditions and the following dis-
claimer.
2. Redistributions in binary form must reproduce the above copyright notice, this list of conditions and the following
disclaimer in the documentation and/or other materials provided with the distribution.
THIS SOFTWARE IS PROVIDED BY THE NETBSD FOUNDATION, INC. AND CONTRIBUTORS ''AS IS'' AND ANY
EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES OF
MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL
THE FOUNDATION OR CONTRIBUTORS BE LIABLE FOR ANYDIRECT,INDIRECT,INCIDENTAL, SPECIAL, EX-
EMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTI-
TUTE GOODS OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER
CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT (IN-
CLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN
IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.
Redistribution and use in source and binary forms, with or without modification, are permitted provided that the fol-
lowing conditions are met:
1. Redistributions of source code must retain the above copyright notice, this list of conditions, and the following dis-
claimer, without modification, immediately at the beginning of the file.
2. The name of the author may not be used to endorse or promote products derived from this software without specific
prior written permission.
THIS SOFTWARE IS PROVIDED BY THE AUTHOR AND CONTRIBUTORS ''AS IS'' AND ANY EXPRESS OR IM-
PLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES OF MERCHANTABILI-
TY AND FITNESS FOR A PARTICULAR PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE AUTHOR OR
CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSE-
QUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SER-
VICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY
THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT
LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF
THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.
Redistribution and use in source and binary forms, with or without modification, are permitted provided that the fol-
lowing conditions are met:
1. Redistributions of source code must retain the above copyright notice, this list of conditions, and the following dis-
claimer, without modification, immediately at the beginning of the file.
2. The name of the author may not be used to endorse or promote products derived from this software without specific
prior written permission.
THIS SOFTWARE IS PROVIDED BY THE AUTHOR AND CONTRIBUTORS ''AS IS'' AND ANY EXPRESS OR IM-
PLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES OF MERCHANTABILI-
TY AND FITNESS FOR A PARTICULAR PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE AUTHOR OR
1716
CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSE-
QUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SER-
VICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY
THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT
LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF
THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.
Redistribution and use in source and binary forms, with or without modification, are permitted provided that the fol-
lowing conditions are met:
1. Redistributions of source code must retain the above copyright notice, this list of conditions and the following dis-
claimer.
2. Redistributions in binary form must reproduce the above copyright notice, this list of conditions and the following
disclaimer in the documentation and/or other materials provided with the distribution.
THIS SOFTWARE IS PROVIDED BY THE NETBSD FOUNDATION, INC. AND CONTRIBUTORS ''AS IS'' AND ANY
EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES OF
MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL
THE FOUNDATION OR CONTRIBUTORS BE LIABLE FOR ANYDIRECT,INDIRECT,INCIDENTAL, SPECIAL, EX-
EMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTI-
TUTE GOODS OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER
CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT (IN-
CLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN
IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.
Redistribution and use in source and binary forms, with or without modification, are permitted provided that the fol-
lowing conditions are met:
1. Redistributions of source code must retain the above copyright notice, this list of conditions and the following dis-
claimer.
2. The name of the author may not be used to endorse or promote products derived from this software without specific
prior written permission.
THIS SOFTWARE IS PROVIDED BY THE AUTHOR AND CONTRIBUTORS ''AS IS'' AND ANY EXPRESS OR IM-
PLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES OF MERCHANTABILI-
TY AND FITNESS FOR A PARTICULAR PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE AUTHOR OR
CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSE-
QUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SER-
VICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY
THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE
OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POS-
SIBILITY OF SUCH DAMAGE.
Redistribution and use in source and binary forms, with or without modification, are permitted provided that the fol-
lowing conditions are met:
1. Redistributions of source code must retain the above copyright notice, this list of conditions and the following dis-
claimer.
THIS SOFTWARE IS PROVIDED BY Berkeley Software Design, Inc. ''AS IS'' AND ANY EXPRESS OR IMPLIED WAR-
RANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FIT-
NESS FOR A PARTICULAR PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL Berkeley Software Design, Inc. BE
LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES
(INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, DA-
TA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY,
WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING
IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAM-
AGE.
Redistribution and use in source and binary forms, with or without modification, are permitted provided that the fol-
lowing conditions are met:
1. Redistributions of source code must retain the above copyright notice, this list of conditions and the following dis-
claimer.
2. Redistributions in binary form must reproduce the above copyright notice, this list of conditions and the following
1717
SGOS Administration Guide
disclaimer in the documentation and/or other materials provided with the distribution.
3. All advertising materials mentioning features or use of this software must display the following acknowledgement:
This product includes software developed by the NetBSD Foundation, Inc. and its contributors.
4. Neither the name of The NetBSD Foundation nor the names of its contributors may be used to endorse or promote
products derived from this software without specific prior written permission.
THIS SOFTWARE IS PROVIDED BY THE NETBSD FOUNDATION, INC. AND CONTRIBUTORS ''AS IS'' AND ANY
EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES OF
MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL
THE FOUNDATION OR CONTRIBUTORS BE LIABLE FOR ANY DIRECT,INDIRECT,INCIDENTAL, SPECIAL, EX-
EMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTI-
TUTE GOODS OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER
CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT (IN-
CLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN
IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.
Redistribution and use in source and binary forms, with or without modification, are permitted provided that the fol-
lowing conditions are met:
1. Redistributions of source code must retain the above copyright notice, this list of conditions and the following dis-
claimer.
2. Redistributions in binary form must reproduce the above copyright notice, this list of conditions and the following
disclaimer in the documentation and/or other materials provided with the distribution.
THIS SOFTWARE IS PROVIDED BY THE NETBSD FOUNDATION, INC. AND CONTRIBUTORS ''AS IS'' AND ANY
EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES OF
MERCHANTABILITY AND FITNESS FOR A PARTICULAR
PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE FOUNDATION OR CONTRIBUTORS BE LIABLE FOR
ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUD-
ING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, DATA, OR
PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER
IN CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY
WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.
Redistribution and use in source and binary forms, with or without modification, are permitted provided that the fol-
lowing conditions are met:
1. Redistributions of source code must retain the above copyright notice unmodified, this list of conditions, and the
following disclaimer.
2. Redistributions in binary form must reproduce the above copyright notice, this list of conditions and the following
disclaimer in the
documentation and/or other materials provided with the distribution.
THIS SOFTWARE IS PROVIDED BY THE AUTHOR ''AS IS'' AND ANY EXPRESS OR IMPLIED WARRANTIES, IN-
CLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A
PARTICULAR PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE AUTHOR BE LIABLE FOR ANY DIRECT,
INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT
LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR
BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CON-
TRACT, STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT
OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.
Redistribution and use in source and binary forms, with or without modification, are permitted provided that the fol-
lowing conditions are met:
1. Redistributions of source code must retain the above copyright notice unmodified, this list of conditions, and the
following disclaimer.
2. Redistributions in binary form must reproduce the above copyright notice, this list of conditions and the following
disclaimer in the documentation and/or other materials provided with the distribution.
THIS SOFTWARE IS PROVIDED BY THE AUTHOR ''AS IS'' AND ANY EXPRESS OR IMPLIED WARRANTIES, IN-
CLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A
PARTICULAR PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE AUTHOR BE LIABLE FOR ANY DIRECT,
INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT
LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR
BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CON-
TRACT, STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT
1718
OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.
Redistribution and use in source and binary forms, with or without modification, are permitted provided that the fol-
lowing conditions are met:
1. Redistributions of source code must retain the above copyright notice unmodified, this list of conditions, and the
following disclaimer.
2. Redistributions in binary form must reproduce the above copyright notice, this list of conditions and the following
disclaimer in the documentation and/or other materials provided with the distribution.
THIS SOFTWARE IS PROVIDED BY THE AUTHOR ''AS IS'' AND ANY EXPRESS OR IMPLIED WARRANTIES, IN-
CLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A
PARTICULAR PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE AUTHOR BE LIABLE FOR ANY DIRECT,
INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT
LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR
BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CON-
TRACT, STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT
OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.
This version of the SRE library can be redistributed under CNRI's Python 1.6 license. For any other use, please contact
Secret Labs AB ([email protected]).
Portions of this engine have been developed in cooperation with CNRI. Hewlett-Packard provided funding for 1.6 in-
tegration and other compatibility work.
Redistribution and use in source and binary forms, with or without modification, are permitted provided that the fol-
lowing conditions are met:
1. Redistributions of source code must retain the above copyright notice, this list of conditions and the following dis-
claimer.
2. Redistributions in binary form must reproduce the above copyright notice, this list of conditions and the following
disclaimer in the documentation and/or other materials provided with the distribution.
3. All advertising materials mentioning features or use of this software must display the following acknowledgement:
This product includes software developed by the NetBSD
Foundation, Inc. and its contributors.
4. Neither the name of The NetBSD Foundation nor the names of its contributors may be used to endorse or promote
products derived from this software without specific prior written permission.
THIS SOFTWARE IS PROVIDED BY THE NETBSD FOUNDATION, INC. AND CONTRIBUTORS ''AS IS'' AND ANY
EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES OF
MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL
THE FOUNDATION OR CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EX-
EMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTI-
TUTE GOODS OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER
CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT (IN-
CLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN
IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.
Copyright (c) 1997 Berkeley Software Design, Inc. All rights reserved.
Redistribution and use in source and binary forms, with or without modification, are permitted provided that the fol-
lowing conditions are met:
1. Redistributions of source code must retain the above copyright notice, this list of conditions and the following dis-
claimer.
2. Redistributions in binary form must reproduce the above copyright notice, this list of conditions and the following
disclaimer in the documentation and/or other materials provided with the distribution.
3. Berkeley Software Design Inc's name may not be used to endorse or promote products derived from this software
without specific prior written permission.
THIS SOFTWARE IS PROVIDED BY BERKELEY SOFTWARE DESIGN INC ''AS IS'' AND ANY EXPRESS OR IMPLIED
WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES OF MERCHANTABILITY AND
FITNESS FOR A PARTICULAR PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL BERKELEY SOFTWARE DE-
SIGN INC BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUEN-
TIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES;
LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY
OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHER-
WISE) ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY
OF SUCH DAMAGE.
1719
SGOS Administration Guide
Redistribution and use in source and binary forms, with or without modification, are permitted provided that the fol-
lowing conditions are met:
1. Redistributions of source code must retain the above copyright notice, this list of conditions and the following dis-
claimer.
2. Redistributions in binary form must reproduce the above copyright notice, this list of conditions and the following
disclaimer in the
documentation and/or other materials provided with the distribution.
3. All advertising materials mentioning features or use of this software must display the following acknowledgement:
This product includes software developed by Christos Zoulas.
4. The name of the author may not be used to endorse or promote products derived from this software without specific
prior written permission.
THIS SOFTWARE IS PROVIDED BY THE AUTHOR ''AS IS'' AND ANY EXPRESS OR IMPLIED WARRANTIES, IN-
CLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A
PARTICULAR PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE AUTHOR BE LIABLE FOR ANY DIRECT,
INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT
LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR
BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CON-
TRACT, STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT
OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.
Redistribution and use in source and binary forms, with or without modification, are permitted provided that the fol-
lowing conditions are met:
1. Redistributions of source code must retain the above copyright notice, this list of conditions and the following dis-
claimer.
2. Redistributions in binary form must reproduce the above copyright notice, this list of conditions and the following
disclaimer in the documentation and/or other materials provided with the distribution.
THIS SOFTWARE IS PROVIDED BY THE AUTHOR AND CONTRIBUTORS ''AS IS'' AND ANY EXPRESS OR IM-
PLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES OF MERCHANTABILI-
TY AND FITNESS FOR A PARTICULAR PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE AUTHOR OR
CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSE-
QUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SER-
VICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY
THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE
OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POS-
SIBILITY OF SUCH DAMAGE.
Redistribution and use in source and binary forms, with or without modification, are permitted provided that the fol-
lowing conditions are met:
1. Redistributions of source code must retain the above copyright notice, this list of conditions and the following dis-
claimer.
2. Redistributions in binary form must reproduce the above copyright notice, this list of conditions and the following
disclaimer in the
documentation and/or other materials provided with the distribution.
3. All advertising materials mentioning features or use of this software must display the following acknowledgement:
This product includes software developed for the NetBSD Project by Jason R. Thorpe.
4. The name of the author may not be used to endorse or promote products derived from this software without specific
prior written permission.
THIS SOFTWARE IS PROVIDED BY THE AUTHOR ''AS IS'' AND ANY EXPRESS OR IMPLIED WARRANTIES, IN-
CLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A
PARTICULAR PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE AUTHOR BE LIABLE FOR ANY DIRECT,
INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING,
BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, DATA, OR PROF-
ITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN
CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY
OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF
SUCH DAMAGE.
Redistribution and use in source and binary forms, with or without modification, are permitted provided that the fol-
1720
lowing conditions are met:
1. Redistributions of source code must retain the above copyright notice, this list of conditions and the following dis-
claimer.
2. Redistributions in binary form must reproduce the above copyright notice, this list of conditions and the following
disclaimer in the documentation and/or other materials provided with the distribution.
3. All advertising materials mentioning features or use of this software must display the following acknowledgement:
This product includes software developed by Jonathan Stone and Jason R. Thorpe for the NetBSD Project.
4. The names of the authors may not be used to endorse or promote products derived from this software without spe-
cific prior written permission.
THIS SOFTWARE IS PROVIDED BY THE AUTHORS ''AS IS'' AND ANY EXPRESS OR IMPLIED WARRANTIES, IN-
CLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A
PARTICULAR PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE AUTHOR BE LIABLE FOR ANY DIRECT,
INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT
LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR
BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CON-
TRACT, STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT
OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.
Redistribution and use in source and binary forms, with or without modification, are permitted provided that the fol-
lowing conditions are met:
1. Redistributions of source code must retain the above copyright notice, this list of conditions, and the following dis-
claimer, without modification, immediately at the beginning of the file.
2. The name of the author may not be used to endorse or promote products derived from this software without specific
prior written permission.
THIS SOFTWARE IS PROVIDED BY THE AUTHOR AND CONTRIBUTORS ''AS IS'' AND ANY EXPRESS OR IM-
PLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES OF MERCHANTABILI-
TY AND FITNESS FOR A PARTICULAR PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE AUTHOR OR
CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSE-
QUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SER-
VICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY
THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT
LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF
THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.
Redistribution and use in source and binary forms, with or without modification, are permitted provided that the fol-
lowing conditions are met:
1. Redistributions of source code must retain the above copyright notice, this list of conditions, and the following dis-
claimer, without modification, immediately at the beginning of the file.
2. The name of the author may not be used to endorse or promote products derived from this software without specific
prior written permission.
THIS SOFTWARE IS PROVIDED BY THE AUTHOR AND CONTRIBUTORS ''AS IS'' AND ANY EXPRESS OR IM-
PLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES OF MERCHANTABILI-
TY AND FITNESS FOR A PARTICULAR PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE AUTHOR OR
CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSE-
QUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SER-
VICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY
THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT
LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF
THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.
Redistribution and use in source and binary forms, with or without modification, are permitted provided that the fol-
lowing conditions are met:
1. Redistributions of source code must retain the above copyright notice, this list of conditions, and the following dis-
claimer, without modification, immediately at the beginning of the file.
2. The name of the author may not be used to endorse or promote products derived from this software without specific
prior written permission.
THIS SOFTWARE IS PROVIDED BY THE AUTHOR AND CONTRIBUTORS ''AS IS'' AND ANY EXPRESS OR IM-
PLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES OF MERCHANTABILI-
TY AND FITNESS FOR A PARTICULAR PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE AUTHOR OR
1721
SGOS Administration Guide
CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSE-
QUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SER-
VICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY
THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE
OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POS-
SIBILITY OF SUCH DAMAGE.
Redistribution and use in source and binary forms, with or without modification, are permitted provided that the fol-
lowing conditions are met:
1. Redistributions of source code must retain the above copyright notice, this list of conditions, and the following dis-
claimer, without modification.
2. The name of the author may not be used to endorse or promote products derived from this software without specific
prior written permission.
Alternatively, this software may be distributed under the terms of the GNU General Public License ("GPL").
THIS SOFTWARE IS PROVIDED BY THE AUTHOR AND CONTRIBUTORS ''AS IS'' AND ANY EXPRESS OR IM-
PLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES OF MERCHANTABILI-
TY AND FITNESS FOR A PARTICULAR PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE AUTHOR OR
CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSE-
QUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SER-
VICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY
THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE
OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POS-
SIBILITY OF SUCH DAMAGE.
Redistribution and use in source and binary forms, with or without modification, are permitted provided that the fol-
lowing conditions are met:
1. Redistributions of source code must retain the above copyright notice, this list of conditions, and the following dis-
claimer, without modification.
2. Redistributions in binary form must reproduce at minimum a disclaimer substantially similar to the "NO WARRAN-
TY" disclaimer below ("Disclaimer") and any redistribution must be conditioned upon including a substantially similar
Disclaimer requirement for further binary redistribution.
3. Neither the names of the above-listed copyright holders nor the names of any contributors may be used to endorse
or promote products derived
from this software without specific prior written permission.
Alternatively, this software may be distributed under the terms of the GNU General Public License ("GPL") version 2 as
published by the Free Software Foundation.
NO WARRANTY
THIS SOFTWARE IS PROVIDED BY THE COPYRIGHT HOLDERS AND CONTRIBUTORS "AS IS" AND ANY EX-
PRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES OF MER-
CHANTIBILITY AND FITNESS FOR A PARTICULAR PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE
COPYRIGHT HOLDERS OR CONTRIBUTORS BE LIABLE FOR SPECIAL, EXEMPLARY, OR CONSEQUENTIAL
DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS
OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY OF LI-
ABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE)
ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH
DAMAGES.
Redistribution and use in source and binary forms, with or without modification, are permitted provided that the fol-
lowing conditions are met:
1. Redistributions of source code must retain the above copyright notice, this list of conditions, and the following dis-
claimer, without modification.
2. Redistributions in binary form must reproduce at minimum a disclaimer substantially similar to the "NO WARRAN-
TY" disclaimer below
("Disclaimer") and any redistribution must be conditioned upon including a substantially similar Disclaimer require-
ment for further binary redistribution.
3. Neither the names of the above-listed copyright holders nor the names of any contributors may be used to endorse
or promote products derived
from this software without specific prior written permission.
1722
Alternatively, this software may be distributed under the terms of the GNU General Public License ("GPL") version 2 as
published by the Free Software Foundation.
NO WARRANTY
THIS SOFTWARE IS PROVIDED BY THE COPYRIGHT HOLDERS AND CONTRIBUTORS "AS IS" AND ANY EX-
PRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES OF MER-
CHANTIBILITY AND FITNESS FOR A PARTICULAR PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE
COPYRIGHT HOLDERS OR CONTRIBUTORS BE LIABLE FOR SPECIAL, EXEMPLARY, OR CONSEQUENTIAL
DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS
OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY OF LI-
ABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE)
ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH
DAMAGES.
Redistribution and use in source and binary forms, with or without modification, are permitted provided that the fol-
lowing conditions are met:
1. Redistributions of source code must retain the above copyright notice, this list of conditions and the following dis-
claimer.
2. Redistributions in binary form must reproduce the above copyright notice, this list of conditions and the following
disclaimer in the documentation and/or other materials provided with the distribution.
3. All advertising materials mentioning features or use of this software must display the following acknowledgement:
This product includes software developed by Manuel Bouyer.
4. The name of the author may not be used to endorse or promote products derived from this software without specific
prior written permission.
THIS SOFTWARE IS PROVIDED BY THE AUTHOR "AS IS'' AND ANY EXPRESS OR IMPLIED WARRANTIES, IN-
CLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A
PARTICULAR PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE AUTHOR BE LIABLE FOR ANY DIRECT,
INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT
LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR
BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CON-
TRACT, STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT
OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.
Redistribution and use in source and binary forms, with or without modification, are permitted provided that the fol-
lowing conditions are met:
1. Redistributions of source code must retain the above copyright notice, this list of conditions and the following dis-
claimer.
2. Redistributions in binary form must reproduce the above copyright notice, this list of conditions and the following
disclaimer in the
documentation and/or other materials provided with the distribution.
3. All advertising materials mentioning features or use of this software must display the following acknowledgement:
This product includes software developed by Causality Limited.
4. The name of Causality Limited may not be used to endorse or promote products derived from this software without
specific prior written
permission.
THIS SOFTWARE IS PROVIDED BY CAUSALITY LIMITED ''AS IS'' AND ANY EXPRESS OR IMPLIED WARRAN-
TIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS
FOR A PARTICULAR PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL CAUSALITY LIMITED BE LIABLE FOR
ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUD-
ING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, DATA, OR
PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER
IN CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY
WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.
Redistribution and use in source and binary forms, with or without modification, are permitted provided that the fol-
lowing conditions are met:
1. Redistributions of source code must retain the above copyright notice, this list of conditions and the following dis-
claimer.
2. Redistributions in binary form must reproduce the above copyright notice, this list of conditions and the following
disclaimer in the documentation and/or other materials provided with the distribution.
3. All advertising materials mentioning features or use of this software must display the following acknowledgement:
This product includes software developed for the FreeBSD Project by Peter Wemm.
4. The name of the author may not be used to endorse or promote products derived from this software without specific
prior written permission.
1723
SGOS Administration Guide
THIS SOFTWARE IS PROVIDED BY THE AUTHOR ''AS IS'' AND ANY EXPRESS OR IMPLIED WARRANTIES, IN-
CLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A
PARTICULAR PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE AUTHOR BE LIABLE FOR ANY DIRECT,
INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT
LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR
BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CON-
TRACT, STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT
OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF
SUCH DAMAGE.
Redistribution and use in source and binary forms, with or without modification, are permitted provided that the fol-
lowing conditions are met:
1. Redistributions of source code must retain the above copyright notice, this list of conditions and the following dis-
claimer.
2. Redistributions in binary form must reproduce the above copyright notice, this list of conditions and the following
disclaimer in the documentation and/or other materials provided with the distribution.
3. The name of the author may not be used to endorse or promote products derived from this software without specific
prior written permission.
THIS SOFTWARE IS PROVIDED BY THE AUTHOR AND CONTRIBUTORS ''AS IS'' AND ANY EXPRESS OR IM-
PLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES OF MERCHANTABILI-
TY AND FITNESS FOR A PARTICULAR PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE AUTHOR OR
CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSE-
QUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SER-
VICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY
THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE
OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POS-
SIBILITY OF SUCH DAMAGE.
Redistribution and use in source and binary forms, with or without modification, are permitted provided that the fol-
lowing conditions are met:
1. Redistributions of source code must retain the above copyright notice, this list of conditions and the following dis-
claimer.
2. Redistributions in binary form must reproduce the above copyright notice, this list of conditions and the following
disclaimer in the
documentation and/or other materials provided with the distribution.
3. The name of the author may not be used to endorse or promote products derived from this software without specific
prior written permission.
THIS SOFTWARE IS PROVIDED ''AS IS'' AND ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT
LIMITED TO, THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PUR-
POSE ARE DISCLAIMED. IN NO EVENT SHALL THE AUTHOR BE LIABLE FOR ANY DIRECT, INDIRECT, INCI-
DENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO,
PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTER-
RUPTION) HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT LIA-
BILITY, OR TORT (INCLUDING NEGLIGENCE OR
OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSI-
BILITY OF SUCH DAMAGE.
Copyright (c) 1998, 1999, 2000, 2001 The NetBSD Foundation, Inc.
All rights reserved.
Redistribution and use in source and binary forms, with or without modification, are permitted provided that the fol-
lowing conditions are met:
1. Redistributions of source code must retain the above copyright notice, this list of conditions and the following dis-
claimer.
2. Redistributions in binary form must reproduce the above copyright notice, this list of conditions and the following
disclaimer in the documentation and/or other materials provided with the distribution.
3. All advertising materials mentioning features or use of this software must display the following acknowledgement:
This product includes software developed by the NetBSD Foundation, Inc. and its contributors.
4. Neither the name of The NetBSD Foundation nor the names of its contributors may be used to endorse or promote
products derived from this software without specific prior written permission.
THIS SOFTWARE IS PROVIDED BY THE NETBSD FOUNDATION, INC. AND CONTRIBUTORS ''AS IS'' AND ANY
EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES OF
MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL
THE FOUNDATION OR CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EX-
EMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTI-
TUTE GOODS OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER
CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT (IN-
1724
CLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN
IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.
Redistribution and use in source and binary forms, with or without modification, are permitted provided that the fol-
lowing conditions are met:
1. Redistributions of source code must retain the above copyright notice, this list of conditions and the following dis-
claimer.
2. Redistributions in binary form must reproduce the above copyright notice, this list of conditions and the following
disclaimer in the documentation and/or other materials provided with the distribution.
3. All advertising materials mentioning features or use of this software must display the following acknowledgement:
This product includes software developed by the NetBSD Foundation, Inc. and its contributors.
4. Neither the name of The NetBSD Foundation nor the names of its contributors may be used to endorse or promote
products derived from this software without specific prior written permission.
THIS SOFTWARE IS PROVIDED BY THE NETBSD FOUNDATION, INC. AND CONTRIBUTORS ''AS IS'' AND ANY
EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES OF
MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL
THE FOUNDATION OR CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EX-
EMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTI-
TUTE GOODS OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER
CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT (IN-
CLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN
IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.
Redistribution and use in source and binary forms, with or without modification, are permitted provided that the fol-
lowing conditions are met:
1. Redistributions of source code must retain the above copyright notice, this list of conditions and the following dis-
claimer.
2. Redistributions in binary form must reproduce the above copyright notice, this list of conditions and the following
disclaimer in the
documentation and/or other materials provided with the distribution.
3. All advertising materials mentioning features or use of this software must display the following acknowledgement:
This product includes software developed by the NetBSD Foundation, Inc. and its contributors.
4. Neither the name of The NetBSD Foundation nor the names of its contributors may be used to endorse or promote
products derived from this software without specific prior written permission.
THIS SOFTWARE IS PROVIDED BY THE NETBSD FOUNDATION, INC. AND CONTRIBUTORS ''AS IS'' AND ANY
EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES OF
MERCHANTABILITY AND FITNESS FOR A PARTICULAR
PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE FOUNDATION OR CONTRIBUTORS BE LIABLE FOR
ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUD-
ING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, DATA, OR
PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER
IN CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY
WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.
Redistribution and use in source and binary forms, with or without modification, are permitted provided that the fol-
lowing conditions are met:
1. Redistributions of source code must retain the above copyright notice, this list of conditions and the following dis-
claimer.
2. Redistributions in binary form must reproduce the above copyright notice, this list of conditions and the following
disclaimer in the documentation and/or other materials provided with the distribution.
3. All advertising materials mentioning features or use of this software must display the following acknowledgement:
This product includes software developed by the NetBSD Foundation, Inc. and its contributors.
4. Neither the name of The NetBSD Foundation nor the names of its contributors may be used to endorse or promote
products derived
from this software without specific prior written permission.
THIS SOFTWARE IS PROVIDED BY THE NETBSD FOUNDATION, INC. AND CONTRIBUTORS ''AS IS'' AND ANY
EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES OF
MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL
THE FOUNDATION OR CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EX-
EMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTI-
TUTE GOODS OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER
CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT (IN-
CLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN
IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.
1725
SGOS Administration Guide
Redistribution and use in source and binary forms, with or without modification, are permitted provided that the fol-
lowing conditions are met:
1. Redistributions of source code must retain the above copyright notice unmodified, this list of conditions, and the
following disclaimer.
2. Redistributions in binary form must reproduce the above copyright notice, this list of conditions and the following
disclaimer in the
documentation and/or other materials provided with the distribution.
THIS SOFTWARE IS PROVIDED BY THE AUTHOR AND CONTRIBUTORS ''AS IS'' AND ANY EXPRESS OR IM-
PLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES OF MERCHANTABILI-
TY AND FITNESS FOR A PARTICULAR PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE AUTHOR OR
CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSE-
QUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SER-
VICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY
THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT
LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF
THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.
Redistribution and use in source and binary forms, with or without modification, are permitted provided that the fol-
lowing conditions are met:
1. Redistributions of source code must retain the above copyright notice, this list of conditions and the following dis-
claimer.
2. Redistributions in binary form must reproduce the above copyright notice, this list of conditions and the following
disclaimer in the documentation and/or other materials provided with the distribution.
3. Neither the name of the project nor the names of its contributors may be used to endorse or promote products derived
from this software without specific prior written permission.
THIS SOFTWARE IS PROVIDED BY THE PROJECT AND CONTRIBUTORS ''AS IS'' AND ANY EXPRESS OR IMPLIED
WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES OF MERCHANTABILITY AND
FITNESS FOR A PARTICULAR PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE PROJECT OR CONTRIB-
UTORS BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL
DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS
OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY OF LI-
ABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE)
ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH
DAMAGE.
Redistribution and use in source and binary forms, with or without modification, are permitted provided that the fol-
lowing conditions are met:
1. Redistributions of source code must retain the above copyright notice, this list of conditions and the following dis-
claimer.
2. Redistributions in binary form must reproduce the above copyright notice, this list of conditions and the following
disclaimer in the documentation and/or other materials provided with the distribution.
3. All advertising materials mentioning features or use of this software must display the following acknowledgement:
"This product includes software developed by the OpenSSL Project for use in the OpenSSL Toolkit. (http://
www.openssl.org/)"
4. The names "OpenSSL Toolkit" and "OpenSSL Project" must not be used to endorse or promote products derived from
this software without prior written permission. For written permission, please contact [email protected].
5. Products derived from this software may not be called "OpenSSL" nor may "OpenSSL" appear in their names without
prior written permission of the OpenSSL Project.
THIS SOFTWARE IS PROVIDED BY THE OpenSSL PROJECT ''AS IS'' AND ANY EXPRESSED OR IMPLIED WAR-
RANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FIT-
1726
NESS FOR A PARTICULAR PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE OpenSSL PROJECT OR ITS
CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSE-
QUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SER-
VICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY
THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE
OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POS-
SIBILITY OF SUCH DAMAGE.
====================================================================
This product includes cryptographic software written by Eric Young ([email protected]). This product includes soft-
ware written by Tim Hudson ([email protected]).
Redistribution and use in source and binary forms, with or without modification, are permitted provided that the fol-
lowing conditions are met:
1. Redistributions of source code must retain the above copyright notice, this list of conditions and the following dis-
claimer.
2. Redistributions in binary form must reproduce the above copyright notice, this list of conditions and the following
disclaimer in the documentation and/or other materials provided with the distribution.
THIS SOFTWARE IS PROVIDED BY THE AUTHOR AND CONTRIBUTORS ''AS IS'' AND ANY EXPRESS OR IM-
PLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES OF MERCHANTABILI-
TY AND FITNESS FOR A PARTICULAR PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE AUTHOR OR
CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSE-
QUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SER-
VICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY
THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE
OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POS-
SIBILITY OF SUCH DAMAGE.
Redistribution and use in source and binary forms, with or without modification, are permitted provided that the fol-
lowing conditions are met:
1. Redistributions of source code must retain the above copyright notice, this list of conditions and the following dis-
claimer.
2. Redistributions in binary form must reproduce the above copyright notice, this list of conditions and the following
disclaimer in the documentation and/or other materials provided with the distribution.
THIS SOFTWARE IS PROVIDED BY THE REGENTS AND CONTRIBUTORS ''AS IS'' AND ANY EXPRESS OR IM-
PLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES OF MERCHANTABILI-
TY AND FITNESS FOR A PARTICULAR PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE REGENTS OR
CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSE-
QUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SER-
VICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY
THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT
LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF
THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.
Work partly supported by: Cisco Systems, Inc. - NSITE lab, RTP, NC
Redistribution and use in source and binary forms, with or without modification, are permitted provided that the fol-
lowing conditions are met:
1. Redistributions of source code must retain the above copyright notice, this list of conditions and the following dis-
claimer.
2. Redistributions in binary form must reproduce the above copyright notice, this list of conditions and the following
disclaimer in the documentation and/or other materials provided with the distribution.
THIS SOFTWARE IS PROVIDED BY THE AUTHOR ''AS IS'' AND ANY EXPRESS OR IMPLIED WARRANTIES, IN-
CLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A
PARTICULAR PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE REGENTS OR CONTRIBUTORS BE LIA-
BLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL
DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS
OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY OF LI-
ABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE)
ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH
DAMAGE.
1727
SGOS Administration Guide
Redistribution and use in source and binary forms, with or without modification, are permitted provided that the fol-
lowing conditions are met:
1. Redistributions of source code must retain the above copyright notice, this list of conditions and the following dis-
claimer.
2. Redistributions in binary form must reproduce the above copyright notice, this list of conditions and the following
disclaimer in the documentation and/or other materials provided with the distribution.
THIS SOFTWARE IS PROVIDED BY THE AUTHOR AND CONTRIBUTORS ''AS IS'' AND ANY EXPRESS OR IM-
PLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES OF MERCHANTABILI-
TY AND FITNESS FOR A PARTICULAR PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE AUTHOR OR
CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSE-
QUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SER-
VICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY
THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT
LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF
THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.
Redistribution and use in source and binary forms, with or without modification, are permitted provided that the fol-
lowing conditions are met:
1. Redistributions of source code must retain the above copyright notice, this list of conditions and the following dis-
claimer.
2. Redistributions in binary form must reproduce the above copyright notice, this list of conditions and the following
disclaimer in the documentation and/or other materials provided with the distribution.
3. All advertising materials mentioning features or use of this software must display the following acknowledgement:
This product includes software developed by the NetBSD Foundation, Inc. and its contributors.
4. Neither the name of The NetBSD Foundation nor the names of its contributors may be used to endorse or promote
products derived from this software without specific prior written permission.
THIS SOFTWARE IS PROVIDED BY THE NETBSD FOUNDATION, INC. AND CONTRIBUTORS ''AS IS'' AND ANY
EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES OF
MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL
THE FOUNDATION OR CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EX-
EMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTI-
TUTE GOODS OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER
CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT (IN-
CLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN
IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.
Redistribution and use in source and binary forms, with or without modification, are permitted provided that the fol-
lowing conditions are met:
1. Redistributions of source code must retain the above copyright notice, this list of conditions and the following dis-
claimer, without modification, immediately at the beginning of the file.
2. Redistributions in binary form must reproduce the above copyright notice, this list of conditions and the following
disclaimer in the documentation and/or other materials provided with the distribution.
THIS SOFTWARE IS PROVIDED BY THE AUTHOR ''AS IS'' AND ANY EXPRESS OR IMPLIED WARRANTIES, IN-
CLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A
PARTICULAR PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE AUTHOR BE LIABLE FOR ANY DIRECT,
INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT
LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR
BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CON-
TRACT, STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT
OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.
Redistribution and use in source and binary forms, with or without modification, are permitted provided that the fol-
lowing conditions are met:
1. Redistributions of source code must retain the above copyright notice, this list of conditions and the following dis-
claimer, without modification, immediately at the beginning of the file.
2. Redistributions in binary form must reproduce the above copyright notice, this list of conditions and the following
disclaimer in the documentation and/or other materials provided with the distribution.
THIS SOFTWARE IS PROVIDED BY THE AUTHOR ''AS IS'' AND ANY EXPRESS OR IMPLIED WARRANTIES, IN-
CLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A
PARTICULAR PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE AUTHOR BE LIABLE FOR ANY DIRECT,
1728
INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT
LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR
BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CON-
TRACT, STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT
OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.
Redistribution and use in source and binary forms, with or without modification, are permitted provided that the fol-
lowing conditions are met:
1. Redistributions of source code must retain the above copyright notice, this list of conditions and the following dis-
claimer.
2. Redistributions in binary form must reproduce the above copyright notice, this list of conditions and the following
disclaimer in the documentation and/or other materials provided with the distribution.
THIS SOFTWARE IS PROVIDED BY THE AUTHOR AND CONTRIBUTORS ''AS IS'' AND ANY EXPRESS OR IM-
PLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES OF MERCHANTABILI-
TY AND FITNESS FOR A PARTICULAR PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE AUTHOR OR
CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSE-
QUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SER-
VICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY
THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE
OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POS-
SIBILITY OF SUCH DAMAGE.
Redistribution and use in source and binary forms, with or without modification, are permitted provided that the fol-
lowing conditions are met:
1. Redistributions of source code must retain the above copyright notice, this list of conditions and the following dis-
claimer.
2. Redistributions in binary form must reproduce the above copyright notice, this list of conditions and the following
disclaimer in the documentation and/or other materials provided with the distribution.
THIS SOFTWARE IS PROVIDED BY THE AUTHOR AND CONTRIBUTORS ''AS IS'' AND ANY EXPRESS OR IM-
PLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES OF MERCHANTABILI-
TY AND FITNESS FOR A PARTICULAR PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE AUTHOR OR
CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSE-
QUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SER-
VICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY
THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE
OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POS-
SIBILITY OF SUCH DAMAGE.
Redistribution and use in source and binary forms, with or without modification, are permitted provided that the fol-
lowing conditions are met:
1. Redistributions of source code must retain the above copyright notice, this list of conditions and the following dis-
claimer.
2. Redistributions in binary form must reproduce the above copyright notice, this list of conditions and the following
disclaimer in the documentation and/or other materials provided with the distribution.
THIS SOFTWARE IS PROVIDED BY THE AUTHOR AND CONTRIBUTORS ''AS IS'' AND ANY EXPRESS OR IM-
PLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES OF MERCHANTABILI-
TY AND FITNESS FOR A PARTICULAR PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE AUTHOR OR
CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSE-
QUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SER-
VICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY
THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT
LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF
THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.
Redistribution and use in source and binary forms, with or without modification, are permitted provided that the fol-
lowing conditions are met:
1. Redistributions of source code must retain the above copyright notice, this list of conditions, and the following dis-
claimer, without modification, immediately at the beginning of the file.
2. The name of the author may not be used to endorse or promote products derived from this software without specific
1729
SGOS Administration Guide
THIS SOFTWARE IS PROVIDED BY THE AUTHOR AND CONTRIBUTORS ''AS IS'' AND ANY EXPRESS OR IM-
PLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES OF MERCHANTABILI-
TY AND FITNESS FOR A PARTICULAR PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE AUTHOR OR
CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSE-
QUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SER-
VICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY
THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT
LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF
THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.
Redistribution and use in source and binary forms, with or without modification, are permitted provided that the fol-
lowing conditions are met:
1. Redistributions of source code must retain the above copyright notice, this list of conditions, and the following dis-
claimer, without modification, immediately at the beginning of the file.
2. The name of the author may not be used to endorse or promote products derived from this software without specific
prior written permission.
THIS SOFTWARE IS PROVIDED BY THE AUTHOR AND CONTRIBUTORS ''AS IS'' AND ANY EXPRESS OR IM-
PLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES OF MERCHANTABILI-
TY AND FITNESS FOR A PARTICULAR PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE AUTHOR OR
CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSE-
QUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SER-
VICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY
THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT
LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF
THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.
Redistribution and use in source and binary forms, with or without modification, are permitted provided that the fol-
lowing conditions are met:
1. Redistributions of source code must retain the above copyright notice, this list of conditions and the following dis-
claimer.
2. Redistributions in binary form must reproduce the above copyright notice, this list of conditions and the following
disclaimer in the documentation and/or other materials provided with the distribution.
3. The name of the author may not be used to endorse or promote products derived from this software without specific
prior written permission.
THIS SOFTWARE IS PROVIDED BY THE AUTHOR ''AS IS'' AND ANY EXPRESS OR IMPLIED WARRANTIES, IN-
CLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A
PARTICULAR PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE AUTHOR BE LIABLE FOR ANY DIRECT,
INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT
LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR
BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CON-
TRACT, STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT
OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.
Copyright (c) 1998 The NetBSD Foundation, Inc. All rights reserved.
Copyright (c) 1998 Lennart Augustsson. All rights reserved.
Copyright (c) 2008-2010 Hans Petter Selasky. All rights reserved.
Redistribution and use in source and binary forms, with or without modification, are permitted provided that the fol-
lowing conditions are met:
1. Redistributions of source code must retain the above copyright notice, this list of conditions and the following dis-
claimer.
2. Redistributions in binary form must reproduce the above copyright notice, this list of conditions and the following
disclaimer in the documentation and/or other materials provided with the distribution.
THIS SOFTWARE IS PROVIDED BY THE AUTHOR AND CONTRIBUTORS ''AS IS'' AND ANY EXPRESS OR IM-
PLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES OF MERCHANTABILI-
TY AND FITNESS FOR A PARTICULAR PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE AUTHOR OR
CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSE-
QUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SER-
VICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY
THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE
OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POS-
1730
SIBILITY OF SUCH DAMAGE.
Copyright (c) 1998 The NetBSD Foundation, Inc. All rights reserved.
Copyright (c) 1998 Lennart Augustsson. All rights reserved.
Copyright (c) 2008 Hans Petter Selasky. All rights reserved.
Redistribution and use in source and binary forms, with or without modification, are permitted provided that the fol-
lowing conditions are met:
1. Redistributions of source code must retain the above copyright notice, this list of conditions and the following dis-
claimer.
2. Redistributions in binary form must reproduce the above copyright notice, this list of conditions and the following
disclaimer in the documentation and/or other materials provided with the distribution.
THIS SOFTWARE IS PROVIDED BY THE AUTHOR AND CONTRIBUTORS ''AS IS'' AND ANY EXPRESS OR IM-
PLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES OF MERCHANTABILI-
TY AND FITNESS FOR A PARTICULAR PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE AUTHOR OR
CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSE-
QUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SER-
VICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY
THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE
OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POS-
SIBILITY OF SUCH DAMAGE.
Redistribution and use in source and binary forms, with or without modification, are permitted provided that the fol-
lowing conditions are met:
1. Redistributions of source code must retain the above copyright notice, this list of conditions and the following dis-
claimer.
2. Redistributions in binary form must reproduce the above copyright notice, this list of conditions and the following
disclaimer in the documentation and/or other materials provided with the distribution.
3. All advertising materials mentioning features or use of this software must display the following acknowledgement:
This product includes software developed by the NetBSD
Foundation, Inc. and its contributors.
4. Neither the name of The NetBSD Foundation nor the names of its contributors may be used to endorse or promote
products derived from this software without specific prior written permission.
THIS SOFTWARE IS PROVIDED BY THE NETBSD FOUNDATION, INC. AND CONTRIBUTORS ``AS IS'' AND ANY
EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES OF
MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL
THE FOUNDATION OR CONTRIBUTORS BE LIABLE FOR ANY DIRECT,INDIRECT,INCIDENTAL, SPECIAL, EX-
EMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTI-
TUTE GOODS OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER
CAUSED AND ON ANYTHEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT (IN-
CLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN
IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.
Redistribution and use in source and binary forms, with or without modification, are permitted provided that the fol-
lowing conditions are met:
1. Redistributions of source code must retain the above copyright notice, this list of conditions and the following dis-
claimer.
2. Redistributions in binary form must reproduce the above copyright notice, this list of conditions and the following
disclaimer in the documentation and/or other materials provided with the distribution.
3. All advertising materials mentioning features or use of this software must display the following acknowledgement:
This product includes software developed by the NetBSD Foundation, Inc. and its contributors.
4. Neither the name of The NetBSD Foundation nor the names of its contributors may be used to endorse or promote
products derived from this software without specific prior written permission.
THIS SOFTWARE IS PROVIDED BY THE NETBSD FOUNDATION, INC. AND CONTRIBUTORS ''AS IS'' AND ANY
EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES OF
MERCHANTABILITY AND FITNESS FOR A PARTICULAR
PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE FOUNDATION OR CONTRIBUTORS BE LIABLE FOR
ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUD-
ING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, DATA, OR
PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER
IN CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY
WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.
1731
SGOS Administration Guide
THE PROGRAM IS DISTRIBUTED UNDER THE BSD LICENSE ON AN "AS IS" BASIS, WITHOUT WARRANTIES OR
REPRESENTATIONS OF ANY KIND, EITHER EXPRESS OR IMPLIED.
Redistribution and use in source and binary forms, with or without modification, are permitted provided that the fol-
lowing conditions are met:
1. Redistributions of source code must retain the above copyright notice, this list of conditions and the following dis-
claimer.
2. Redistributions in binary form must reproduce the above copyright notice, this list of conditions and the following
disclaimer in the documentation and/or other materials provided with the distribution.
THIS SOFTWARE IS PROVIDED BY THE NETBSD FOUNDATION, INC. AND CONTRIBUTORS ''AS IS'' AND ANY
EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES OF
MERCHANTABILITY AND FITNESS FOR A PARTICULAR
PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE FOUNDATION OR CONTRIBUTORS BE LIABLE FOR
ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUD-
ING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, DATA, OR
PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER
IN CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY
WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.
Redistribution and use in source and binary forms, with or without modification, are permitted provided that the fol-
lowing conditions are met:
1. Redistributions of source code must retain the above copyright notice, this list of conditions and the following dis-
claimer.
2. Redistributions in binary form must reproduce the above copyright notice, this list of conditions and the following
disclaimer in the documentation and/or other materials provided with the distribution.
3. All advertising materials mentioning features or use of this software must display the following acknowledgement:
This product includes software developed by the NetBSD Foundation, Inc. and its contributors.
4. Neither the name of The NetBSD Foundation nor the names of its contributors may be used to endorse or promote
products derived from this software without specific prior written permission.
THIS SOFTWARE IS PROVIDED BY THE NETBSD FOUNDATION, INC. AND CONTRIBUTORS ''AS IS'' AND ANY
EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES OF
MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL
THE FOUNDATION OR CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EX-
EMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTI-
TUTE GOODS OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER
CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT (IN-
CLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN
IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.
Redistribution and use in source and binary forms, with or without modification, are permitted provided that the fol-
lowing conditions are met:
1. Redistributions of source code must retain the above copyright notice, this list of conditions and the following dis-
claimer.
2. Redistributions in binary form must reproduce the above copyright notice, this list of conditions and the following
disclaimer in the documentation and/or other materials provided with the distribution.
3. The name of the author may not be used to endorse or promote products derived from this software without specific
prior written permission.
THIS SOFTWARE IS PROVIDED ''AS IS'' AND ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT
LIMITED TO, THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PUR-
POSE ARE DISCLAIMED. IN NO EVENT SHALL THE AUTHOR BE LIABLE FOR ANY DIRECT, INDIRECT, INCI-
DENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO,
PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTER-
RUPTION) HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT LIA-
BILITY, OR TORT (INCLUDING NEGLIGENCE OR
OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSI-
BILITY OF SUCH DAMAGE.
Permission to use, copy, modify, and distribute this software for any purpose with or without fee is hereby granted, pro-
1732
vided that the above copyright notice and this permission notice appear in all copies.
THE SOFTWARE IS PROVIDED "AS IS" AND THE AUTHOR DISCLAIMS ALL WARRANTIES WITH REGARD TO
THIS SOFTWARE INCLUDING ALL IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS. IN NO
EVENT SHALL THE AUTHOR BE LIABLE FOR ANY SPECIAL, DIRECT, INDIRECT, OR CONSEQUENTIAL DAM-
AGES OR ANY DAMAGES WHATSOEVER RESULTING FROM LOSS OF USE, DATA OR PROFITS, WHETHER IN
AN ACTION OF CONTRACT, NEGLIGENCE OR OTHER TORTIOUS ACTION, ARISING OUT OF OR IN CONNEC-
TION WITH THE USE OR PERFORMANCE OF THIS SOFTWARE.
Permission to use, copy, modify, and distribute this software for any purpose with or without fee is hereby granted, pro-
vided that the above copyright notice and this permission notice appear in all copies.
THE SOFTWARE IS PROVIDED "AS IS" AND TODD C. MILLER DISCLAIMS ALL WARRANTIES WITH REGARD
TO THIS SOFTWARE INCLUDING ALL IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS. IN NO
EVENT SHALL TODD C. MILLER BE LIABLE FOR ANY SPECIAL, DIRECT, INDIRECT, OR CONSEQUENTIAL
DAMAGES OR ANY DAMAGES WHATSOEVER RESULTING FROM LOSS OF USE, DATA OR PROFITS, WHETHER
IN AN ACTION OF CONTRACT, NEGLIGENCE OR OTHER TORTIOUS ACTION, ARISING OUT OF OR IN CON-
NECTION WITH THE USE OR PERFORMANCE OF THIS SOFTWARE.
Redistribution and use in source and binary forms, with or without modification, are permitted provided that the fol-
lowing conditions are met:
1. Redistributions of source code must retain the above copyright notice, this list of conditions and the following dis-
claimer.
2. Redistributions in binary form must reproduce the above copyright notice, this list of conditions and the following
disclaimer in the documentation and/or other materials provided with the distribution.
THIS SOFTWARE IS PROVIDED BY THE AUTHOR AND CONTRIBUTORS ''AS IS'' AND ANY EXPRESS OR IM-
PLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES OF MERCHANTABILI-
TY AND FITNESS FOR A PARTICULAR PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE AUTHOR OR
CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSE-
QUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SER-
VICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY
THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE
OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POS-
SIBILITY OF SUCH DAMAGE.
Redistribution and use in source and binary forms, with or without modification, are permitted provided that the fol-
lowing conditions are met:
1. Redistributions of source code must retain the above copyright notice, this list of conditions and the following dis-
claimer.
2. Redistributions in binary form must reproduce the above copyright notice, this list of conditions and the following
disclaimer in the documentation
and/or other materials provided with the distribution.
3. All advertising materials mentioning features or use of this software must display the following acknowledgement:
This product includes software developed by Intel Corporation and its contributors.
4. Neither the name of Intel Corporation or its contributors may be used to endorse or promote products derived from
this software without specific
prior written permission.
THIS SOFTWARE IS PROVIDED BY INTEL CORPORATION AND CONTRIBUTORS ''AS IS'' AND ANY EXPRESS OR
IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES OF MERCHANTABI-
LITY AND FITNESS FOR A PARTICULAR PURPOSE ARE
DISCLAIMED. IN NO EVENT SHALL INTEL CORPORATION OR CONTRIBUTORS BE LIABLE FOR ANY DIRECT,
INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT
LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR
BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CON-
TRACT, STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT
OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.
1733
SGOS Administration Guide
Redistribution and use in source and binary forms, with or without modification, are permitted provided that the fol-
lowing conditions are met:
1. Redistributions of source code must retain the above copyright notice, this list of conditions, and the following dis-
claimer, without modification, immediately at the beginning of the file.
2. The name of the author may not be used to endorse or promote products derived from this software without specific
prior written permission.
THIS SOFTWARE IS PROVIDED BY THE AUTHOR AND CONTRIBUTORS ''AS IS'' AND ANY EXPRESS OR IM-
PLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES OF MERCHANTABILI-
TY AND FITNESS FOR A PARTICULAR PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE AUTHOR OR
CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSE-
QUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SER-
VICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY
THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT
LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF
THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.
Redistribution and use in source and binary forms, with or without modification, are permitted provided that the fol-
lowing conditions are met:
1. Redistributions of source code must retain the above copyright notice, this list of conditions and the following dis-
claimer.
2. Redistributions in binary form must reproduce the above copyright notice, this list of conditions and the following
disclaimer in the documentation
and/or other materials provided with the distribution.
3. Neither the name of Intel Corporation nor the names of its contributors may be used to endorse or promote products
derived from this software
without specific prior written permission.
THIS SOFTWARE IS PROVIDED BY THE COPYRIGHT HOLDERS AND CONTRIBUTORS ''AS IS''AND ANY EX-
PRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THEIMPLIED WARRANTIES OF MER-
CHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE ARE
DISCLAIMED. IN NO EVENT SHALL CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT,INCIDENTAL,
SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOTLIMITED TO, PROCURE-
MENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, DATA, ORPROFITS; OR BUSINESS INTERRUPTION)
HOWEVER CAUSED AND ON ANY THEORY OFLIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR
TORT (INCLUDINGNEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF THIS SOFT-
WARE,EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.
Redistribution and use in source and binary forms, with or without modification, are permitted provided that the fol-
lowing conditions are met:
1. Redistributions of source code must retain the above copyright notice, this list of conditions and the following dis-
claimer.
2. Redistributions in binary form must reproduce the above copyright notice, this list of conditions and the following
disclaimer in the documentation and/or other materials provided with the distribution.
THIS SOFTWARE IS PROVIDED BY THE AUTHOR AND CONTRIBUTORS ''AS IS'' AND ANY EXPRESS OR IM-
PLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES OF MERCHANTABILI-
TY AND FITNESS FOR A PARTICULAR PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE AUTHOR OR
CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSE-
QUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SER-
VICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY
THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT
LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF
THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.
1734
THE PROGRAM IS DISTRIBUTED UNDER THE BSD LICENSE ON AN "AS IS" BASIS,WITHOUT WARRANTIES OR
REPRESENTATIONS OF ANY KIND, EITHER EXPRESS OR IMPLIED.
Redistribution and use in source and binary forms, with or without modification, are permitted provided that the fol-
lowing conditions are met:
1. Redistributions of source code must retain the above copyright notice, this list of conditions and the following dis-
claimer.
2. Redistributions in binary form must reproduce the above copyright notice, this list of conditions and the following
disclaimer in the documentation and/or other materials provided with the distribution.
THIS SOFTWARE IS PROVIDED BY THE AUTHOR AND CONTRIBUTORS ''AS IS'' AND ANY EXPRESS OR IM-
PLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES OF MERCHANTABILI-
TY AND FITNESS FOR A PARTICULAR PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE AUTHOR OR
CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSE-
QUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SER-
VICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY
THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE
OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POS-
SIBILITY OF SUCH DAMAGE.
Redistribution and use in source and binary forms, with or without modification, are permitted provided that the fol-
lowing conditions are met:
1. Redistributions of source code must retain the above copyright notice, this list of conditions and the following dis-
claimer.
2. Redistributions in binary form must reproduce the above copyright notice, this list of conditions and the following
disclaimer in the documentation and/or other materials provided with the distribution.
THIS SOFTWARE IS PROVIDED BY THE AUTHOR AND CONTRIBUTORS ''AS IS'' AND ANY EXPRESS OR IM-
PLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES OF MERCHANTABILI-
TY AND FITNESS FOR A PARTICULAR PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE AUTHOR OR
CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSE-
QUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SER-
VICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY
THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE
OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POS-
SIBILITY OF SUCH DAMAGE.
Redistribution and use in source and binary forms, with or without modification, are permitted provided that the fol-
lowing conditions are met:
1. Redistributions of source code must retain the above copyright notice, this list of conditions and the following dis-
claimer.
2. Redistributions in binary form must reproduce the above copyright notice, this list of conditions and the following
disclaimer in the documentation and/or other materials provided with the distribution.
THIS SOFTWARE IS PROVIDED BY THE AUTHOR AND CONTRIBUTORS ''AS IS'' AND ANY EXPRESS OR IM-
PLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES OF MERCHANTABILI-
TY AND FITNESS FOR A PARTICULAR PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE AUTHOR OR
CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSE-
QUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SER-
VICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY
THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE
OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POS-
SIBILITY OF SUCH DAMAGE.
THE PROGRAM IS DISTRIBUTED UNDER THE BSD LICENSE ON AN "AS IS" BASIS, WITHOUT WARRANTIES OR
REPRESENTATIONS OF ANY KIND, EITHER EXPRESS OR IMPLIED.
1735
SGOS Administration Guide
BSD License which accompanies this distribution. The full text of the license may be found at http://opensource.org/
licenses/bsd-license.php
THE PROGRAM IS DISTRIBUTED UNDER THE BSD LICENSE ON AN "AS IS" BASIS, WITHOUT WARRANTIES OR
REPRESENTATIONS OF ANY KIND, EITHER EXPRESS OR IMPLIED.
THE PROGRAM IS DISTRIBUTED UNDER THE BSD LICENSE ON AN "AS IS" BASIS, WITHOUT WARRANTIES OR
REPRESENTATIONS OF ANY KIND, EITHER EXPRESS OR IMPLIED.
Redistribution and use in source and binary forms, with or without modification, are permitted provided that the fol-
lowing conditions are met:
1. Redistributions of source code must retain the above copyright notice, this list of conditions and the following dis-
claimer.
2. Redistributions in binary form must reproduce the above copyright notice, this list of conditions and the following
disclaimer in the documentation and/or other materials provided with the distribution.
3. All advertising materials mentioning features or use of this software must display the following acknowledgement:
"This product includes software developed by the OpenSSL Project for use in the OpenSSL Toolkit. (http://
www.OpenSSL.org/)"
4. The names "OpenSSL Toolkit" and "OpenSSL Project" must not be used to endorse or promote products derived from
this software without prior written permission. For written permission, please contact [email protected].
5. Products derived from this software may not be called "OpenSSL" nor may "OpenSSL" appear in their names without
prior written permission of the OpenSSL Project.
THIS SOFTWARE IS PROVIDED BY THE OpenSSL PROJECT ''AS IS'' AND ANY EXPRESSED OR IMPLIED WAR-
RANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FIT-
NESS FOR A PARTICULAR PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE OpenSSL PROJECT OR ITS
CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSE-
QUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SER-
VICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY
THEORY OF LIABILITY, WHETHER IN CONTRACT,
STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE
USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.
THE PROGRAM IS DISTRIBUTED UNDER THE BSD LICENSE ON AN "AS IS" BASIS, WITHOUT WARRANTIES OR
REPRESENTATIONS OF ANY KIND, EITHER EXPRESS OR IMPLIED.
THE PROGRAM IS DISTRIBUTED UNDER THE BSD LICENSE ON AN "AS IS" BASIS, WITHOUT WARRANTIES OR
REPRESENTATIONS OF ANY KIND, EITHER EXPRESS OR IMPLIED.
This program and the accompanying materials are licensed and made available under the terms and conditions of the
BSD License which accompanies this distribution. The full text of the license may be found at http://opensource.org/
licenses/bsd-license.php
1736
THE PROGRAM IS DISTRIBUTED UNDER THE BSD LICENSE ON AN "AS IS" BASIS, WITHOUT WARRANTIES OR
REPRESENTATIONS OF ANY KIND, EITHER EXPRESS OR IMPLIED.
This program and the accompanying materials are licensed and made available under the terms and conditions of the
BSD License which accompanies this distribution. The full text of the license may be found at http://opensource.org/
licenses/bsd-license.php
THE PROGRAM IS DISTRIBUTED UNDER THE BSD LICENSE ON AN "AS IS" BASIS, WITHOUT WARRANTIES OR
REPRESENTATIONS OF ANY KIND, EITHER EXPRESS OR IMPLIED.
Redistribution and use in source and binary forms, with or without modification, are permitted provided that the fol-
lowing conditions are met:
1. Redistributions of source code must retain the above copyright notice, this list of conditions and the following dis-
claimer.
2. Redistributions in binary form must reproduce the above copyright notice, this list of conditions and the following
disclaimer in the documentation and/or other materials provided with the distribution.
THIS SOFTWARE IS PROVIDED BY THE AUTHOR AND CONTRIBUTORS ''AS IS'' AND ANY EXPRESS OR IM-
PLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES OF MERCHANTABILI-
TY AND FITNESS FOR A PARTICULAR PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE AUTHOR OR
CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSE-
QUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SER-
VICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY
THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE
OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POS-
SIBILITY OF SUCH DAMAGE.
Redistribution and use in source and binary forms, with or without modification, are permitted provided that the fol-
lowing conditions are met:
1. Redistributions of source code must retain the above copyright notice, this list of conditions and the following dis-
claimer.
2. Redistributions in binary form must reproduce the above copyright notice, this list of conditions and the following
disclaimer in the documentation and/or other materials provided with the distribution.
THIS SOFTWARE IS PROVIDED BY THE AUTHOR AND CONTRIBUTORS ''AS IS'' AND ANY EXPRESS OR IM-
PLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES OF MERCHANTABILI-
TY AND FITNESS FOR A PARTICULAR PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE AUTHOR OR
CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSE-
QUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SER-
VICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY
THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE
OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POS-
SIBILITY OF SUCH DAMAGE.
Redistribution and use in source and binary forms, with or without modification, are permitted provided that the fol-
lowing conditions are met:
1. Redistributions of source code must retain the above copyright notice, this list of conditions, and the following dis-
claimer, without modification, immediately at the beginning of the file.
2. The name of the author may not be used to endorse or promote products derived from this software without specific
prior written permission.
THIS SOFTWARE IS PROVIDED BY THE AUTHOR AND CONTRIBUTORS ''AS IS'' AND ANY EXPRESS OR IM-
PLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES OF MERCHANTABILI-
TY AND FITNESS FOR A PARTICULAR PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE AUTHOR OR
CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSE-
QUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SER-
VICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY
THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE
OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POS-
SIBILITY OF SUCH DAMAGE.
1737
SGOS Administration Guide
Redistribution and use in source and binary forms, with or without modification, are permitted provided that the fol-
lowing conditions are met:
1. Redistributions of source code must retain the above copyright notice, this list of conditions and the following dis-
claimer.
2. Redistributions in binary form must reproduce the above copyright notice, this list of conditions and the following
disclaimer in the documentation and/or other materials provided with the distribution.
THIS SOFTWARE IS PROVIDED BY THE AUTHOR AND CONTRIBUTORS ''AS IS'' AND ANY EXPRESS OR IM-
PLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES OF MERCHANTABILI-
TY AND FITNESS FOR A PARTICULAR PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE AUTHOR OR
CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSE-
QUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SER-
VICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY
THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE
OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POS-
SIBILITY OF SUCH DAMAGE.
Redistribution and use in source and binary forms, with or without modification, are permitted provided that the fol-
lowing conditions are met:
1. Redistributions of source code must retain the above copyright notice, this list of conditions and the following dis-
claimer.
2. Redistributions in binary form must reproduce the above copyright notice, this list of conditions and the following
disclaimer in the documentation and/or other materials provided with the distribution.
THIS SOFTWARE IS PROVIDED BY MARK MURRAY AND CONTRIBUTORS ''AS IS'' AND ANY EXPRESS OR IM-
PLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES OF MERCHANTABILI-
TY AND FITNESS FOR A PARTICULAR PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL MARK MURRAY OR
CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSE-
QUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SER-
VICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY
THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE
OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POS-
SIBILITY OF SUCH DAMAGE.
Redistribution and use in source and binary forms, with or without modification, are permitted provided that the fol-
lowing conditions are met:
1. Redistributions of source code must retain the above copyright notice, this list of conditions and the following dis-
claimer.
2. Redistributions in binary form must reproduce the above copyright notice, this list of conditions and the following
disclaimer in the documentation and/or other materials provided with the distribution.
THIS SOFTWARE IS PROVIDED BY THE AUTHOR AND CONTRIBUTORS ''AS IS'' AND ANY EXPRESS OR IM-
PLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES OF MERCHANTABILI-
TY AND FITNESS FOR A PARTICULAR PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE AUTHOR OR
CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSE-
QUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SER-
VICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY
THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT
LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF
THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.
Redistribution and use in source and binary forms, with or without modification, are permitted provided that the fol-
lowing conditions are met:
1. Redistributions of source code must retain the above copyright notice, this list of conditions and the following dis-
claimer.
2. Redistributions in binary form must reproduce the above copyright notice, this list of conditions and the following
disclaimer in the documentation and/or other materials provided with the distribution.
THIS SOFTWARE IS PROVIDED BY THE AUTHOR AND CONTRIBUTORS ''AS IS'' AND ANY EXPRESS OR IM-
PLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES OF MERCHANTABILI-
TY AND FITNESS FOR A PARTICULAR PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE AUTHOR OR
CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSE-
QUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SER-
1738
VICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY
THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT
LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF
THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.
Redistribution and use in source and binary forms, with or without modification, are permitted provided that the fol-
lowing conditions are met:
1. Redistributions of source code must retain the above copyright notice, this list of conditions and the following dis-
claimer.
2. Redistributions in binary form must reproduce the above copyright notice, this list of conditions and the following
disclaimer in the documentation and/or other materials provided with the distribution.
3. All advertising materials mentioning features or use of this software must display the following acknowledgement:
This product includes software developed by the NetBSD Foundation, Inc. and its contributors.
4. Neither the name of The NetBSD Foundation nor the names of its contributors may be used to endorse or promote
products derived from this software without specific prior written permission.
THIS SOFTWARE IS PROVIDED BY THE NETBSD FOUNDATION, INC. AND CONTRIBUTORS ''AS IS'' AND ANY
EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES OF
MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL
THE FOUNDATION OR CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT,INCIDENTAL, SPECIAL, EX-
EMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF
SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOW-
EVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT
(INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE,
EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.
Redistribution and use in source and binary forms, with or without modification, are permitted provided that the fol-
lowing conditions are met:
1. Redistributions of source code must retain the above copyright notice, this list of conditions and the following dis-
claimer in this position and unchanged.
2. Redistributions in binary form must reproduce the above copyright notice, this list of conditions and the following
disclaimer in the documentation and/or other materials provided with the distribution.
THIS SOFTWARE IS PROVIDED BY THE AUTHOR ''AS IS'' AND ANY EXPRESS OR IMPLIED WARRANTIES, IN-
CLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A
PARTICULAR PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE AUTHOR BE LIABLE FOR ANY DIRECT,
INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT
LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR
BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CON-
TRACT, STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT
OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.
Redistribution and use in source and binary forms, with or without modification, are permitted provided that the fol-
lowing conditions are met:
1. Redistributions of source code must retain the above copyright notice, this list of conditions and the following dis-
claimer.
2. Redistributions in binary form must reproduce the above copyright notice, this list of conditions and the following
disclaimer in the
documentation and/or other materials provided with the distribution.
THIS SOFTWARE IS PROVIDED BY THE AUTHOR AND CONTRIBUTORS ''AS IS'' AND ANY EXPRESS OR IM-
PLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES OF MERCHANTABILI-
TY AND FITNESS FOR A PARTICULAR PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE AUTHOR OR
CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSE-
QUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SER-
VICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY
THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE
OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POS-
SIBILITY OF SUCH DAMAGE.
Redistribution and use in source and binary forms, with or without modification, are permitted provided that the fol-
lowing conditions
are met:
1739
SGOS Administration Guide
1. Redistributions of source code must retain the above copyright notice, this list of conditions and the following dis-
claimer.
2. Redistributions in binary form must reproduce the above copyright notice, this list of conditions and the following
disclaimer in the
documentation and/or other materials provided with the distribution.
3. All advertising materials mentioning features or use of this software must display the following acknowledgement:
This product includes software developed by the NetBSD Foundation, Inc. and its contributors.
4. Neither the name of The NetBSD Foundation nor the names of its contributors may be used to endorse or promote
products derived from this software without specific prior written permission.
THIS SOFTWARE IS PROVIDED BY THE NETBSD FOUNDATION, INC. AND CONTRIBUTORS ''AS IS'' AND ANY
EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES OF
MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL
THE FOUNDATION OR CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EX-
EMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTI-
TUTE GOODS OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER
CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT (IN-
CLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN
IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.
Redistribution and use in source and binary forms, with or without modification, are permitted provided that the fol-
lowing conditions are met:
1. Redistributions of source code must retain the above copyright notice immediately at the beginning of the file, with-
out modification, this list of conditions, and the following disclaimer.
2. The name of the author may not be used to endorse or promote products derived from this software without specific
prior written permission.
THIS SOFTWARE IS PROVIDED BY THE AUTHOR AND CONTRIBUTORS ''AS IS'' AND ANY EXPRESS OR IM-
PLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES OF MERCHANTABILI-
TY AND FITNESS FOR A PARTICULAR PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE AUTHOR OR
CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSE-
QUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SER-
VICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY
THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE
OR OTHERWISE) ARISING IN ANY WAY
Redistribution and use in source and binary forms, with or without modification, are permitted provided that the fol-
lowing conditions are met:
1. Redistributions of source code must retain the above copyright notice immediately at the beginning of the file, with-
out modification,
this list of conditions, and the following disclaimer.
2. The name of the author may not be used to endorse or promote products derived from this software without specific
prior written permission.
THIS SOFTWARE IS PROVIDED BY THE AUTHOR AND CONTRIBUTORS ''AS IS'' AND ANY EXPRESS OR IM-
PLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES OF MERCHANTABILI-
TY AND FITNESS FOR A PARTICULAR PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE AUTHOR OR
CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSE-
QUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SER-
VICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY
THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT
LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF
THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.
Redistribution and use in source and binary forms, with or without modification, are permitted provided that the fol-
lowing conditions are met:
1. Redistributions of source code must retain the above copyright notice immediately at the beginning of the file, with-
out modification, this list of conditions, and the following disclaimer.
2. The name of the author may not be used to endorse or promote products derived from this software without specific
prior written permission.
THIS SOFTWARE IS PROVIDED BY THE AUTHOR AND CONTRIBUTORS ''AS IS'' AND ANY EXPRESS OR IM-
PLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES OF MERCHANTABILI-
TY AND FITNESS FOR A PARTICULAR PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE AUTHOR OR
CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSE-
QUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SER-
1740
VICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY
THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT
LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF
THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.
Redistribution and use in source and binary forms, with or without modification, are permitted provided that the fol-
lowing conditions are met:
1. Redistributions of source code must retain the above copyright notice, this list of conditions, and the following dis-
claimer, without modification, immediately at the beginning of the file.
2. The name of the author may not be used to endorse or promote products derived from this software without specific
prior written permission.
THIS SOFTWARE IS PROVIDED BY THE AUTHOR AND CONTRIBUTORS ''AS IS'' AND ANY EXPRESS OR IM-
PLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES OF MERCHANTABILI-
TY AND FITNESS FOR A PARTICULAR PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE AUTHOR OR
CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSE-
QUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SER-
VICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY
THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT
LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF
THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.
Redistribution and use in source and binary forms, with or without modification, are permitted provided that the fol-
lowing conditions are met:
1. Redistributions of source code must retain the above copyright notice, this list of conditions and the following dis-
claimer.
2. Redistributions in binary form must reproduce the above copyright notice, this list of conditions and the following
disclaimer in the documentation and/or other materials provided with the distribution.
THIS SOFTWARE IS PROVIDED BY THE AUTHOR AND CONTRIBUTORS ''AS IS'' AND ANY EXPRESS OR IM-
PLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES OF MERCHANTABILI-
TY AND FITNESS FOR A PARTICULAR PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE AUTHOR OR
CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSE-
QUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SER-
VICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY
THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT
LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF
THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.
Redistribution and use in source and binary forms, with or without modification, are permitted provided that the fol-
lowing conditions are met:
1. Redistributions of source code must retain the above copyright notice, this list of conditions and the following dis-
claimer.
2. Redistributions in binary form must reproduce the above copyright notice, this list of conditions and the following
disclaimer in the documentation and/or other materials provided with the distribution.
3. All advertising materials mentioning features or use of this software must display the following acknowledgement:
This product includes software developed by the NetBSD Foundation, Inc. and its contributors.
4. Neither the name of The NetBSD Foundation nor the names of its contributors may be used to endorse or promote
products derived from this software without specific prior written permission.
THIS SOFTWARE IS PROVIDED BY THE NETBSD FOUNDATION, INC. AND CONTRIBUTORS ``AS IS'' AND ANY
EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES OF
MERCHANTABILITY AND FITNESS FOR A PARTICULAR
PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE FOUNDATION OR CONTRIBUTORS BE LIABLE FOR
ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUD-
ING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, DATA, OR
PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER
IN CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY
WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.
Redistribution and use in source and binary forms, with or without modification, are permitted provided that the fol-
lowing conditions are met:
1. Redistributions of source code must retain the above copyright notice, this list of conditions and the following dis-
claimer.
1741
SGOS Administration Guide
2. Neither the name of the University nor the names of its contributors may be used to endorse or promote products
derived from this software
without specific prior written permission.
THIS SOFTWARE IS PROVIDED BY THE REGENTS AND CONTRIBUTORS ''AS IS'' AND ANY EXPRESS OR IM-
PLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES OF MERCHANTABILI-
TY AND FITNESS FOR A PARTICULAR PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE REGENTS OR
CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSE-
QUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SER-
VICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY
THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE
OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POS-
SIBILITY OF SUCH DAMAGE.
Redistribution and use in source and binary forms, with or without modification, are permitted provided that the fol-
lowing conditions are met:
1. Redistributions of source code must retain the above copyright notice, this list of conditions, and the following dis-
claimer, without modification.
2. Redistributions in binary form must reproduce at minimum a disclaimer substantially similar to the "NO WARRAN-
TY" disclaimer below ("Disclaimer") and any redistribution must be conditioned upon including a substantially similar
Disclaimer requirement for further binary redistribution.
3. Neither the names of the above-listed copyright holders nor the names of any contributors may be used to endorse
or promote products derived
from this software without specific prior written permission.
Alternatively, this software may be distributed under the terms of the GNU General Public License ("GPL") version 2 as
published by the Free Software Foundation.
NO WARRANTY
THIS SOFTWARE IS PROVIDED BY THE COPYRIGHT HOLDERS AND CONTRIBUTORS "AS IS" AND ANY EX-
PRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES OF MER-
CHANTIBILITY AND FITNESS FOR A PARTICULAR PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE
COPYRIGHT HOLDERS OR CONTRIBUTORS BE LIABLE FOR SPECIAL, EXEMPLARY, OR CONSEQUENTIAL
DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS
OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY OF LI-
ABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE)
ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH
DAMAGES.
1. Redistributions of source code must retain the above copyright notice, this list of conditions and the following dis-
claimer.
2. Redistributions in binary form must reproduce the above copyright notice, this list of conditions and the following
disclaimer in the documentation and/or other materials provided with the distribution.
3. The name of the author may not be used to endorse or promote products derived from this software without specific
prior written permission.
THIS SOFTWARE IS PROVIDED ''AS IS'' AND ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT
LIMITED TO, THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PUR-
POSE ARE DISCLAIMED. IN NO EVENT SHALL THE AUTHOR BE LIABLE FOR ANY DIRECT, INDIRECT, INCI-
DENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO,
PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTER-
RUPTION) HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT LIA-
BILITY, OR TORT (INCLUDING NEGLIGENCE OR
OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSI-
BILITY OF SUCH DAMAGE.
Redistribution and use in source and binary forms, with or without modification, are permitted provided that the fol-
lowing conditions are met:
1. Redistributions of source code must retain the above copyright notice, this list of conditions and the following dis-
claimer.
2. Redistributions in binary form must reproduce the above copyright notice, this list of conditions and the following
disclaimer in the
documentation and/or other materials provided with the distribution.
3. The name of the author may not be used to endorse or promote products derived from this software without specific
prior written permission.
1742
THIS SOFTWARE IS PROVIDED ''AS IS'' AND ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT
LIMITED TO, THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PUR-
POSE ARE DISCLAIMED. IN NO EVENT SHALL THE AUTHOR BE LIABLE FOR ANY DIRECT, INDIRECT, INCI-
DENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO,
PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTER-
RUPTION) HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT LIA-
BILITY, OR TORT (INCLUDING NEGLIGENCE OR
OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSI-
BILITY OF SUCH DAMAGE.
Redistribution and use in source and binary forms, with or without modification, are permitted provided that the fol-
lowing conditions are met:
1. Redistributions of source code must retain the above copyright notice, this list of conditions and the following dis-
claimer in this position and unchanged.
2. Redistributions in binary form must reproduce the above copyright notice, this list of conditions and the following
disclaimer in the documentation and/or other materials provided with the distribution.
THIS SOFTWARE IS PROVIDED BY THE AUTHOR ''AS IS'' AND ANY EXPRESS OR IMPLIED WARRANTIES, IN-
CLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A
PARTICULAR PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE AUTHOR BE LIABLE FOR ANY DIRECT,
INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT
LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR
BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CON-
TRACT, STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT
OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.
Redistribution and use in source and binary forms, with or without modification, are permitted provided that the fol-
lowing conditions are met:
1. Redistributions of source code must retain the above copyright notice, this list of conditions and the following dis-
claimer.
2. Neither the name of the University nor the names of its contributors may be used to endorse or promote products
derived from this software
without specific prior written permission.
THIS SOFTWARE IS PROVIDED BY THE REGENTS AND CONTRIBUTORS ''AS IS'' AND ANY EXPRESS OR IM-
PLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES OF MERCHANTABILI-
TY AND FITNESS FOR A PARTICULAR PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE REGENTS OR
CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSE-
QUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SER-
VICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY
THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT
LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF
THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.
Redistribution and use in source and binary forms, with or without modification, are permitted provided that the fol-
lowing conditions are met:
1. Redistributions of source code must retain the above copyright notice, this list of conditions and the following dis-
claimer, without modification, immediately at the beginning of the file.
2. Redistributions in binary form must reproduce the above copyright notice, this list of conditions and the following
disclaimer in the documentation and/or other materials provided with the distribution.
3. The name of the author may not be used to endorse or promote products derived from this software without specific
prior written permission.
THIS SOFTWARE IS PROVIDED BY THE AUTHOR ''AS IS'' AND ANY EXPRESS OR IMPLIED WARRANTIES, IN-
CLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A
PARTICULAR PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE AUTHOR BE LIABLE FOR ANY DIRECT,
INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT
LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR
BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CON-
TRACT, STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT
OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.
1743
SGOS Administration Guide
Redistribution and use in source and binary forms, with or without modification, are permitted provided that the fol-
lowing conditions are met:
1. Redistributions of source code must retain the above copyright notice, this list of conditions and the following dis-
claimer.
2. Redistributions in binary form must reproduce at minimum a disclaimer substantially similar to the "NO WARRAN-
TY" disclaimer below
("Disclaimer") and any redistribution must be conditioned upon including
a substantially similar Disclaimer requirement for further binary redistribution.
3. Neither the name of the LSI Logic Corporation nor the names of its contributors may be used to endorse or promote
products derived from this software without specific prior written permission.
THIS SOFTWARE IS PROVIDED BY THE COPYRIGHT HOLDERS AND CONTRIBUTORS "AS IS" AND ANY EX-
PRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES OF MER-
CHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE
COPYRIGHT OWNER OR CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL,
EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUB-
STITUTE GOODS OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER
CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT (IN-
CLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN
IF THE COPYRIGHT OWNER OR CONTRIBUTOR IS ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.
Redistribution and use in source and binary forms, with or without modification, are permitted provided that the fol-
lowing conditions are met:
1. Redistributions of source code must retain the above copyright notice, this list of conditions and the following dis-
claimer.
2. Redistributions in binary form must reproduce the above copyright notice, this list of conditions and the following
disclaimer in the documentation and/or other materials provided with the distribution.
3. All advertising materials mentioning features or use of this software must display the following acknowledgement:
This product includes software developed by the NetBSD Foundation, Inc. and its contributors.
4. Neither the name of The NetBSD Foundation nor the names of its contributors may be used to endorse or promote
products derived from this software without specific prior written permission.
THIS SOFTWARE IS PROVIDED BY THE NETBSD FOUNDATION, INC. AND CONTRIBUTORS ''AS IS'' AND ANY
EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES OF
MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL
THE FOUNDATION OR CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EX-
EMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTI-
TUTE GOODS OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER
CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT (IN-
CLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN
IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.
Redistribution and use in source and binary forms, with or without modification, are permitted provided that the fol-
lowing conditions are met:
1. Redistributions of source code must retain the above copyright notice, this list of conditions and the following dis-
claimer, without modification, immediately at the beginning of the file.
2. Redistributions in binary form must reproduce the above copyright
notice, this list of conditions and the following disclaimer in the
documentation and/or other materials provided with the distribution.
THIS SOFTWARE IS PROVIDED BY THE AUTHOR ''AS IS'' AND ANY EXPRESS OR IMPLIED WARRANTIES, IN-
CLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A
PARTICULAR PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE AUTHOR BE LIABLE FOR ANY DIRECT,
INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT
LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR
BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CON-
TRACT, STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT
OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.
Redistribution and use in source and binary forms, with or without modification, are permitted provided that the fol-
lowing conditions are met:
1. Redistributions of source code must retain the above copyright notice, this list of conditions and the following dis-
claimer.
2. Redistributions in binary form must reproduce the above copyright notice, this list of conditions and the following
disclaimer in the documentation and/or other materials provided with the distribution.
3. All advertising materials mentioning features or use of this software must display the following acknowledgement:
This product includes software developed by Bill Paul.
1744
4. Neither the name of the author nor the names of any co-contributors may be used to endorse or promote products
derived from this software
without specific prior written permission.
THIS SOFTWARE IS PROVIDED BY Bill Paul AND CONTRIBUTORS ''AS IS'' AND ANY EXPRESS OR IMPLIED WAR-
RANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FIT-
NESS FOR A PARTICULAR PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL Bill Paul OR THE VOICES IN HIS
HEAD BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR
CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS
OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON
ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING NEGLI-
GENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF
THE POSSIBILITY OF SUCH DAMAGE.
Redistribution and use in source and binary forms, with or without modification, are permitted provided that the fol-
lowing conditions are met:
1. Redistributions of source code must retain the above copyright notice, this list of conditions and the following dis-
claimer.
2. Redistributions in binary form must reproduce the above copyright notice, this list of conditions and the following
disclaimer in the
documentation and/or other materials provided with the distribution.
THIS SOFTWARE IS PROVIDED BY THE AUTHOR AND CONTRIBUTORS ''AS IS'' AND ANY EXPRESS OR IM-
PLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES OF MERCHANTABILI-
TY AND FITNESS FOR A PARTICULAR PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE AUTHOR OR
CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSE-
QUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SER-
VICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY
THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT
LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF
THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.
Redistribution and use in source and binary forms, with or without modification, are permitted provided that the fol-
lowing conditions are met:
1. Redistributions of source code must retain the above copyright notice, this list of conditions and the following dis-
claimer.
2. Redistributions in binary form must reproduce the above copyright notice, this list of conditions and the following
disclaimer in the documentation and/or other materials provided with the distribution.
THIS SOFTWARE IS PROVIDED BY THE AUTHOR AND CONTRIBUTORS ''AS IS'' AND ANY EXPRESS OR IM-
PLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES OF MERCHANTABILI-
TY AND FITNESS FOR A PARTICULAR PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE AUTHOR OR
CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSE-
QUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SER-
VICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY
THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT
LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF
THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.
Redistribution and use in source and binary forms, with or without modification, are permitted provided that the fol-
lowing conditions are met:
1. Redistributions of source code must retain the above copyright notice, this list of conditions and the following dis-
claimer.
2. Redistributions in binary form must reproduce the above copyright notice, this list of conditions and the following
disclaimer in the documentation and/or other materials provided with the distribution.
3. All advertising materials mentioning features or use of this software must display the following acknowledgement:
This product includes software developed by Intel Corporation and its contributors.
4. Neither the name of Intel Corporation or its contributors may be used to endorse or promote products derived from
this software without specific prior written permission.
1745
SGOS Administration Guide
THIS SOFTWARE IS PROVIDED BY INTEL CORPORATION AND CONTRIBUTORS ''AS IS'' AND ANY EXPRESS OR
IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES OF MERCHANTABI-
LITY AND FITNESS FOR A PARTICULAR PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL INTEL CORPORA-
TION OR CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR
CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS
OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON
ANY THEORY OF LIABILITY,WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING NEGLI-
GENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF
THE POSSIBILITY OF SUCH DAMAGE.
Redistribution and use in source and binary forms, with or without modification, are permitted provided that the fol-
lowing conditions are met:
1. Redistributions of source code must retain the above copyright notice, this list of conditions, and the following dis-
claimer.
2. Redistributions in binary form must reproduce the above copyright notice, this list of conditions and the following
disclaimer in the documentation and/or other materials provided with the distribution.
THIS SOFTWARE IS PROVIDED BY THE AUTHOR AND CONTRIBUTORS ''AS IS'' AND ANY EXPRESS OR IM-
PLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES OF MERCHANTABILI-
TY AND FITNESS FOR A PARTICULAR PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE AUTHOR OR
CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSE-
QUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SER-
VICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY
THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE
OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POS-
SIBILITY OF SUCH DAMAGE.
Redistribution and use in source and binary forms, with or without modification, are permitted provided that the fol-
lowing conditions are met:
1. Redistributions of source code must retain the above copyright notice, this list of conditions and the following dis-
claimer.
2. Redistributions in binary form must reproduce the above copyright notice, this list of conditions and the following
disclaimer in the documentation and/or other materials provided with the distribution.
THIS SOFTWARE IS PROVIDED BY THE AUTHOR AND CONTRIBUTORS ''AS IS'' AND ANY EXPRESS OR IM-
PLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES OF MERCHANTABILI-
TY AND FITNESS FOR A PARTICULAR PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE AUTHOR OR
CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSE-
QUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SER-
VICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY
THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE
OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POS-
SIBILITY OF SUCH DAMAGE.
Redistribution and use in source and binary forms, with or without modification, are permitted provided that the fol-
lowing conditions are met:
1. Redistributions of source code must retain the above copyright notice, this list of conditions and the following dis-
claimer.
2. Redistributions in binary form must reproduce the above copyright notice, this list of conditions and the following
disclaimer in the documentation and/or other materials provided with the distribution.
3. All advertising materials mentioning features or use of this software must display the following acknowledgement:
This product includes software developed by Jason L. Wright
4. The name of the author may not be used to endorse or promote products derived from this software without specific
prior written permission.
THIS SOFTWARE IS PROVIDED BY THE AUTHOR ''AS IS'' AND ANY EXPRESS OR IMPLIED WARRANTIES, IN-
CLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A
PARTICULAR PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE AUTHOR BE LIABLE FOR ANY DIRECT,
INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT
LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR
BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CON-
TRACT, STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT
OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.
1746
Redistribution and use in source and binary forms, with or without modification, are permitted provided that the fol-
lowing conditions are met:
1. Redistributions of source code must retain the above copyright notice, this list of conditions and the following dis-
claimer in this position and unchanged.
2. Redistributions in binary form must reproduce the above copyright notice, this list of conditions and the following
disclaimer in the documentation and/or other materials provided with the distribution.
THIS SOFTWARE IS PROVIDED BY THE AUTHOR ''AS IS'' AND ANY EXPRESS OR IMPLIED WARRANTIES, IN-
CLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A
PARTICULAR PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE AUTHOR BE LIABLE FOR ANY DIRECT,
INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT
LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR
BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CON-
TRACT, STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT
OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.
Redistribution and use in source and binary forms, with or without modification, are permitted provided that the fol-
lowing conditions are met:
1. Redistributions of source code must retain the above copyright notice, this list of conditions, and the following dis-
claimer,
without modification, immediately at the beginning of the file.
2. The name of the author may not be used to endorse or promote products derived from this software without specific
prior written permission.
THIS SOFTWARE IS PROVIDED BY THE AUTHOR AND CONTRIBUTORS ''AS IS'' AND ANY EXPRESS OR IM-
PLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES OF MERCHANTABILI-
TY AND FITNESS FOR A PARTICULAR PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE AUTHOR OR
CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSE-
QUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SER-
VICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY
THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT
LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF
THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.
Redistribution and use in source and binary forms, with or without modification, are permitted provided that the fol-
lowing conditions are met:
1. Redistributions of source code must retain the above copyright notice, this list of conditions and the following dis-
claimer.
2. Redistributions in binary form must reproduce the above copyright notice, this list of conditions and the following
disclaimer in the documentation and/or other materials provided with the distribution.
THIS SOFTWARE IS PROVIDED BY THE AUTHOR AND CONTRIBUTORS ''AS IS'' AND ANY EXPRESS OR IM-
PLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES OF MERCHANTABILI-
TY AND FITNESS FOR A PARTICULAR PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE AUTHOR OR
CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSE-
QUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SER-
VICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY
THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT
LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF
THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.
Redistribution and use in source and binary forms, with or without modification, are permitted provided that the fol-
lowing conditions
are met:
1. Redistributions of source code must retain the above copyright notice, this list of conditions and the following dis-
claimer.
2. Redistributions in binary form must reproduce the above copyright notice, this list of conditions and the following
disclaimer in the documentation and/or other materials provided with the distribution.
THIS SOFTWARE IS PROVIDED BY THE AUTHOR AND CONTRIBUTORS ''AS IS'' AND ANY EXPRESS OR IM-
PLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES OF MERCHANTABILI-
TY AND FITNESS FOR A PARTICULAR PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE AUTHOR OR
CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSE-
QUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SER-
1747
SGOS Administration Guide
VICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY
THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT
LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF
THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.
Redistribution and use in source and binary forms, with or without modification, are permitted provided that the fol-
lowing conditions are met:
1. Redistributions of source code must retain the above copyright notice, this list of conditions and the following dis-
claimer in this position and unchanged.
2. Redistributions in binary form must reproduce the above copyright notice, this list of conditions and the following
disclaimer in the documentation and/or other materials provided with the distribution.
3. The name of the author may not be used to endorse or promote products derived from this software without specific
prior written permission.
THIS SOFTWARE IS PROVIDED BY THE AUTHOR ''AS IS'' AND ANY EXPRESS OR IMPLIED WARRANTIES, IN-
CLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A
PARTICULAR PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE AUTHOR BE LIABLE FOR ANY DIRECT,
INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT
LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR
BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CON-
TRACT, STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT
OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.
Redistribution and use in source and binary forms, with or without modification, are permitted provided that the fol-
lowing conditions are met:
1. Redistributions of source code must retain the above copyright notice, this list of conditions and the following dis-
claimer.
2. Redistributions in binary form must reproduce the above copyright notice, this list of conditions and the following
disclaimer in the documentation and/or other materials provided with the distribution.
3. All advertising materials mentioning features or use of this software must display the following acknowledgement:
This product includes software developed by the NetBSD Foundation, Inc. and its contributors.
4. Neither the name of The NetBSD Foundation nor the names of its contributors may be used to endorse or promote
products derived from this software without specific prior written permission.
THIS SOFTWARE IS PROVIDED BY THE NETBSD FOUNDATION, INC. AND CONTRIBUTORS ''AS IS'' AND ANY
EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES OF
MERCHANTABILITY AND FITNESS FOR A PARTICULAR
PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE FOUNDATION OR CONTRIBUTORS BE LIABLE FOR
ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUD-
ING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, DATA, OR
PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER
IN CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY
WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.
Redistribution and use in source and binary forms, with or without modification, are permitted provided that the fol-
lowing conditions are met:
1. Redistributions of source code must retain the above copyright notice, this list of conditions, and the following dis-
claimer, without modification, immediately at the beginning of the file.
2. The name of the author may not be used to endorse or promote products derived from this software without specific
prior written permission.
Alternatively, this software may be distributed under the terms of the the GNU Public License ("GPL").
THIS SOFTWARE IS PROVIDED BY THE AUTHOR AND CONTRIBUTORS ''AS IS'' AND ANY EXPRESS OR IM-
PLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES OF MERCHANTABILI-
TY AND FITNESS FOR A PARTICULAR PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE AUTHOR OR
CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSE-
QUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SER-
VICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY
THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE
OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POS-
SIBILITY OF SUCH DAMAGE.
Redistribution and use in source and binary forms, with or without modification, are permitted provided that the fol-
1748
lowing conditions are met:
1. Redistributions of source code must retain the above copyright notice, this list of conditions and the following dis-
claimer.
2. Redistributions in binary form must reproduce the above copyright notice, this list of conditions and the following
disclaimer in the documentation and/or other materials provided with the distribution.
3. All advertising materials mentioning features or use of this software must display the following acknowledgement:
This product includes software developed by Cisco Systems, Inc.
4. Neither the name of the project nor the names of its contributors may be used to endorse or promote products derived
from this software without specific prior written permission.
THIS SOFTWARE IS PROVIDED BY CISCO SYSTEMS AND CONTRIBUTORS ''AS IS'' AND ANY EXPRESS OR IM-
PLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES OF MERCHANTABILI-
TY AND FITNESS FOR A PARTICULAR PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL CISCO SYSTEMS OR
CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSE-
QUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SER-
VICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY
THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE
OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POS-
SIBILITY OF SUCH DAMAGE.
Redistribution and use in source and binary forms, with or without modification, are permitted provided that the fol-
lowing conditions are met:
1. Redistributions of source code must retain the above copyright notice, this list of conditions and the following dis-
claimer.
2. Redistributions in binary form must reproduce the above copyright notice, this list of conditions and the following
disclaimer in the documentation and/or other materials provided with the distribution.
THIS SOFTWARE IS PROVIDED BY THE AUTHOR AND CONTRIBUTORS ''AS IS'' AND ANY EXPRESS OR IM-
PLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES OF MERCHANTABILI-
TY AND FITNESS FOR A PARTICULAR PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE AUTHOR OR
CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSE-
QUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SER-
VICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY
THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE
OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POS-
SIBILITY OF SUCH DAMAGE.
Redistribution and use in source and binary forms, with or without modification, are permitted provided that the fol-
lowing conditions are met:
1. Redistributions of source code must retain the above copyright notice, this list of conditions and the following dis-
claimer.
2. Redistributions in binary form must reproduce the above copyright notice, this list of conditions and the following
disclaimer in the documentation and/or other materials provided with the distribution.
3. All advertising materials mentioning features or use of this software must display the following acknowledgement:
This product includes software developed by Cisco Systems, Inc.
4. Neither the name of the project nor the names of its contributors may be used to endorse or promote products derived
from this software without specific prior written permission.
THIS SOFTWARE IS PROVIDED BY CISCO SYSTEMS AND CONTRIBUTORS ''AS IS'' AND ANY EXPRESS OR IM-
PLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES OF MERCHANTABILI-
TY AND FITNESS FOR A PARTICULAR PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL CISCO SYSTEMS OR
CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSE-
QUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SER-
VICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY
THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE
OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POS-
SIBILITY OF SUCH DAMAGE.
Redistribution and use in source and binary forms, with or without modification, are permitted provided that the fol-
lowing conditions are met:
1. Redistributions of source code must retain the above copyright notice, this list of conditions and the following dis-
claimer.
2. Redistributions in binary form must reproduce the above copyright notice, this list of conditions and the following
disclaimer in the
1749
SGOS Administration Guide
THIS SOFTWARE IS PROVIDED BY THE NETBSD FOUNDATION, INC. AND CONTRIBUTORS ''AS IS'' AND ANY
EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES OF
MERCHANTABILITY AND FITNESS FOR A PARTICULAR
PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE FOUNDATION OR CONTRIBUTORS BE LIABLE FOR
ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUD-
ING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, DATA, OR
PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER
IN CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY
WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.
Redistribution and use in source and binary forms, with or without modification, are permitted provided that the fol-
lowing conditions are met:
1. Redistributions of source code must retain the above copyright notice, this list of conditions and the following dis-
claimer.
2. Redistributions in binary form must reproduce the above copyright notice, this list of conditions and the following
disclaimer in the documentation and/or other materials provided with the distribution.
3. All advertising materials mentioning features or use of this software must display the following acknowledgement:
This product includes software developed by the NetBSD Foundation, Inc. and its contributors.
4. Neither the name of The NetBSD Foundation nor the names of its contributors may be used to endorse or promote
products derived from this software without specific prior written permission.
THIS SOFTWARE IS PROVIDED BY THE NETBSD FOUNDATION, INC. AND CONTRIBUTORS ''AS IS'' AND ANY
EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES OF
MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL
THE FOUNDATION OR CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EX-
EMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTI-
TUTE GOODS OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER
CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT (IN-
CLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN
IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.
THE PROGRAM IS DISTRIBUTED UNDER THE BSD LICENSE ON AN "AS IS" BASIS, WITHOUT WARRANTIES OR
REPRESENTATIONS OF ANY KIND, EITHER EXPRESS OR IMPLIED.
Redistribution and use in source and binary forms, with or without modification, are permitted provided that the fol-
lowing conditions are met:
1. Redistributions of source code must retain the above copyright notice, this list of conditions and the following dis-
claimer.
2. Redistributions in binary form must reproduce the above copyright notice, this list of conditions and the following
disclaimer in the documentation and/or other materials provided with the distribution.
THIS SOFTWARE IS PROVIDED BY THE AUTHOR AND CONTRIBUTORS ''AS IS'' AND ANY EXPRESS OR IM-
PLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES OF MERCHANTABILI-
TY AND FITNESS FOR A PARTICULAR PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE AUTHOR OR
CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSE-
QUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SER-
VICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY
THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE
OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POS-
SIBILITY OF SUCH DAMAGE.
Redistribution and use in source and binary forms, with or without modification, are permitted provided that the fol-
lowing conditions are met:
1750
1. Redistributions of source code must retain the above copyright notice, this list of conditions and the following dis-
claimer.
2. Redistributions in binary form must reproduce the above copyright notice, this list of conditions and the following
disclaimer in the documentation and/or other materials provided with the distribution.
THIS SOFTWARE IS PROVIDED BY THE AUTHOR AND CONTRIBUTORS ''AS IS'' AND ANY EXPRESS OR IM-
PLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES OF MERCHANTABILI-
TY AND FITNESS FOR A PARTICULAR PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE AUTHOR OR
CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSE-
QUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SER-
VICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY
THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE
OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POS-
SIBILITY OF SUCH DAMAGE.
Redistribution and use in source and binary forms, with or without modification, are permitted provided that the fol-
lowing conditions are met:
1. Redistributions of source code must retain the above copyright notice, this list of conditions and the following dis-
claimer.
2. Redistributions in binary form must reproduce the above copyright notice, this list of conditions and the following
disclaimer in the documentation and/or other materials provided with the distribution.
THIS SOFTWARE IS PROVIDED BY THE AUTHOR AND CONTRIBUTORS ''AS IS'' AND ANY EXPRESS OR IM-
PLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES OF MERCHANTABILI-
TY AND FITNESS FOR A PARTICULAR PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE AUTHOR OR
CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSE-
QUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SER-
VICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY
THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE
OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POS-
SIBILITY OF SUCH DAMAGE.
Redistribution and use in source and binary forms, with or without modification, are permitted provided that the fol-
lowing conditions are met:
1. Redistributions of source code must retain the above copyright notice, this list of conditions and the following dis-
claimer.
2. Redistributions in binary form must reproduce the above copyright notice, this list of conditions and the following
disclaimer in the documentation and/or other materials provided with the distribution.
3. Neither the name of the Intel Corporation nor the names of its contributors may be used to endorse or promote prod-
ucts derived from this software without specific prior written permission.
THIS SOFTWARE IS PROVIDED BY THE COPYRIGHT HOLDERS AND CONTRIBUTORS "AS IS" AND ANY EX-
PRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES OF MER-
CHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE
ARE DISCLAIMED. IN NO EVENT SHALL THE COPYRIGHT OWNER OR CONTRIBUTORS BE LIABLE FOR ANY
DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT
NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, DATA, OR PROFITS;
OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CON-
TRACT, STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT
OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.
Redistribution and use in source and binary forms, with or without modification, are permitted provided that the fol-
lowing conditions are met:
1. Redistributions of source code must retain the above copyright notice, this list of conditions and the following dis-
claimer.
2. Redistributions in binary form must reproduce the above copyright notice, this list of conditions and the following
disclaimer in the documentation and/or other materials provided with the distribution.
THIS SOFTWARE IS PROVIDED BY THE AUTHOR AND CONTRIBUTORS ''AS IS'' AND ANY EXPRESS OR IM-
PLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES OF MERCHANTABILI-
TY AND FITNESS FOR A PARTICULAR PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE AUTHOR OR
CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSE-
QUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SER-
VICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY
1751
SGOS Administration Guide
Redistribution and use in source and binary forms, with or without modification, are permitted provided that the fol-
lowing conditions are met:
1. Redistributions of source code must retain the above copyright notice, this list of conditions and the following dis-
claimer.
2. Redistributions in binary form must reproduce the above copyright notice, this list of conditions and the following
disclaimer in the
documentation and/or other materials provided with the distribution.
THIS SOFTWARE IS PROVIDED BY THE AUTHOR AND CONTRIBUTORS ''AS IS'' AND ANY EXPRESS OR IM-
PLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES OF MERCHANTABILI-
TY AND FITNESS FOR A PARTICULAR PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE AUTHOR OR
CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSE-
QUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SER-
VICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY
THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT
LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF
THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.
Redistribution and use in source and binary forms, with or without modification, are permitted provided that the fol-
lowing conditions are met:
1. Redistributions of source code must retain the above copyright notice, this list of conditions and the following dis-
claimer.
2. Redistributions in binary form must reproduce the above copyright notice, this list of conditions and the following
disclaimer in the documentation and/or other materials provided with the distribution.
3. Neither the name of the Intel Corporation nor the names of its contributors may be used to endorse or promote prod-
ucts derived from this software without specific prior written permission.
THIS SOFTWARE IS PROVIDED BY THE COPYRIGHT HOLDERS AND CONTRIBUTORS "AS IS" AND ANY EX-
PRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES OF MER-
CHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE
COPYRIGHT OWNER OR CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL,
EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUB-
STITUTE GOODS OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER
CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT (IN-
CLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN
IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.
Redistribution and use in source and binary forms, with or without modification, are permitted provided that the fol-
lowing conditions are met:
1. Redistributions of source code must retain the above copyright notice, this list of conditions and the following dis-
claimer.
2. Redistributions in binary form must reproduce the above copyright notice, this list of conditions and the following
disclaimer in the documentation and/or other materials provided with the distribution.
3. Neither the name of the Intel Corporation nor the names of its contributors may be used to endorse or promote prod-
ucts derived from this software without specific prior written permission.
THIS SOFTWARE IS PROVIDED BY THE COPYRIGHT HOLDERS AND CONTRIBUTORS "AS IS" AND ANY EX-
PRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES OF MER-
CHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE
COPYRIGHT OWNER OR CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL,
EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUB-
STITUTE GOODS OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER
CAUSED AND ON ANY THEORY OF LIABILITY,WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT (IN-
CLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN
IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.
1752
Copyright (c) 2001-2010, Intel Corporation
All rights reserved.
Redistribution and use in source and binary forms, with or without modification, are permitted provided that the fol-
lowing conditions are met:
1. Redistributions of source code must retain the above copyright notice, this list of conditions and the following dis-
claimer.
2. Redistributions in binary form must reproduce the above copyright notice, this list of conditions and the following
disclaimer in the documentation and/or other materials provided with the distribution.
3. Neither the name of the Intel Corporation nor the names of its contributors may be used to endorse or promote prod-
ucts derived from this software without specific prior written permission.
THIS SOFTWARE IS PROVIDED BY THE COPYRIGHT HOLDERS AND CONTRIBUTORS "AS IS" AND ANY EX-
PRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES OF MER-
CHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE
ARE DISCLAIMED. IN NO EVENT SHALL THE COPYRIGHT OWNER OR CONTRIBUTORS BE LIABLE FOR ANY
DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT
NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, DATA, OR PROFITS;
OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CON-
TRACT, STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT
OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.
Redistribution and use in source and binary forms, with or without modification, are permitted provided that the fol-
lowing conditions are met:
1. Redistributions of source code must retain the above copyright notice, this list of conditions and the following dis-
claimer.
2. Redistributions in binary form must reproduce the above copyright notice, this list of conditions and the following
disclaimer in the documentation and/or other materials provided with the distribution.
3. Neither the name of the Intel Corporation nor the names of its contributors may be used to endorse or promote prod-
ucts derived from this software without specific prior written permission.
THIS SOFTWARE IS PROVIDED BY THE COPYRIGHT HOLDERS AND CONTRIBUTORS "AS IS" AND ANY EX-
PRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES OF MER-
CHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE
ARE DISCLAIMED. IN NO EVENT SHALL THE COPYRIGHT OWNER OR CONTRIBUTORS BE LIABLE FOR ANY
DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT
NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, DATA, OR PROFITS;
OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CON-
TRACT, STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT
OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.
Redistribution and use in source and binary forms, with or without modification, are permitted provided that the fol-
lowing conditions are met:
1. Redistributions of source code must retain the above copyright notice, this list of conditions, and the following dis-
claimer, without modification.
2. Redistributions in binary form must reproduce at minimum a disclaimer substantially similar to the "NO WARRAN-
TY" disclaimer below ("Disclaimer") and any redistribution must be conditioned upon including a substantially similar
Disclaimer requirement for further binary redistribution.
3. Neither the names of the above-listed copyright holders nor the names of any contributors may be used to endorse
or promote products derived
from this software without specific prior written permission.
Alternatively, this software may be distributed under the terms of the GNU General Public License ("GPL") version 2 as
published by the Free Software Foundation.
NO WARRANTY
THIS SOFTWARE IS PROVIDED BY THE COPYRIGHT HOLDERS AND CONTRIBUTORS "AS IS" AND ANY EX-
PRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES OF MER-
CHANTIBILITY AND FITNESS FOR A PARTICULAR PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE
COPYRIGHT HOLDERS OR CONTRIBUTORS BE LIABLE FOR SPECIAL, EXEMPLARY, OR CONSEQUENTIAL
DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS
OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY OF LI-
ABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE)
ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH
1753
SGOS Administration Guide
DAMAGES.
Redistribution and use in source and binary forms, with or without modification, are permitted provided that the fol-
lowing conditions are met:
1. Redistributions of source code must retain the above copyright notice unmodified, this list of conditions, and the
following disclaimer.
2. Redistributions in binary form must reproduce the above copyright notice, this list of conditions and the following
disclaimer in the documentation and/or other materials provided with the distribution.
THIS SOFTWARE IS PROVIDED BY THE AUTHOR AND CONTRIBUTORS ''AS IS'' AND ANY EXPRESS OR IM-
PLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES OF MERCHANTABILI-
TY AND FITNESS FOR A PARTICULAR PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE AUTHOR OR
CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSE-
QUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SER-
VICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY
THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT
LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF
THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.
Redistribution and use in source and binary forms, with or without modification, are permitted provided that the fol-
lowing conditions are met:
1. Redistributions of source code must retain the above copyright notice, this list of conditions and the following dis-
claimer.
2. Redistributions in binary form must reproduce the above copyright notice, this list of conditions and the following
disclaimer in the documentation and/or other materials provided with the distribution.
3. All advertising materials mentioning features or use of this software must display the following acknowledgement:
This product includes software developed by Broadcom Corporation.
4. Neither the name of the author nor the names of any co-contributors may be used to endorse or promote products
derived from this software without specific prior written permission.
THIS SOFTWARE IS PROVIDED BY Broadcom Corporation ''AS IS'' AND ANY EXPRESS OR IMPLIED WARRAN-
TIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS
FOR A PARTICULAR PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL Broadcom Corporation BE LIABLE FOR
ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUD-
ING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, DATA, OR
PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER
IN CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY
WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.
Redistribution and use in source and binary forms, with or without modification, are permitted provided that the fol-
lowing conditions are met:
1. Redistributions of source code must retain the above copyright notice, this list of conditions and the following dis-
claimer.
2. Redistributions in binary form must reproduce the above copyright notice, this list of conditions and the following
disclaimer in the documentation and/or other materials provided with the distribution.
3. All advertising materials mentioning features or use of this software must display the following acknowledgement:
This product includes software developed by Broadcom Corporation.
4. Neither the name of the author nor the names of any co-contributors may be used to endorse or promote products
derived from this software
without specific prior written permission.
THIS SOFTWARE IS PROVIDED BY Broadcom Corporation ''AS IS'' AND ANY EXPRESS OR IMPLIED WARRAN-
TIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS
FOR A PARTICULAR PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL Broadcom Corporation BE LIABLE FOR
ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUD-
1754
ING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, DATA, OR
PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER
IN CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY
WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.
Redistribution and use in source and binary forms, with or without modification, are permitted provided that the fol-
lowing conditions are met:
1. Redistributions of source code must retain the above copyright notice, this list of conditions and the following dis-
claimer.
2. Redistributions in binary form must reproduce the above copyright notice, this list of conditions and the following
disclaimer in the
documentation and/or other materials provided with the distribution.
3. All advertising materials mentioning features or use of this software must display the following acknowledgement:
This product includes software developed by Broadcom Corporation.
4. Neither the name of the author nor the names of any co-contributors may be used to endorse or promote products
derived from this software
without specific prior written permission.
THIS SOFTWARE IS PROVIDED BY Broadcom Corporation ''AS IS'' AND ANY EXPRESS OR IMPLIED WARRAN-
TIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS
FOR A PARTICULAR PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL Broadcom Corporation BE LIABLE FOR
ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUD-
ING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, DATA, OR
PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER
IN CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY
WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF
THE POSSIBILITY OF SUCH DAMAGE.
Redistribution and use in source and binary forms, with or without modification, are permitted provided that the fol-
lowing conditions are met:
1. Redistributions of source code must retain the above copyright notice, this list of conditions and the following dis-
claimer.
2. Redistributions in binary form must reproduce the above copyright notice, this list of conditions and the following
disclaimer in the documentation and/or other materials provided with the distribution.
3. All advertising materials mentioning features or use of this software must display the following acknowledgement:
This product includes software developed by Broadcom Corporation.
4. Neither the name of the author nor the names of any co-contributors may be used to endorse or promote products
derived from this software without specific prior written permission.
THIS SOFTWARE IS PROVIDED BY Broadcom Corporation ``AS IS'' AND ANY EXPRESS OR IMPLIED WARRAN-
TIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS
FOR A PARTICULAR PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL Broadcom Corporation BE LIABLE FOR
ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUD-
ING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, DATA, OR
PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER
IN CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY
WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.
Redistribution and use in source and binary forms, with or without modification, are permitted provided that the fol-
lowing conditions are met:
1. Redistributions of source code must retain the above copyright notice, this list of conditions and the following dis-
claimer.
2. Redistributions in binary form must reproduce the above copyright notice, this list of conditions and the following
disclaimer in the documentation and/or other materials provided with the distribution.
THIS SOFTWARE IS PROVIDED BY THE AUTHOR AND CONTRIBUTORS ``AS IS'' AND ANY EXPRESS OR IM-
PLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES OF MERCHANTABILI-
TY AND FITNESS FOR A PARTICULAR PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE AUTHOR OR
CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSE-
QUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SER-
VICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY
THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE
OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POS-
1755
SGOS Administration Guide
Redistribution and use in source and binary forms, with or without modification, are permitted provided that the fol-
lowing conditions are met:
- Redistributions of source code must retain the above copyright notice, this list of conditions and the following dis-
claimer.
- Redistributions in binary form must reproduce the above copyright notice, this list of conditions and the following
disclaimer in the documentation and/or other materials provided with the distribution.
THIS SOFTWARE IS PROVIDED BY THE COPYRIGHT HOLDERS AND CONTRIBUTORS "AS IS" AND ANY EX-
PRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES OF MER-
CHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE
COPYRIGHT HOLDERS OR CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL,
EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUB-
STITUTE GOODS OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER
CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT (IN-
CLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN
IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.
Redistribution and use in source and binary forms, with or without modification, are permitted provided that the fol-
lowing conditions are met:
1. Redistributions of source code must retain the above copyright notice, this list of conditions and the following dis-
claimer.
2. Redistributions in binary form must reproduce the above copyright notice, this list of conditions and the following
disclaimer in the documentation and/or other materials provided with the distribution.
THIS SOFTWARE IS PROVIDED BY THE AUTHOR AND CONTRIBUTORS ''AS IS'' AND ANY EXPRESS OR IM-
PLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES OF MERCHANTABILI-
TY AND FITNESS FOR A PARTICULAR PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE AUTHOR OR
CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSE-
QUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SER-
VICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY
THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT
LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF
THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.
Redistribution and use in source and binary forms, with or without modification, are permitted provided that the fol-
lowing conditions are met:
1. Redistributions of source code must retain the above copyright notice, this list of conditions and the following dis-
claimer.
2. Redistributions in binary form must reproduce the above copyright notice, this list of conditions and the following
disclaimer in the
documentation and/or other materials provided with the distribution.
3. Neither the name of the author nor the names of any co-contributors may be used to endorse or promote products
derived from this software
without specific prior written permission.
THIS SOFTWARE IS PROVIDED BY THE AUTHOR AND CONTRIBUTORS ''AS IS'' AND ANY EXPRESS OR IM-
PLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES OF MERCHANTABILI-
TY AND FITNESS FOR A PARTICULAR PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE AUTHOR OR
CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSE-
QUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SER-
VICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY
THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT
LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF
THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.
Redistribution and use in source and binary forms, with or without modification, are permitted provided that the fol-
lowing conditions are met:
1. Redistributions of source code must retain the above copyright notice, this list of conditions, and the following dis-
claimer.
2. Redistributions in binary form must reproduce the above copyright notice, this list of conditions and the following
1756
disclaimer in the documentation and/or other materials provided with the distribution.
THIS SOFTWARE IS PROVIDED BY THE AUTHOR AND CONTRIBUTORS ''AS IS'' AND ANY EXPRESS OR IM-
PLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES OF MERCHANTABILI-
TY AND FITNESS FOR A PARTICULAR PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE AUTHOR OR
CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSE-
QUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SER-
VICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY
THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE
OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POS-
SIBILITY OF SUCH DAMAGE.
Redistribution and use in source and binary forms, with or without modification, are permitted provided that the fol-
lowing conditions are met:
1. Redistributions of source code must retain the above copyright notice, this list of conditions and the following dis-
claimer.
2. Redistributions in binary form must reproduce the above copyright notice, this list of conditions and the following
disclaimer in the
documentation and/or other materials provided with the distribution.
THIS SOFTWARE IS PROVIDED BY THE AUTHOR ''AS IS'' AND ANY EXPRESS OR IMPLIED WARRANTIES, IN-
CLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A
PARTICULAR PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE AUTHOR BE LIABLE FOR ANY DIRECT,
INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT
LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR
BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CON-
TRACT, STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT
OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.
This software was developed for the FreeBSD Project by Jonathan Lemon and NAI Labs, the Security Research Division
of Network Associates, Inc. under DARPA/SPAWAR contract N66001-01-C-8035 ("CBOSS"), as part of the DARPA
CHATS research program.
Redistribution and use in source and binary forms, with or without modification, are permitted provided that the fol-
lowing conditions are met:
1. Redistributions of source code must retain the above copyright notice, this list of conditions and the following dis-
claimer.
2. Redistributions in binary form must reproduce the above copyright notice, this list of conditions and the following
disclaimer in the documentation and/or other materials provided with the distribution.
3. The name of the author may not be used to endorse or promote products derived from this software without specific
prior written permission.
THIS SOFTWARE IS PROVIDED BY THE AUTHOR AND CONTRIBUTORS ''AS IS'' AND ANY EXPRESS OR IM-
PLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES OF MERCHANTABILI-
TY AND FITNESS FOR A PARTICULAR PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE AUTHOR OR
CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSE-
QUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SER-
VICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY
THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE
OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POS-
SIBILITY OF SUCH DAMAGE.
Redistribution and use in source and binary forms, with or without modification, are permitted provided that the fol-
lowing conditions are met:
1. Redistributions of source code must retain the above copyright notice, this list of conditions and the following dis-
claimer.
2. Redistributions in binary form must reproduce the above copyright notice, this list of conditions and the following
disclaimer in the documentation and/or other materials provided with the distribution.
3. All advertising materials mentioning features or use of this software must display the following acknowledgement:
This product includes software developed by the NetBSD Foundation, Inc. and its contributors.
4. Neither the name of The NetBSD Foundation nor the names of its contributors may be used to endorse or promote
products derived from this software without specific prior written permission.
THIS SOFTWARE IS PROVIDED BY THE NETBSD FOUNDATION, INC. AND CONTRIBUTORS ''AS IS'' AND ANY
EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES OF
MERCHANTABILITY AND FITNESS FOR A PARTICULAR
PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE FOUNDATION OR CONTRIBUTORS BE LIABLE FOR
ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUD-
1757
SGOS Administration Guide
ING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, DATA, OR
PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER
IN CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY
WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.
Redistribution and use in source and binary forms, with or without modification, are permitted provided that the fol-
lowing conditions are met:
1. Redistributions of source code must retain the above copyright notice, this list of conditions and the following dis-
claimer.
2. Redistributions in binary form must reproduce the above copyright notice, this list of conditions and the following
disclaimer in the documentation and/or other materials provided with the distribution.
THIS SOFTWARE IS PROVIDED BY THE NETBSD FOUNDATION, INC. AND CONTRIBUTORS ''AS IS'' AND ANY
EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES OF
MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL
THE FOUNDATION OR CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EX-
EMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTI-
TUTE GOODS OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER
CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT (IN-
CLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN
IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.
Redistribution and use in source and binary forms, with or without modification, are permitted provided that the fol-
lowing conditions are met:
1. Redistributions of source code must retain the above copyright notice, this list of conditions and the following dis-
claimer.
2. Redistributions in binary form must reproduce the above copyright notice, this list of conditions and the following
disclaimer in the documentation and/or other materials provided with the distribution.
3. The name of the author may not be used to endorse or promote products derived from this software without specific
prior written permission.
THIS SOFTWARE IS PROVIDED ''AS IS'' AND ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT
LIMITED TO, THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PUR-
POSE ARE DISCLAIMED. IN NO EVENT SHALL THE AUTHOR BE LIABLE FOR ANY DIRECT, INDIRECT, INCI-
DENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO,
PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTER-
RUPTION) HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT LIA-
BILITY, OR TORT (INCLUDING NEGLIGENCE OR
OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSI-
BILITY OF SUCH DAMAGE.
Redistribution and use in source and binary forms, with or without modification, are permitted provided that the fol-
lowing conditions are met:
1. Redistributions of source code must retain the above copyright notice, this list of conditions and the following dis-
claimer.
2. Redistributions in binary form must reproduce the above copyright notice, this list of conditions and the following
disclaimer in the documentation and/or other materials provided with the distribution.
3. All advertising materials mentioning features or use of this software must display the following acknowledgement:
This product includes software developed by Bill Paul.
4. Neither the name of the author nor the names of any co-contributors may be used to endorse or promote products
derived from this software without specific prior written permission.
THIS SOFTWARE IS PROVIDED BY Bill Paul AND CONTRIBUTORS ''AS IS'' AND ANY EXPRESS OR IMPLIED WAR-
RANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FIT-
NESS FOR A PARTICULAR PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL Bill Paul OR THE VOICES IN HIS
HEAD BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR
CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS
OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON
ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING NEGLI-
GENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF
THE POSSIBILITY OF SUCH DAMAGE.
1758
All rights reserved.
Redistribution and use in source and binary forms, with or without modification, are permitted provided that the fol-
lowing conditions are met:
1. Redistributions of source code must retain the above copyright notice unmodified, this list of conditions, and the
following disclaimer.
2. Redistributions in binary form must reproduce the above copyright notice, this list of conditions and the following
disclaimer in the documentation and/or other materials provided with the distribution.
THIS SOFTWARE IS PROVIDED BY THE AUTHOR ''AS IS'' AND ANY EXPRESS OR IMPLIED WARRANTIES, IN-
CLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A
PARTICULAR PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE AUTHOR BE LIABLE FOR ANY DIRECT,
INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT
LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR
BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CON-
TRACT, STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT
OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.
Redistribution and use in source and binary forms, with or without modification, are permitted provided that the fol-
lowing conditions are met:
1. Redistributions of source code must retain the above copyright notice, this list of conditions and the following dis-
claimer.
2. Redistributions in binary form must reproduce the above copyright notice, this list of conditions and the following
disclaimer in the documentation and/or other materials provided with the distribution.
THIS SOFTWARE IS PROVIDED BY THE AUTHOR ''AS IS'' AND ANY EXPRESS OR IMPLIED WARRANTIES, IN-
CLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A
PARTICULAR PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE AUTHOR BE LIABLE FOR ANY DIRECT,
INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT
LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR
BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CON-
TRACT, STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT
OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.
Redistribution and use in source and binary forms, with or without modification, are permitted provided that the fol-
lowing conditions are met:
1. Redistributions of source code must retain the above copyright notice, this list of conditions and the following dis-
claimer.
2. Redistributions in binary form must reproduce at minimum a disclaimer substantially similar to the "NO WARRAN-
TY" disclaimer below ("Disclaimer") and any redistribution must be conditioned upon including a substantially similar
Disclaimer requirement for further binary redistribution.
3. Neither the names of the above listed copyright holders nor the names of any contributors may be used to endorse
or promote products derived
from this software without specific prior written permission.
THIS SOFTWARE IS PROVIDED BY THE COPYRIGHT HOLDERS AND CONTRIBUTORS "AS IS" AND ANY EX-
PRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES OF MER-
CHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE
COPYRIGHT OWNER OR CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL,
EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUB-
STITUTE GOODS OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER
CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT (IN-
CLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN
IF THE COPYRIGHT OWNER OR CONTRIBUTOR IS ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.
Redistribution and use in source and binary forms, with or without modification, are permitted provided that the fol-
lowing conditions are met:
1. Redistributions of source code must retain the above copyright notice, this list of conditions and the following dis-
claimer.
2. Redistributions in binary form must reproduce the above copyright notice, this list of conditions and the following
disclaimer in the documentation and/or other materials provided with the distribution.
THIS SOFTWARE IS PROVIDED BY THE AUTHOR AND CONTRIBUTORS ''AS IS'' AND ANY EXPRESS OR IM-
PLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES OF MERCHANTABILI-
TY AND FITNESS FOR A PARTICULAR PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE AUTHOR OR
1759
SGOS Administration Guide
CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSE-
QUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SER-
VICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY
THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE
OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POS-
SIBILITY OF SUCH DAMAGE.
Redistribution and use in source and binary forms, with or without modification, are permitted provided that the fol-
lowing conditions are met:
1. Redistributions of source code must retain the above copyright notice unmodified, this list of conditions, and the
following disclaimer.
2. Redistributions in binary form must reproduce the above copyright notice, this list of conditions and the following
disclaimer in the documentation and/or other materials provided with the distribution.
THIS SOFTWARE IS PROVIDED BY THE AUTHOR ''AS IS'' AND ANY EXPRESS OR IMPLIED WARRANTIES, IN-
CLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A
PARTICULAR PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE AUTHOR BE LIABLE FOR ANY DIRECT,
INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT
LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR
BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CON-
TRACT, STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT
OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.
Redistribution and use in source forms, with and without modification, are permitted provided that this entire comment
appears intact.
Redistribution in binary form may occur without any restrictions. Obviously, it would be nice if you gave credit where
credit is due but requiring it would be too onerous.
This software is provided ''AS IS'' without any warranties of any kind.
This program and the accompanying materials are licensed and made available under the terms and conditions of the
BSD License which accompanies this distribution. The full text of the license may be found at http://opensource.org/
licenses/bsd-license.php
THE PROGRAM IS DISTRIBUTED UNDER THE BSD LICENSE ON AN "AS IS" BASIS, WITHOUT WARRANTIES OR
REPRESENTATIONS OF ANY KIND, EITHER EXPRESS OR IMPLIED.
This program and the accompanying materials are licensed and made available under the terms and conditions of the
BSD License which accompanies this distribution. The full text of the license may be found at http://opensource.org/
licenses/bsd-license.php
THE PROGRAM IS DISTRIBUTED UNDER THE BSD LICENSE ON AN "AS IS" BASIS, WITHOUT WARRANTIES OR
REPRESENTATIONS OF ANY KIND, EITHER EXPRESS OR IMPLIED.
Redistribution and use in source and binary forms, with or without modification, are permitted provided that the fol-
lowing conditions are met:
1. Redistributions of source code must retain the above copyright notice, this list of conditions and the following dis-
claimer.
2. Redistributions in binary form must reproduce the above copyright notice, this list of conditions and the following
disclaimer in the
documentation and/or other materials provided with the distribution.
3. The name of the author may not be used to endorse or promote products derived from this software without specific
prior written permission.
THIS SOFTWARE IS PROVIDED BY THE AUTHOR AND CONTRIBUTORS ''AS IS'' AND ANY EXPRESS OR IM-
PLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES OF MERCHANTABILI-
1760
TY AND FITNESS FOR A PARTICULAR PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE AUTHOR OR
CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSE-
QUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SER-
VICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY
THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT
LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF
THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.
Redistribution and use in source and binary forms, with or without modification, are permitted provided that the fol-
lowing conditions are met:
1. Redistributions of source code must retain the above copyright notice, this list of conditions and the following dis-
claimer.
2. Redistributions in binary form must reproduce the above copyright notice, this list of conditions and the following
disclaimer in the documentation and/or other materials provided with the distribution.
THIS SOFTWARE IS PROVIDED BY THE AUTHOR AND CONTRIBUTORS ''AS IS'' AND ANY EXPRESS OR IM-
PLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES OF MERCHANTABILI-
TY AND FITNESS FOR A PARTICULAR PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE AUTHOR OR
CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSE-
QUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SER-
VICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY
THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT
LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF
THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.
Redistribution and use in source and binary forms, with or without modification, are permitted provided that the fol-
lowing conditions are met:
1. Redistributions of source code must retain the above copyright notice, this list of conditions and the following dis-
claimer.
2. Redistributions in binary form must reproduce the above copyright notice, this list of conditions and the following
disclaimer in the documentation and/or other materials provided with the distribution.
3. All advertising materials mentioning features or use of this software must display the following acknowledgement:
This product includes software developed by INRIA and its contributors.
4. Neither the name of INRIA nor the names of its contributors may be used to endorse or promote products derived
from this software without specific prior written permission.
THIS SOFTWARE IS PROVIDED BY THE INSTITUTE AND CONTRIBUTORS ''AS IS'' AND ANY EXPRESS OR IM-
PLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES OF MERCHANTABILI-
TY AND FITNESS FOR A PARTICULAR PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE INSTITUTE OR
CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSE-
QUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SER-
VICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY
THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT
LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF
THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.
Redistribution and use in source and binary forms, with or without modification, are permitted provided that the fol-
lowing conditions are met:
1. Redistributions of source code must retain the above copyright notice, this list of conditions and the following dis-
claimer.
2. Redistributions in binary form must reproduce the above copyright notice, this list of conditions and the following
disclaimer in the documentation and/or other materials provided with the distribution.
3. Neither the name of INRIA nor the names of its contributors may be used to endorse or promote products derived
from this software without specific prior written permission.
THIS SOFTWARE IS PROVIDED BY THE INSTITUTE AND CONTRIBUTORS ''AS IS'' AND ANY EXPRESS OR IM-
PLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES OF MERCHANTABILI-
TY AND FITNESS FOR A PARTICULAR PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE INSTITUTE OR
CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSE-
QUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SER-
VICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY
THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE
OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POS-
SIBILITY OF SUCH DAMAGE.
1761
SGOS Administration Guide
Redistribution and use in source and binary forms, with or without modification, are permitted provided that the fol-
lowing conditions are met:
1. Redistributions of source code must retain the above copyright notice, this list of conditions and the following dis-
claimer.
2. Redistributions in binary form must reproduce the above copyright notice, this list of conditions and the following
disclaimer in the documentation and/or other materials provided with the distribution.
THIS SOFTWARE IS PROVIDED BY THE AUTHOR AND CONTRIBUTORS ''AS IS'' AND ANY EXPRESS OR IM-
PLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES OF MERCHANTABILI-
TY AND FITNESS FOR A PARTICULAR PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE AUTHOR OR
CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSE-
QUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SER-
VICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY
THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE
OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POS-
SIBILITY OF SUCH DAMAGE.
Redistribution and use in source and binary forms, with or without modification, are permitted provided that the fol-
lowing conditions are met:
1. Redistributions of source code must retain the above copyright notice, this list of conditions and the following dis-
claimer.
2. Redistributions in binary form must reproduce the above copyright notice, this list of conditions and the following
disclaimer in the documentation and/or other materials provided with the distribution.
THIS SOFTWARE IS PROVIDED BY THE AUTHOR ''AS IS'' AND ANY EXPRESS OR IMPLIED WARRANTIES, IN-
CLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A
PARTICULAR PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE AUTHOR BE LIABLE FOR ANY DIRECT,
INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT
LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR
BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CON-
TRACT, STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT
OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.
Redistribution and use in source and binary forms, with or without modification, are permitted provided that the fol-
lowing conditions are met:
1. Redistributions of source code must retain the above copyright notice, this list of conditions and the following dis-
claimer.
2. Redistributions in binary form must reproduce the above copyright notice, this list of conditions and the following
disclaimer in the documentation and/or other materials provided with the distribution.
THIS SOFTWARE IS PROVIDED BY THE AUTHOR AND CONTRIBUTORS ''AS IS'' AND ANY EXPRESS OR IM-
PLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES OF MERCHANTABILI-
TY AND FITNESS FOR A PARTICULAR PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE AUTHOR OR
CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSE-
QUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SER-
VICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY
THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE
OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POS-
SIBILITY OF SUCH DAMAGE.
Redistribution and use in source and binary forms, with or without modification, are permitted provided that the fol-
lowing conditions are met:
1. Redistributions of source code must retain the above copyright notice, this list of conditions, and the following dis-
claimer, without modification, immediately at the beginning of the file.
2. The name of the author may not be used to endorse or promote products derived from this software without specific
prior written permission.
THIS SOFTWARE IS PROVIDED BY THE AUTHOR AND CONTRIBUTORS ''AS IS'' AND ANY EXPRESS OR IM-
PLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES OF MERCHANTABILI-
TY AND FITNESS FOR A PARTICULAR PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE AUTHOR OR
CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSE-
QUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SER-
VICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY
THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT
1762
LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF
THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.
Redistribution and use in source and binary forms, with or without modification, are permitted provided that the fol-
lowing conditions are met:
1. Redistributions of source code must retain the above copyright notice, this list of conditions, and the following dis-
claimer, without modification, immediately at the beginning of the file.
2. The name of the author may not be used to endorse or promote products derived from this software without specific
prior written permission.
THIS SOFTWARE IS PROVIDED BY THE AUTHOR AND CONTRIBUTORS ''AS IS'' AND ANY EXPRESS OR IM-
PLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES OF MERCHANTABILI-
TY AND FITNESS FOR A PARTICULAR PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE AUTHOR OR
CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSE-
QUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SER-
VICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY
THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT
LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF
THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.
Redistribution and use in source and binary forms, with or without modification, are permitted provided that the fol-
lowing conditions are met:
1. Redistributions of source code must retain the above copyright notice, this list of conditions and the following dis-
claimer.
2. Redistributions in binary form must reproduce the above copyright notice, this list of conditions and the following
disclaimer in the documentation and/or other materials provided with the distribution.
3. All advertising materials mentioning features or use of this software must display the following acknowledgement:
This product includes software developed by the NetBSD Foundation, Inc. and its contributors.
4. Neither the name of The NetBSD Foundation nor the names of its contributors may be used to endorse or promote
products derived from this software without specific prior written permission.
THIS SOFTWARE IS PROVIDED BY THE NETBSD FOUNDATION, INC. AND CONTRIBUTORS ''AS IS'' AND ANY
EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES OF
MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL
THE FOUNDATION OR CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EX-
EMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTI-
TUTE GOODS OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER
CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT (IN-
CLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN
IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.
Redistribution and use in source and binary forms, with or without modification, are permitted provided that the fol-
lowing conditions are met:
1. Redistributions of source code must retain the above copyright notice, this list of conditions and the following dis-
claimer.
2. Redistributions in binary form must reproduce the above copyright notice, this list of conditions and the following
disclaimer in the documentation and/or other materials provided with the distribution.
THIS SOFTWARE IS PROVIDED BY THE AUTHOR AND CONTRIBUTORS ''AS IS'' AND ANY EXPRESS OR IM-
PLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES OF MERCHANTABILI-
TY AND FITNESS FOR A PARTICULAR PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE AUTHOR OR
CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSE-
QUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SER-
VICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY
THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT
LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF
THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.
Redistribution and use in source and binary forms, with or without modification, are permitted provided that the fol-
lowing conditions are met:
1763
SGOS Administration Guide
1. Redistributions of source code must retain the above copyright notice, this list of conditions and the following dis-
claimer.
2. Redistributions in binary form must reproduce the above copyright notice, this list of conditions and the following
disclaimer in the documentation and/or other materials provided with the distribution.
THIS SOFTWARE IS PROVIDED BY THE AUTHOR AND CONTRIBUTORS ''AS IS'' AND ANY EXPRESS OR IM-
PLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES OF MERCHANTABILI-
TY AND FITNESS FOR A PARTICULAR PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE AUTHOR OR
CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSE-
QUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SER-
VICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY
THEORY OF LIABILITY, WHETHER IN CONTRACT,STRICT
LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF
THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.
Redistribution and use in source and binary forms, with or without modification, are permitted provided that the fol-
lowing conditions are met:
1. Redistributions of source code must retain the above copyright notice, this list of conditions and the following dis-
claimer.
2. Redistributions in binary form must reproduce the above copyright notice, this list of conditions and the following
disclaimer in the documentation and/or other materials provided with the distribution.
THIS SOFTWARE IS PROVIDED BY THE AUTHOR AND CONTRIBUTORS ''AS IS'' AND ANY EXPRESS OR IM-
PLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES OF MERCHANTABILI-
TY AND FITNESS FOR A PARTICULAR PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE AUTHOR OR
CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSE-
QUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SER-
VICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY
THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE
OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POS-
SIBILITY OF SUCH DAMAGE.
Redistribution and use in source and binary forms, with or without modification, are permitted provided that the fol-
lowing conditions are met:
1. Redistributions of source code must retain the above copyright notice, this list of conditions and the following dis-
claimer.
2. Redistributions in binary form must reproduce the above copyright notice, this list of conditions and the following
disclaimer in the documentation and/or other materials provided with the distribution.
THIS SOFTWARE IS PROVIDED BY THE AUTHOR AND CONTRIBUTORS ''AS IS'' AND ANY EXPRESS OR IM-
PLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES OF MERCHANTABILI-
TY AND FITNESS FOR A PARTICULAR PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE AUTHOR OR
CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSE-
QUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SER-
VICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY
THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE
OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POS-
SIBILITY OF SUCH DAMAGE.
Permission to use, copy, modify, and distribute this software for any purpose with or without fee is hereby granted, pro-
vided that the above copyright notice and this permission notice appear in all copies.
THE SOFTWARE IS PROVIDED "AS IS" AND THE AUTHOR DISCLAIMS ALL WARRANTIES WITH REGARD TO
THIS SOFTWARE INCLUDING ALL IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS. IN NO
EVENT SHALL THE AUTHOR BE LIABLE FOR ANY SPECIAL, DIRECT, INDIRECT, OR CONSEQUENTIAL DAM-
AGES OR ANY DAMAGES WHATSOEVER RESULTING FROM LOSS OF USE, DATA OR PROFITS, WHETHER IN
AN ACTION OF CONTRACT, NEGLIGENCE OR OTHER TORTIOUS ACTION, ARISING OUT OF OR IN CONNEC-
TION WITH THE USE OR PERFORMANCE OF THIS SOFTWARE.
Redistribution and use in source and binary forms, with or without modification, are permitted provided that the fol-
lowing conditions are met:
1. Redistributions of source code must retain the above copyright notice, this list of conditions and the following dis-
claimer.
1764
2. Redistributions in binary form must reproduce the above copyright notice, this list of conditions and the following
disclaimer in the
documentation and/or other materials provided with the distribution.
THIS SOFTWARE IS PROVIDED BY THE AUTHOR AND CONTRIBUTORS ''AS IS'' AND ANY EXPRESS OR IM-
PLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES OF MERCHANTABILI-
TY AND FITNESS FOR A PARTICULAR PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE AUTHOR OR
CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSE-
QUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SER-
VICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY
THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT
LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF
THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.
Redistribution and use in source and binary forms, with or without modification, are permitted provided that the fol-
lowing conditions are met:
1. Redistributions of source code must retain the above copyright notice, this list of conditions and the following dis-
claimer.
2. Redistributions in binary form must reproduce the above copyright notice, this list of conditions and the following
disclaimer in the documentation and/or other materials provided with the distribution.
THIS SOFTWARE IS PROVIDED BY THE AUTHOR AND CONTRIBUTORS ''AS IS'' AND ANY EXPRESS OR IM-
PLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES OF MERCHANTABILI-
TY AND FITNESS FOR A PARTICULAR PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE AUTHOR OR
CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSE-
QUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SER-
VICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY
THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT
LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF
THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.
Redistribution and use in source and binary forms, with or without modification, are permitted provided that the fol-
lowing conditions are met:
1. Redistributions of source code must retain the above copyright notice, this list of conditions and the following dis-
claimer.
2. Redistributions in binary form must reproduce the above copyright notice, this list of conditions and the following
disclaimer in the documentation and/or other materials provided with the distribution.
THIS SOFTWARE IS PROVIDED BY THE AUTHOR AND CONTRIBUTORS ''AS IS'' AND ANY EXPRESS OR IM-
PLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES OF MERCHANTABILI-
TY AND FITNESS FOR A PARTICULAR PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE AUTHOR OR
CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSE-
QUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SER-
VICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY
THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT
LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF
THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.
Redistribution and use in source and binary forms, with or without modification, are permitted provided that the fol-
lowing conditions are met:
1. Redistributions of source code must retain the above copyright notice, this list of conditions and the following dis-
claimer.
2. Redistributions in binary form must reproduce the above copyright notice, this list of conditions and the following
disclaimer in the documentation and/or other materials provided with the distribution.
3. All advertising materials mentioning features or use of this software must display the following acknowledgement:
This product includes software developed by Bill Paul.
4. Neither the name of the author nor the names of any co-contributors may be used to endorse or promote products
derived from this software without specific prior written permission.
THIS SOFTWARE IS PROVIDED BY Bill Paul AND CONTRIBUTORS ``AS IS'' AND ANY EXPRESS OR IMPLIED
WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES OF MERCHANTABILITY AND
FITNESS FOR A PARTICULAR PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL Bill Paul, THE VOICES IN HIS
HEAD OR THE CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY,
OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE
GOODS OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED
AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING
1765
SGOS Administration Guide
NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF AD-
VISED OF THE POSSIBILITY OF SUCH DAMAGE.
Redistribution and use in source and binary forms, with or without modification, are permitted provided that the fol-
lowing conditions are met:
1. Redistributions of source code must retain the above copyright notice, this list of conditions and the following dis-
claimer.
2. Redistributions in binary form must reproduce the above copyright notice, this list of conditions and the following
disclaimer in the documentation and/or other materials provided with the distribution.
THIS SOFTWARE IS PROVIDED BY THE AUTHOR(S) ``AS IS'' AND ANY EXPRESS OR IMPLIED WARRANTIES, IN-
CLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A
PARTICULAR PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE AUTHOR(S) BE LIABLE FOR ANY DI-
RECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT
NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, DATA, OR PROFITS;
OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CON-
TRACT, STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT
OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.
Developed by:
LLVM Team
http://llvm.org
Permission is hereby granted, free of charge, to any person obtaining a copy of this software and associated documen-
tation files (the "Software"), to deal with the Software without restriction, including without limitation the rights to use,
copy, modify, merge, publish, distribute, sublicense, and/or sell copies of the Software, and to permit persons to whom
the Software is furnished to do so, subject to the following conditions:
Redistributions of source code must retain the above copyright notice, this list of conditions and the following disclaim-
ers.
Redistributions in binary form must reproduce the above copyright notice, this list of conditions and the following dis-
claimers in the documentation and/or other materials provided with the distribution.
Neither the names of the LLVM Team, University of Illinois at Urbana-Champaign, nor the names of its contributors
may be used to endorse or promote products derived from this Software without specific prior written permission.
THE SOFTWARE IS PROVIDED "AS IS", WITHOUT WARRANTY OF ANY KIND, EXPRESS OR IMPLIED, INCLUD-
ING BUT NOT LIMITED TO THE WARRANTIES OF MERCHANTABILITY, FITNESS FOR A PARTICULAR PUR-
POSE AND NONINFRINGEMENT. IN NO EVENT SHALL THE CONTRIBUTORS OR COPYRIGHT HOLDERS BE
LIABLE FOR ANY CLAIM, DAMAGES OR OTHER LIABILITY, WHETHER IN AN ACTION OF CONTRACT, TORT
OR OTHERWISE, ARISING FROM, OUT OF OR IN CONNECTION WITH THE SOFTWARE OR THE USE OR OTHER
DEALINGS WITH THE SOFTWARE.
Redistribution and use in source and binary forms, with or without modification, are permitted provided that the fol-
lowing conditions are met:
1. Redistributions of source code must retain the above copyright notice, this list of conditions and the following dis-
claimer.
2. Redistributions in binary form must reproduce the above copyright notice, this list of conditions and the following
disclaimer in the documentation and/or other materials provided with the distribution.
3. The name of the author may not be used to endorse or promote products derived from this software without specific
prior written permission.
THIS SOFTWARE IS PROVIDED BY THE AUTHOR AND CONTRIBUTORS ''AS IS'' AND ANY EXPRESS OR IM-
PLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES OF MERCHANTABILI-
TY AND FITNESS FOR A PARTICULAR PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE AUTHOR OR
CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSE-
QUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SER-
VICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY
THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT
LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF
1766
THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.
Redistribution and use in source and binary forms, with or without modification, are permitted provided that the fol-
lowing conditions are met:
1. Redistributions of source code must retain the above copyright notice, this list of conditions and the following dis-
claimer.
2. Redistributions in binary form must reproduce the above copyright notice, this list of conditions and the following
disclaimer in the
documentation and/or other materials provided with the distribution.
THIS SOFTWARE IS PROVIDED BY THE AUTHOR AND CONTRIBUTORS ''AS IS'' AND ANY EXPRESS OR IM-
PLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES OF MERCHANTABILI-
TY AND FITNESS FOR A PARTICULAR PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE AUTHOR OR
CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSE-
QUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SER-
VICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY
THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT
LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF
THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.
Redistribution and use in source and binary forms, with or without modification, are permitted provided that the fol-
lowing conditions are met:
1. Redistributions of source code must retain the above copyright notice, this list of conditions and the following dis-
claimer.
2. Redistributions in binary form must reproduce the above copyright notice, this list of conditions and the following
disclaimer in the documentation and/or other materials provided with the distribution.
THIS SOFTWARE IS PROVIDED BY THE AUTHOR AND CONTRIBUTORS ''AS IS'' AND ANY EXPRESS OR IM-
PLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES OF MERCHANTABILI-
TY AND FITNESS FOR A PARTICULAR PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE AUTHOR OR
CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSE-
QUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SER-
VICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY
THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE
OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POS-
SIBILITY OF SUCH DAMAGE.
Redistribution and use in source and binary forms, with or without modification, are permitted provided that the fol-
lowing conditions are met:
1. Redistributions of source code must retain the above copyright notice, this list of conditions and the following dis-
claimer.
2. Redistributions in binary form must reproduce the above copyright notice, this list of conditions and the following
disclaimer in the documentation and/or other materials provided with the distribution.
3. The name of the author may not be used to endorse or promote products derived from this software without specific
prior written permission.
THIS SOFTWARE IS PROVIDED BY THE AUTHOR ''AS IS'' AND ANY EXPRESS OR IMPLIED WARRANTIES, IN-
CLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A
PARTICULAR PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE AUTHOR BE LIABLE FOR ANY DIRECT,
INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT
LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR
BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CON-
TRACT, STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT
OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.
Redistribution and use in source and binary forms, with or without modification, are permitted provided that the fol-
lowing conditions are met:
1. Redistributions of source code must retain the above copyright notice, this list of conditions and the following dis-
claimer.
2. Redistributions in binary form must reproduce the above copyright notice, this list of conditions and the following
disclaimer in the documentation and/or other materials provided with the distribution.
THIS SOFTWARE IS PROVIDED BY THE AUTHOR AND CONTRIBUTORS ''AS IS'' AND ANY EXPRESS OR IM-
1767
SGOS Administration Guide
PLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES OF MERCHANTABILI-
TY AND FITNESS FOR A PARTICULAR PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE AUTHOR OR
CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSE-
QUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SER-
VICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY
THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE
OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POS-
SIBILITY OF SUCH DAMAGE.
Redistribution and use in source and binary forms, with or without modification, are permitted provided that the fol-
lowing conditions are met:
1. Redistributions of source code must retain the above copyright notice, this list of conditions and the following dis-
claimer.
2. Redistributions in binary form must reproduce the above copyright notice, this list of conditions and the following
disclaimer in the documentation and/or other materials provided with the distribution.
THIS SOFTWARE IS PROVIDED BY THE AUTHOR ''AS IS'' AND ANY EXPRESS OR IMPLIED WARRANTIES, IN-
CLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A
PARTICULAR PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE AUTHOR BE LIABLE FOR ANY DIRECT,
INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT
LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR
BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CON-
TRACT, STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT
OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.
Redistribution and use in source and binary forms, with or without modification, are permitted provided that the fol-
lowing conditions are met:
1. Redistributions of source code must retain the above copyright notice, this list of conditions and the following dis-
claimer.
2. Redistributions in binary form must reproduce the above copyright notice, this list of conditions and the following
disclaimer in the
documentation and/or other materials provided with the distribution.
4. Neither the name of the University nor the names of its contributors may be used to endorse or promote products
derived from this software
without specific prior written permission.
THIS SOFTWARE IS PROVIDED BY THE REGENTS AND CONTRIBUTORS ''AS IS'' AND ANY EXPRESS OR IM-
PLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES OF MERCHANTABILI-
TY AND FITNESS FOR A PARTICULAR PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE REGENTS OR
CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSE-
QUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SER-
VICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY
THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT
LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF
THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.
Redistribution and use in source and binary forms, with or without modification, are permitted provided that the fol-
lowing conditions are met:
1. Redistributions of source code must retain the above copyright notice, this list of conditions and the following dis-
claimer,
without modification.
2. Redistributions in binary form must reproduce at minimum a disclaimer similar to the "NO WARRANTY" disclaimer
below ("Disclaimer") and any
redistribution must be conditioned upon including a substantially similar Disclaimer requirement for further binary
redistribution.
3. Neither the names of the above-listed copyright holders nor the names of any contributors may be used to endorse
or promote products derived
from this software without specific prior written permission.
NO WARRANTY
THIS SOFTWARE IS PROVIDED BY THE COPYRIGHT HOLDERS AND CONTRIBUTORS ''AS IS'' AND ANY EX-
PRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES OF NON-
INFRINGEMENT, MERCHANTIBILITY AND FITNESS FOR A PARTICULAR PURPOSE ARE DISCLAIMED. IN NO
EVENT SHALL THE COPYRIGHT HOLDERS OR CONTRIBUTORS BE LIABLE FOR SPECIAL, EXEMPLARY, OR
CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS
1768
OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON
ANY THEORY OF LIABILITY, WHETHER
IN CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY
WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGES.
Redistribution and use in source and binary forms, with or without modification, are permitted provided that the fol-
lowing conditions are met:
1. Redistributions of source code must retain the above copyright notice, this list of conditions and the following dis-
claimer.
2. Redistributions in binary form must reproduce the above copyright notice, this list of conditions and the following
disclaimer in the documentation and/or other materials provided with the distribution.
THIS SOFTWARE IS PROVIDED BY THE AUTHOR AND CONTRIBUTORS ''AS IS'' AND ANY EXPRESS OR IM-
PLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES OF MERCHANTABILI-
TY AND FITNESS FOR A PARTICULAR PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE AUTHOR OR
CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSE-
QUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SER-
VICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY
THEORY OF LIABILITY, WHETHER IN CONTRACT,STRICT
LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF
THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.
Redistribution and use in source and binary forms, with or without modification, are permitted provided that the fol-
lowing conditions are met:
1. Redistributions of source code must retain the above copyright notice, this list of conditions and the following dis-
claimer.
2. Redistributions in binary form must reproduce the above copyright notice, this list of conditions and the following
disclaimer in the documentation and/or other materials provided with the distribution.
3. Neither the name of the author nor the names of any co-contributors may be used to endorse or promote products
derived from this software without specific prior written permission.
THIS SOFTWARE IS PROVIDED BY THE AUTHOR AND CONTRIBUTORS ''AS IS'' AND ANY EXPRESS OR IM-
PLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES OF MERCHANTABILI-
TY AND FITNESS FOR A PARTICULAR PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE AUTHOR OR
CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSE-
QUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SER-
VICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY
THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE
OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POS-
SIBILITY OF SUCH DAMAGE.
Redistribution and use in source and binary forms, with or without modification, are permitted provided that the fol-
lowing conditions are met:
1. Redistributions of source code must retain the above copyright notice, this list of conditions and the following dis-
claimer.
2. Redistributions in binary form must reproduce the above copyright notice, this list of conditions and the following
disclaimer in the
documentation and/or other materials provided with the distribution.
3. All advertising materials mentioning features or use of this software must display the following acknowledgement:
This product includes software developed by the NetBSD Foundation, Inc. and its contributors.
4. Neither the name of The NetBSD Foundation nor the names of its contributors may be used to endorse or promote
products derived from this software without specific prior written permission.
THIS SOFTWARE IS PROVIDED BY THE NETBSD FOUNDATION, INC. AND CONTRIBUTORS ''AS IS'' AND ANY
EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES OF
MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL
THE FOUNDATION OR CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EX-
EMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF
SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEV-
ER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT (IN-
CLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN
IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.
Redistribution and use in source and binary forms, with or without modification, are permitted provided that the fol-
1769
SGOS Administration Guide
THIS SOFTWARE IS PROVIDED BY THE NETBSD FOUNDATION, INC. AND CONTRIBUTORS ''AS IS'' AND ANY
EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES OF
MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL
THE FOUNDATION OR CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EX-
EMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTI-
TUTE GOODS OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER
CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT (IN-
CLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN
IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.
Redistribution and use in source and binary forms, with or without modification, are permitted provided that the fol-
lowing conditions are met:
1. Redistributions of source code must retain the above copyright notice, this list of conditions and the following dis-
claimer.
2. Redistributions in binary form must reproduce at minimum a disclaimer substantially similar to the "NO WARRAN-
TY" disclaimer below ("Disclaimer") and any redistribution must be conditioned upon including a substantially similar
Disclaimer requirement for further binary redistribution.
3. Neither the names of the above listed copyright holders nor the names of any contributors may be used to endorse
or promote products derived
from this software without specific prior written permission.
THIS SOFTWARE IS PROVIDED BY THE COPYRIGHT HOLDERS AND CONTRIBUTORS "AS IS" AND ANY EX-
PRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES OF MER-
CHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE
COPYRIGHT OWNER OR CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL,
EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUB-
STITUTE GOODS OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER
CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT (IN-
CLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN
IF THE COPYRIGHT OWNER OR CONTRIBUTOR IS ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.
Redistribution and use in source and binary forms, with or without modification, are permitted provided that the fol-
lowing conditions are met:
1. Redistributions of source code must retain the above copyright notice, this list of conditions and the following dis-
claimer.
2. Redistributions in binary form must reproduce at minimum a disclaimer substantially similar to the "NO WARRAN-
TY" disclaimer below
("Disclaimer") and any redistribution must be conditioned upon including a substantially similar Disclaimer require-
ment for further binary
redistribution.
3. Neither the names of the above listed copyright holders nor the names of any contributors may be used to endorse
or promote products derived
from this software without specific prior written permission.
THIS SOFTWARE IS PROVIDED BY THE COPYRIGHT HOLDERS AND CONTRIBUTORS "AS IS" AND ANY EX-
PRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES OF MER-
CHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE
COPYRIGHT OWNER OR CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL,
EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUB-
STITUTE GOODS OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER
CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT (IN-
CLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN
IF THE COPYRIGHT OWNER OR CONTRIBUTOR IS ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.
1770
Portions copyright (c) 2010 - 2011, Apple Inc. All rights reserved.
This program and the accompanying materials are licensed and made available under the terms and conditions of the
BSD License which accompanies this distribution. The full text of the license may be found at http://opensource.org/
licenses/bsd-license.php
THE PROGRAM IS DISTRIBUTED UNDER THE BSD LICENSE ON AN "AS IS" BASIS,WITHOUT WARRANTIES OR
REPRESENTATIONS OF ANY KIND, EITHER EXPRESS OR IMPLIED.
THE PROGRAM IS DISTRIBUTED UNDER THE BSD LICENSE ON AN "AS IS" BASIS, WITHOUT WARRANTIES OR
REPRESENTATIONS OF ANY KIND, EITHER EXPRESS OR IMPLIED.
THE PROGRAM IS DISTRIBUTED UNDER THE BSD LICENSE ON AN "AS IS" BASIS, WITHOUT WARRANTIES OR
REPRESENTATIONS OF ANY KIND, EITHER EXPRESS OR IMPLIED.
1. Redistributions of source code must retain the above copyright notice, this list of conditions and the following dis-
claimer.
2. Redistributions in binary form must reproduce the above copyright notice, this list of conditions and the following
disclaimer in the documentation and/or other materials provided with the distribution.
3. Neither the name of the Silicom nor the names of its contributors may be used to endorse or promote products derived
from this software without specific prior written permission.
THIS SOFTWARE IS PROVIDED BY THE COPYRIGHT HOLDERS AND CONTRIBUTORS "AS IS"AND ANY EX-
PRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THEIMPLIED WARRANTIES OF MER-
CHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE
ARE DISCLAIMED. IN NO EVENT SHALL THE COPYRIGHT OWNER OR CONTRIBUTORS BELIABLE FOR ANY
DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, ORCONSEQUENTIAL DAMAGES (INCLUDING, BUT
NOT LIMITED TO, PROCUREMENT OFSUBSTITUTE GOODS OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR
BUSINESSINTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER INCON-
TRACT, STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE)ARISING IN ANY WAY OUT
OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.
THE PROGRAM IS DISTRIBUTED UNDER THE BSD LICENSE ON AN "AS IS" BASIS, WITHOUT WARRANTIES OR
REPRESENTATIONS OF ANY KIND, EITHER EXPRESS OR IMPLIED.
Redistribution and use in source and binary forms, with or without modification, are permitted provided that the fol-
lowing conditions are met:
1. Redistributions of source code must retain the above copyright notice, this list of conditions and the following dis-
claimer.
2. Redistributions in binary form must reproduce the above copyright notice, this list of conditions and the following
disclaimer in the documentation and/or other materials provided with the distribution.
THIS SOFTWARE IS PROVIDED BY THE AUTHOR AND CONTRIBUTORS ''AS IS'' AND ANY EXPRESS OR IM-
PLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES OF MERCHANTABILI-
TY AND FITNESS FOR A PARTICULAR PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE AUTHOR OR
CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSE-
QUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SER-
VICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY
THEORY OF LIABILITY, WHETHER IN CONTRACT,STRICT
LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF
1771
SGOS Administration Guide
THE PROGRAM IS DISTRIBUTED UNDER THE BSD LICENSE ON AN "AS IS" BASIS, WITHOUT WARRANTIES OR
REPRESENTATIONS OF ANY KIND, EITHER EXPRESS OR IMPLIED.
THE PROGRAM IS DISTRIBUTED UNDER THE BSD LICENSE ON AN "AS IS" BASIS, WITHOUT WARRANTIES OR
REPRESENTATIONS OF ANY KIND, EITHER EXPRESS OR IMPLIED.
THE PROGRAM IS DISTRIBUTED UNDER THE BSD LICENSE ON AN "AS IS" BASIS, WITHOUT WARRANTIES OR
REPRESENTATIONS OF ANY KIND, EITHER EXPRESS OR IMPLIED.
THE PROGRAM IS DISTRIBUTED UNDER THE BSD LICENSE ON AN "AS IS" BASIS,WITHOUT WARRANTIES OR
REPRESENTATIONS OF ANY KIND, EITHER EXPRESS OR IMPLIED.
THE PROGRAM IS DISTRIBUTED UNDER THE BSD LICENSE ON AN "AS IS" BASIS, WITHOUT WARRANTIES OR
REPRESENTATIONS OF ANY KIND, EITHER EXPRESS OR IMPLIED.
THE PROGRAM IS DISTRIBUTED UNDER THE BSD LICENSE ON AN "AS IS" BASIS, WITHOUT WARRANTIES OR
REPRESENTATIONS OF ANY KIND, EITHER EXPRESS OR IMPLIED.
THE PROGRAM IS DISTRIBUTED UNDER THE BSD LICENSE ON AN "AS IS" BASIS, WITHOUT WARRANTIES OR
REPRESENTATIONS OF ANY KIND, EITHER EXPRESS OR IMPLIED.
This program and the accompanying materials are licensed and made available under the terms and conditions of the
BSD License which accompanies this distribution. The full text of the license may be found at http://opensource.org/
licenses/bsd-license.php
THE PROGRAM IS DISTRIBUTED UNDER THE BSD LICENSE ON AN "AS IS" BASIS, WITHOUT WARRANTIES OR
REPRESENTATIONS OF ANY KIND, EITHER EXPRESS OR IMPLIED.
1772
Copyright (c) 2004 - 2009, Intel Corporation. All rights reserved.
This program and the accompanying materials are licensed and made available under the terms and conditions of the
BSD License which accompanies this distribution. The full text of the license may be found at http://opensource.org/
licenses/bsd-license.php
THE PROGRAM IS DISTRIBUTED UNDER THE BSD LICENSE ON AN "AS IS" BASIS,
WITHOUT WARRANTIES OR REPRESENTATIONS OF ANY KIND, EITHER EXPRESS OR IMPLIED.
THE PROGRAM IS DISTRIBUTED UNDER THE BSD LICENSE ON AN "AS IS" BASIS, WITHOUT WARRANTIES OR
REPRESENTATIONS OF ANY KIND, EITHER EXPRESS OR IMPLIED.
bbe
THE PROGRAM IS DISTRIBUTED UNDER THE BSD LICENSE ON AN "AS IS" BASIS,WITHOUT WARRANTIES OR
REPRESENTATIONS OF ANY KIND, EITHER EXPRESS OR IMPLIED.
THE PROGRAM IS DISTRIBUTED UNDER THE BSD LICENSE ON AN "AS IS" BASIS, WITHOUT WARRANTIES OR
REPRESENTATIONS OF ANY KIND, EITHER EXPRESS OR IMPLIED.
THE PROGRAM IS DISTRIBUTED UNDER THE BSD LICENSE ON AN "AS IS" BASIS, WITHOUT WARRANTIES OR
REPRESENTATIONS OF ANY KIND, EITHER EXPRESS OR IMPLIED.
THE PROGRAM IS DISTRIBUTED UNDER THE BSD LICENSE ON AN "AS IS" BASIS, WITHOUT WARRANTIES OR
REPRESENTATIONS OF ANY KIND, EITHER EXPRESS OR IMPLIED.
This program and the accompanying materials are licensed and made available under the terms and conditions of the
BSD License which accompanies this distribution. The full text of the license may be found at http://opensource.org/
licenses/bsd-license.php
THE PROGRAM IS DISTRIBUTED UNDER THE BSD LICENSE ON AN "AS IS" BASIS, WITHOUT WARRANTIES OR
REPRESENTATIONS OF ANY KIND, EITHER EXPRESS OR IMPLIED.
THE PROGRAM IS DISTRIBUTED UNDER THE BSD LICENSE ON AN "AS IS" BASIS, WITHOUT WARRANTIES OR
REPRESENTATIONS OF ANY KIND, EITHER EXPRESS OR IMPLIED.
1773
SGOS Administration Guide
BSD License which accompanies this distribution. The full text of the license may be found at http://opensource.org/
licenses/bsd-license.php
THE PROGRAM IS DISTRIBUTED UNDER THE BSD LICENSE ON AN "AS IS" BASIS, WITHOUT WARRANTIES OR
REPRESENTATIONS OF ANY KIND, EITHER EXPRESS OR IMPLIED.
Redistribution and use in source and binary forms, with or without modification, are permitted provided that the fol-
lowing conditions are met:
1. Redistributions of source code must retain the above copyright notice, this list of conditions and the following dis-
claimer.
2. Redistributions in binary form must reproduce the above copyright notice, this list of conditions and the following
disclaimer in the documentation and/or other materials provided with the distribution.
THIS SOFTWARE IS PROVIDED BY THE AUTHOR AND CONTRIBUTORS ''AS IS'' AND ANY EXPRESS OR IM-
PLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES OF MERCHANTABILI-
TY AND FITNESS FOR A PARTICULAR PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE AUTHOR OR
CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSE-
QUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SER-
VICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY
THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT
LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF
THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.
Redistribution and use in source and binary forms, with or without modification, are permitted provided that the fol-
lowing conditions are met:
1. Redistributions of source code must retain the above copyright notice unmodified, this list of conditions and the fol-
lowing disclaimer.
2. Redistributions in binary form must reproduce the above copyright notice, this list of conditions and the following
disclaimer in the documentation and/or other materials provided with the distribution.
3. Neither the name of the author nor the names of contributors may be used to endorse or promote products derived
from this software without specific prior written permission.
THIS SOFTWARE IS PROVIDED BY THE AUTHOR AND CONTRIBUTORS ''AS IS'' AND ANY EXPRESS OR IM-
PLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES OF MERCHANTABILI-
TY AND FITNESS FOR A PARTICULAR PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE AUTHOR OR
CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSE-
QUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SER-
VICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY
THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT
LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF
THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.
Redistribution and use in source and binary forms, with or without modification, are permitted provided that the fol-
lowing conditions are met:
1. Redistributions of source code must retain the above copyright notice, this list of conditions and the following dis-
claimer in this position and unchanged.
2. Redistributions in binary form must reproduce the above copyright notice, this list of conditions and the following
disclaimer in the documentation and/or other materials provided with the distribution.
3. The name of the author may not be used to endorse or promote products derived from this software without specific
prior written permission.
THIS SOFTWARE IS PROVIDED BY THE AUTHOR ''AS IS'' AND ANY EXPRESS OR IMPLIED WARRANTIES, IN-
CLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A
PARTICULAR PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE AUTHOR BE LIABLE FOR ANY DIRECT,
INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT
LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR
BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CON-
TRACT, STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT
OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.
Redistribution and use in source and binary forms, with or without modification, are permitted provided that the fol-
lowing conditions are met:
1774
1. Redistributions of source code must retain the above copyright notice, this list of conditions and the following dis-
claimer.
2. Redistributions in binary form must reproduce the above copyright notice, this list of conditions and the following
disclaimer in the documentation and/or other materials provided with the distribution.
THIS SOFTWARE IS PROVIDED BY THE AUTHOR ''AS IS'' AND ANY EXPRESS OR IMPLIED WARRANTIES, IN-
CLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A
PARTICULAR PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE AUTHOR BE LIABLE FOR ANY DIRECT,
INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT
LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR
BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CON-
TRACT, STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT
OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.
Redistribution and use in source and binary forms, with or without modification, are permitted provided that the fol-
lowing conditions are met:
1. Redistributions of source code must retain the above copyright notice, this list of conditions and the following dis-
claimer.
2. Redistributions in binary form must reproduce the above copyright notice, this list of conditions and the following
disclaimer in the documentation and/or other materials provided with the distribution.
THIS SOFTWARE IS PROVIDED BY THE AUTHOR AND CONTRIBUTORS ''AS IS'' AND ANY EXPRESS OR IM-
PLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES OF MERCHANTABILI-
TY AND FITNESS FOR A PARTICULAR PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE AUTHOR OR
CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSE-
QUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SER-
VICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY
THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE
OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POS-
SIBILITY OF SUCH DAMAGE.
Redistribution and use in source and binary forms, with or without modification, are permitted provided that the fol-
lowing conditions are met:
1. Redistributions of source code must retain the above copyright notice, this list of conditions and the following dis-
claimer.
2. Redistributions in binary form must reproduce the above copyright notice, this list of conditions and the following
disclaimer in the documentation and/or other materials provided with the distribution.
3. Neither the name of the University nor the names of its contributors may be used to endorse or promote products
derived from this software without specific prior written permission.
THIS SOFTWARE IS PROVIDED BY THE REGENTS AND CONTRIBUTORS ''AS IS'' AND ANY EXPRESS OR IM-
PLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES OF MERCHANTABILI-
TY AND FITNESS FOR A PARTICULAR PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE REGENTS OR
CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSE-
QUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SER-
VICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY
THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE
OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POS-
SIBILITY OF SUCH DAMAGE.
Redistribution and use in source and binary forms, with or without modification, are permitted provided that the fol-
lowing conditions are met:
1. Redistributions of source code must retain the above copyright notice, this list of conditions and the following dis-
claimer.
2. Redistributions in binary form must reproduce the above copyright notice, this list of conditions and the following
disclaimer in the documentation and/or other materials provided with the distribution.
3. All advertising materials mentioning features or use of this software must display the following acknowledgement:
This product includes software developed by the NetBSD Foundation, Inc. and its contributors.
4. Neither the name of The NetBSD Foundation nor the names of its contributors may be used to endorse or promote
products derived from this software without specific prior written permission.
THIS SOFTWARE IS PROVIDED BY THE NETBSD FOUNDATION, INC. AND CONTRIBUTORS ''AS IS'' AND ANY
EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES OF
MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL
THE FOUNDATION OR CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EX-
1775
SGOS Administration Guide
EMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTI-
TUTE GOODS OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER
CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT (IN-
CLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN
IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.
Permission to use, copy, modify, and distribute this software for any purpose with or without fee is hereby granted,
provided that the above copyright notice and this permission notice appear in all copies.
THE SOFTWARE IS PROVIDED "AS IS" AND ISC DISCLAIMS ALL WARRANTIES WITH REGARD TO THIS SOFT-
WARE INCLUDING ALL IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS. IN NO EVENT SHALL
ISC BE LIABLE FOR ANY SPECIAL, DIRECT, INDIRECT, OR CONSEQUENTIAL DAMAGES OR ANY DAMAGES
WHATSOEVER RESULTING FROM LOSS OF USE, DATA OR PROFITS, WHETHER IN AN ACTION OF CON-
TRACT, NEGLIGENCE OR OTHER TORTIOUS ACTION, ARISING OUT OF OR IN CONNECTION WITH THE USE
OR PERFORMANCE OF THIS SOFTWARE.
Permission to use, copy, modify, and distribute this software for any purpose with or without fee is hereby granted, pro-
vided that the above copyright notice and this permission notice appear in all copies.
THE SOFTWARE IS PROVIDED "AS IS" AND ISC DISCLAIMS ALL WARRANTIES WITH REGARD TO THIS SOFT-
WARE INCLUDING ALL IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS. IN NO EVENT SHALL
ISC BE LIABLE FOR ANY SPECIAL, DIRECT, INDIRECT, OR CONSEQUENTIAL DAMAGES OR ANY DAMAGES
WHATSOEVER RESULTING FROM LOSS OF USE, DATA OR PROFITS, WHETHER IN AN ACTION OF CON-
TRACT, NEGLIGENCE OR OTHER TORTIOUS ACTION, ARISING OUT OF OR IN CONNECTION WITH THE USE
OR PERFORMANCE OF THIS SOFTWARE.
Permission to use, copy, modify, and distribute this software for any purpose with or without fee is hereby granted, pro-
vided that the above copyright notice and this permission notice appear in all copies.
THE SOFTWARE IS PROVIDED "AS IS" AND THE AUTHOR DISCLAIMS ALL WARRANTIES WITH REGARD TO
THIS SOFTWARE INCLUDING ALL IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS. IN NO
EVENT SHALL THE AUTHOR BE LIABLE FOR ANY SPECIAL, DIRECT, INDIRECT, OR CONSEQUENTIAL DAM-
AGES OR ANY DAMAGES WHATSOEVER RESULTING FROM LOSS OF USE, DATA OR PROFITS, WHETHER IN
AN ACTION OF CONTRACT, NEGLIGENCE OR OTHER TORTIOUS ACTION, ARISING OUT OF OR IN CONNEC-
TION WITH THE USE OR PERFORMANCE OF THIS SOFTWARE.
Permission to use, copy, modify, and distribute this software for any purpose with or without fee is hereby granted, pro-
vided that the above copyright notice and this permission notice appear in all copies.
THE SOFTWARE IS PROVIDED "AS IS" AND THE AUTHOR DISCLAIMS ALL WARRANTIES WITH REGARD TO
THIS SOFTWARE INCLUDING ALL IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS. IN NO
EVENT SHALL THE AUTHOR BE LIABLE FOR ANY SPECIAL, DIRECT, INDIRECT, OR CONSEQUENTIAL DAM-
AGES OR ANY DAMAGES WHATSOEVER RESULTING FROM LOSS OF USE, DATA OR PROFITS, WHETHER IN
AN ACTION OF CONTRACT, NEGLIGENCE OR OTHER TORTIOUS ACTION, ARISING OUT OF OR IN CONNEC-
TION WITH THE USE OR PERFORMANCE OF THIS SOFTWARE.
Permission to use, copy, modify, and distribute this software for any purpose with or without fee is hereby granted, pro-
vided that the above copyright notice and this permission notice appear in all copies.
THE SOFTWARE IS PROVIDED "AS IS" AND THE AUTHOR DISCLAIMS ALL WARRANTIES WITH REGARD TO
THIS SOFTWARE INCLUDING ALL IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS. IN NO
EVENT SHALL THE AUTHOR BE LIABLE FOR ANY SPECIAL, DIRECT, INDIRECT, OR CONSEQUENTIAL DAM-
AGES OR ANY DAMAGES WHATSOEVER RESULTING FROM LOSS OF USE, DATA OR PROFITS, WHETHER IN
AN ACTION OF CONTRACT, NEGLIGENCE OR OTHER TORTIOUS ACTION, ARISING OUT OF OR IN CONNEC-
TION WITH THE USE OR PERFORMANCE OF THIS SOFTWARE.
1776
are licensed and made available under the terms and conditions of the BSD License
which accompanies this distribution. The full text of the license may be found at
http://opensource.org/licenses/bsd-license.php
THE PROGRAM IS DISTRIBUTED UNDER THE BSD LICENSE ON AN "AS IS" BASIS,WITHOUT WARRANTIES OR
REPRESENTATIONS OF ANY KIND, EITHER EXPRESS OR IMPLIED.
Redistribution and use in source and binary forms, with or without modification, are permitted provided that the fol-
lowing conditions are met:
1. Redistributions of source code must retain the above copyright notice, this list of conditions and the following dis-
claimer.
2. Redistributions in binary form must reproduce the above copyright notice, this list of conditions and the following
disclaimer in the documentation and/or other materials provided with the distribution.
THIS SOFTWARE IS PROVIDED BY THE AUTHOR AND CONTRIBUTORS ''AS IS'' AND ANY EXPRESS OR IM-
PLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES OF MERCHANTABILI-
TY AND FITNESS FOR A PARTICULAR PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE AUTHOR OR
CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSE-
QUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SER-
VICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY
THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE
OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POS-
SIBILITY OF SUCH DAMAGE.
Redistribution and use in source and binary forms, with or without modification, are permitted provided that the fol-
lowing conditions are met:
1. Redistributions of source code must retain the above copyright notice, this list of conditions and the following dis-
claimer.
2. Redistributions in binary form must reproduce at minimum a disclaimer substantially similar to the "NO WARRAN-
TY" disclaimer below ("Disclaimer") and any redistribution must be conditioned upon including a substantially similar
Disclaimer requirement for further binary redistribution.
3. Neither the names of the above listed copyright holders nor the names of any contributors may be used to endorse
or promote products derived
from this software without specific prior written permission.
THIS SOFTWARE IS PROVIDED BY THE COPYRIGHT HOLDERS AND CONTRIBUTORS "AS IS" AND ANY EX-
PRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES OF MER-
CHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE
COPYRIGHT OWNER OR CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL,
EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUB-
STITUTE GOODS OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER
CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT (IN-
CLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN
IF THE COPYRIGHT OWNER OR CONTRIBUTOR IS ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.
Redistribution and use in source and binary forms, with or without modification, are permitted provided that the fol-
lowing conditions are met:
1. Redistributions of source code must retain the above copyright notice, this list of conditions and the following dis-
claimer.
2. Redistributions in binary form must reproduce at minimum a disclaimer substantially similar to the "NO WARRAN-
TY" disclaimer below ("Disclaimer") and any redistribution must be conditioned upon including a substantially similar
Disclaimer requirement for further binary redistribution.
3. Neither the names of the above listed copyright holders nor the names of any contributors may be used to endorse
or promote products derived from this software without specific prior written permission.
THIS SOFTWARE IS PROVIDED BY THE COPYRIGHT HOLDERS AND CONTRIBUTORS "AS IS" AND ANY EX-
PRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES OF MER-
CHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE
ARE DISCLAIMED. IN NO EVENT SHALL THE COPYRIGHT OWNER OR CONTRIBUTORS BE LIABLE FOR ANY
DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT
NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, DATA, OR PROFITS;
OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CON-
TRACT, STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT
OF THE USE OF THIS SOFTWARE, EVEN IF THE COPYRIGHT OWNER OR CONTRIBUTOR IS ADVISED OF THE
1777
SGOS Administration Guide
THE PROGRAM IS DISTRIBUTED UNDER THE BSD LICENSE ON AN "AS IS" BASIS, WITHOUT WARRANTIES OR
REPRESENTATIONS OF ANY KIND, EITHER EXPRESS OR IMPLIED.
THE PROGRAM IS DISTRIBUTED UNDER THE BSD LICENSE ON AN "AS IS" BASIS,WITHOUT WARRANTIES OR
REPRESENTATIONS OF ANY KIND, EITHER EXPRESS OR IMPLIED.
Permission to use, copy, modify, and distribute this software for any purpose with or without fee is hereby granted,
provided that the above copyright notice and this permission notice appear in all copies.
THE SOFTWARE IS PROVIDED "AS IS" AND THE AUTHOR DISCLAIMS ALL WARRANTIES WITH REGARD TO
THIS SOFTWARE INCLUDING ALL IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS. IN NO
EVENT SHALL THE AUTHOR BE LIABLE FOR ANY SPECIAL, DIRECT, INDIRECT, OR CONSEQUENTIAL DAM-
AGES OR ANY DAMAGES WHATSOEVER RESULTING FROM LOSS OF USE, DATA OR PROFITS, WHETHER IN
AN ACTION OF CONTRACT, NEGLIGENCE OR OTHER TORTIOUS ACTION, ARISING OUT OF OR IN CONNEC-
TION WITH THE USE OR PERFORMANCE OF THIS SOFTWARE.
THE PROGRAM IS DISTRIBUTED UNDER THE BSD LICENSE ON AN "AS IS" BASIS, WITHOUT WARRANTIES OR
REPRESENTATIONS OF ANY KIND, EITHER EXPRESS OR IMPLIED.
Permission to use, copy, modify, and distribute this software for any purpose with or without fee is hereby granted, pro-
vided that the above copyright notice and this permission notice appear in all copies.
THE SOFTWARE IS PROVIDED "AS IS" AND THE AUTHOR DISCLAIMS ALL WARRANTIES WITH REGARD TO
THIS SOFTWARE INCLUDING ALL IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS. IN NO
EVENT SHALL THE AUTHOR BE LIABLE FOR ANY SPECIAL, DIRECT, INDIRECT, OR CONSEQUENTIAL DAM-
AGES OR ANY DAMAGES WHATSOEVER RESULTING FROM LOSS OF USE, DATA OR PROFITS, WHETHER IN
AN ACTION OF CONTRACT, NEGLIGENCE OR OTHER TORTIOUS ACTION, ARISING OUT OF OR IN CONNEC-
TION WITH THE USE OR PERFORMANCE OF THIS SOFTWARE.
THE PROGRAM IS DISTRIBUTED UNDER THE BSD LICENSE ON AN "AS IS" BASIS,WITHOUT WARRANTIES OR
REPRESENTATIONS OF ANY KIND, EITHER EXPRESS OR IMPLIED.
THE PROGRAM IS DISTRIBUTED UNDER THE BSD LICENSE ON AN "AS IS" BASIS, WITHOUT WARRANTIES OR
REPRESENTATIONS OF ANY KIND, EITHER EXPRESS OR IMPLIED.
1778
THE PROGRAM IS DISTRIBUTED UNDER THE BSD LICENSE ON AN "AS IS" BASIS, WITHOUT WARRANTIES OR
REPRESENTATIONS OF ANY KIND, EITHER EXPRESS OR IMPLIED.
THE PROGRAM IS DISTRIBUTED UNDER THE BSD LICENSE ON AN "AS IS" BASIS, WITHOUT WARRANTIES OR
REPRESENTATIONS OF ANY KIND, EITHER EXPRESS OR IMPLIED.
THE PROGRAM IS DISTRIBUTED UNDER THE BSD LICENSE ON AN "AS IS" BASIS,
WITHOUT WARRANTIES OR REPRESENTATIONS OF ANY KIND, EITHER EXPRESS OR IMPLIED.
THE PROGRAM IS DISTRIBUTED UNDER THE BSD LICENSE ON AN "AS IS" BASIS, WITHOUT WARRANTIES OR
REPRESENTATIONS OF ANY KIND, EITHER EXPRESS OR IMPLIED.
THE PROGRAM IS DISTRIBUTED UNDER THE BSD LICENSE ON AN "AS IS" BASIS, WITHOUT WARRANTIES OR
REPRESENTATIONS OF ANY KIND, EITHER EXPRESS OR IMPLIED.
THE PROGRAM IS DISTRIBUTED UNDER THE BSD LICENSE ON AN "AS IS" BASIS, WITHOUT WARRANTIES OR
REPRESENTATIONS OF ANY KIND, EITHER EXPRESS OR IMPLIED.
THE PROGRAM IS DISTRIBUTED UNDER THE BSD LICENSE ON AN "AS IS" BASIS, WITHOUT WARRANTIES OR
REPRESENTATIONS OF ANY KIND, EITHER EXPRESS OR IMPLIED.
THE PROGRAM IS DISTRIBUTED UNDER THE BSD LICENSE ON AN "AS IS" BASIS, WITHOUT WARRANTIES OR
REPRESENTATIONS OF ANY KIND, EITHER EXPRESS OR IMPLIED.
THE PROGRAM IS DISTRIBUTED UNDER THE BSD LICENSE ON AN "AS IS" BASIS, WITHOUT WARRANTIES OR
REPRESENTATIONS OF ANY KIND, EITHER EXPRESS OR IMPLIED.
1779
SGOS Administration Guide
licenses/bsd-license.php
THE PROGRAM IS DISTRIBUTED UNDER THE BSD LICENSE ON AN "AS IS" BASIS, WITHOUT WARRANTIES OR
REPRESENTATIONS OF ANY KIND, EITHER EXPRESS OR IMPLIED.
Redistribution and use in source and binary forms, with or without modification, are permitted provided that the fol-
lowing conditions are met:
1. Redistributions of source code must retain the above copyright notice, this list of conditions and the following dis-
claimer.
2. Redistributions in binary form must reproduce the above copyright notice, this list of conditions and the following
disclaimer in the documentation and/or other materials provided with the distribution.
3. Neither the name of the Silicom nor the names of its contributors may be used to endorse or promote products derived
from this software without specific prior written permission.
THIS SOFTWARE IS PROVIDED BY THE COPYRIGHT HOLDERS AND CONTRIBUTORS "AS IS"AND ANY EX-
PRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THEIMPLIED WARRANTIES OF MER-
CHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE
COPYRIGHT OWNER OR CONTRIBUTORS BE IABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EX-
EMPLARY, ORCONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTI-
TUTE GOODS OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER
CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT (IN-
CLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN
IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.
Permission to use, copy, modify, and distribute this software for any purpose with or without fee is hereby granted, pro-
vided that the above copyright notice and this permission notice appear in all copies.
THE SOFTWARE IS PROVIDED "AS IS" AND THE AUTHOR DISCLAIMS ALL WARRANTIES WITH REGARD TO
THIS SOFTWARE INCLUDING ALL IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS. IN NO
EVENT SHALL THE AUTHOR BE LIABLE FOR ANY SPECIAL, DIRECT, INDIRECT, OR CONSEQUENTIAL DAM-
AGES OR ANY DAMAGES WHATSOEVER RESULTING FROM LOSS OF USE, DATA OR PROFITS, WHETHER IN
AN ACTION OF CONTRACT, NEGLIGENCE OR OTHER TORTIOUS ACTION, ARISING OUT OF OR IN CONNEC-
TION WITH THE USE OR PERFORMANCE OF THIS SOFTWARE.
Permission to use, copy, modify, and distribute this software for any purpose with or without fee is hereby granted, pro-
vided that the above copyright notice and this permission notice appear in all copies.
THE SOFTWARE IS PROVIDED "AS IS" AND THE AUTHOR DISCLAIMS ALL WARRANTIES WITH REGARD TO
THIS SOFTWARE INCLUDING ALL IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS. IN NO
EVENT SHALL THE AUTHOR BE LIABLE FOR ANY SPECIAL, DIRECT, INDIRECT, OR CONSEQUENTIAL DAM-
AGES OR ANY DAMAGES WHATSOEVER RESULTING FROM LOSS OF USE, DATA OR PROFITS, WHETHER IN
AN ACTION OF CONTRACT, NEGLIGENCE OR OTHER TORTIOUS ACTION, ARISING OUT OF OR IN CONNEC-
TION WITH THE USE OR PERFORMANCE OF THIS SOFTWARE.
Redistribution and use in source and binary forms, with or without modification, are permitted provided that the fol-
lowing conditions are met:
1. Redistributions of source code must retain the above copyright notice, this list of conditions and the following dis-
claimer.
2. Neither the name of the University nor the names of its contributors may be used to endorse or promote products
derived from this software without specific prior written permission.
THIS SOFTWARE IS PROVIDED BY THE REGENTS AND CONTRIBUTORS ''AS IS'' AND ANY EXPRESS OR IM-
PLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES OF MERCHANTABILI-
TY AND FITNESS FOR A PARTICULAR PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE REGENTS OR
CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSE-
QUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SER-
VICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY
THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT
LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF
THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.
1780
Copyright (c) 2011, ARM Limited. All rights reserved.
This program and the accompanying materials are licensed and made available under the terms and conditions of the
BSD License which accompanies this distribution. The full text of the license may be found at http://opensource.org/
licenses/bsd-license.php
THE PROGRAM IS DISTRIBUTED UNDER THE BSD LICENSE ON AN "AS IS" BASIS, WITHOUT WARRANTIES OR
REPRESENTATIONS OF ANY KIND, EITHER EXPRESS OR IMPLIED.
THE PROGRAM IS DISTRIBUTED UNDER THE BSD LICENSE ON AN "AS IS" BASIS, WITHOUT WARRANTIES OR
REPRESENTATIONS OF ANY KIND, EITHER EXPRESS OR IMPLIED.
THE PROGRAM IS DISTRIBUTED UNDER THE BSD LICENSE ON AN "AS IS" BASIS, WITHOUT WARRANTIES OR
REPRESENTATIONS OF ANY KIND, EITHER EXPRESS OR IMPLIED.
THE PROGRAM IS DISTRIBUTED UNDER THE BSD LICENSE ON AN "AS IS" BASIS, WITHOUT WARRANTIES OR
REPRESENTATIONS OF ANY KIND, EITHER EXPRESS OR IMPLIED.
THE PROGRAM IS DISTRIBUTED UNDER THE BSD LICENSE ON AN "AS IS" BASIS, WITHOUT WARRANTIES OR
REPRESENTATIONS OF ANY KIND, EITHER EXPRESS OR IMPLIED.
This program and the accompanying materials are licensed and made available under the terms and conditions of the
BSD License which accompanies this distribution. The full text of the license may be found at: http://opensource.org/
licenses/bsd-license.php
THE PROGRAM IS DISTRIBUTED UNDER THE BSD LICENSE ON AN "AS IS" BASIS, WITHOUT WARRANTIES OR
REPRESENTATIONS OF ANY KIND, EITHER EXPRESS OR IMPLIED.
THE PROGRAM IS DISTRIBUTED UNDER THE BSD LICENSE ON AN "AS IS" BASIS, WITHOUT WARRANTIES OR
REPRESENTATIONS OF ANY KIND, EITHER EXPRESS OR IMPLIED.
1781
SGOS Administration Guide
Redistribution and use in source and binary forms, with or without modification, are permitted provided that the fol-
lowing conditions are met:
1. Redistributions of source code must retain the above copyright notice, this list of conditions and the following dis-
claimer.
2. Neither the name of the Myricom Inc, nor the names of its contributors may be used to endorse or promote products
derived from this software without specific prior written permission.
2. Neither the name of the Intel Corporation, nor the names of its contributors may be used to endorse or promote prod-
ucts derived from this software without specific prior written permission.
THIS SOFTWARE IS PROVIDED BY THE COPYRIGHT HOLDERS AND CONTRIBUTORS "AS IS" AND ANY EX-
PRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES OF MER-
CHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE
COPYRIGHT OWNER OR CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL,
EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUB-
STITUTE GOODS OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER
CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT (IN-
CLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN
IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.
Redistribution and use in source and binary forms, with or without modification, are permitted provided that the fol-
lowing conditions are met:
1. Redistributions of source code must retain the above copyright notice, this list of conditions and the following dis-
claimer.
2. Redistributions in binary form must reproduce the above copyright notice, this list of conditions and the following
disclaimer in the documentation and/or other materials provided with the distribution.
3. Neither the name of the Silicom nor the names of its contributors may be used to endorse or promote products derived
from this software without specific prior written permission.
THIS SOFTWARE IS PROVIDED BY THE COPYRIGHT HOLDERS AND CONTRIBUTORS "AS IS"AND ANY EX-
PRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THEIMPLIED WARRANTIES OF MER-
CHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE
COPYRIGHT OWNER OR CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL,
EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUB-
STITUTE GOODS OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER
CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT (IN-
CLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN
IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.
THE PROGRAM IS DISTRIBUTED UNDER THE BSD LICENSE ON AN "AS IS" BASIS, WITHOUT WARRANTIES OR
REPRESENTATIONS OF ANY KIND, EITHER EXPRESS OR IMPLIED.
THE PROGRAM IS DISTRIBUTED UNDER THE BSD LICENSE ON AN "AS IS" BASIS, WITHOUT WARRANTIES OR
REPRESENTATIONS OF ANY KIND, EITHER EXPRESS OR IMPLIED.
THE PROGRAM IS DISTRIBUTED UNDER THE BSD LICENSE ON AN "AS IS" BASIS, WITHOUT WARRANTIES OR
REPRESENTATIONS OF ANY KIND, EITHER EXPRESS OR IMPLIED.
1782
This program and the accompanying materials are licensed and made available under the terms and conditions of the
BSD License which accompanies this distribution. The full text of the license may be found at: http://opensource.org/
licenses/bsd-license.php
THE PROGRAM IS DISTRIBUTED UNDER THE BSD LICENSE ON AN "AS IS" BASIS, WITHOUT WARRANTIES OR
REPRESENTATIONS OF ANY KIND, EITHER EXPRESS OR IMPLIED.
THE PROGRAM IS DISTRIBUTED UNDER THE BSD LICENSE ON AN "AS IS" BASIS, WITHOUT WARRANTIES OR
REPRESENTATIONS OF ANY KIND, EITHER EXPRESS OR IMPLIED.
THE PROGRAM IS DISTRIBUTED UNDER THE BSD LICENSE ON AN "AS IS" BASIS, WITHOUT WARRANTIES OR
REPRESENTATIONS OF ANY KIND, EITHER EXPRESS OR IMPLIED.
THE PROGRAM IS DISTRIBUTED UNDER THE BSD LICENSE ON AN "AS IS" BASIS, WITHOUT WARRANTIES OR
REPRESENTATIONS OF ANY KIND, EITHER EXPRESS OR IMPLIED.
This program and the accompanying materials are licensed and made available under the terms and conditions of the
BSD License
which accompanies this distribution. The full text of the license may be found at http://opensource.org/licenses/bsd-
license.php
THE PROGRAM IS DISTRIBUTED UNDER THE BSD LICENSE ON AN "AS IS" BASIS, WITHOUT WARRANTIES OR
REPRESENTATIONS OF ANY KIND, EITHER EXPRESS OR IMPLIED.
THE PROGRAM IS DISTRIBUTED UNDER THE BSD LICENSE ON AN "AS IS" BASIS, WITHOUT WARRANTIES OR
REPRESENTATIONS OF ANY KIND, EITHER EXPRESS OR IMPLIED.
THE PROGRAM IS DISTRIBUTED UNDER THE BSD LICENSE ON AN "AS IS" BASIS, WITHOUT WARRANTIES OR
REPRESENTATIONS OF ANY KIND, EITHER EXPRESS OR IMPLIED.
THE PROGRAM IS DISTRIBUTED UNDER THE BSD LICENSE ON AN "AS IS" BASIS, WITHOUT WARRANTIES OR
REPRESENTATIONS OF ANY KIND, EITHER EXPRESS OR IMPLIED.
1783
SGOS Administration Guide
THE PROGRAM IS DISTRIBUTED UNDER THE BSD LICENSE ON AN "AS IS" BASIS,WITHOUT WARRANTIES OR
REPRESENTATIONS OF ANY KIND, EITHER EXPRESS OR IMPLIED.
This program and the accompanying materials are licensed and made available under the terms and conditions of the
BSD License which accompanies this distribution. The full text of the license may be found at: http://opensource.org/
licenses/bsd-license.php
THE PROGRAM IS DISTRIBUTED UNDER THE BSD LICENSE ON AN "AS IS" BASIS, WITHOUT WARRANTIES OR
REPRESENTATIONS OF ANY KIND, EITHER EXPRESS OR IMPLIED.
THE PROGRAM IS DISTRIBUTED UNDER THE BSD LICENSE ON AN "AS IS" BASIS, WITHOUT WARRANTIES OR
REPRESENTATIONS OF ANY KIND, EITHER EXPRESS OR IMPLIED.
THE PROGRAM IS DISTRIBUTED UNDER THE BSD LICENSE ON AN "AS IS" BASIS, WITHOUT WARRANTIES OR
REPRESENTATIONS OF ANY KIND, EITHER EXPRESS OR IMPLIED.
Redistribution and use in source and binary forms, with or without modification, are permitted provided that the fol-
lowing conditions are met:
1. Redistributions of source code must retain the above copyright notice, this list of conditions and the following dis-
claimer.
2. Redistributions in binary form must reproduce the above copyright notice, this list of conditions and the following
disclaimer in the documentation and/or other materials provided with the distribution.
THIS SOFTWARE IS PROVIDED BY THE AUTHOR AND CONTRIBUTORS ''AS IS'' AND ANY EXPRESS OR IM-
PLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES OF MERCHANTABILI-
TY AND FITNESS FOR A PARTICULAR PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE AUTHOR OR
CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSE-
QUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SER-
VICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY
THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT
LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF
THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.
THE PROGRAM IS DISTRIBUTED UNDER THE BSD LICENSE ON AN "AS IS" BASIS, WITHOUT WARRANTIES OR
REPRESENTATIONS OF ANY KIND, EITHER EXPRESS OR IMPLIED.
THE PROGRAM IS DISTRIBUTED UNDER THE BSD LICENSE ON AN "AS IS" BASIS, WITHOUT WARRANTIES OR
REPRESENTATIONS OF ANY KIND, EITHER EXPRESS OR IMPLIED.
THE PROGRAM IS DISTRIBUTED UNDER THE BSD LICENSE ON AN "AS IS" BASIS, WITHOUT WARRANTIES OR
REPRESENTATIONS OF ANY KIND, EITHER EXPRESS OR IMPLIED.
1784
Copyright (c) 2006 - 2009, Intel Corporation. All rights reserved.
Portions copyright (c) 2008 - 2010, Apple Inc. All rights reserved.
This program and the accompanying materials are licensed and made available under the terms and conditions of the
BSD License which accompanies this distribution. The full text of the license may be found at http://opensource.org/
licenses/bsd-license.php
THE PROGRAM IS DISTRIBUTED UNDER THE BSD LICENSE ON AN "AS IS" BASIS, WITHOUT WARRANTIES OR
REPRESENTATIONS OF ANY KIND, EITHER EXPRESS OR IMPLIED.
THE PROGRAM IS DISTRIBUTED UNDER THE BSD LICENSE ON AN "AS IS" BASIS, WITHOUT WARRANTIES OR
REPRESENTATIONS OF ANY KIND, EITHER EXPRESS OR IMPLIED.
THE PROGRAM IS DISTRIBUTED UNDER THE BSD LICENSE ON AN "AS IS" BASIS, WITHOUT WARRANTIES OR
REPRESENTATIONS OF ANY KIND, EITHER EXPRESS OR IMPLIED.
THE PROGRAM IS DISTRIBUTED UNDER THE BSD LICENSE ON AN "AS IS" BASIS, WITHOUT WARRANTIES OR
REPRESENTATIONS OF ANY KIND, EITHER EXPRESS OR IMPLIED.
This program and the accompanying materials are licensed and made available under the terms and conditions of the
BSD License which accompanies this distribution. The full text of the license may be found at: http://opensource.org/
licenses/bsd-license.php
THE PROGRAM IS DISTRIBUTED UNDER THE BSD LICENSE ON AN "AS IS" BASIS, WITHOUT WARRANTIES OR
REPRESENTATIONS OF ANY KIND, EITHER EXPRESS OR IMPLIED.
THE PROGRAM IS DISTRIBUTED UNDER THE BSD LICENSE ON AN "AS IS" BASIS, WITHOUT WARRANTIES OR
REPRESENTATIONS OF ANY KIND, EITHER EXPRESS OR IMPLIED.
THE PROGRAM IS DISTRIBUTED UNDER THE BSD LICENSE ON AN "AS IS" BASIS, WITHOUT WARRANTIES OR
REPRESENTATIONS OF ANY KIND, EITHER EXPRESS OR IMPLIED.
THE PROGRAM IS DISTRIBUTED UNDER THE BSD LICENSE ON AN "AS IS" BASIS, WITHOUT WARRANTIES OR
REPRESENTATIONS OF ANY KIND, EITHER EXPRESS OR IMPLIED.
1785
SGOS Administration Guide
THE PROGRAM IS DISTRIBUTED UNDER THE BSD LICENSE ON AN "AS IS" BASIS, WITHOUT WARRANTIES OR
REPRESENTATIONS OF ANY KIND, EITHER EXPRESS OR IMPLIED.
THE PROGRAM IS DISTRIBUTED UNDER THE BSD LICENSE ON AN "AS IS" BASIS, WITHOUT WARRANTIES OR
REPRESENTATIONS OF ANY KIND, EITHER EXPRESS OR IMPLIED.
THE PROGRAM IS DISTRIBUTED UNDER THE BSD LICENSE ON AN "AS IS" BASIS, WITHOUT WARRANTIES OR
REPRESENTATIONS OF ANY KIND, EITHER EXPRESS OR IMPLIED.
THE PROGRAM IS DISTRIBUTED UNDER THE BSD LICENSE ON AN "AS IS" BASIS, WITHOUT WARRANTIES OR
REPRESENTATIONS OF ANY KIND, EITHER EXPRESS OR IMPLIED.
THE PROGRAM IS DISTRIBUTED UNDER THE BSD LICENSE ON AN "AS IS" BASIS, WITHOUT WARRANTIES OR
REPRESENTATIONS OF ANY KIND, EITHER EXPRESS OR IMPLIED.
THE PROGRAM IS DISTRIBUTED UNDER THE BSD LICENSE ON AN "AS IS" BASIS, WITHOUT WARRANTIES OR
REPRESENTATIONS OF ANY KIND, EITHER EXPRESS OR IMPLIED.
THE PROGRAM IS DISTRIBUTED UNDER THE BSD LICENSE ON AN "AS IS" BASIS, WITHOUT WARRANTIES OR
REPRESENTATIONS OF ANY KIND, EITHER EXPRESS OR IMPLIED.
THE PROGRAM IS DISTRIBUTED UNDER THE BSD LICENSE ON AN "AS IS" BASIS,WITHOUT WARRANTIES OR
REPRESENTATIONS OF ANY KIND, EITHER EXPRESS OR IMPLIED.
1786
licenses/bsd-license.php
THE PROGRAM IS DISTRIBUTED UNDER THE BSD LICENSE ON AN "AS IS" BASIS, WITHOUT WARRANTIES OR
REPRESENTATIONS OF ANY KIND, EITHER EXPRESS OR IMPLIED.
THE PROGRAM IS DISTRIBUTED UNDER THE BSD LICENSE ON AN "AS IS" BASIS, WITHOUT WARRANTIES OR
REPRESENTATIONS OF ANY KIND, EITHER EXPRESS OR IMPLIED.
THE PROGRAM IS DISTRIBUTED UNDER THE BSD LICENSE ON AN "AS IS" BASIS, WITHOUT WARRANTIES OR
REPRESENTATIONS OF ANY KIND, EITHER EXPRESS OR IMPLIED.
THE PROGRAM IS DISTRIBUTED UNDER THE BSD LICENSE ON AN "AS IS" BASIS, WITHOUT WARRANTIES OR
REPRESENTATIONS OF ANY KIND, EITHER EXPRESS OR IMPLIED.
THE PROGRAM IS DISTRIBUTED UNDER THE BSD LICENSE ON AN "AS IS" BASIS, WITHOUT WARRANTIES OR
REPRESENTATIONS OF ANY KIND, EITHER EXPRESS OR IMPLIED.
THE PROGRAM IS DISTRIBUTED UNDER THE BSD LICENSE ON AN "AS IS" BASIS, WITHOUT WARRANTIES OR
REPRESENTATIONS OF ANY KIND, EITHER EXPRESS OR IMPLIED.
THE PROGRAM IS DISTRIBUTED UNDER THE BSD LICENSE ON AN "AS IS" BASIS, WITHOUT WARRANTIES OR
REPRESENTATIONS OF ANY KIND, EITHER EXPRESS OR IMPLIED.
THE PROGRAM IS DISTRIBUTED UNDER THE BSD LICENSE ON AN "AS IS" BASIS, WITHOUT WARRANTIES OR
REPRESENTATIONS OF ANY KIND, EITHER EXPRESS OR IMPLIED.
Redistribution and use in source and binary forms, with or without modification, are permitted provided that the fol-
lowing conditions
are met:
1. Redistributions of source code must retain the above copyright notice, this list of conditions and the following dis-
claimer.
1787
SGOS Administration Guide
2. Redistributions in binary form must reproduce the above copyright notice, this list of conditions and the following
disclaimer in the documentation and/or other materials provided with the distribution.
3. All advertising materials mentioning features or use of this software must display the following acknowledgement:
This product includes software developed by the University of California, Berkeley and its contributors.
4. Neither the name of the University nor the names of its contributors may be used to endorse or promote products
derived from this software
without specific prior written permission.
THIS SOFTWARE IS PROVIDED BY THE REGENTS AND CONTRIBUTORS ''AS IS'' AND ANY EXPRESS OR IM-
PLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES OF MERCHANTABILI-
TY AND FITNESS FOR A PARTICULAR PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE REGENTS OR
CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSE-
QUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SER-
VICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY
THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE
OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POS-
SIBILITY OF SUCH DAMAGE.
THE PROGRAM IS DISTRIBUTED UNDER THE BSD LICENSE ON AN "AS IS" BASIS, WITHOUT WARRANTIES OR
REPRESENTATIONS OF ANY KIND, EITHER EXPRESS OR IMPLIED.
THE PROGRAM IS DISTRIBUTED UNDER THE BSD LICENSE ON AN "AS IS" BASIS, WITHOUT WARRANTIES OR
REPRESENTATIONS OF ANY KIND, EITHER EXPRESS OR IMPLIED.
This program and the accompanying materials are licensed and made available under the terms and conditions of the
BSD License which accompanies this distribution. The full text of the license may be found at: http://opensource.org/
licenses/bsd-license.php
THE PROGRAM IS DISTRIBUTED UNDER THE BSD LICENSE ON AN "AS IS" BASIS, WITHOUT WARRANTIES OR
REPRESENTATIONS OF ANY KIND, EITHER EXPRESS OR IMPLIED.
THE PROGRAM IS DISTRIBUTED UNDER THE BSD LICENSE ON AN "AS IS" BASIS, WITHOUT WARRANTIES OR
REPRESENTATIONS OF ANY KIND, EITHER EXPRESS OR IMPLIED.
THE PROGRAM IS DISTRIBUTED UNDER THE BSD LICENSE ON AN "AS IS" BASIS, WITHOUT WARRANTIES OR
REPRESENTATIONS OF ANY KIND, EITHER EXPRESS OR IMPLIED.
THE PROGRAM IS DISTRIBUTED UNDER THE BSD LICENSE ON AN "AS IS" BASIS, WITHOUT WARRANTIES OR
REPRESENTATIONS OF ANY KIND, EITHER EXPRESS OR IMPLIED.
THE PROGRAM IS DISTRIBUTED UNDER THE BSD LICENSE ON AN "AS IS" BASIS, WITHOUT WARRANTIES OR
REPRESENTATIONS OF ANY KIND, EITHER EXPRESS OR IMPLIED.
1788
This program and the accompanying materials are licensed and made available under the terms and conditions of the
BSD License which accompanies this distribution. The full text of the license may be found at http://opensource.org/
licenses/bsd-license.php
THE PROGRAM IS DISTRIBUTED UNDER THE BSD LICENSE ON AN "AS IS" BASIS, WITHOUT WARRANTIES OR
REPRESENTATIONS OF ANY KIND, EITHER EXPRESS OR IMPLIED.
THE PROGRAM IS DISTRIBUTED UNDER THE BSD LICENSE ON AN "AS IS" BASIS, WITHOUT WARRANTIES OR
REPRESENTATIONS OF ANY KIND, EITHER EXPRESS OR IMPLIED.
THE PROGRAM IS DISTRIBUTED UNDER THE BSD LICENSE ON AN "AS IS" BASIS, WITHOUT WARRANTIES OR
REPRESENTATIONS OF ANY KIND, EITHER EXPRESS OR IMPLIED.
This program and the accompanying materials are licensed and made available under the terms and conditions of the
BSD License which accompanies this distribution. The full text of the license may be found at http://opensource.org/
licenses/bsd-license.php
THE PROGRAM IS DISTRIBUTED UNDER THE BSD LICENSE ON AN "AS IS" BASIS, WITHOUT WARRANTIES OR
REPRESENTATIONS OF ANY KIND, EITHER EXPRESS OR IMPLIED.
THE PROGRAM IS DISTRIBUTED UNDER THE BSD LICENSE ON AN "AS IS" BASIS, WITHOUT WARRANTIES OR
REPRESENTATIONS OF ANY KIND, EITHER EXPRESS OR IMPLIED.
THE PROGRAM IS DISTRIBUTED UNDER THE BSD LICENSE ON AN "AS IS" BASIS, WITHOUT WARRANTIES OR
REPRESENTATIONS OF ANY KIND, EITHER EXPRESS OR IMPLIED.
THE PROGRAM IS DISTRIBUTED UNDER THE BSD LICENSE ON AN "AS IS" BASIS, WITHOUT WARRANTIES OR
REPRESENTATIONS OF ANY KIND, EITHER EXPRESS OR IMPLIED.
THE PROGRAM IS DISTRIBUTED UNDER THE BSD LICENSE ON AN "AS IS" BASIS, WITHOUT WARRANTIES OR
REPRESENTATIONS OF ANY KIND, EITHER EXPRESS OR IMPLIED.
1789
SGOS Administration Guide
This program and the accompanying materials are licensed and made available under the terms and conditions of the
BSD License which accompanies this distribution. The full text of the license may be found at: http://opensource.org/
licenses/bsd-license.php
THE PROGRAM IS DISTRIBUTED UNDER THE BSD LICENSE ON AN "AS IS" BASIS, WITHOUT WARRANTIES OR
REPRESENTATIONS OF ANY KIND, EITHER EXPRESS OR IMPLIED.
THE PROGRAM IS DISTRIBUTED UNDER THE BSD LICENSE ON AN "AS IS" BASIS, WITHOUT WARRANTIES OR
REPRESENTATIONS OF ANY KIND, EITHER EXPRESS OR IMPLIED.
THE PROGRAM IS DISTRIBUTED UNDER THE BSD LICENSE ON AN "AS IS" BASIS, WITHOUT WARRANTIES OR
REPRESENTATIONS OF ANY KIND, EITHER EXPRESS OR IMPLIED.
THE PROGRAM IS DISTRIBUTED UNDER THE BSD LICENSE ON AN "AS IS" BASIS, WITHOUT WARRANTIES OR
REPRESENTATIONS OF ANY KIND, EITHER EXPRESS OR IMPLIED.
THE PROGRAM IS DISTRIBUTED UNDER THE BSD LICENSE ON AN "AS IS" BASIS, WITHOUT WARRANTIES OR
REPRESENTATIONS OF ANY KIND, EITHER EXPRESS OR IMPLIED.
Redistribution and use in source and binary forms, with or without modification, are permitted provided that the fol-
lowing conditions are met:
1. Redistributions of source code must retain the above copyright notice, this list of conditions and the following dis-
claimer.
2. Redistributions in binary form must reproduce the above copyright notice, this list of conditions and the following
disclaimer in the documentation and/or other materials provided with the distribution.
THIS SOFTWARE IS PROVIDED BY THE AUTHOR AND CONTRIBUTORS ''AS IS'' AND ANY EXPRESS OR IM-
PLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES OF MERCHANTABILI-
TY AND FITNESS FOR A PARTICULAR PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE AUTHOR OR
CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSE-
QUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SER-
VICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY
THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE
OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POS-
SIBILITY OF SUCH DAMAGE.
Redistribution and use in source and binary forms, with or without modification, are permitted provided that the fol-
lowing conditions are met:
1. Redistributions of source code must retain the above copyright notice, this list of conditions and the following dis-
claimer.
2. Redistributions in binary form must reproduce the above copyright notice, this list of conditions and the following
disclaimer in the documentation and/or other materials provided with the distribution.
THIS SOFTWARE IS PROVIDED BY THE AUTHOR AND CONTRIBUTORS ''AS IS'' AND ANY EXPRESS OR IM-
PLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES OF MERCHANTABILI-
TY AND FITNESS FOR A PARTICULAR PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE AUTHOR OR
CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSE-
1790
QUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SER-
VICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY
THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT
LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF
THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.
Permission to use, copy, modify, and distribute this software for any purpose with or without fee is hereby granted, pro-
vided that the above copyright notice and this permission notice appear in all copies.
THE SOFTWARE IS PROVIDED "AS IS" AND THE AUTHOR DISCLAIMS ALL WARRANTIES WITH REGARD TO
THIS SOFTWARE INCLUDING ALL IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS. IN NO
EVENT SHALL THE AUTHOR BE LIABLE FOR ANY SPECIAL, DIRECT, INDIRECT, OR CONSEQUENTIAL DAM-
AGES OR ANY DAMAGES WHATSOEVER RESULTING FROM LOSS OF USE, DATA OR PROFITS, WHETHER IN
AN ACTION OF CONTRACT, NEGLIGENCE OR OTHER TORTIOUS ACTION, ARISING OUT OF OR IN CONNEC-
TION WITH THE USE OR PERFORMANCE OF THIS SOFTWARE.
Permission to use, copy, modify, and distribute this software for any purpose with or without fee is hereby granted, pro-
vided that the above copyright notice and this permission notice appear in all copies.
THE SOFTWARE IS PROVIDED "AS IS" AND THE AUTHOR DISCLAIMS ALL WARRANTIES WITH REGARD TO
THIS SOFTWARE INCLUDING ALL IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS. IN NO
EVENT SHALL THE AUTHOR BE LIABLE FOR ANY SPECIAL, DIRECT, INDIRECT, OR CONSEQUENTIAL DAM-
AGES OR ANY DAMAGES WHATSOEVER RESULTING FROM LOSS OF USE, DATA OR PROFITS, WHETHER IN
AN ACTION OF CONTRACT, NEGLIGENCE OR OTHER TORTIOUS ACTION, ARISING OUT OF OR IN CONNEC-
TION WITH THE USE OR PERFORMANCE OF THIS SOFTWARE.
Permission to use, copy, modify, and distribute this software for any purpose with or without fee is hereby granted,
provided that the above copyright notice and this permission notice appear in all copies.
THE SOFTWARE IS PROVIDED "AS IS" AND THE AUTHOR DISCLAIMS ALL WARRANTIES WITH REGARD TO
THIS SOFTWARE INCLUDING ALL IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS. IN NO
EVENT SHALL THE AUTHOR BE LIABLE FOR ANY SPECIAL, DIRECT, INDIRECT, OR CONSEQUENTIAL DAM-
AGES OR ANY DAMAGES WHATSOEVER RESULTING FROM LOSS OF USE, DATA OR PROFITS, WHETHER IN
AN ACTION OF CONTRACT, NEGLIGENCE OR OTHER TORTIOUS ACTION, ARISING OUT OF OR IN CONNEC-
TION WITH THE USE OR PERFORMANCE OF THIS SOFTWARE.
Redistribution and use in source and binary forms, with or without modification, are permitted provided that the fol-
lowing conditions
are met:
1. Redistributions of source code must retain the above copyright notice, this list of conditions and the following dis-
claimer.
2. Redistributions in binary form must reproduce the above copyright notice, this list of conditions and the following
disclaimer in the documentation and/or other materials provided with the distribution.
THIS SOFTWARE IS PROVIDED BY THE AUTHOR ''AS IS'' AND ANY EXPRESS OR IMPLIED WARRANTIES, IN-
CLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A
PARTICULAR PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE AUTHOR BE LIABLE FOR ANY DIRECT,
INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT
LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR
BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CON-
TRACT, STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT
OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.
Redistribution and use in source and binary forms, with or without modification, are permitted provided that the fol-
lowing conditions are met:
1. Redistributions of source code must retain the above copyright notice, this list of conditions and the following dis-
claimer, without modification.
1791
SGOS Administration Guide
2. Redistributions in binary form must reproduce at minimum a disclaimer similar to the "NO WARRANTY" disclaimer
below ("Disclaimer") and any
redistribution must be conditioned upon including a substantially similar Disclaimer requirement for further binary
redistribution.
NO WARRANTY
THIS SOFTWARE IS PROVIDED BY THE COPYRIGHT HOLDERS AND CONTRIBUTORS ''AS IS'' AND ANY EX-
PRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES OF NON-
INFRINGEMENT, MERCHANTIBILITY AND FITNESS FOR A PARTICULAR PURPOSE ARE DISCLAIMED. IN NO
EVENT SHALL THE COPYRIGHT HOLDERS OR CONTRIBUTORS BE LIABLE FOR SPECIAL, EXEMPLARY, OR
CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS
OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON
ANY THEORY OF LIABILITY, WHETHER
IN CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY
WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGES.
Permission to use, copy, modify, and distribute this software for any
purpose with or without fee is hereby granted, provided that the above
copyright notice and this permission notice appear in all copies.
THE SOFTWARE IS PROVIDED "AS IS" AND THE AUTHOR DISCLAIMS ALL WARRANTIES WITH REGARD TO
THIS SOFTWARE INCLUDING ALL IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS. IN NO
EVENT SHALL THE AUTHOR BE LIABLE FOR ANY SPECIAL, DIRECT, INDIRECT, OR CONSEQUENTIAL DAM-
AGES OR ANY DAMAGES WHATSOEVER RESULTING FROM LOSS OF USE, DATA OR PROFITS, WHETHER IN
AN ACTION OF CONTRACT, NEGLIGENCE OR OTHER TORTIOUS ACTION, ARISING OUT OF OR IN CONNEC-
TION WITH THE USE OR PERFORMANCE OF THIS SOFTWARE.
Redistribution and use in source and binary forms, with or without modification, are permitted provided that the fol-
lowing conditions are met:
1. Redistributions of source code must retain the above copyright notice, this list of conditions and the following dis-
claimer.
2. Redistributions in binary form must reproduce the above copyright notice, this list of conditions and the following
disclaimer in the documentation and/or other materials provided with the distribution.
3. All advertising materials mentioning features or use of this software must display the following acknowledgement:
This product includes software developed by the NetBSD Foundation, Inc. and its contributors.
4. Neither the name of The NetBSD Foundation nor the names of its contributors may be used to endorse or promote
products derived from this software without specific prior written permission.
THIS SOFTWARE IS PROVIDED BY THE NETBSD FOUNDATION, INC. AND CONTRIBUTORS ''AS IS'' AND ANY
EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES OF
MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL
THE FOUNDATION OR CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EX-
EMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTI-
TUTE GOODS OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER
CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT (IN-
CLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN
IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.
Permission to use, copy, modify, and distribute this software for any purpose with or without fee is hereby granted, pro-
vided that the above copyright notice and this permission notice appear in all copies.
THE SOFTWARE IS PROVIDED "AS IS" AND THE AUTHOR DISCLAIMS ALL WARRANTIES WITH REGARD TO
THIS SOFTWARE INCLUDING ALL IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS. IN NO
EVENT SHALL THE AUTHOR BE LIABLE FOR ANY SPECIAL, DIRECT, INDIRECT, OR CONSEQUENTIAL DAM-
AGES OR ANY DAMAGES WHATSOEVER RESULTING FROM LOSS OF USE, DATA OR PROFITS, WHETHER IN
AN ACTION OF CONTRACT, NEGLIGENCE OR OTHER TORTIOUS ACTION, ARISING OUT OF OR IN CONNEC-
TION WITH THE USE OR PERFORMANCE OF THIS SOFTWARE.
Copyright (c) 2007, Intel Corporation. All rights reserved.
Portions copyright (c) 2008 - 2009, Apple Inc. All rights reserved.
This program and the accompanying materials are licensed and made available under the terms and conditions of the
BSD License which accompanies this distribution. The full text of the license may be found at http://opensource.org/
licenses/bsd-license.php
THE PROGRAM IS DISTRIBUTED UNDER THE BSD LICENSE ON AN "AS IS" BASIS, WITHOUT WARRANTIES OR
1792
REPRESENTATIONS OF ANY KIND, EITHER EXPRESS OR IMPLIED.
This program and the accompanying materials are licensed and made available under the terms and conditions of the
BSD License which accompanies this distribution. The full text of the license may be found at: http://opensource.org/
licenses/bsd-license.php
THE PROGRAM IS DISTRIBUTED UNDER THE BSD LICENSE ON AN "AS IS" BASIS, WITHOUT WARRANTIES OR
REPRESENTATIONS OF ANY KIND, EITHER EXPRESS OR IMPLIED.
THE PROGRAM IS DISTRIBUTED UNDER THE BSD LICENSE ON AN "AS IS" BASIS, WITHOUT WARRANTIES OR
REPRESENTATIONS OF ANY KIND, EITHER EXPRESS OR IMPLIED.
Redistribution and use in source and binary forms, with or without modification, are permitted provided that the fol-
lowing conditions are met:
1. Redistributions of source code must retain the above copyright notice, this list of conditions and the following dis-
claimer.
2. Neither the name of the Myricom Inc, nor the names of its contributors may be used to endorse or promote products
derived from this software without specific prior written permission.
3. Neither the name of the Intel Corporation, nor the names of its contributors may be used to endorse or promote prod-
ucts derived from this software without specific prior written permission.
THIS SOFTWARE IS PROVIDED BY THE COPYRIGHT HOLDERS AND CONTRIBUTORS "AS IS"AND ANY EX-
PRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES OF MER-
CHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE
ARE DISCLAIMED. IN NO EVENT SHALL THE COPYRIGHT OWNER OR CONTRIBUTORS BE LIABLE FOR ANY
DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT
NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, DATA, OR PROFITS;
OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CON-
TRACT, STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT
OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.
Redistribution and use in source and binary forms, with or without modification, are permitted provided that the fol-
lowing conditions are met:
1. Redistributions of source code must retain the above copyright notice, this list of conditions and the following dis-
claimer.
2. Redistributions in binary form must reproduce the above copyright notice, this list of conditions and the following
disclaimer in the documentation and/or other materials provided with the distribution.
THIS SOFTWARE IS PROVIDED BY THE AUTHOR AND CONTRIBUTORS ''AS IS'' AND ANY EXPRESS OR IM-
PLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES OF MERCHANTABILI-
TY AND FITNESS FOR A PARTICULAR PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE AUTHOR OR
CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSE-
QUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SER-
VICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY
THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT
LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF
THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.
THE PROGRAM IS DISTRIBUTED UNDER THE BSD LICENSE ON AN "AS IS" BASIS, WITHOUT WARRANTIES OR
REPRESENTATIONS OF ANY KIND, EITHER EXPRESS OR IMPLIED.
1793
SGOS Administration Guide
BSD License which accompanies this distribution. The full text of the license may be found at http://opensource.org/
licenses/bsd-license.php
THE PROGRAM IS DISTRIBUTED UNDER THE BSD LICENSE ON AN "AS IS" BASIS, WITHOUT WARRANTIES OR
REPRESENTATIONS OF ANY KIND, EITHER EXPRESS OR IMPLIED.
Redistribution and use in source and binary forms, with or without modification, are permitted provided that the fol-
lowing conditions are met:
1. Redistributions of source code must retain the above copyright notice, this list of conditions and the following dis-
claimer.
2. Redistributions in binary form must reproduce the above copyright notice, this list of conditions and the following
disclaimer in the documentation and/or other materials provided with the distribution.
3. Neither the name of Broadcom Corporation nor the name of its contributors may be used to endorse or promote prod-
ucts derived from this software
without specific prior written consent.
THIS SOFTWARE IS PROVIDED BY THE COPYRIGHT HOLDERS AND CONTRIBUTORS "AS IS'' AND ANY EX-
PRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES OF MER-
CHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE
COPYRIGHT OWNER OR CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL,
EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUB-
STITUTE GOODS OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER
CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT (IN-
CLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN
IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.
Redistribution and use in source and binary forms, with or without modification, are permitted provided that the fol-
lowing conditions are met:
1. Redistributions of source code must retain the above copyright notice, this list of conditions and the following dis-
claimer.
2. Redistributions in binary form must reproduce the above copyright notice, this list of conditions and the following
disclaimer in the documentation and/or other materials provided with the distribution.
THIS SOFTWARE IS PROVIDED BY THE AUTHOR AND CONTRIBUTORS ''AS IS'' AND ANY EXPRESS OR IM-
PLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES OF MERCHANTABILI-
TY AND FITNESS FOR A PARTICULAR PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE AUTHOR OR
CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSE-
QUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SER-
VICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY
THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE
OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POS-
SIBILITY OF SUCH DAMAGE.
THE PROGRAM IS DISTRIBUTED UNDER THE BSD LICENSE ON AN "AS IS" BASIS, WITHOUT WARRANTIES OR
REPRESENTATIONS OF ANY KIND, EITHER EXPRESS OR IMPLIED.
THE PROGRAM IS DISTRIBUTED UNDER THE BSD LICENSE ON AN "AS IS" BASIS, WITHOUT WARRANTIES OR
REPRESENTATIONS OF ANY KIND, EITHER EXPRESS OR IMPLIED.
THE PROGRAM IS DISTRIBUTED UNDER THE BSD LICENSE ON AN "AS IS" BASIS, WITHOUT WARRANTIES OR
REPRESENTATIONS OF ANY KIND, EITHER EXPRESS OR IMPLIED.
This program and the accompanying materials are licensed and made available under the terms and conditions of the
1794
BSD License which accompanies this distribution. The full text of the license may be found at: http://opensource.org/
licenses/bsd-license.php
THE PROGRAM IS DISTRIBUTED UNDER THE BSD LICENSE ON AN "AS IS" BASIS, WITHOUT WARRANTIES OR
REPRESENTATIONS OF ANY KIND, EITHER EXPRESS OR IMPLIED.
THE PROGRAM IS DISTRIBUTED UNDER THE BSD LICENSE ON AN "AS IS" BASIS, WITHOUT WARRANTIES OR
REPRESENTATIONS OF ANY KIND, EITHER EXPRESS OR IMPLIED.
THE PROGRAM IS DISTRIBUTED UNDER THE BSD LICENSE ON AN "AS IS" BASIS, WITHOUT WARRANTIES OR
REPRESENTATIONS OF ANY KIND, EITHER EXPRESS OR IMPLIED.
THE PROGRAM IS DISTRIBUTED UNDER THE BSD LICENSE ON AN "AS IS" BASIS, WITHOUT WARRANTIES OR
REPRESENTATIONS OF ANY KIND, EITHER EXPRESS OR IMPLIED.
This program and the accompanying materials are licensed and made available under the terms and conditions of the
BSD License which accompanies this distribution. The full text of the license may be found at http://opensource.org/
licenses/bsd-license.php.
THE PROGRAM IS DISTRIBUTED UNDER THE BSD LICENSE ON AN "AS IS" BASIS, WITHOUT WARRANTIES OR
REPRESENTATIONS OF ANY KIND, EITHER EXPRESS OR IMPLIED.
THE PROGRAM IS DISTRIBUTED UNDER THE BSD LICENSE ON AN "AS IS" BASIS, WITHOUT WARRANTIES OR
REPRESENTATIONS OF ANY KIND, EITHER EXPRESS OR IMPLIED.
Permission to use, copy, modify, and distribute this software for any purpose with or without fee is hereby granted, pro-
vided that the above copyright notice and this permission notice appear in all copies.
THE SOFTWARE IS PROVIDED "AS IS" AND THE AUTHOR DISCLAIMS ALL WARRANTIES WITH REGARD TO
THIS SOFTWARE INCLUDING ALL IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS. IN NO
EVENT SHALL THE AUTHOR BE LIABLE FOR ANY SPECIAL, DIRECT, INDIRECT, OR CONSEQUENTIAL DAM-
AGES OR ANY DAMAGES WHATSOEVER RESULTING FROM LOSS OF USE, DATA OR PROFITS, WHETHER IN
AN ACTION OF CONTRACT, NEGLIGENCE OR OTHER TORTIOUS ACTION, ARISING OUT OF OR IN CONNEC-
TION WITH THE USE OR PERFORMANCE OF THIS SOFTWARE.
Redistribution and use in source and binary forms, with or without modification, are permitted provided that the fol-
lowing conditions are met:
1. Redistributions of source code must retain the above copyright notice, this list of conditions and the following dis-
claimer.
2. Redistributions in binary form must reproduce the above copyright notice, this list of conditions and the following
disclaimer in the documentation and/or other materials provided with the distribution.
THIS SOFTWARE IS PROVIDED BY THE AUTHOR AND CONTRIBUTORS ''AS IS'' AND ANY EXPRESS OR IM-
PLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES OF MERCHANTABILI-
TY AND FITNESS FOR A PARTICULAR PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE AUTHOR OR
CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSE-
QUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SER-
VICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY
1795
SGOS Administration Guide
Redistribution and use in source and binary forms, with or without modification, are permitted provided that the fol-
lowing conditions are met:
1. Redistributions of source code must retain the above copyright notice, this list of conditions and the following dis-
claimer.
2. Redistributions in binary form must reproduce the above copyright notice, this list of conditions and the following
disclaimer in the documentation and/or other materials provided with the distribution.
THIS SOFTWARE IS PROVIDED BY THE AUTHOR AND CONTRIBUTORS ''AS IS'' AND ANY EXPRESS OR IM-
PLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES OF MERCHANTABILI-
TY AND FITNESS FOR A PARTICULAR PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE AUTHOR OR
CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSE-
QUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SER-
VICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY
THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE
OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POS-
SIBILITY OF SUCH DAMAGE.
Redistribution and use in source and binary forms, with or without modification, are permitted provided that the fol-
lowing conditions are met:
1. Redistributions of source code must retain the above copyright
notice, this list of conditions and the following disclaimer.
2. Redistributions in binary form must reproduce the above copyright
notice, this list of conditions and the following disclaimer in the
documentation and/or other materials provided with the distribution.
THIS SOFTWARE IS PROVIDED BY THE AUTHOR AND CONTRIBUTORS ''AS IS'' AND ANY EXPRESS OR IM-
PLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES OF MERCHANTABILI-
TY AND FITNESS FOR A PARTICULAR PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE AUTHOR OR
CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSE-
QUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SER-
VICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY
THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT
LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF
THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.
Permission to use, copy, modify, and distribute this software for any purpose with or without fee is hereby granted,
provided that the above copyright notice and this permission notice appear in all copies.
THE SOFTWARE IS PROVIDED "AS IS" AND THE AUTHOR DISCLAIMS ALL WARRANTIES WITH REGARD TO
THIS SOFTWARE INCLUDING ALL IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS. IN NO
EVENT SHALL THE AUTHOR BE LIABLE FOR ANY SPECIAL, DIRECT, INDIRECT, OR CONSEQUENTIAL DAM-
AGES OR ANY DAMAGES WHATSOEVER RESULTING FROM LOSS OF USE, DATA OR PROFITS, WHETHER IN
AN ACTION OF CONTRACT, NEGLIGENCE OR OTHER TORTIOUS ACTION, ARISING OUT OF OR IN CONNEC-
TION WITH THE USE OR PERFORMANCE OF THIS SOFTWARE.
Redistribution and use in source and binary forms, with or without modification, are permitted provided that the fol-
lowing conditions are met:
1. Redistributions of source code must retain the above copyright notice, this list of conditions, and the following dis-
claimer, without modification, immediately at the beginning of the file.
2. The name of the author may not be used to endorse or promote products derived from this software without specific
prior written permission.
THIS SOFTWARE IS PROVIDED BY THE AUTHOR AND CONTRIBUTORS ''AS IS'' AND ANY EXPRESS OR IM-
PLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES OF MERCHANTABILI-
TY AND FITNESS FOR A PARTICULAR PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE AUTHOR OR
CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSE-
QUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SER-
VICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY
THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICTLIABILITY, OR TORT (INCLUDING NEGLIGENCE OR
1796
OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSI-
BILITY OF SUCH DAMAGE.
Redistribution and use in source and binary forms, with or without modification, are permitted provided that the fol-
lowing conditions are met:
1. Redistributions of source code must retain the above copyright notice, this list of conditions and the following dis-
claimer.
2. Redistributions in binary form must reproduce the above copyright notice, this list of conditions and the following
disclaimer in the
documentation and/or other materials provided with the distribution.
3. All advertising materials mentioning features or use of this software must display the following acknowledgement:
This product includes software developed by the NetBSD Foundation, Inc. and its contributors.
4. Neither the name of The NetBSD Foundation nor the names of its contributors may be used to endorse or promote
products derived from this software without specific prior written permission.
THIS SOFTWARE IS PROVIDED BY THE NETBSD FOUNDATION, INC. AND CONTRIBUTORS ''AS IS'' AND ANY
EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES OF
MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL
THE FOUNDATION OR CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EX-
EMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTI-
TUTE GOODS OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER
CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT (IN-
CLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN
IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.
Permission to use, copy, modify, and distribute this software for any purpose with or without fee is hereby granted, pro-
vided that the above copyright notice and this permission notice appear in all copies.
THE SOFTWARE IS PROVIDED "AS IS" AND THE AUTHOR DISCLAIMS ALL WARRANTIES WITH REGARD TO
THIS SOFTWARE INCLUDING ALL IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS. IN NO
EVENT SHALL THE AUTHOR BE LIABLE FOR ANY SPECIAL, DIRECT, INDIRECT, OR CONSEQUENTIAL DAM-
AGES OR ANY DAMAGES WHATSOEVER RESULTING FROM LOSS OF USE, DATA OR PROFITS, WHETHER IN
AN ACTION OF CONTRACT, NEGLIGENCE OR OTHER TORTIOUS ACTION, ARISING OUT OF OR IN CONNEC-
TION WITH THE USE OR PERFORMANCE OF THIS SOFTWARE.
Permission to use, copy, modify, and distribute this software for any purpose with or without fee is hereby granted, pro-
vided that the above copyright notice and this permission notice appear in all copies.
THE SOFTWARE IS PROVIDED "AS IS" AND THE AUTHOR DISCLAIMS ALL WARRANTIES WITH REGARD TO
THIS SOFTWARE INCLUDING ALL IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS. IN NO
EVENT SHALL THE AUTHOR BE LIABLE FOR ANY SPECIAL, DIRECT, INDIRECT, OR CONSEQUENTIAL DAM-
AGES OR ANY DAMAGES WHATSOEVER RESULTING FROM LOSS OF USE, DATA OR PROFITS, WHETHER IN
AN ACTION OF CONTRACT, NEGLIGENCE OR OTHER TORTIOUS ACTION, ARISING OUT OF OR IN CONNEC-
TION WITH THE USE OR PERFORMANCE OF THIS SOFTWARE.
Permission to use, copy, modify, and distribute this software for any purpose with or without fee is hereby granted, pro-
vided that the above copyright notice and this permission notice appear in all copies.
THE SOFTWARE IS PROVIDED "AS IS" AND THE AUTHOR DISCLAIMS ALL WARRANTIES WITH REGARD TO
THIS SOFTWARE INCLUDING ALL IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS. IN NO
EVENT SHALL THE AUTHOR BE LIABLE FOR ANY SPECIAL, DIRECT, INDIRECT, OR CONSEQUENTIAL DAM-
AGES OR ANY DAMAGES WHATSOEVER RESULTING FROM LOSS OF USE, DATA OR PROFITS, WHETHER IN
AN ACTION OF CONTRACT, NEGLIGENCE OR OTHER TORTIOUS ACTION, ARISING OUT OF OR IN CONNEC-
TION WITH THE USE OR PERFORMANCE OF THIS SOFTWARE.
THE PROGRAM IS DISTRIBUTED UNDER THE BSD LICENSE ON AN "AS IS" BASIS, WITHOUT WARRANTIES OR
REPRESENTATIONS OF ANY KIND, EITHER EXPRESS OR IMPLIED.
1797
SGOS Administration Guide
This program and the accompanying materials are licensed and made available under the terms and conditions of the
BSD License which accompanies this distribution. The full text of the license may be found at http://opensource.org/
licenses/bsd-license.php
THE PROGRAM IS DISTRIBUTED UNDER THE BSD LICENSE ON AN "AS IS" BASIS, WITHOUT WARRANTIES OR
REPRESENTATIONS OF ANY KIND, EITHER EXPRESS OR IMPLIED.
This program and the accompanying materials are licensed and made available under the terms and conditions of the
BSD License which accompanies this distribution. The full text of the license may be found at http://opensource.org/
licenses/bsd-license.php
THE PROGRAM IS DISTRIBUTED UNDER THE BSD LICENSE ON AN "AS IS" BASIS, WITHOUT WARRANTIES OR
REPRESENTATIONS OF ANY KIND, EITHER EXPRESS OR IMPLIED.
This program and the accompanying materials are licensed and made available under the terms and conditions of the
BSD License which accompanies this distribution. The full text of the license may be found at http://opensource.org/
licenses/bsd-license.php
THE PROGRAM IS DISTRIBUTED UNDER THE BSD LICENSE ON AN "AS IS" BASIS, WITHOUT WARRANTIES OR
REPRESENTATIONS OF ANY KIND, EITHER EXPRESS OR IMPLIED.
This program and the accompanying materials are licensed and made available under the terms and conditions of the
BSD License which accompanies this distribution. The full text of the license may be found at http://opensource.org/
licenses/bsd-license.php
THE PROGRAM IS DISTRIBUTED UNDER THE BSD LICENSE ON AN "AS IS" BASIS, WITHOUT WARRANTIES OR
REPRESENTATIONS OF ANY KIND, EITHER EXPRESS OR IMPLIED.
THE PROGRAM IS DISTRIBUTED UNDER THE BSD LICENSE ON AN "AS IS" BASIS, WITHOUT WARRANTIES OR
REPRESENTATIONS OF ANY KIND, EITHER EXPRESS OR IMPLIED.
This program and the accompanying materials are licensed and made available under the terms and conditions of the
BSD License which accompanies this distribution. The full text of the license may be found at http://opensource.org/
licenses/bsd-license.php
THE PROGRAM IS DISTRIBUTED UNDER THE BSD LICENSE ON AN "AS IS" BASIS, WITHOUT WARRANTIES OR
REPRESENTATIONS OF ANY KIND, EITHER EXPRESS OR IMPLIED.
THE PROGRAM IS DISTRIBUTED UNDER THE BSD LICENSE ON AN "AS IS" BASIS, WITHOUT WARRANTIES OR
REPRESENTATIONS OF ANY KIND, EITHER EXPRESS OR IMPLIED.
This program and the accompanying materials are licensed and made available under the terms and conditions of the
BSD License which accompanies this distribution. The full text of the license may be found at http://opensource.org/
licenses/bsd-license.php
1798
THE PROGRAM IS DISTRIBUTED UNDER THE BSD LICENSE ON AN "AS IS" BASIS, WITHOUT WARRANTIES OR
REPRESENTATIONS OF ANY KIND, EITHER EXPRESS OR IMPLIED.
THE PROGRAM IS DISTRIBUTED UNDER THE BSD LICENSE ON AN "AS IS" BASIS, WITHOUT WARRANTIES OR
REPRESENTATIONS OF ANY KIND, EITHER EXPRESS OR IMPLIED.
THE PROGRAM IS DISTRIBUTED UNDER THE BSD LICENSE ON AN "AS IS" BASIS, WITHOUT WARRANTIES OR
REPRESENTATIONS OF ANY KIND, EITHER EXPRESS OR IMPLIED.
THE PROGRAM IS DISTRIBUTED UNDER THE BSD LICENSE ON AN "AS IS" BASIS, WITHOUT WARRANTIES OR
REPRESENTATIONS OF ANY KIND, EITHER EXPRESS OR IMPLIED.
This program and the accompanying materials are licensed and made available under the terms and conditions of the
BSD License which accompanies this distribution. The full text of the license may be found at http://opensource.org/
licenses/bsd-license.php
THE PROGRAM IS DISTRIBUTED UNDER THE BSD LICENSE ON AN "AS IS" BASIS, WITHOUT WARRANTIES OR
REPRESENTATIONS OF ANY KIND, EITHER EXPRESS OR IMPLIED.
This program and the accompanying materials are licensed and made available under the terms and conditions of the
BSD License which accompanies this distribution. The full text of the license may be found at http://opensource.org/
licenses/bsd-license.php
THE PROGRAM IS DISTRIBUTED UNDER THE BSD LICENSE ON AN "AS IS" BASIS, WITHOUT WARRANTIES OR
REPRESENTATIONS OF ANY KIND, EITHER EXPRESS OR IMPLIED.
This program and the accompanying materials are licensed and made available under the terms and conditions of the
BSD License which accompanies this distribution. The full text of the license may be found at http://opensource.org/
licenses/bsd-license.php
THE PROGRAM IS DISTRIBUTED UNDER THE BSD LICENSE ON AN "AS IS" BASIS, WITHOUT WARRANTIES OR
REPRESENTATIONS OF ANY KIND, EITHER EXPRESS OR IMPLIED.
THE PROGRAM IS DISTRIBUTED UNDER THE BSD LICENSE ON AN "AS IS" BASIS,WITHOUT WARRANTIES OR
REPRESENTATIONS OF ANY KIND, EITHER EXPRESS OR IMPLIED.
THE PROGRAM IS DISTRIBUTED UNDER THE BSD LICENSE ON AN "AS IS" BASIS, WITHOUT WARRANTIES OR
REPRESENTATIONS OF ANY KIND, EITHER EXPRESS OR IMPLIED.
1799
SGOS Administration Guide
licenses/bsd-license.php
THE PROGRAM IS DISTRIBUTED UNDER THE BSD LICENSE ON AN "AS IS" BASIS, WITHOUT WARRANTIES OR
REPRESENTATIONS OF ANY KIND, EITHER EXPRESS OR IMPLIED.
Permission to use, copy, modify, and distribute this software for any purpose with or without fee is hereby granted, pro-
vided that the above copyright notice and this permission notice appear in all copies.
THE SOFTWARE IS PROVIDED "AS IS" AND THE AUTHOR DISCLAIMS ALL WARRANTIES WITH REGARD TO
THIS SOFTWARE INCLUDING ALL IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS. IN NO
EVENT SHALL THE AUTHOR BE LIABLE FOR ANY SPECIAL, DIRECT, INDIRECT, OR CONSEQUENTIAL DAM-
AGES OR ANY DAMAGES WHATSOEVER RESULTING FROM LOSS OF USE, DATA OR PROFITS, WHETHER IN
AN ACTION OF CONTRACT, NEGLIGENCE OR OTHER TORTIOUS ACTION, ARISING OUT OF OR IN CONNEC-
TION WITH THE USE OR PERFORMANCE OF THIS SOFTWARE.
Redistribution and use in source and binary forms, with or without modification, are permitted provided that the fol-
lowing conditions are met:
1. Redistributions of source code must retain the above copyright notice, this list of conditions and the following dis-
claimer.
2. Redistributions in binary form must reproduce the above copyright notice, this list of conditions and the following
disclaimer in the
documentation and/or other materials provided with the distribution.
THIS SOFTWARE IS PROVIDED BY THE AUTHOR AND CONTRIBUTORS ''AS IS'' AND ANY EXPRESS OR IM-
PLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES OF MERCHANTABILI-
TY AND FITNESS FOR A PARTICULAR PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE AUTHOR OR
CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSE-
QUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SER-
VICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY
THEORY OF LIABILITY, WHETHER IN CONTRACT,STRICT
LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF
THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.
Redistribution and use in source and binary forms, with or without modification, are permitted provided that the fol-
lowing conditions are met:
1. Redistributions of source code must retain the above copyright notice, this list of conditions and the following dis-
claimer.
2. Redistributions in binary form must reproduce the above copyright notice, this list of conditions and the following
disclaimer in the documentation and/or other materials provided with the distribution.
THIS SOFTWARE IS PROVIDED BY THE AUTHOR AND CONTRIBUTORS ''AS IS'' AND ANY EXPRESS OR IM-
PLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES OF MERCHANTABILI-
TY AND FITNESS FOR A PARTICULAR PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE AUTHOR OR
CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSE-
QUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SER-
VICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY
THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE
OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POS-
SIBILITY OF SUCH DAMAGE.
Redistribution and use in source and binary forms, with or without modification, are permitted provided that the fol-
lowing conditions are met:
1. Redistributions of source code must retain the above copyright notice, this list of conditions and the following dis-
claimer.
2. Redistributions in binary form must reproduce the above copyright notice, this list of conditions and the following
disclaimer in the documentation and/or other materials provided with the distribution.
THIS SOFTWARE IS PROVIDED BY THE AUTHOR AND CONTRIBUTORS ''AS IS'' AND ANY EXPRESS OR IM-
1800
PLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES OF MERCHANTABILI-
TY AND FITNESS FOR A PARTICULAR PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE AUTHOR OR
CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSE-
QUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SER-
VICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY
THEORY OF LIABILITY, WHETHER IN CONTRACT,STRICT
LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAYOUT OF THE USE OF
THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.
Redistribution and use in source and binary forms, with or without modification, are permitted provided that the fol-
lowing conditions are met:
1. Redistributions of source code must retain the above copyright notice, this list of conditions and the following dis-
claimer, without modification, immediately at the beginning of the file.
2. Redistributions in binary form must reproduce the above copyright notice, this list of conditions and the following
disclaimer in the documentation and/or other materials provided with the distribution.
3. The name of the author may not be used to endorse or promote products derived from this software without specific
prior written permission.
THIS SOFTWARE IS PROVIDED BY THE AUTHOR ''AS IS'' AND ANY EXPRESS OR IMPLIED WARRANTIES, IN-
CLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A
PARTICULAR PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE AUTHOR BE LIABLE FOR ANY DIRECT,
INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT
LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR
BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CON-
TRACT, STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT
OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.
Redistribution and use in source and binary forms, with or without modification, are permitted provided that the fol-
lowing conditions are met:
1. Redistributions of source code must retain the above copyright notice, this list of conditions and the following dis-
claimer.
2. Redistributions in binary form must reproduce the above copyright notice, this list of conditions and the following
disclaimer in the documentation and/or other materials provided with the distribution.
THIS SOFTWARE IS PROVIDED BY THE AUTHOR AND CONTRIBUTORS ''AS IS'' AND ANY EXPRESS OR IM-
PLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES OF MERCHANTABILI-
TY AND FITNESS FOR A PARTICULAR PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE AUTHOR OR
CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSE-
QUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SER-
VICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY
THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT
LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF
THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.
Redistribution and use in source and binary forms, with or without modification, are permitted provided that the fol-
lowing conditions are met:
1. Redistributions of source code must retain the above copyright notice, this list of conditions and the following dis-
claimer.
2. Redistributions in binary form must reproduce the above copyright notice, this list of conditions and the following
disclaimer in the documentation and/or other materials provided with the distribution.
THIS SOFTWARE IS PROVIDED BY THE AUTHOR AND CONTRIBUTORS ''AS IS'' AND ANY EXPRESS OR IM-
PLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES OF MERCHANTABILI-
TY AND FITNESS FOR A PARTICULAR PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE AUTHOR OR
CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSE-
QUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SER-
VICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY
THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT
LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF
THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.
Redistribution and use in source and binary forms, with or without modification, are permitted provided that the fol-
lowing conditions are met:
1. Redistributions of source code must retain the above copyright notice, this list of conditions and the following dis-
claimer.
2. Redistributions in binary form must reproduce the above copyright notice, this list of conditions and the following
disclaimer in the documentation and/or other materials provided with the distribution.
1801
SGOS Administration Guide
THIS SOFTWARE IS PROVIDED BY THE AUTHOR ''AS IS'' AND ANY EXPRESS OR IMPLIED WARRANTIES, IN-
CLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A
PARTICULAR PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE AUTHOR BE LIABLE FOR ANY DIRECT,
INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT
LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR
BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CON-
TRACT, STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT
OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.
Permission to use, copy, modify, and distribute this software for any purpose with or without fee is hereby granted, pro-
vided that the above copyright notice and this permission notice appear in all copies.
THE SOFTWARE IS PROVIDED "AS IS" AND THE AUTHOR DISCLAIMS ALL WARRANTIES WITH REGARD TO
THIS SOFTWARE INCLUDING ALL IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS. IN NO
EVENT SHALL THE AUTHOR BE LIABLE FOR ANY SPECIAL, DIRECT, INDIRECT, OR CONSEQUENTIAL DAM-
AGES OR ANY DAMAGES WHATSOEVER RESULTING FROM LOSS OF USE, DATA OR PROFITS, WHETHER IN
AN ACTION OF CONTRACT, NEGLIGENCE OR OTHER TORTIOUS ACTION, ARISING OUT OF OR IN CONNEC-
TION WITH THE USE OR PERFORMANCE OF THIS SOFTWARE.
Redistribution and use in source and binary forms, with or without modification, are permitted provided that the fol-
lowing conditions are met:
1. Redistributions of source code must retain the above copyright notice, this list of conditions and the following dis-
claimer.
2. Redistributions in binary form must reproduce the above copyright notice, this list of conditions and the following
disclaimer in the documentation and/or other materials provided with the distribution.
3. Neither the name of the author nor the names of any co-contributors may be used to endorse or promote products
derived from this software
without specific prior written permission.
THIS SOFTWARE IS PROVIDED BY THE AUTHOR AND CONTRIBUTORS ''AS IS'' AND ANY EXPRESS OR IM-
PLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES OF MERCHANTABILI-
TY AND FITNESS FOR A PARTICULAR PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE AUTHOR OR
CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSE-
QUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SER-
VICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY
THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE
OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POS-
SIBILITY OF SUCH DAMAGE.
This program and the accompanying materials are licensed and made available under the terms and conditions of the
BSD License which accompanies this distribution. The full text of the license may be found at http://opensource.org/
licenses/bsd-license.php
THE PROGRAM IS DISTRIBUTED UNDER THE BSD LICENSE ON AN "AS IS" BASIS, WITHOUT WARRANTIES OR
REPRESENTATIONS OF ANY KIND, EITHER EXPRESS OR IMPLIED.
THE PROGRAM IS DISTRIBUTED UNDER THE BSD LICENSE ON AN "AS IS" BASIS, WITHOUT WARRANTIES OR
REPRESENTATIONS OF ANY KIND, EITHER EXPRESS OR IMPLIED.
THE PROGRAM IS DISTRIBUTED UNDER THE BSD LICENSE ON AN "AS IS" BASIS, WITHOUT WARRANTIES OR
REPRESENTATIONS OF ANY KIND, EITHER EXPRESS OR IMPLIED.
1802
THE PROGRAM IS DISTRIBUTED UNDER THE BSD LICENSE ON AN "AS IS" BASIS, WITHOUT WARRANTIES OR
REPRESENTATIONS OF ANY KIND, EITHER EXPRESS OR IMPLIED.
THE PROGRAM IS DISTRIBUTED UNDER THE BSD LICENSE ON AN "AS IS" BASIS, WITHOUT WARRANTIES OR
REPRESENTATIONS OF ANY KIND, EITHER EXPRESS OR IMPLIED.
THE PROGRAM IS DISTRIBUTED UNDER THE BSD LICENSE ON AN "AS IS" BASIS, WITHOUT WARRANTIES OR
REPRESENTATIONS OF ANY KIND, EITHER EXPRESS OR IMPLIED.
THE PROGRAM IS DISTRIBUTED UNDER THE BSD LICENSE ON AN "AS IS" BASIS, WITHOUT WARRANTIES OR
REPRESENTATIONS OF ANY KIND, EITHER EXPRESS OR IMPLIED.
THE PROGRAM IS DISTRIBUTED UNDER THE BSD LICENSE ON AN "AS IS" BASIS, WITHOUT WARRANTIES OR
REPRESENTATIONS OF ANY KIND, EITHER EXPRESS OR IMPLIED.
THE PROGRAM IS DISTRIBUTED UNDER THE BSD LICENSE ON AN "AS IS" BASIS, WITHOUT WARRANTIES OR
REPRESENTATIONS OF ANY KIND, EITHER EXPRESS OR IMPLIED.
THE PROGRAM IS DISTRIBUTED UNDER THE BSD LICENSE ON AN "AS IS" BASIS,WITHOUT WARRANTIES OR
REPRESENTATIONS OF ANY KIND, EITHER EXPRESS OR IMPLIED.
THE PROGRAM IS DISTRIBUTED UNDER THE BSD LICENSE ON AN "AS IS" BASIS, WITHOUT WARRANTIES OR
REPRESENTATIONS OF ANY KIND, EITHER EXPRESS OR IMPLIED.
THE PROGRAM IS DISTRIBUTED UNDER THE BSD LICENSE ON AN "AS IS" BASIS, WITHOUT WARRANTIES OR
REPRESENTATIONS OF ANY KIND, EITHER EXPRESS OR IMPLIED.
1803
SGOS Administration Guide
THE PROGRAM IS DISTRIBUTED UNDER THE BSD LICENSE ON AN "AS IS" BASIS, WITHOUT WARRANTIES OR
REPRESENTATIONS OF ANY KIND, EITHER EXPRESS OR IMPLIED.
THE PROGRAM IS DISTRIBUTED UNDER THE BSD LICENSE ON AN "AS IS" BASIS, WITHOUT WARRANTIES OR
REPRESENTATIONS OF ANY KIND, EITHER EXPRESS OR IMPLIED.
Redistribution and use in source and binary forms, with or without modification, are permitted provided that the fol-
lowing conditions are met:
1. Redistributions of source code must retain the above copyright notice unmodified, this list of conditions, and the
following disclaimer.
2. Redistributions in binary form must reproduce the above copyright notice, this list of conditions and the following
disclaimer in the documentation and/or other materials provided with the distribution.
THIS SOFTWARE IS PROVIDED BY THE AUTHOR ''AS IS'' AND ANY EXPRESS OR IMPLIED WARRANTIES, IN-
CLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A
PARTICULAR PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE AUTHOR BE LIABLE FOR ANY DIRECT,
INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT
LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR
BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CON-
TRACT, STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT
OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.
Redistribution and use in source and binary forms, with or without modification, are permitted provided that the fol-
lowing conditions are met:
1. Redistributions of source code must retain the above copyright notice unmodified, this list of conditions, and the
following
disclaimer.
2. Redistributions in binary form must reproduce the above copyright notice, this list of conditions and the following
disclaimer in the documentation and/or other materials provided with the distribution.
THIS SOFTWARE IS PROVIDED BY THE AUTHOR ''AS IS'' AND ANY EXPRESS OR IMPLIED WARRANTIES, IN-
CLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A
PARTICULAR PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE AUTHOR BE LIABLE FOR ANY DIRECT,
INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT
LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR
BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CON-
TRACT, STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT
OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.
Redistribution and use in source and binary forms, with or without modification, are permitted provided that the fol-
lowing conditions are met:
1. Redistributions of source code must retain the above copyright notice, this list of conditions and the following dis-
claimer, without modification, immediately at the beginning of the file.
2. Redistributions in binary form must reproduce the above copyright notice, this list of conditions and the following
disclaimer in the documentation and/or other materials provided with the distribution.
THIS SOFTWARE IS PROVIDED BY THE AUTHOR ''AS IS'' AND ANY EXPRESS OR IMPLIED WARRANTIES, IN-
CLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A
PARTICULAR PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE AUTHOR BE LIABLE FOR ANY DIRECT,
INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT
LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR
BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CON-
TRACT, STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT
OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.
1804
Redistribution and use in source and binary forms, with or without modification, are permitted provided that the fol-
lowing conditions are met:
1. Redistributions of source code must retain the above copyright notice, this list of conditions and the following dis-
claimer.
2. Redistributions in binary form must reproduce the above copyright notice, this list of conditions and the following
disclaimer in the documentation and/or other materials provided with the distribution.
THIS SOFTWARE IS PROVIDED BY THE AUTHOR AND CONTRIBUTORS ''AS IS'' AND ANY EXPRESS OR IM-
PLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES OF MERCHANTABILI-
TY AND FITNESS FOR A PARTICULAR PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE AUTHOR OR
CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSE-
QUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SER-
VICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY
THEORY OF LIABILITY, WHETHER IN CONTRACT,STRICT
LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF
THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.
Copyright (c) 2009 Andrew Thompson
Redistribution and use in source and binary forms, with or without modification, are permitted provided that the fol-
lowing conditions are met:
1. Redistributions of source code must retain the above copyright notice, this list of conditions and the following dis-
claimer.
2. Redistributions in binary form must reproduce the above copyright notice, this list of conditions and the following
disclaimer in the documentation and/or other materials provided with the distribution.
THIS SOFTWARE IS PROVIDED BY THE AUTHOR ''AS IS'' AND ANY EXPRESS OR IMPLIED WARRANTIES, IN-
CLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A
PARTICULAR PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE AUTHOR BE LIABLE FOR ANY DIRECT,
INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT
LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR
BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CON-
TRACT, STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT
OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.
Redistribution and use in source and binary forms, with or without modification, are permitted provided that the fol-
lowing conditions are met:
1. Redistributions of source code must retain the above copyright notice, this list of conditions and the following dis-
claimer.
2. Redistributions in binary form must reproduce the above copyright notice, this list of conditions and the following
disclaimer in the documentation and/or other materials provided with the distribution.
THIS SOFTWARE IS PROVIDED BY THE AUTHOR ''AS IS'' AND ANY EXPRESS OR IMPLIED WARRANTIES, IN-
CLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A
PARTICULAR PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE AUTHOR BE LIABLE FOR ANY DIRECT,
INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT
LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR
BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CON-
TRACT, STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT
OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.
Redistribution and use in source and binary forms, with or without modification, are permitted provided that the fol-
lowing conditions are met:
1. Redistributions of source code must retain the above copyright notice, this list of conditions and the following dis-
claimer.
2. Redistributions in binary form must reproduce the above copyright notice, this list of conditions and the following
disclaimer in the documentation and/or other materials provided with the distribution.
THIS SOFTWARE IS PROVIDED BY THE AUTHOR AND CONTRIBUTORS ''AS IS'' AND ANY EXPRESS OR IM-
PLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES OF MERCHANTABILI-
TY AND FITNESS FOR A PARTICULAR PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE AUTHOR OR
CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSE-
QUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SER-
VICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY
THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT
LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF
THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.
Redistribution and use in source and binary forms, with or without modification, are permitted provided that the fol-
1805
SGOS Administration Guide
THIS SOFTWARE IS PROVIDED BY THE AUTHOR AND CONTRIBUTORS ''AS IS'' AND ANY EXPRESS OR IM-
PLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES OF MERCHANTABILI-
TY AND FITNESS FOR A PARTICULAR PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE AUTHOR OR
CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSE-
QUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SER-
VICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY
THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT
LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF
THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.
Redistribution and use in source and binary forms, with or without modification, are permitted provided that the fol-
lowing conditions are met:
1. Redistributions of source code must retain the above copyright notice, this list of conditions and the following dis-
claimer.
2. Redistributions in binary form must reproduce the above copyright notice, this list of conditions and the following
disclaimer in the documentation and/or other materials provided with the distribution.
3. Neither the name of The DragonFly Project nor the names of its contributors may be used to endorse or promote
products derived from this software without specific, prior written permission.
THIS SOFTWARE IS PROVIDED BY THE COPYRIGHT HOLDERS AND CONTRIBUTORS ''AS IS'' AND ANY EX-
PRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES OF MER-
CHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE
COPYRIGHT HOLDERS OR CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL,
EXEMPLARY OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUB-
STITUTE GOODS OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER
CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT (IN-
CLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN
IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.
Redistribution and use in source and binary forms, with or without modification, are permitted provided that the fol-
lowing conditions are met:
1. Redistributions of source code must retain the above copyright notice, this list of conditions and the following dis-
claimer.
2. Redistributions in binary form must reproduce the above copyright notice, this list of conditions and the following
disclaimer in the documentation and/or other materials provided with the distribution.
THIS SOFTWARE IS PROVIDED BY THE AUTHOR AND CONTRIBUTORS ''AS IS'' AND ANY EXPRESS OR IM-
PLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES OF MERCHANTABILI-
TY AND FITNESS FOR A PARTICULAR PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE AUTHOR OR
CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSE-
QUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SER-
VICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY
THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT
LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF
THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.
This program and the accompanying materials are licensed and made available under the terms and conditions of the
BSD License which accompanies this distribution. The full text of the license may be found at http://opensource.org/
licenses/bsd-license.php
THE PROGRAM IS DISTRIBUTED UNDER THE BSD LICENSE ON AN "AS IS" BASIS, WITHOUT WARRANTIES OR
REPRESENTATIONS OF ANY KIND, EITHER EXPRESS OR IMPLIED.
This program and the accompanying materials are licensed and made available under the terms and conditions of the
BSD License which accompanies this distribution. The full text of the license may be found at http://opensource.org/
licenses/bsd-license.php
THE PROGRAM IS DISTRIBUTED UNDER THE BSD LICENSE ON AN "AS IS" BASIS, WITHOUT WARRANTIES OR
REPRESENTATIONS OF ANY KIND, EITHER EXPRESS OR IMPLIED.
1806
Copyright (c) 2010, Apple Inc. All rights reserved.
This program and the accompanying materials are licensed and made available under the terms and conditions of the
BSD License which accompanies this distribution. The full text of the license may be found at http://opensource.org/
licenses/bsd-license.php
THE PROGRAM IS DISTRIBUTED UNDER THE BSD LICENSE ON AN "AS IS" BASIS, WITHOUT WARRANTIES OR
REPRESENTATIONS OF ANY KIND, EITHER EXPRESS OR IMPLIED.
Redistribution and use in source and binary forms, with or without modification, are permitted provided that the fol-
lowing conditions are met:
1. Redistributions of source code must retain the above copyright notice, this list of conditions and the following dis-
claimer.
2. Redistributions in binary form must reproduce the above copyright notice, this list of conditions and the following
disclaimer in the
documentation and/or other materials provided with the distribution.
3. Neither the name of the University nor the names of its contributors may be used to endorse or promote products
derived from this software
without specific prior written permission.
THIS SOFTWARE IS PROVIDED BY THE REGENTS AND CONTRIBUTORS ''AS IS'' AND ANY EXPRESS OR IM-
PLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES OF MERCHANTABILI-
TY AND FITNESS FOR A PARTICULAR PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE REGENTS OR
CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSE-
QUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SER-
VICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY
THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE
OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POS-
SIBILITY OF SUCH DAMAGE.
Redistribution and use in source and binary forms, with or without modification, are permitted provided that the fol-
lowing conditions are met:
1. Redistributions of source code must retain the above copyright notice, this list of conditions and the following dis-
claimer.
2. Redistributions in binary form must reproduce the above copyright notice, this list of conditions and the following
disclaimer in the documentation and/or other materials provided with the distribution.
3. Neither the name of the University nor the names of its contributors may be used to endorse or promote products
derived from this software
without specific prior written permission.
THIS SOFTWARE IS PROVIDED BY THE REGENTS AND CONTRIBUTORS ''AS IS'' AND ANY EXPRESS OR IM-
PLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES OF MERCHANTABILI-
TY AND FITNESS FOR A PARTICULAR PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE REGENTS OR
CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSE-
QUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SER-
VICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY
THEORY OF LIABILITY, WHETHER IN CONTRACT,STRICT
LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF
THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.
THE PROGRAM IS DISTRIBUTED UNDER THE BSD LICENSE ON AN "AS IS" BASIS, WITHOUT WARRANTIES OR
REPRESENTATIONS OF ANY KIND, EITHER EXPRESS OR IMPLIED.
THE PROGRAM IS DISTRIBUTED UNDER THE BSD LICENSE ON AN "AS IS" BASIS, WITHOUT WARRANTIES OR
REPRESENTATIONS OF ANY KIND, EITHER EXPRESS OR IMPLIED.
1807
SGOS Administration Guide
THE PROGRAM IS DISTRIBUTED UNDER THE BSD LICENSE ON AN "AS IS" BASIS, WITHOUT WARRANTIES OR
REPRESENTATIONS OF ANY KIND, EITHER EXPRESS OR IMPLIED.
This program and the accompanying materials are licensed and made available under the terms and conditions of the
BSD License which accompanies this distribution. The full text of the license may be found at http://opensource.org/
licenses/bsd-license.php.
THE PROGRAM IS DISTRIBUTED UNDER THE BSD LICENSE ON AN "AS IS" BASIS, WITHOUT WARRANTIES OR
REPRESENTATIONS OF ANY KIND, EITHER EXPRESS OR IMPLIED.
THE PROGRAM IS DISTRIBUTED UNDER THE BSD LICENSE ON AN "AS IS" BASIS, WITHOUT WARRANTIES OR
REPRESENTATIONS OF ANY KIND, EITHER EXPRESS OR IMPLIED.
This program and the accompanying materials are licensed and made available under the terms and conditions of the
BSD License which accompanies this distribution. The full text of the license may be found at http://opensource.org/
licenses/bsd-license.php
THE PROGRAM IS DISTRIBUTED UNDER THE BSD LICENSE ON AN "AS IS" BASIS, WITHOUT WARRANTIES OR
REPRESENTATIONS OF ANY KIND, EITHER EXPRESS OR IMPLIED.
This program and the accompanying materials are licensed and made available under the terms and conditions of the
BSD License which accompanies this distribution. The full text of the license may be found at http://opensource.org/
licenses/bsd-license.php
THE PROGRAM IS DISTRIBUTED UNDER THE BSD LICENSE ON AN "AS IS" BASIS, WITHOUT WARRANTIES OR
REPRESENTATIONS OF ANY KIND, EITHER EXPRESS OR IMPLIED.
THE PROGRAM IS DISTRIBUTED UNDER THE BSD LICENSE ON AN "AS IS" BASIS, WITHOUT WARRANTIES OR
REPRESENTATIONS OF ANY KIND, EITHER EXPRESS OR IMPLIED.
THE PROGRAM IS DISTRIBUTED UNDER THE BSD LICENSE ON AN "AS IS" BASIS, WITHOUT WARRANTIES OR
REPRESENTATIONS OF ANY KIND, EITHER EXPRESS OR IMPLIED.
THE PROGRAM IS DISTRIBUTED UNDER THE BSD LICENSE ON AN "AS IS" BASIS, WITHOUT WARRANTIES OR
REPRESENTATIONS OF ANY KIND, EITHER EXPRESS OR IMPLIED.
1808
THE PROGRAM IS DISTRIBUTED UNDER THE BSD LICENSE ON AN "AS IS" BASIS, WITHOUT WARRANTIES OR
REPRESENTATIONS OF ANY KIND, EITHER EXPRESS OR IMPLIED.
THE PROGRAM IS DISTRIBUTED UNDER THE BSD LICENSE ON AN "AS IS" BASIS, WITHOUT WARRANTIES OR
REPRESENTATIONS OF ANY KIND, EITHER EXPRESS OR IMPLIED.
THE PROGRAM IS DISTRIBUTED UNDER THE BSD LICENSE ON AN "AS IS" BASIS, WITHOUT WARRANTIES OR
REPRESENTATIONS OF ANY KIND, EITHER EXPRESS OR IMPLIED.
THE PROGRAM IS DISTRIBUTED UNDER THE BSD LICENSE ON AN "AS IS" BASIS, WITHOUT WARRANTIES OR
REPRESENTATIONS OF ANY KIND, EITHER EXPRESS OR IMPLIED.
Redistribution and use in source and binary forms, with or without modification, are permitted provided that the fol-
lowing conditions are met:
1. Redistributions of source code must retain the above copyright notice unmodified, this list of conditions, and the
following disclaimer.
2. Redistributions in binary form must reproduce the above copyright notice, this list of conditions and the following
disclaimer in the documentation and/or other materials provided with the distribution.
THIS SOFTWARE IS PROVIDED BY THE AUTHOR ''AS IS'' AND ANY EXPRESS OR IMPLIED WARRANTIES, IN-
CLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A
PARTICULAR PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE AUTHOR BE LIABLE FOR ANY DIRECT,
INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT
LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR
BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CON-
TRACT, STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT
OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.
Redistribution and use in source and binary forms, with or without modification, are permitted provided that the fol-
lowing conditions are met:
1. Redistributions of source code must retain the above copyright notice, this list of conditions and the following dis-
claimer.
2. Redistributions in binary form must reproduce the above copyright notice, this list of conditions and the following
disclaimer in the documentation and/or other materials provided with the distribution.
THIS SOFTWARE IS PROVIDED BY THE AUTHOR ''AS IS'' AND ANY EXPRESS OR IMPLIED WARRANTIES, IN-
CLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A
PARTICULAR PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE AUTHOR BE LIABLE FOR ANY DIRECT,
INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT
LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR
BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CON-
TRACT, STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT
OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.
Redistribution and use in source and binary forms, with or without modification, are permitted provided that the fol-
lowing conditions are met:
1. Redistributions of source code must retain the above copyright notice, this list of conditions and the following dis-
1809
SGOS Administration Guide
claimer.
2. Redistributions in binary form must reproduce the above copyright notice, this list of conditions and the following
disclaimer in the documentation and/or other materials provided with the distribution.
THIS SOFTWARE IS PROVIDED BY THE AUTHOR AND CONTRIBUTORS ''AS IS'' AND ANY EXPRESS OR IM-
PLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES OF MERCHANTABILI-
TY AND FITNESS FOR A PARTICULAR PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE AUTHOR OR
CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSE-
QUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SER-
VICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY
THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT
LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF
THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.
Redistribution and use in source and binary forms, with or without modification, are permitted provided that the fol-
lowing conditions are met:
1. Redistributions of source code must retain the above copyright notice, this list of conditions and the following dis-
claimer.
2. Redistributions in binary form must reproduce the above copyright notice, this list of conditions and the following
disclaimer in the documentation and/or other materials provided with the distribution.
THIS SOFTWARE IS PROVIDED BY THE AUTHOR AND CONTRIBUTORS ''AS IS'' AND ANY EXPRESS OR IM-
PLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES OF MERCHANTABILI-
TY AND FITNESS FOR A PARTICULAR PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE AUTHOR OR
CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSE-
QUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SER-
VICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY
THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT
LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF
THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.
This program and the accompanying materials are licensed and made available under the terms and conditions of the
BSD License which accompanies this distribution. The full text of the license may be found at http://opensource.org/
licenses/bsd-license.php
THE PROGRAM IS DISTRIBUTED UNDER THE BSD LICENSE ON AN "AS IS" BASIS, WITHOUT WARRANTIES OR
REPRESENTATIONS OF ANY KIND, EITHER EXPRESS OR IMPLIED.
THE PROGRAM IS DISTRIBUTED UNDER THE BSD LICENSE ON AN "AS IS" BASIS, WITHOUT WARRANTIES OR
REPRESENTATIONS OF ANY KIND, EITHER EXPRESS OR IMPLIED.
THE PROGRAM IS DISTRIBUTED UNDER THE BSD LICENSE ON AN "AS IS" BASIS, WITHOUT WARRANTIES OR
REPRESENTATIONS OF ANY KIND, EITHER EXPRESS OR IMPLIED.
THE PROGRAM IS DISTRIBUTED UNDER THE BSD LICENSE ON AN "AS IS" BASIS, WITHOUT WARRANTIES OR
REPRESENTATIONS OF ANY KIND, EITHER EXPRESS OR IMPLIED.
This program and the accompanying materials are licensed and made available under the terms and conditions of the
BSD License which accompanies this distribution. The full text of the license may be found at http://opensource.org/
licenses/bsd-license.php
THE PROGRAM IS DISTRIBUTED UNDER THE BSD LICENSE ON AN "AS IS" BASIS, WITHOUT WARRANTIES OR
REPRESENTATIONS OF ANY KIND, EITHER EXPRESS OR IMPLIED.
1810
Copyright (c) 2011, Apple Inc. All rights reserved.
This program and the accompanying materials are licensed and made available under the terms and conditions of the
BSD License which accompanies this distribution. The full text of the license may be found at http://opensource.org/
licenses/bsd-license.php
THE PROGRAM IS DISTRIBUTED UNDER THE BSD LICENSE ON AN "AS IS" BASIS, WITHOUT WARRANTIES OR
REPRESENTATIONS OF ANY KIND, EITHER EXPRESS OR IMPLIED.
This program and the accompanying materials are licensed and made available under the terms and conditions of the
BSD License which accompanies this distribution. The full text of the license may be found at http://opensource.org/
licenses/bsd-license.php
THE PROGRAM IS DISTRIBUTED UNDER THE BSD LICENSE ON AN "AS IS" BASIS, WITHOUT WARRANTIES OR
REPRESENTATIONS OF ANY KIND, EITHER EXPRESS OR IMPLIED.
THE PROGRAM IS DISTRIBUTED UNDER THE BSD LICENSE ON AN "AS IS" BASIS, WITHOUT WARRANTIES OR
REPRESENTATIONS OF ANY KIND, EITHER EXPRESS OR IMPLIED.
THE PROGRAM IS DISTRIBUTED UNDER THE BSD LICENSE ON AN "AS IS" BASIS, WITHOUT WARRANTIES OR
REPRESENTATIONS OF ANY KIND, EITHER EXPRESS OR IMPLIED.
THE PROGRAM IS DISTRIBUTED UNDER THE BSD LICENSE ON AN "AS IS" BASIS, WITHOUT WARRANTIES OR
REPRESENTATIONS OF ANY KIND, EITHER EXPRESS OR IMPLIED.
THE PROGRAM IS DISTRIBUTED UNDER THE BSD LICENSE ON AN "AS IS" BASIS, WITHOUT WARRANTIES OR
REPRESENTATIONS OF ANY KIND, EITHER EXPRESS OR IMPLIED.
THE PROGRAM IS DISTRIBUTED UNDER THE BSD LICENSE ON AN "AS IS" BASIS, WITHOUT WARRANTIES OR
REPRESENTATIONS OF ANY KIND, EITHER EXPRESS OR IMPLIED.
THE PROGRAM IS DISTRIBUTED UNDER THE BSD LICENSE ON AN "AS IS" BASIS, WITHOUT WARRANTIES OR
REPRESENTATIONS OF ANY KIND, EITHER EXPRESS OR IMPLIED.
1811
SGOS Administration Guide
license.
THE PROGRAM IS DISTRIBUTED UNDER THE BSD LICENSE ON AN "AS IS" BASIS, WITHOUT WARRANTIES OR
REPRESENTATIONS OF ANY KIND, EITHER EXPRESS OR IMPLIED.
THE PROGRAM IS DISTRIBUTED UNDER THE BSD LICENSE ON AN "AS IS" BASIS, WITHOUT WARRANTIES OR
REPRESENTATIONS OF ANY KIND, EITHER EXPRESS OR IMPLIED.
THE PROGRAM IS DISTRIBUTED UNDER THE BSD LICENSE ON AN "AS IS" BASIS, WITHOUT WARRANTIES OR
REPRESENTATIONS OF ANY KIND, EITHER EXPRESS OR IMPLIED.
This program and the accompanying materials are licensed and made available under the terms and conditions of the
BSD License which accompanies this distribution. The full text of the license may be found at http://opensource.org/
licenses/bsd-license.php
THE PROGRAM IS DISTRIBUTED UNDER THE BSD LICENSE ON AN "AS IS" BASIS, WITHOUT WARRANTIES OR
REPRESENTATIONS OF ANY KIND, EITHER EXPRESS OR IMPLIED.
This software and associated documentation (if any) is furnished under a license and may only be used or copied in ac-
cordance with the terms of the license. Except as permitted by such license, no part of this software or documentation
may be reproduced, stored in a retrieval system, or transmitted in any form or by any means without the express written
consent of Intel Corporation.
All rights reserved. Unpublished rights reserved under the copyright laws of Japan.
Redistribution and use in source and binary forms, with or without modification, are permitted provided that the fol-
lowing conditions are met:
1. Redistributions of source code must retain the above copyright notice, this list of conditions and the following dis-
claimer as the first lines of this file unmodified.
2. Redistributions in binary form must reproduce the above copyright notice, this list of conditions and the following
disclaimer in the documentation and/or other materials provided with the distribution.
3. The name of the author may not be used to endorse or promote products derived from this software without specific
prior written permission.
THIS SOFTWARE IS PROVIDED BY THE AUTHOR ''AS IS'' AND ANY EXPRESS OR IMPLIED WARRANTIES, IN-
CLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A
PARTICULAR PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE AUTHOR BE LIABLE FOR ANY DIRECT,
INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT
LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR
BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CON-
TRACT, STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT
OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.
Permission to use, copy, modify, and distribute this software and its documentation for any purpose and without fee is
hereby granted, provided that the above copyright notice appears in all copies and that both the copyright notice and
this permission notice appear in supporting documentation, and that the name of OSF or Open Software Foundation
not be used in advertising or publicity pertaining to distribution of the software without specific, written prior permis-
sion.
OSF DISCLAIMS ALL WARRANTIES WITH REGARD TO THIS SOFTWARE INCLUDING ALL IMPLIED WARRAN-
1812
TIES OF MERCHANTABILITY AND FITNESS, IN NO EVENT SHALL OSF BE LIABLE FOR ANY SPECIAL, INDI-
RECT, OR CONSEQUENTIAL DAMAGES OR ANY DAMAGES WHATSOEVER RESULTING FROM LOSS OF USE,
DATA OR PROFITS, WHETHER IN ACTION OF CONTRACT, NEGLIGENCE, OR OTHER TORTIOUS ACTION,
ARISING OUT OF OR IN CONNECTION WITH THE USE OR PERFORMANCE OF THIS SOFTWARE.
Permission to use, copy, modify, and distribute this software and its documentation for any purpose and without fee is
hereby granted, provided that both the above copyright notice and this permission notice appear in all copies, that both
the above copyright notice and this permission notice appear in all supporting documentation, and that the name of
M.I.T. not be used in advertising or publicity pertaining to distribution of the software without specific, written prior
permission. M.I.T. makes no representations about the suitability of this software for any purpose. It is provided "as is"
without express or implied warranty.
THIS SOFTWARE IS PROVIDED BY M.I.T. ''AS IS''. M.I.T. DISCLAIMS ALL EXPRESS OR IMPLIED WARRANTIES
WITH REGARD TO THIS SOFTWARE, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES OF
MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE. IN NO EVENT SHALL M.I.T. BE LIABLE FOR
ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUD-
ING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, DATA, OR
PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER
IN CONTRACT, STRICT LIABILITY,
OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF THIS SOFT-
WARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.
Redistribution and use in source and binary forms, with or without modification, are permitted provided that the fol-
lowing conditions are met:
1. Redistributions of source code must retain the above copyright notice, this list of conditions and the following dis-
claimer.
2. Redistributions in binary form must reproduce the above copyright notice, this list of conditions and the following
disclaimer in the documentation and/or other materials provided with the distribution.
3. All advertising materials mentioning features or use of this software must display the following acknowledgement:
This product includes software developed by Niels Provos.
4. The name of the author may not be used to endorse or promote products derived from this software without specific
prior written permission.
THIS SOFTWARE IS PROVIDED BY THE AUTHOR ''AS IS'' AND ANY EXPRESS OR IMPLIED WARRANTIES, IN-
CLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A
PARTICULAR PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE AUTHOR BE LIABLE FOR ANY DIRECT,
INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT
LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR
BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CON-
TRACT, STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT
OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.
Permission to use, copy, modify, and distribute this software and its documentation for any purpose and without fee is
hereby granted, provided that both the above copyright notice and this permission notice appear in all copies, that both
the above copyright notice and this permission notice appear in all supporting documentation, and that the name of
M.I.T. not be used in advertising or publicity pertaining to distribution of the software without specific, written prior
permission. M.I.T. makes no representations about the suitability of this software for any purpose. It is provided "as is"
without express or implied warranty.
THIS SOFTWARE IS PROVIDED BY M.I.T. ''AS IS''. M.I.T. DISCLAIMS ALL EXPRESS OR IMPLIED WARRANTIES
WITH REGARD TO THIS SOFTWARE, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES OF
MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE. IN NO EVENT SHALL M.I.T. BE LIABLE FOR
ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUD-
ING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, DATA, OR
PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER
IN CONTRACT, STRICT LIABILITY,
OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF THIS SOFT-
WARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.
Redistribution and use in source and binary forms, with or without modification, are permitted provided that the fol-
lowing conditions are met:
1. Redistributions of source code must retain the above copyright notice, this list of conditions and the following dis-
claimer.
2. Redistributions in binary form must reproduce the above copyright notice, this list of conditions and the following
1813
SGOS Administration Guide
disclaimer in the documentation and/or other materials provided with the distribution.
3. All advertising materials mentioning features or use of this software must display the following acknowledgement:
This product includes software developed by Niels Provos.
4. The name of the author may not be used to endorse or promote products derived from this software without specific
prior written permission.
THIS SOFTWARE IS PROVIDED BY THE AUTHOR ''AS IS'' AND ANY EXPRESS OR IMPLIED WARRANTIES, IN-
CLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A
PARTICULAR PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE AUTHOR BE LIABLE FOR ANY DIRECT,
INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT
LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR
BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CON-
TRACT, STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT
OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.
Redistribution and use in source and binary forms, with or without modification, are permitted provided that the fol-
lowing conditions are met:
1. Redistributions of source code must retain the above copyright notice, this list of conditions and the following dis-
claimer.
2. Redistributions in binary form must reproduce the above copyright notice, this list of conditions and the following
disclaimer in the documentation and/or other materials provided with the distribution.
THIS SOFTWARE IS PROVIDED BY THE AUTHOR "AS IS'' AND ANY EXPRESS OR IMPLIED WARRANTIES, IN-
CLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A
PARTICULAR PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE AUTHOR BE LIABLE FOR ANY DIRECT,
INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT
LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR
BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CON-
TRACT, STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT
OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.
Redistribution and use in source and binary forms, with or without modification, are permitted provided that the fol-
lowing conditions are met:
1. Redistributions of source code must retain the above copyright notice, this list of conditions and the following dis-
claimer.
2. Redistributions in binary form must reproduce the above copyright notice, this list of conditions and the following
disclaimer in the documentation and/or other materials provided with the distribution.
3. Neither the name of the copyright holder nor the names of contributors may be used to endorse or promote products
derived from this software
without specific prior written permission.
THIS SOFTWARE IS PROVIDED BY THE AUTHOR(S) AND CONTRIBUTOR(S) ''AS IS'' AND ANY EXPRESS OR IM-
PLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES OF MERCHANTABILI-
TY AND FITNESS FOR A PARTICULAR PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE AUTHOR(S) OR
CONTRIBUTOR(S) BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSE-
QUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SER-
VICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY
THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE
OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POS-
SIBILITY OF SUCH DAMAGE.
Redistribution and use in source and binary forms, with or without modification, are permitted provided that the fol-
lowing conditions are met:
1. Redistributions of source code must retain the above copyright notice, this list of conditions and the following dis-
claimer.
2. Redistributions in binary form must reproduce the above copyright notice, this list of conditions and the following
disclaimer in the documentation and/or other materials provided with the distribution.
3. All advertising materials mentioning features or use of this software must display the following acknowledgement:
This product includes software developed for the NetBSD Project by Wasabi Systems, Inc.
4. The name of Wasabi Systems, Inc. may not be used to endorse or promote products derived from this software with-
out specific prior written permission.
THIS SOFTWARE IS PROVIDED BY WASABI SYSTEMS, INC. ''AS IS'' AND ANY EXPRESS OR IMPLIED WARRAN-
TIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS
FOR A PARTICULAR PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL WASABI SYSTEMS, INC BE LIABLE
1814
FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (IN-
CLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, DATA,
OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY,
WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING
IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE
POSSIBILITY OF SUCH DAMAGE.
Redistribution and use in source and binary forms, with or without modification, are permitted provided that the fol-
lowing conditions are met:
1. Redistributions of source code must retain the above copyright notice, this list of conditions and the following dis-
claimer.
2. Redistributions in binary form must reproduce the above copyright notice, this list of conditions and the following
disclaimer in the
documentation and/or other materials provided with the distribution.
THIS SOFTWARE IS PROVIDED BY THE AUTHOR ''AS IS'' AND ANY EXPRESS OR IMPLIED WARRANTIES, IN-
CLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A
PARTICULAR PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE AUTHOR BE LIABLE FOR ANY DIRECT,
INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT
LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR
BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CON-
TRACT, STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT
OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.
Redistribution and use in source and binary forms, with or without modification, are permitted provided that the fol-
lowing conditions are met:
1. Redistributions of source code must retain the above copyright notice, this list of conditions and the following dis-
claimer.
2. Redistributions in binary form must reproduce the above copyright notice, this list of conditions and the following
disclaimer in the
documentation and/or other materials provided with the distribution.
3. Neither the name of the University nor the names of its contributors may be used to endorse or promote products
derived from this software
without specific prior written permission.
THIS SOFTWARE IS PROVIDED BY THE REGENTS AND CONTRIBUTORS ''AS IS'' AND ANY EXPRESS OR IM-
PLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES OF MERCHANTABILI-
TY AND FITNESS FOR A PARTICULAR PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE REGENTS OR
CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSE-
QUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SER-
VICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY
THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE
OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POS-
SIBILITY OF SUCH DAMAGE.
Redistribution and use in source and binary forms, with or without modification, are permitted provided that the fol-
lowing conditions are met:
1. Redistributions of source code must retain the above copyright notice, this list of conditions and the following dis-
claimer.
2. Redistributions in binary form must reproduce the above copyright notice, this list of conditions and the following
disclaimer in the documentation and/or other materials provided with the distribution.
THIS SOFTWARE IS PROVIDED BY THE AUTHOR AND CONTRIBUTORS ''AS IS'' AND ANY EXPRESS OR IM-
PLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES OF MERCHANTABILI-
TY AND FITNESS FOR A PARTICULAR PURPOSEARE DISCLAIMED. IN NO EVENT SHALL THE AUTHOR OR
CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSE-
QUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SER-
VICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY
THEORY OF LIABILITY, WHETHER IN CONTRACT,STRICT
LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF
THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.
Redistribution and use in source and binary forms, with or without modification, are permitted provided that the fol-
1815
SGOS Administration Guide
1. Redistributions of source code must retain the above copyright notice, this list of conditions, and the following dis-
claimer, without modification, immediately at the beginning of the file.
2. The name of the author may not be used to endorse or promote products derived from this software without specific
prior written permission.
THIS SOFTWARE IS PROVIDED BY THE AUTHOR AND CONTRIBUTORS ''AS IS'' AND ANY EXPRESS OR IM-
PLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES OF MERCHANTABILI-
TY AND FITNESS FOR A PARTICULAR PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE AUTHOR OR
CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSE-
QUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SER-
VICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY
THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE
OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POS-
SIBILITY OF SUCH DAMAGE.
Redistribution and use in source and binary forms, with or without modification, are permitted provided that the fol-
lowing conditions are met:
1. Redistributions of source code must retain the above copyright notice, this list of conditions and the following dis-
claimer.
2. Redistributions in binary form must reproduce the above copyright notice, this list of conditions and the following
disclaimer in the documentation and/or other materials provided with the distribution.
THIS SOFTWARE IS PROVIDED BY THE AUTHOR AND CONTRIBUTORS ''AS IS'' AND ANY EXPRESS OR IM-
PLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES OF MERCHANTABILI-
TY AND FITNESS FOR A PARTICULAR PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE AUTHOR OR
CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSE-
QUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SER-
VICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY
THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT
LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF
THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.
Redistribution and use in source and binary forms, with or without modification, are permitted provided that the fol-
lowing conditions are met:
1. Redistributions of source code must retain the above copyright notice, this list of conditions, and the following dis-
claimer, without modification.
2. Redistributions in binary form must reproduce at minimum a disclaimer substantially similar to the "NO WARRAN-
TY" disclaimer below ("Disclaimer") and any redistribution must be conditioned upon including a substantially similar
Disclaimer requirement for further binary redistribution.
NO WARRANTY
THIS SOFTWARE IS PROVIDED BY THE COPYRIGHT HOLDERS AND CONTRIBUTORS "AS IS" AND ANY EX-
PRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES OF MER-
CHANTIBILITY AND FITNESS FOR A PARTICULAR PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE
COPYRIGHT HOLDERS OR CONTRIBUTORS BE LIABLE FOR SPECIAL, EXEMPLARY, OR CONSEQUENTIAL
DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS
OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY OF LI-
ABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE)
ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH
DAMAGES.
Redistribution and use in source and binary forms, with or without modification, are permitted provided that the fol-
lowing conditions are met:
1. Redistributions of source code must retain the above copyright notice unmodified, this list of conditions, and the
following disclaimer.
2. Redistributions in binary form must reproduce the above copyright notice, this list of conditions and the following
disclaimer in the documentation and/or other materials provided with the distribution.
THIS SOFTWARE IS PROVIDED BY THE AUTHOR ''AS IS'' AND ANY EXPRESS OR IMPLIED WARRANTIES, IN-
CLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A
PARTICULAR PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE AUTHOR BE LIABLE FOR ANY DIRECT,
INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT
LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR
BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CON-
TRACT, STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT
1816
OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.
Redistribution and use in source and binary forms, with or without modification, are permitted provided that the fol-
lowing conditions are met:
1. Redistributions of source code must retain the above copyright notice unmodified, this list of conditions, and the
following disclaimer.
2. Redistributions in binary form must reproduce the above copyright notice, this list of conditions and the following
disclaimer in the documentation and/or other materials provided with the distribution.
THIS SOFTWARE IS PROVIDED BY THE AUTHOR 'AS IS'' AND ANY EXPRESS OR IMPLIED WARRANTIES, IN-
CLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A
PARTICULAR PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE AUTHOR BE LIABLE FOR ANY DIRECT,
INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT
LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR
BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CON-
TRACT, STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT
OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.
Redistribution and use in source and binary forms, with or without modification, are permitted provided that the fol-
lowing conditions are met:
1. Redistributions of source code must retain the above copyright notice, this list of conditions, and the following dis-
claimer, without modification, immediately at the beginning of the file.
2. The name of the author may not be used to endorse or promote products derived from this software without specific
prior written permission.
THIS SOFTWARE IS PROVIDED BY THE AUTHOR AND CONTRIBUTORS ''AS IS'' AND ANY EXPRESS OR IM-
PLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES OF MERCHANTABILI-
TY AND FITNESS FOR A PARTICULAR PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE AUTHOR OR
CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSE-
QUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SER-
VICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY
THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT
LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF
THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.
Portions Copyright (C) 1995, 1996, 1997, and 1998 WIDE Project.
All rights reserved.
Redistribution and use in source and binary forms, with or without modification, are permitted provided that the fol-
lowing conditions are met:
1. Redistributions of source code must retain the above copyright notice, this list of conditions and the following dis-
claimer.
2. Redistributions in binary form must reproduce the above copyright notice, this list of conditions and the following
disclaimer in the documentation and/or other materials provided with the distribution.
3. All advertising materials mentioning features or use of this software must display the following acknowledgement:
This product includes software developed by WIDE Project and its contributors.
4. Neither the name of the project nor the names of its contributors may be used to endorse or promote products derived
from this software without specific prior written permission.
THIS SOFTWARE IS PROVIDED BY THE PROJECT AND CONTRIBUTORS ''AS IS'' AND ANY EXPRESS OR IMPLIED
WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES OF MERCHANTABILITY AND
FITNESS FOR A PARTICULAR PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE PROJECT OR CONTRIB-
UTORS BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL
DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS
OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY OF LI-
ABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE)
ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH
DAMAGE.
Redistribution and use in source and binary forms, with or without modification, are permitted provided that the fol-
lowing conditions are met:
1. Redistributions of source code must retain the above copyright notice, this list of conditions and the following dis-
claimer.
1817
SGOS Administration Guide
2. Redistributions in binary form must reproduce the above copyright notice, this list of conditions and the following
disclaimer in the documentation and/or other materials provided with the distribution.
THIS SOFTWARE IS PROVIDED BY THE AUTHOR(S) ``AS IS'' AND ANY EXPRESS OR IMPLIED WARRANTIES, IN-
CLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A
PARTICULAR PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE AUTHOR(S) BE LIABLE FOR ANY DI-
RECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES
(INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, DA-
TA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY,
WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING
IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAM-
AGE.
Redistribution and use in source and binary forms, with or without modification, are permitted provided that the fol-
lowing conditions are met:
- Redistributions of source code must retain the above copyright notice, this list of conditions and the following dis-
claimer.
- Redistributions in binary form must reproduce the above copyright notice, this list of conditions and the following
disclaimer in the documentation and/or other materials provided with the distribution.
- Neither the name of the University nor the names of its contributors may be used to endorse or promote products
derived from this software without specific prior written permission.
THIS SOFTWARE IS PROVIDED BY THE COPYRIGHT HOLDERS AND CONTRIBUTORS "AS IS" AND ANY EX-
PRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES OF MER-
CHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE
ARE DISCLAIMED. IN NO EVENT SHALL THE COPYRIGHT HOLDERS OR CONTRIBUTORS BE LIABLE FOR ANY
DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT
NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, DATA, OR PROFITS;
OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CON-
TRACT, STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT
OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.
Redistribution and use in source and binary forms, with or without modification, are permitted provided that the fol-
lowing conditions are met:
1. Redistributions of source code must retain the above copyright notice, this list of conditions and the following
disclaimer.
2. Redistributions in binary form must reproduce the above copyright notice, this list of conditions and the following
disclaimer in the documentation and/or other materials provided with the distribution.
3. Neither the name of the University nor the names of its contributors may be used to endorse or promote products
derived from this software without specific prior written permission.
THIS SOFTWARE IS PROVIDED BY THE REGENTS AND CONTRIBUTORS ''AS IS'' AND ANY EXPRESS OR IM-
PLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES OF MERCHANTABILI-
TY AND FITNESS FOR A PARTICULAR PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE REGENTS OR
CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSE-
QUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SER-
VICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY
THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT
LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF
THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.
Permission to use, copy, modify, and distribute this software for any purpose with or without fee is hereby granted, pro-
vided that the above
copyright notice and this permission notice appear in all copies.
Permission to use, copy, modify, and distribute this software for any purpose with or without fee is hereby granted, pro-
vided that the above copyright notice and this permission notice appear in all copies, and that the name of Digital Equip-
ment Corporation not be used in advertising or publicity pertaining to distribution of the document or software without
specific, written prior permission.
THE SOFTWARE IS PROVIDED "AS IS" AND DIGITAL EQUIPMENT CORP. DISCLAIMS ALL WARRANTIES WITH
REGARD TO THIS SOFTWARE, INCLUDING ALL IMPLIED WARRANTIES OF MERCHANTABILITY AND FIT-
NESS. IN NO EVENT SHALL DIGITAL EQUIPMENT CORPORATION BE LIABLE FOR ANY SPECIAL, DIRECT, IN-
DIRECT, OR CONSEQUENTIAL DAMAGES OR ANY DAMAGES WHATSOEVER RESULTING FROM LOSS OF USE,
1818
DATA OR PROFITS, WHETHER IN AN ACTION OF CONTRACT, NEGLIGENCE OR OTHER TORTIOUS ACTION,
ARISING OUT OF OR IN CONNECTION WITH THE USE OR PERFORMANCE OF THIS SOFTWARE.
International Business Machines, Inc. (hereinafter called IBM) grants permission under its copyrights to use, copy, mod-
ify, and distribute this Software with or without fee, provided that the above copyright notice and all paragraphs of this
notice appear in all copies, and that the name of IBM not be used in connection with the marketing of any product in-
corporating the Software or modifications thereof, without specific, written prior permission.
To the extent it has a right to do so, IBM grants an immunity from suit under its patents, if any, for the use, sale or man-
ufacture of products to the extent that such products are used for performing Domain Name System dynamic updates
in TCP/IP networks by means of the Software. No immunity is granted for any product per se or for any other function
of any product.
THE SOFTWARE IS PROVIDED "AS IS", AND IBM DISCLAIMS ALL WARRANTIES, INCLUDING ALL IMPLIED
WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE. IN NO EVENT SHALL
IBM BE LIABLE FOR ANY SPECIAL, DIRECT, INDIRECT, OR CONSEQUENTIAL DAMAGES OR ANY DAMAGES
WHATSOEVER ARISING OUT OF OR IN CONNECTION WITH THE USE OR PERFORMANCE OF THIS SOFT-
WARE, EVEN IF IBM IS APPRISED OF THE POSSIBILITY OF SUCH DAMAGES.
Permission to use, copy, modify, and distribute this software for any purpose with or without fee is hereby granted, pro-
vided that the above copyright notice and this permission notice appear in all copies.
THE SOFTWARE IS PROVIDED "AS IS" AND INTERNET SOFTWARE CONSORTIUM DISCLAIMS ALL WARRAN-
TIES WITH REGARD TO THIS SOFTWARE INCLUDING ALL IMPLIED WARRANTIES OF MERCHANTABILITY
AND FITNESS. IN NO EVENT SHALL INTERNET SOFTWARE
CONSORTIUM BE LIABLE FOR ANY SPECIAL, DIRECT, INDIRECT, OR CONSEQUENTIAL DAMAGES OR ANY
DAMAGES WHATSOEVER RESULTING FROM LOSS OF USE, DATA OR PROFITS, WHETHER IN AN ACTION OF
CONTRACT, NEGLIGENCE OR OTHER TORTIOUS ACTION, ARISING OUT OF OR IN CONNECTION WITH THE
USE OR PERFORMANCE OF THIS SOFTWARE.
Redistribution and use in source and binary forms, with or without modification, are permitted provided that the fol-
lowing conditions are met:
1. Redistributions of source code must retain the above copyright notice, this list of conditions and the following dis-
claimer.
2. Redistributions in binary form must reproduce the above copyright notice, this list of conditions and the following
disclaimer in the documentation and/or other materials provided with the distribution.
3. All advertising materials mentioning features or use of this software must display the following acknowledgement:
This product includes software developed by the NetBSD Foundation, Inc. and its contributors.
4. Neither the name of The NetBSD Foundation nor the names of its contributors may be used to endorse or promote
products derived from this software without specific prior written permission.
THIS SOFTWARE IS PROVIDED BY THE NETBSD FOUNDATION, INC. AND CONTRIBUTORS ''AS IS'' AND ANY
EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES OF
MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL
THE FOUNDATION OR CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT,INCIDENTAL, SPECIAL, EX-
EMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF
SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEV-
ER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT (IN-
CLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN
IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.
Redistribution and use in source and binary forms, with or without modification, are permitted provided that the fol-
lowing conditions are met:
1. Redistributions of source code must retain the above copyright notice, this list of conditions and the following dis-
claimer.
2. Redistributions in binary form must reproduce the above copyright notice, this list of conditions and the following
disclaimer in the
documentation and/or other materials provided with the distribution.
3. Neither the name of the University nor the names of its contributors may be used to endorse or promote products
derived from this software without specific prior written permission.
THIS SOFTWARE IS PROVIDED BY THE REGENTS AND CONTRIBUTORS ''AS IS'' AND ANY EXPRESS OR IM-
PLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES OF MERCHANTABILI-
TY AND FITNESS FOR A PARTICULAR PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE REGENTS OR
CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSE-
1819
SGOS Administration Guide
QUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SER-
VICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY
THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE
OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POS-
SIBILITY OF SUCH DAMAGE.
Redistribution and use in source and binary forms, with or without modification, are permitted provided that the fol-
lowing conditions are met:
1. Redistributions of source code must retain the above copyright notice, this list of conditions and the following dis-
claimer.
2. Redistributions in binary form must reproduce the above copyright notice, this list of conditions and the following
disclaimer in the documentation and/or other materials provided with the distribution.
3. All advertising materials mentioning features or use of this software must display the following acknowledgement:
This product includes software developed by Intel Corporation and its contributors.
4. Neither the name of Intel Corporation or its contributors may be used to endorse or promote products derived from
this software without specific prior written permission.
THIS SOFTWARE IS PROVIDED BY INTEL CORPORATION AND CONTRIBUTORS ''AS IS'' AND ANY EXPRESS
OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES OF MERCHANT-
ABILITY AND FITNESS FOR A PARTICULAR PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL INTEL COR-
PORATION OR CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL,
EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUB-
STITUTE GOODS OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER
CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT (IN-
CLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN
IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.
Permission to use, copy, modify, and distribute this software for any purpose with or without fee is hereby granted,
provided that the above copyright notice and this permission notice appear in all copies.
THE SOFTWARE IS PROVIDED "AS IS" AND THE AUTHOR DISCLAIMS ALL WARRANTIES WITH REGARD TO
THIS SOFTWARE INCLUDING ALL IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS. IN NO
EVENT SHALL THE AUTHOR BE LIABLE FOR ANY SPECIAL, DIRECT, INDIRECT, OR CONSEQUENTIAL DAM-
AGES OR ANY DAMAGES WHATSOEVER RESULTING FROM LOSS OF USE, DATA OR PROFITS, WHETHER IN
AN ACTION OF CONTRACT, NEGLIGENCE OR OTHER TORTIOUS ACTION, ARISING OUT OF OR IN CONNEC-
TION WITH THE USE OR PERFORMANCE OF THIS SOFTWARE.
Redistribution and use in source and binary forms, with or without modification, are permitted provided that the fol-
lowing conditions are met:
1. Redistributions of source code must retain the above copyright notice, this list of conditions and the following dis-
claimer.
2. Redistributions in binary form must reproduce the above copyright notice, this list of conditions and the following
disclaimer in the documentation and/or other materials provided with the distribution.
3. Neither the name of IBM nor the names of its contributors may be used to endorse or promote products derived from
this software without specific prior written permission.
THIS SOFTWARE IS PROVIDED BY THE COPYRIGHT HOLDERS AND CONTRIBUTORS ''AS IS'' AND ANY EX-
PRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES OF MER-
CHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL IBM
OR CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CON-
SEQUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR
SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON
ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING NEGLI-
GENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF
THE POSSIBILITY OF SUCH DAMAGE.
This header is BSD licensed so anyone can use the definitions to implement
compatible drivers/servers.
1820
Redistribution and use in source and binary forms, with or without modification, are permitted provided that the fol-
lowing conditions are met:
1. Redistributions of source code must retain the above copyright notice, this list of conditions and the following dis-
claimer.
2. Redistributions in binary form must reproduce the above copyright notice, this list of conditions and the following
disclaimer in the
documentation and/or other materials provided with the distribution.
3. Neither the name of IBM nor the names of its contributors may be used to endorse or promote products derived from
this software without specific prior written permission.
THIS SOFTWARE IS PROVIDED BY THE COPYRIGHT HOLDERS AND CONTRIBUTORS ''AS IS'' AND ANY EX-
PRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES OF MER-
CHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL IBM
OR CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CON-
SEQUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR
SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON
ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING NEGLI-
GENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF
THE POSSIBILITY OF SUCH DAMAGE.
Redistribution and use in source and binary forms, with or without modification, are permitted provided that the fol-
lowing conditions are met:
1. Redistributions of source code must retain the above copyright notice, this list of conditions and the following dis-
claimer.
2. Redistributions in binary form must reproduce the above copyright notice, this list of conditions and the following
disclaimer in the documentation and/or other materials provided with the distribution.
3. Neither the name of The Internet Software Consortium nor the names of its contributors may be used to endorse or
promote products derived from this software without specific prior written permission.
THIS SOFTWARE IS PROVIDED BY THE INTERNET SOFTWARE CONSORTIUM AND CONTRIBUTORS ''AS IS''
AND ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRAN-
TIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE ARE DISCLAIMED. IN NO EVENT
SHALL THE INTERNET SOFTWARE CONSORTIUM OR CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDI-
RECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT LIMIT-
ED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS
INTERRUPTION) HOWEVER CAUSED AND
ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING NEGLI-
GENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF
THE POSSIBILITY OF SUCH DAMAGE.
Copyright (c) 1995 The Internet Software Consortium. All rights reserved.
Redistribution and use in source and binary forms, with or without modification, are permitted provided that the fol-
lowing conditions are met:
1. Redistributions of source code must retain the above copyright notice, this list of conditions and the following dis-
claimer.
2. Redistributions in binary form must reproduce the above copyright notice, this list of conditions and the following
disclaimer in the documentation and/or other materials provided with the distribution.
3. Neither the name of The Internet Software Consortium nor the names of its contributors may be used to endorse or
promote products derived from this software without specific prior written permission.
THIS SOFTWARE IS PROVIDED BY THE INTERNET SOFTWARE CONSORTIUM AND CONTRIBUTORS ''AS IS''
AND ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRAN-
TIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE ARE DISCLAIMED. IN NO EVENT
SHALL THE INTERNET SOFTWARE CONSORTIUM OR CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDI-
RECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT LIMIT-
ED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS
INTERRUPTION) HOWEVER CAUSED AND
ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING NEG-
LIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF
THE POSSIBILITY OF SUCH DAMAGE.
Redistribution and use in source and binary forms, with or without modification, are permitted provided that the fol-
lowing conditions are met:
1. Redistributions of source code must retain the above copyright notice, this list of conditions and the following dis-
1821
SGOS Administration Guide
claimer.
2. Redistributions in binary form must reproduce the above copyright notice, this list of conditions and the following
disclaimer in the documentation and/or other materials provided with the distribution.
3. Neither the name of The Internet Software Consortium nor the names of its contributors may be used to endorse or
promote products derived
from this software without specific prior written permission.
THIS SOFTWARE IS PROVIDED BY THE INTERNET SOFTWARE CONSORTIUM AND CONTRIBUTORS ''AS IS''
AND ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRAN-
TIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE ARE DISCLAIMED. IN NO EVENT
SHALL THE INTERNET SOFTWARE CONSORTIUM OR CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDI-
RECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT LIMIT-
ED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS
INTERRUPTION) HOWEVER CAUSED AND
ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING NEG-
LIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF
THE POSSIBILITY OF SUCH DAMAGE.
Redistribution and use in source and binary forms, with or without modification, are permitted provided that the fol-
lowing conditions are met:
1. Redistributions of source code must retain the above copyright notice, this list of conditions and the following dis-
claimer.
2. Redistributions in binary form must reproduce the above copyright notice, this list of conditions and the following
disclaimer in the
documentation and/or other materials provided with the distribution.
3. Neither the name of The Internet Software Consortium nor the names of its contributors may be used to endorse or
promote products derived
from this software without specific prior written permission.
THIS SOFTWARE IS PROVIDED BY THE INTERNET SOFTWARE CONSORTIUM AND CONTRIBUTORS ''AS IS''
AND ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRAN-
TIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE ARE DISCLAIMED. IN NO EVENT
SHALL THE INTERNET SOFTWARE CONSORTIUM OR CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDI-
RECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT LIMIT-
ED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS
INTERRUPTION) HOWEVER CAUSED AND
ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING NEG-
LIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF
THE POSSIBILITY OF SUCH DAMAGE.
Copyright (c) 1995, 1996, 1997, 1998 The Internet Software Consortium.
All rights reserved.
Redistribution and use in source and binary forms, with or without modification, are permitted provided that the fol-
lowing conditions are met:
1. Redistributions of source code must retain the above copyright notice, this list of conditions and the following dis-
claimer.
2. Redistributions in binary form must reproduce the above copyright notice, this list of conditions and the following
disclaimer in the documentation and/or other materials provided with the distribution.
3. Neither the name of The Internet Software Consortium nor the names of its contributors may be used to endorse or
promote products derived from this software without specific prior written permission.
THIS SOFTWARE IS PROVIDED BY THE INTERNET SOFTWARE CONSORTIUM AND CONTRIBUTORS ''AS IS''
AND ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRAN-
TIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE ARE DISCLAIMED. IN NO EVENT
SHALL THE INTERNET SOFTWARE CONSORTIUM OR CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDI-
RECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT LIMIT-
ED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS
INTERRUPTION) HOWEVER CAUSED AND
ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING NEGLI-
GENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF
THE POSSIBILITY OF SUCH DAMAGE.
Redistribution and use in source and binary forms, with or without modification, are permitted provided that the fol-
lowing conditions are met:
1. Redistributions of source code must retain the above copyright notice, this list of conditions and the following dis-
claimer.
1822
2. Redistributions in binary form must reproduce the above copyright notice, this list of conditions and the following
disclaimer in the documentation and/or other materials provided with the distribution.
3. Neither the name of The Internet Software Consortium nor the names of its contributors may be used to endorse or
promote products derived from this software without specific prior written permission.
THIS SOFTWARE IS PROVIDED BY THE INTERNET SOFTWARE CONSORTIUM AND CONTRIBUTORS ''AS IS''
AND ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRAN-
TIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE ARE DISCLAIMED. IN NO EVENT
SHALL THE INTERNET SOFTWARE CONSORTIUM OR CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDI-
RECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT LIMIT-
ED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS
INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT
LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF
THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.
Redistribution and use in source and binary forms, with or without modification, are permitted provided that the fol-
lowing conditions are met:
1. Redistributions of source code must retain the above copyright notice, this list of conditions and the following dis-
claimer.
2. Redistributions in binary form must reproduce the above copyright notice, this list of conditions and the following
disclaimer in the documentation and/or other materials provided with the distribution.
3. Neither the name of The Internet Software Consortium nor the names of its contributors may be used to endorse or
promote products derived from this software without specific prior written permission.
THIS SOFTWARE IS PROVIDED BY THE INTERNET SOFTWARE CONSORTIUM AND CONTRIBUTORS ``AS IS''
AND ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRAN-
TIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE ARE DISCLAIMED. IN NO EVENT
SHALL THE INTERNET SOFTWARE CONSORTIUM OR CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDI-
RECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT LIMIT-
ED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS
INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT
LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF
THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.
Redistribution and use in source and binary forms, with or without modification, are permitted provided that the fol-
lowing conditions are met:
1. Redistributions of source code must retain the above copyright notice, this list of conditions and the following dis-
claimer.
2. Redistributions in binary form must reproduce the above copyright notice, this list of conditions and the following
disclaimer in the documentation and/or other materials provided with the distribution.
3. Neither the name of The Internet Software Consortium nor the names of its contributors may be used to endorse or
promote products derived from this software without specific prior written permission.
THIS SOFTWARE IS PROVIDED BY THE INTERNET SOFTWARE CONSORTIUM AND CONTRIBUTORS ''AS IS''
AND ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRAN-
TIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE ARE DISCLAIMED. IN NO EVENT
SHALL THE INTERNET SOFTWARE CONSORTIUM OR CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDI-
RECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT LIMIT-
ED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS
INTERRUPTION) HOWEVER CAUSED AND
ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING NEGLI-
GENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF
THE POSSIBILITY OFSUCH DAMAGE.
Redistribution and use in source and binary forms, with or without modification, are permitted provided that the fol-
lowing conditions are met:
1. Redistributions of source code must retain the above copyright notice, this list of conditions and the following dis-
claimer.
2. Redistributions in binary form must reproduce the above copyright notice, this list of conditions and the following
disclaimer in the documentation and/or other materials provided with the distribution.
3. Neither the name of The Internet Software Consortium nor the names of its contributors may be used to endorse or
promote products derived from this software without specific prior written permission.
THIS SOFTWARE IS PROVIDED BY THE INTERNET SOFTWARE CONSORTIUM AND CONTRIBUTORS ''AS IS''
1823
SGOS Administration Guide
AND ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRAN-
TIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE ARE DISCLAIMED. IN NO EVENT
SHALL THE INTERNET SOFTWARE CONSORTIUM OR CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDI-
RECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT LIMIT-
ED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS
INTERRUPTION) HOWEVER CAUSED AND
ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING NEGLI-
GENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF
THE POSSIBILITY OF SUCH DAMAGE.
Copyright (c) 1996 The Internet Software Consortium. All rights reserved.
Redistribution and use in source and binary forms, with or without modification, are permitted provided that the fol-
lowing conditions are met:
1. Redistributions of source code must retain the above copyright notice, this list of conditions and the following dis-
claimer.
2. Redistributions in binary form must reproduce the above copyright notice, this list of conditions and the following
disclaimer in the documentation and/or other materials provided with the distribution.
3. Neither the name of The Internet Software Consortium nor the names of its contributors may be used to endorse or
promote products derived from this software without specific prior written permission.
THIS SOFTWARE IS PROVIDED BY THE INTERNET SOFTWARE CONSORTIUM AND CONTRIBUTORS ``AS IS''
AND ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRAN-
TIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE ARE DISCLAIMED. IN NO EVENT
SHALL THE INTERNET SOFTWARE CONSORTIUM OR CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDI-
RECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT LIMIT-
ED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS
INTERRUPTION) HOWEVER CAUSED AND
ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING NEGLI-
GENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF
THE POSSIBILITY OF SUCH DAMAGE.
Redistribution and use in source and binary forms, with or without modification, are permitted provided that the fol-
lowing conditions are met:
1. Redistributions of source code must retain the above copyright notice, this list of conditions and the following dis-
claimer.
2. Redistributions in binary form must reproduce the above copyright notice, this list of conditions and the following
disclaimer in the documentation and/or other materials provided with the distribution.
3. Neither the name of RadioMail Corporation, the Internet Software Consortium nor the names of its contributors may
be used to endorse or promote products derived from this software without specific prior written permission.
Redistribution and use in source and binary forms, with or without modification, are permitted provided that the fol-
lowing conditions are met:
1. Redistributions of source code must retain the above copyright notice, this list of conditions and the following dis-
claimer.
2. Redistributions in binary form must reproduce the above copyright notice, this list of conditions and the following
disclaimer in the documentation and/or other materials provided with the distribution.
3. Neither the name of The Internet Software Consortium nor the names of its contributors may be used to endorse or
promote products derived from this software without specific prior written permission.
THIS SOFTWARE IS PROVIDED BY THE INTERNET SOFTWARE CONSORTIUM AND CONTRIBUTORS ''AS IS''
AND ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRAN-
1824
TIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE ARE DISCLAIMED. IN NO EVENT
SHALL THE INTERNET SOFTWARE CONSORTIUM OR CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDI-
RECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT LIMIT-
ED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS
INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT
LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF
THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.
Redistribution and use in source and binary forms, with or without modification, are permitted provided that the fol-
lowing conditions are met:
1. Redistributions of source code must retain the above copyright notice, this list of conditions and the following dis-
claimer in this position and unchanged.
2. Redistributions in binary form must reproduce the above copyright notice, this list of conditions and the following
disclaimer in the documentation and/or other materials provided with the distribution.
THIS SOFTWARE IS PROVIDED BY THE AUTHOR AND CONTRIBUTORS ''AS IS'' AND ANY EXPRESS OR IM-
PLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES OF MERCHANTABILI-
TY AND FITNESS FOR A PARTICULAR PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE AUTHOR OR
CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSE-
QUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SER-
VICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY
THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE
OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POS-
SIBILITY OF SUCH DAMAGE.
64-bit updates:
Benjamin Liu <[email protected]>
Jun Nakajima <[email protected]>
This program is free software; you can redistribute it and/or modify it under the terms of the GNU General Public Li-
cense version 2 as published by the Free Software Foundation; or, when distributed separately from the Linux kernel or
incorporated into other software packages, subject to the following license:
Permission is hereby granted, free of charge, to any person obtaining a copy of this source file (the "Software"), to deal
in the Software without restriction, including without limitation the rights to use, copy, modify, merge, publish, distrib-
ute, sublicense, and/or sell copies of the Software, and to permit persons to whom the Software is furnished to do so,
subject to the following conditions:
The above copyright notice and this permission notice shall be included in all copies or substantial portions of the Soft-
ware.
THE SOFTWARE IS PROVIDED "AS IS", WITHOUT WARRANTY OF ANY KIND, EXPRESS OR IMPLIED, INCLUD-
ING BUT NOT LIMITED TO THE WARRANTIES OF MERCHANTABILITY, FITNESS FOR A PARTICULAR PUR-
POSE AND NONINFRINGEMENT. IN NO EVENT SHALL THE AUTHORS OR COPYRIGHT HOLDERS BE LIABLE
FOR ANY CLAIM, DAMAGES OR OTHER LIABILITY, WHETHER IN AN ACTION OF CONTRACT, TORT OR OTH-
ERWISE, ARISING FROM, OUT OF OR IN CONNECTION WITH THE SOFTWARE OR THE USE OR OTHER DEAL-
INGS IN THE SOFTWARE.
This file may be distributed separately from the Linux kernel, or incorporated into other software packages, subject to
the following license:
Permission is hereby granted, free of charge, to any person obtaining a copy of this source file (the "Software"), to deal
in the Software without restriction, including without limitation the rights to use, copy, modify, merge, publish, distrib-
ute, sublicense, and/or sell copies of the Software, and to permit persons to whom the Software is furnished to do so,
subject to the following conditions:
The above copyright notice and this permission notice shall be included in all copies or substantial portions of the Soft-
ware.
THE SOFTWARE IS PROVIDED "AS IS", WITHOUT WARRANTY OF ANY KIND, EXPRESS OR IMPLIED, INCLUD-
ING BUT NOT LIMITED TO THE WARRANTIES OF MERCHANTABILITY, FITNESS FOR A PARTICULAR PUR-
POSE AND NONINFRINGEMENT. IN NO EVENT SHALL THE AUTHORS OR COPYRIGHT HOLDERS BE LIABLE
1825
SGOS Administration Guide
FOR ANY CLAIM, DAMAGES OR OTHER LIABILITY, WHETHER IN AN ACTION OF CONTRACT, TORT OR OTH-
ERWISE, ARISING FROM, OUT OF OR IN CONNECTION WITH THE SOFTWARE OR THE USE OR OTHER DEAL-
INGS IN THE SOFTWARE.
This file may be distributed separately from the Linux kernel, or incorporated into other software packages, subject to
the following license:
Permission is hereby granted, free of charge, to any person obtaining a copy of this source file (the "Software"), to deal
in the Software without restriction, including without limitation the rights to use, copy, modify, merge, publish, distrib-
ute, sublicense, and/or sell copies of the Software, and to permit persons to whom the Software is furnished to do so,
subject to the following conditions:
The above copyright notice and this permission notice shall be included in all copies or substantial portions of the Soft-
ware.
THE SOFTWARE IS PROVIDED "AS IS", WITHOUT WARRANTY OF ANY KIND, EXPRESS OR IMPLIED, INCLUD-
ING BUT NOT LIMITED TO THE WARRANTIES OF MERCHANTABILITY, FITNESS FOR A PARTICULAR PUR-
POSE AND NONINFRINGEMENT. IN NO EVENT SHALL THE AUTHORS OR COPYRIGHT HOLDERS BE LIABLE
FOR ANY CLAIM, DAMAGES OR OTHER LIABILITY, WHETHER IN AN ACTION OF CONTRACT, TORT OR OTH-
ERWISE, ARISING FROM, OUT OF OR IN CONNECTION WITH THE SOFTWARE OR THE USE OR OTHER DEAL-
INGSIN THE SOFTWARE.
This file may be distributed separately from the Linux kernel, or incorporated into other software packages, subject to
the following license:
Permission is hereby granted, free of charge, to any person obtaining a copy of this source file (the "Software"), to deal
in the Software without restriction, including without limitation the rights to use, copy, modify, merge, publish, distrib-
ute, sublicense, and/or sell copies of the Software, and to permit persons to whom the Software is furnished to do so,
subject to the following conditions:
The above copyright notice and this permission notice shall be included in all copies or substantial portions of the Soft-
ware.
THE SOFTWARE IS PROVIDED "AS IS", WITHOUT WARRANTY OF ANY KIND, EXPRESS OR IMPLIED, INCLUD-
ING BUT NOT LIMITED TO THE WARRANTIES OF MERCHANTABILITY, FITNESS FOR A PARTICULAR PUR-
POSE AND NONINFRINGEMENT. IN NO EVENT SHALL THE AUTHORS OR COPYRIGHT HOLDERS BE LIABLE
FOR ANY CLAIM, DAMAGES OR OTHER LIABILITY, WHETHER IN AN ACTION OF CONTRACT, TORT OR OTH-
ERWISE, ARISING FROM, OUT OF OR IN CONNECTION WITH THE SOFTWARE OR THE USE OR OTHER DEAL-
INGS IN THE SOFTWARE.
This file may be distributed separately from the Linux kernel, or incorporated into other software packages, subject to
the following license:
Permission is hereby granted, free of charge, to any person obtaining a copy of this source file (the "Software"), to deal
in the Software without restriction, including without limitation the rights to use, copy, modify, merge, publish, distrib-
ute, sublicense, and/or sell copies of the Software, and to permit persons to whom the Software is furnished to do so,
subject to the following conditions:
The above copyright notice and this permission notice shall be included in all copies or substantial portions of the Soft-
ware.
THE SOFTWARE IS PROVIDED "AS IS", WITHOUT WARRANTY OF ANY KIND, EXPRESS OR IMPLIED, INCLUD-
ING BUT NOT LIMITED TO THE WARRANTIES OF MERCHANTABILITY, FITNESS FOR A PARTICULAR PUR-
POSE AND NONINFRINGEMENT. IN NO EVENT SHALL THE AUTHORS OR COPYRIGHT HOLDERS BE LIABLE
FOR ANY CLAIM, DAMAGES OR OTHER LIABILITY, WHETHER IN AN ACTION OF CONTRACT, TORT OR OTH-
ERWISE, ARISING FROM, OUT OF OR IN CONNECTION WITH THE SOFTWARE OR THE USE OR OTHER DEAL-
INGS IN THE SOFTWARE.
1826
Permission is hereby granted, free of charge, to any person obtaining a copy of this software and associated documen-
tation files (the "Software"), to deal in the Software without restriction, including without limitation the rights to use,
copy, modify, merge, publish, distribute, sublicense, and/or sell copies of the Software, and to permit persons to whom
the Software is furnished to do so, subject to the following conditions:
The above copyright notice and this permission notice shall be included in all copies or substantial portions of the Soft-
ware.
THE SOFTWARE IS PROVIDED "AS IS", WITHOUT WARRANTY OF ANY KIND, EXPRESS OR IMPLIED, INCLUD-
ING BUT NOT LIMITED TO THE WARRANTIES OF MERCHANTABILITY, FITNESS FOR A PARTICULAR PUR-
POSE AND NONINFRINGEMENT. IN NO EVENT SHALL THE AUTHORS OR COPYRIGHT HOLDERS BE LIABLE
FOR ANY CLAIM, DAMAGES OR OTHER LIABILITY, WHETHER IN AN ACTION OF CONTRACT, TORT OR OTH-
ERWISE, ARISING FROM, OUT OF OR IN CONNECTION WITH THE SOFTWARE OR THE USE OR OTHER DEAL-
INGS IN THE SOFTWARE.
Redistribution and use in source and binary forms, with or without modification, are permitted provided that the fol-
lowing conditions are met:
1. Redistributions of source code must retain the above copyright notice, this list of conditions and the following dis-
claimer.
2. Redistributions in binary form must reproduce the above copyright notice, this list of conditions and the following
disclaimer in the documentation and/or other materials provided with the distribution.
THIS SOFTWARE IS PROVIDED BY THE AUTHOR AND CONTRIBUTORS ''AS IS'' AND ANY EXPRESS OR IM-
PLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES OF MERCHANTABILI-
TY AND FITNESS FOR A PARTICULAR PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE AUTHOR OR
CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSE-
QUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SER-
VICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY
THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE
OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POS-
SIBILITY OF SUCH DAMAGE.
1827
SGOS Administration Guide
1828