Home > Articles > Operating Systems, Server

Like this article? We recommend

Network Configuration Tasks

The addition of directly-connected and remote shared subnet support in Sun Ray Server Software 2.0 allows DTUs to be deployed virtually anywhere on the enterprise intranet, subject only to the provision of DHCP service and a sufficient quality of service between the DTU and the Sun Ray server.

The following sections explain how to configure a network to support these deployment scenarios:

  • a directly-connected dedicated interconnect

  • a directly-connected shared subnet

  • a remote shared subnet

FIGURE 2 shows the overall topology and the configuration tasks discussed in this section.4

Figure 2FIGURE 2 Sun Ray Network Topology

Preparing for Deployment

Before deploying a DTU onto any subnet, the administrator must answer three questions:

  1. From which DHCP server will DTUs on this subnet get their basic IP networking parameters?

  2. From which DHCP server will DTUs on this subnet get additional configuration parameters to support features such as firmware download?

  3. How will DTUs on this subnet locate their Sun Ray server?

The answers to these questions determine what configuration steps will let DTUs placed on this subnet initialize themselves and offer Sun Ray sessions to users.

The following sections present examples of DTU deployment on the directly-connected dedicated interconnect A, the directly-connected shared subnet B, and the remote shared subnets C and D shown in FIGURE 2.

Deployment on a Directly-Connected Dedicated Interconnect

Subnet A in FIGURE 2 is a directly-connected dedicated interconnect. Its subnet will use IP addresses in the range 192.168.128.0/24. The Sun Ray server named helios is attached to the interconnect through its qfe2 network interface, which will be assigned the IP address 192.168.128.3.

In an interconnect scenario, the DHCP service on the Sun Ray server always provides both basic networking parameters and additional configuration parameters to the DTU. The answers to the three pre-deployment questions are:

  1. From which DHCP server will DTUs on this subnet get their basic IP networking parameters?

  2. On a directly-connected dedicated interconnect, basic networking parameters are always supplied by the DHCP service on the Sun Ray server.

  3. From which DHCP server will DTUs on this subnet get additional configuration parameters to support features such as firmware download?

  4. On a directly-connected dedicated interconnect, additional configuration parameters are always supplied by the DHCP service on the Sun Ray server.

  5. How will DTUs on this subnet locate their Sun Ray server?

  6. On a directly-connected dedicated interconnect, the DTU is always notified of the location of the Sun Ray server through an additional configuration parameter supplied in Step 2.

Directly-Connected Dedicated Interconnect: Example

This is an example of DHCP service for the directly-connected dedicated interconnect A shown in FIGURE 2.

  1. Configure the Sun Ray server to provide both basic and additional parameters to the interconnect.

  2. Use the utadm -a ifname command to configure DHCP service for DTUs on an interconnect. In this example, the interconnect is attached through interface qfe2, so the appropriate command is:

    # /opt/SUNWut/sbin/utadm -a qfe2
    ### Configuring /etc/nsswitch.conf
    ### Configuring Service information for Sun Ray
    ### Disabling Routing
    ### configuring qfe2 interface at subnet 192.168.128.0
     Selected values for interface "qfe2"
      host address:     192.168.128.1
      net mask:       255.255.255.0
      net address:     192.168.128.0
      host name:      helios-qfe2
      net name:       SunRay-qfe2
      first unit address:  192.168.128.16
      last unit address:  192.168.128.240
      auth server:     192.168.128.1
      firmware server:   192.168.128.1
      router:        192.168.128.1
      alternate servers:
     Accept as is? ([Y]/N): n
     new host address: [192.168.128.1] 192.168.128.3
     new netmask: [255.255.255.0] 
     new host name: [helios-qfe2] 
     Do you want to offer IP addresses for this interface? ([Y]/N): 
     new first Sun Ray address: [192.168.128.16] 
     number of Sun Ray addresses to allocate: [239] 
     new auth server: [192.168.128.3] 
     new firmware server: [192.168.128.3] 
     new router: [192.168.128.3] 
    Specify alternate server list? (Y/[N]): 
     Selected values for interface "qfe2"
     host address:      192.168.128.3
     net mask:        255.255.255.0
     net address:      192.168.128.0
     host name:       helios-qfe2
     net name:        SunRay-qfe2
     first unit address:   192.168.128.16
     last unit address:   192.168.128.254
     auth server:      192.168.128.3
     firmware server: 1   192.168.128.3
     router:         192.168.128.3
     alternate servers: 
     Accept as is? ([Y]/N): 
    ### successfully set up "/etc/hostname.qfe2" file
    ### successfully set up "/etc/inet/hosts" file
    ### successfully set up "/etc/inet/netmasks" file
    ### successfully set up "/etc/inet/networks" file
    ### finished install of "qfe2" interface
    ### Building network tables - this will take a few minutes
    ### Configuring firmware version for Sun Ray
        All the units served by "helios" on the 192.168.128.0
        network interface, running firmware other than version
        "2.0_37.b,REV=2002.12.19.07.46" will be upgraded at their
        next power-on.
    ### Configuring Sun Ray Logging Functions
    DHCP is not currently running, should I start it? ([Y]/N): 
    ### started DHCP daemon
    #

    In this example, the default values initially suggested by utadm were not appropriate. (Specifically, the suggested value for the server's IP address on the interconnect was not the desired value.) The administrator replied n to the first Accept as is? prompt and was given the opportunity to provide alternative values for the various parameters.

  3. Restart Sun Ray services on the Sun Ray server.

  4. Once the utadm command has completed, issue a utrestart command to fully activate Sun Ray services on the newly-defined interconnect:

    # /opt/SUNWut/sbin/utrestart
    Resetting servers... messages will be logged to /var/opt/SUNWut/log/
    messages.

Deployment on a Directly-Connected Shared Subnet

Subnet B in FIGURE 2 is a directly-connected shared subnet that uses IP addresses in the range 130.146.59.0/24. The Sun Ray server helios is attached to the interconnect through its hme0 network interface, which has been assigned the IP address 130.146.59.5. The answers to the three pre-deployment questions are:

  1. From which DHCP server will DTUs on this subnet get their basic IP networking parameters?

  2. In a shared subnet scenario, you must choose whether a DHCP service on the Sun Ray server or some external DHCP service will provide the DTU with basic network parameters. If the enterprise already has a DHCP infrastructure that covers this subnet, it probably supplies basic network parameters. If no such infrastructure exists, configure the Sun Ray server to provide basic network parameters.

  3. From which DHCP server will DTUs on this subnet get additional configuration parameters to support features such as firmware download?

  4. The administrator must choose whether to supply additional configuration parameters to the DTU and, if so, whether to use a DHCP service on the Sun Ray server or some external DHCP service for this purpose. On a directly connected shared subnet, it is possible to deploy DTUs without providing additional parameters at all, but since this deprives the DTU of a number of features, including the ability to download new firmware, it is generally undesirable.

    Administrators of an already established DHCP infrastructure may be unable or unwilling to reconfigure that infrastructure to provide additional Sun Ray configuration parameters, so it is usually more convenient to have the Sun Ray server provide these parameters. Even when the established infrastructure is capable of delivering the additional parameters, it may be desirable to have the Sun Ray server provide them. This enables SRSS commands to be used to manage the values of the additional configuration parameters when those values need to be changed in response to software upgrades or patch installations on the Sun Ray server. For instance, a patch that delivers new DTU firmware could automatically update the firmware version string that is delivered to the DTU. However, if the firmware version parameter is supplied by some external DHCP service, an administrator must manually edit the firmware version parameter string in the external DHCP configuration rules to reflect the new firmware version delivered by the patch. This activity is time-consuming and error-prone, as well as unnecessary.

  5. How will DTUs on this subnet locate their Sun Ray server?

  6. Use one of the optional additional configuration parameters to report the location of the Sun Ray server to the DTU. If additional configuration parameters are not supplied to the DTU at all, the DTU has no indication of the location of any Sun Ray server. In these circumstances, the DTU attempts to discover the location of a Sun Ray server by using a broadcast-based mechanism. However, the DTUs broadcast packets propagate only on the local subnet, so, in the case of a remote subnet, the broadcast cannot reach the Sun Ray server, and contact cannot be established.

    The following examples illustrate two configurations of the directly connected shared subnet. In the first example, the Sun Ray server delivers both basic networking parameters and additional parameters. In the second example, an external DHCP service supplies basic networking parameters, and no additional parameters are provided to the DTU, which must establish contact with the Sun Ray server through its local subnet broadcast discovery mechanism.

    The most likely case, where an external DHCP service provides basic networking parameter and the Sun Ray server provides additional parameters, is illustrated by an example in "Deployment on a Remote Subnet."

Directly-Connected Shared Subnet: Example 1

In this example, the answers to the three pre-deployment questions are:

  1. From which DHCP server will DTUs on this subnet get their basic IP networking parameters?

  2. From the Sun Ray server.

  3. From which DHCP server will DTUs on this subnet get additional configuration parameters to support features such as firmware download?

  4. From the Sun Ray server.

  5. How will DTUs on this subnet locate their Sun Ray server?

  6. The DTUs will be informed of the location of the Sun Ray server through an additional configuration parameter delivered in Step 2.

  1. Configure the Sun Ray server to provide both basic and additional parameters to the shared subnet.

  2. DHCP service for DTUs on a shared subnet is configured through the utadm -A subnet command. In this example, the shared subnet has network number 130.146.59.0, so the appropriate command is utadm -A 130.146.59.0:

    # /opt/SUNWut/sbin/utadm -A 130.146.59.0
     Selected values for subnetwork "130.146.59.0"
      net mask:         255.255.255.0
      no IP addresses offered
      auth server:        130.146.59.5
      firmware server:      130.146.59.5
      router:          130.146.59.1  
      alternate servers:
     Accept as is? ([Y]/N): n
     netmask: 255.255.255.0 (cannot be changed - system defined netmask)
     Do you want to offer IP addresses for this subnet? (Y/[N]): y
     new first Sun Ray address: [130.146.59.4] 130.146.59.200
     number of Sun Ray addresses to allocate: [55] 20
     new auth server:      [130.146.59.5] 
     new firmware server:    [130.146.59.5] 
     new router:        [130.146.59.1] 
    Specify alternate server list? (Y/[N]): 
     Selected values for subnetwork "130.146.59.0"
      net mask:        255.255.255.0
      first unit address:   130.146.59.200
      last unit address:    130.146.59.219
      auth server:       130.146.59.5
      firmware server:     130.146.59.5
      router:         130.146.59.1 
      alternate servers:
     Accept as is? ([Y]/N): 
    ### Building network tables - this will take a few minutes
    ### Configuring firmware version for Sun Ray
      All the units served by "helios" on the 130.146.59.0
      network interface, running firmware other than version
      "2.0_37.b,REV=2002.12.19.07.46" will be upgraded at  
      their next power-on.
    ### Configuring Sun Ray Logging Functions
    ### stopped DHCP daemon
    ### started DHCP daemon
    #

    The default values initially suggested by utadm were not appropriate. Specifically, this server would not have offered any IP addresses on the 130.146.59.0 subnet because utadm assumes that basic networking parameters, including IP addresses, are provided by some external DHCP service when the DTU is located on a shared subnet. In this example, however, the Sun Ray server is required to provide IP addresses, so the administrator replied n to the first Accept as is? prompt and was given the opportunity to provide alternative values for the various parameters. Twenty IP addresses, starting at 130.146.59.200, were made available for allocation to DHCP clients on this subnet.

  3. Restart Sun Ray services on the Sun Ray server.

  4. Once the utadm command has completed, issue a utrestart command to fully activate Sun Ray services on the shared subnet:

    # /opt/SUNWut/sbin/utrestart
    Resetting servers... messages will be logged to /var/opt/SUNWut/log/messages.

Directly-Connected Shared Subnet: Example 2

In this example, the answers to the three pre-deployment questions are:

  1. From which DHCP server will DTUs on this subnet get their basic IP networking parameters?

  2. From an external DHCP service.

    From which DHCP server will DTUs on this subnet get additional configuration parameters to support features such as firmware download?

    The DTUs will not be supplied with additional parameters.

  3. How will DTUs on this subnet locate their Sun Ray server?

  4. By using the local subnet broadcast discovery mechanism.

    In this example, the Sun Ray server does not participate in DTU initialization at all. Why, then, are configuration steps required on the Sun Ray server? The Sun Ray server responds by default only to DTUs located on directly connected dedicated interconnects. It responds to DTUs on shared subnets only if the utadm -L on command has been executed. Running the utadm -A subnet command to activate DHCP on the Sun Ray server for a shared subnet, as in this example, implicitly executes utadm -L on. If utadm -A subnet has not been run, the administrator must run utadm -L on manually to allow the server to offer sessions to DTUs on the shared subnet.

  1. Configure the external DHCP service.

  2. Determining how to configure the external DHCP infrastructure to provide basic networking parameters to the DTUs on this subnet is beyond the scope of this document. Bear in mind:

    • If the external DHCP service does not have its own direct connection to this subnet, the administrator must configure a DHCP Relay Agent to deliver DHCP traffic on this subnet to the external DHCP service. The most likely location for such a Relay Agent would be on a router in this subnet, in this case the router named r22-59 in FIGURE 2. For a brief introduction to this topic refer to "DHCP Relay Agent" on page 4.

    • An existing external DHCP service may need to have its IP address allocation for this subnet increased in order to support the new DTUs. (This applies whenever additional DHCP clients are placed on a subnet.) It might also be desirable to reduce the lease time of addresses on this subnet so that addresses become eligible for reuse quickly.

  3. Configure the Sun Ray server to accept DTU connections from shared subnets.

  4. Run utadm -L on:

    # /opt/SUNWut/sbin/utadm -L on
    ### Turning on Sun Ray LAN connection
    NOTE: utrestart must be run before LAN connections will be allowed
  5. Restart Sun Ray services on the Sun Ray server.

  6. Once the utadm command has completed, issue a utrestart command to fully activate Sun Ray services on the shared subnet:

    # /opt/SUNWut/sbin/utrestart
    Resetting servers... messages will be logged to /var/opt/SUNWut/log/messages.

Deployment on a Remote Subnet

Subnets C and D in FIGURE 2 are remote shared subnets.

Subnet C uses IP addresses in the range 130.146.22.0/24. Subnet D uses IP addresses in the range 130.146.71.0/24. The Sun Ray server named helios has no direct attachment to either of these subnets; it is this characteristic that defines them as remote. The answers to the three pre-deployment questions are:

  1. From which DHCP server will DTUs on this subnet get their basic IP networking parameters?

  2. In a shared subnet scenario, the administrator must choose whether a DHCP service on the Sun Ray server or some external DHCP service will provide the DTU with basic network parameters.

    If the enterprise already has a DHCP infrastructure that covers this subnet, it probably supplies basic network parameters. If no such infrastructure exists, configure the Sun Ray server to provide basic network parameters.

  3. From which DHCP server will DTUs on this subnet get additional configuration parameters to support features such as firmware download?

  4. The administrator must choose whether additional configuration parameters will be supplied to the DTU, and if so whether they will be supplied by a DHCP service on the Sun Ray server or by some external DHCP service.

    Administrators of an established DHCP infrastructure may be unable or unwilling to reconfigure it to provide additional Sun Ray configuration parameters, so it is usually more convenient to have the Sun Ray server provide them.

    Even when the established infrastructure is capable of delivering the additional parameters, it may be desirable to have the Sun Ray server provide them. This enables you to use Sun Ray Server Software commands to manage the values of the additional configuration parameters, when those values need to be changed in response to software upgrades or patch installations on the Sun Ray server. For instance, a patch that delivers new DTU firmware could automatically update the firmware version string delivered to the DTU. However, if the firmware version parameter is supplied by some external DHCP service, an administrator must manually edit the firmware version parameter string in the external DHCP configuration rules to reflect the new firmware version delivered by the patch. This kind of activity is time-consuming and error-prone as well as unnecessary.

  5. How will DTUs on this subnet locate their Sun Ray server?

  6. Use one of the optional additional configuration parameters to report the location of the Sun Ray server to the DTU. If additional configuration parameters are not supplied to the DTU at all, the DTU cannot locate a Sun Ray server, so it tries to discover the location of a Sun Ray server by using a broadcast-based mechanism. However, the DTUs broadcast packets propagate only on the local subnet; they cannot reach a Sun Ray server located on a remote subnet, and cannot establish contact.

    The next two examples illustrate representative remote shared subnet configurations. In the first example, an external DHCP service provides basic networking parameters, and the Sun Ray server provides additional parameters. This is by far the most likely configuration for a Sun Ray deployment in an enterprise that has an established DHCP infrastructure.

    In the second example, basic networking parameters and a bare minimum of additional parameters—just enough to enable the DTU to contact a Sun Ray server—are supplied by an external DHCP. In this case, it is the DHCP service in a Cisco router. This scenario is less than ideal.

    No firmware parameters are delivered to the DTU, so it cannot download new firmware. The administrator must make some other arrangement to provide the DTU with new firmware, for instance, by rotating it off this subnet periodically onto an interconnect or onto some other shared subnet where a full set of additional configuration parameters is offered.

    NOTE

    For examples of shared subnet deployments in which both basic networking parameters and additional parameters are delivered by the Sun Ray server and basic networking parameters are supplied by an external DHCP service (with no additional DTU parameters provided), see "Directly-Connected Shared Subnet" on page 6.

Remote Shared Subnet: Example 1

In this example, in which DTUs are deployed on subnet C in FIGURE 2, the answers to the three pre-deployment questions are:

  1. From which DHCP server will DTUs on this subnet get their basic IP networking parameters?

  2. From an external DHCP service.

  3. From which DHCP server will DTUs on this subnet get additional configuration parameters to support features such as firmware download?

  4. From the Sun Ray server.

  5. How will DTUs on this subnet locate their Sun Ray server?

  6. The DTUs will be informed of the location of the Sun Ray server through an additional configuration parameter delivered in Step 2.

    Use the utadm -A subnet command as follows to configure DHCP service for DTUs on a shared subnet.

  1. Configure the External DHCP Service.

  2. Determining how to configure the external DHCP infrastructure to provide basic networking parameters to the DTUs on this subnet is beyond the scope of this document. Bear in mind:

    • If the external DHCP service does not have its own direct connection to this subnet, the administrator must configure a DHCP Relay Agent to deliver DHCP traffic on this subnet to the external DHCP service. The most likely location for such a Relay Agent would be on a router in this subnet, in this case the router named r22-59 in FIGURE 2. For a brief introduction to this topic refer to "DHCP Relay Agent" on page 4.

    • An existing external DHCP service may need to have its IP address allocation increased for this subnet to support the new DTUs. (This applies whenever additional DHCP clients are placed on a subnet.) It might also be desirable to reduce the lease time of addresses on this subnet so that addresses become eligible for re-use quickly.

  3. Arrange to Deliver DHCP Traffic to the Sun Ray Server.

  4. Because the Sun Ray server does not have its own direct connection to this subnet, the administrator must configure a DHCP Relay Agent to deliver the subnet's DHCP traffic to the Sun Ray server. The most likely location for such a Relay Agent would be on a router in this subnet, in this case the router named r22-59 in FIGURE 2. For a brief introduction to this topic refer to "DHCP Relay Agent" on page 4.

    If r22-59 is running the Cisco IOS, the ip helper-address command can be used to activate its DHCP Relay Agent to relay DHCP broadcasts from its 10/100 Ethernet port number 4 to the Sun Ray server at 130.146.59.5.

    r22-59> interface fastethernet 4
    r22-59> ip helper-address 130.146.59.5
    r22-59>

    If the external DHCP service also lacks a connection to this subnet, configure a DHCP Relay Agent to forward requests from the DTU to:

    • The external DHCP service (so that the DTU can obtain basic networking parameters)

    • The DHCP service on the Sun Ray server (so that the DTU can obtain additional parameters)

    The Cisco IOS ip helper-address command accepts multiple relay destination addresses, so if, for instance, the external DHCP service could be contacted at 130.146.59.2 on subnet B in FIGURE 2, the appropriate sequence would be:

    r22-59> interface fastethernet 4
    r22-59> ip helper-address 130.146.59.2 130.146.59.5
    r22-59>

    NOTE

    Details of the IOS interaction vary according to the specific release of IOS, the model of the router, and the hardware installed in the router.

  5. Configure the Sun Ray server to provide additional parameters to the shared subnet.

  6. Use the utadm -A subnet command to configure DHCP service for DTUs on a shared subnet. In this example, the shared subnet has network number 130.146.22.0, so the appropriate command is utadm -A 130.146.22.0.

    # /opt/SUNWut/sbin/utadm -A 130.146.22.0
     Selected values for subnetwork "130.146.22.0"
      net mask:       255.255.255.0
      no IP addresses offered
      auth server:      130.146.59.5
      firmware server:    130.146.59.5
      router:        130.146.22.1
      alternate servers:
    Accept as is? ([Y]/N): n
    new netmask:[255.255.255.0] 
    Do you want to offer IP addresses for this subnet? (Y/[N]): 
    new auth server:[130.146.59.5] 
    new firmware server:[130.146.59.5] 
    new router: [130.146.22.1] 130.146.22.6
    Specify alternate server list? (Y/[N]): 
    Selected values for subnetwork "130.146.59.0"
      net mask:       255.255.255.0
      no IP addresses offered
      auth server:      130.146.59.5  
      firmware server:    130.146.59.5
      router:        130.146.22.6
      alternate servers:
    Accept as is? ([Y]/N): 
    ### Building network tables - this will take a few minutes
    ### Configuring firmware version for Sun Ray
    All the units served by "helios" on the 130.146.22.0
    network interface, running firmware other than version
    "2.0_37.b,REV=2002.12.19.07.46" will be upgraded at their
    next power-on.
    ### Configuring Sun Ray Logging Functions
    ### stopped DHCP daemon
    ### started DHCP daemon
    #

    In this example, the default values initially suggested by utadm were not appropriate. Specifically, the default router address to be used by DTUs on this subnet was not correct because utadm guesses that the address of the default router for any shared subnet will have a host part equal to 1. This was a great guess for the directly-connected subnet B in FIGURE 2, but it is not correct for subnet C.

    The appropriate router address for DTUs on this subnet is 130.146.22.6 (port 4 of router r22-59), so the administrator replied n to the first Accept as is? prompt and was given the opportunity to provide alternative values for the various parameters.

  7. Restart Sun Ray services on the Sun Ray server.

  8. Once the utadm command has completed, issue a utrestart command to fully activate Sun Ray services on the shared subnet:

    # /opt/SUNWut/sbin/utrestart
    Resetting servers... messages will be logged to /var/opt/SUNWut/log/messages.

Remote Shared Subnet: Example 2

In this example, deploying DTUs on subnet D in FIGURE 2, the answers to the three pre-deployment questions are:

  1. From which DHCP server will DTUs on this subnet get their basic IP networking parameters?

  2. From an external DHCP service.

  3. From which DHCP server will DTUs on this subnet get additional configuration parameters to support features such as firmware download?

  4. The DTUs will not be supplied with the additional parameters required to support firmware download or to activate other advanced DTU features.

  5. How will DTUs on this subnet locate their Sun Ray server?

  6. The external DHCP service will supply a single additional parameter to inform the DTU of the location of a Sun Ray server.

In this example, the Sun Ray server does not participate in DTU initialization at all. Why, then, are configuration steps required on the Sun Ray server? The Sun Ray server responds by default only to DTUs located on directly connected dedicated interconnects. It responds to DTUs on shared subnets only if the utadm -L on command has been executed. Running the utadm -A subnet command to activate DHCP on the Sun Ray server for a shared subnet, as in this example, implicitly executes utadm -L on. If utadm -A subnet has not been run, the administrator must run utadm -L on manually to allow the server to offer sessions to DTUs on the shared subnet.

  1. Configure the External DHCP Service.

  2. Determining how to configure the external DHCP infrastructure to provide basic networking parameters to the DTUs on this subnet is beyond the scope of this document. However, for this example, assume that DHCP service is provided by Cisco IOS-based router r22-71 in FIGURE 2, attached to the 130.146.71.0 subnet through its 10/100 Ethernet port 3. This router can be configured to provide basic networking parameters and the location of a Sun Ray server as follows:

    r22-71> interface fastethernet 3
    r22-71> ip dhcp excluded-address 130.146.71.1 130.146.71.15
    r22-71> ip dhcp pool CLIENT
    r22-71/dhcp> import all
    r22-71/dhcp> network 130.146.71.0 255.255.255.0
    r22-71/dhcp> default-router 130.146.71.4
    r22-71/dhcp> option 49 ip 130.146.59.5
    r22-71/dhcp> lease 0 2
    r22-71/dhcp> ^Z
    r22-71>

    NOTE

    Details of the IOS interaction vary according to the specific release of IOS, the model of router and the hardware installed in the router.

    DHCP option 49, the standard option of the X Window Display Manager, identifies 130.146.59.5 as the address of a Sun Ray server. In the absence of AltAuth and Auth-Srvr vendor-specific options, the DTU tries to find a Sun Ray server by broadcasting on the local subnet. If the broadcasts evoke no response, the DTU uses the address supplied in t option of the X Window Display Manager—provided that the DTU contains firmware at Sun Ray Server Software 2.0 patch level 114880-01 or greater.

    NOTE

    This is an unorthodox use of the option of the X Window Display Manager, but in a remote subnet deployment where vendor-specific options can not be delivered, it may be the only way of putting a DTU in touch with a server.

  3. Configure the Sun Ray server to accept DTU connections from shared subnets by running utadm -L on.

  4. # /opt/SUNWut/sbin/utadm -L on
    ### Turning on Sun Ray LAN connection
    NOTE: utrestart must be run before LAN connections will be allowed
    #
  5. Restart Sun Ray services on the Sun Ray server.

  6. Once the utadm command has completed, issue a utrestart command to fully activate Sun Ray services on the shared subnet:

    # /opt/SUNWut/sbin/utrestart
    Resetting servers... messages will be logged to /var/opt/SUNWut/log/
    messages.
    #

    TABLE 2 lists the vendor-specific DHCP options that Sun Ray defines and uses.

    TABLE 2 Vendor-specific DHCP Options

    Parameter Name

    Client Class

    Option Code

    Data Type

    Optional/

    Mandatory

    Granularity

    Max Count

    Comments

    AltAuth

    SUNW.NewT.SUNW

    35

    IP

    Optional

    1

    0

    List of Sun Ray server IP addresses

    AuthSrvr

    SUNW.NewT.SUNW

    21

    IP

    Mandatory

    1

    1

    Single Sun Ray server IP addresses

    AuthPort

    SUNW.NewT.SUNW

    22

    NUMBER

    Optional

    2

    1

    Sun Ray server port

    NewTVer

    SUNW.NewT.SUNW

    23

    ASCII

    Optional

    1

    0

    Desired firmware version

    FWSrvr

    SUNW.NewT.SUNW

    31

    IP

    Optional

    1

    1

    Firmware TFTP server IP address

    BarrierLevel

    SUNW.NewT.SUNW

    36

    NUMBER

    Mandatory

    4

    1

    Firmware Download:

    barrier level

    LogHost

    SUNW.NewT.SUNW

    24

    IP

    Optional

    1

    1

    Syslog server IP address

    LogKern

    SUNW.NewT.SUNW

    25

    NUMBER

    Optional

    1

    1

    Log level for kernel

    LogNet

    SUNW.NewT.SUNW

    26

    NUMBER

    Optional

    1

    1

    Log level for network

    LogUSB

    SUNW.NewT.SUNW

    27

    NUMBER

    Optional

    1

    1

    Log level for USB

    LogVid

    SUNW.NewT.SUNW

    28

    NUMBER

    Optional

    1

    1

    Log level for video

    LogAppl

    SUNW.NewT.SUNW

    28

    NUMBER

    Optional

    1

    1

    Sun Rat server interface name

    Intf

    SUNW.NewT.SUN

    29

    ASCII

    Optional

    1

    0

    Sun Ray server interface name

    NewTBW

     

    30

    NUMBER

    Optional

    4

    1

    Bandwidth cap

    NewTDispIndx

    SUNW.NewT.SUNW

    32

    NUMBER

    Optional

    4

    1

    Obsolete. Do not use.

    NewTFlags

    SUNW.NewT.SUNW

    34

    NUMBER

    Optional

    4

    1

    Obsolete. Do not use.


    The DTU can perform its basic functions even if none of these options are delivered during initialization, but some advanced DTU features do not become active unless certain options are delivered to the DTU. In particular:

    • AltAuth and AuthSrvr indicate the IP addresses of Sun Ray servers. Addresses in the AltAuth list are tried in order until a connection is established. Current firmware ignores AuthSrvr if AltAuth is provided, but it is good practice always to specify AuthSrvr for the benefit of old (pre Sun Ray Server Software 1.3) firmware, which does not understand the AltAuth option. If neither of these options is supplied, the DTU tries to locate a Sun Ray server by sending broadcasts on the local subnet. If the DTU contains firmware at Sun Ray Server Software 2.0 patch level 114880-01 or greater, it resorts to trying to contact a Sun Ray server at the address supplied in the option of the X Window Display Manager if that option has been provided.

    • NewTVer and FWSrvr must both be provided in order for the DTU to attempt a firmware download. NewTVer contains the name of the firmware version that the DTU should use. If this name does not match the name of the firmware version that the DTU is actually running, the DTU tries to download the desired firmware from a TFTP server at the address given by FWSrvr.

    • LogHost must be specified in order for the DTU to report messages through the syslog protocol. Reporting thresholds for major DTU subsystems are controlled by the LogKern, LogNet, LogUSB, LogVid, and LogAppl options.

    NOTE

    The message formats, contents, and thresholds are intended for use only by service personnel and are not documented intentionally.

    The DHCP Client Class name for all Sun Ray vendor-specific options is SUNW.NewT.SUNW. The DTU cites this name in DHCP requests so that the server can respond with the appropriate set of vendor-specific options. This mechanism guarantees that the DTU is not given vendor options defined for some other type of equipment and that other equipment is not given options that are meaningful only to the DTU.

InformIT Promotional Mailings & Special Offers

I would like to receive exclusive offers and hear about products from InformIT and its family of brands. I can unsubscribe at any time.

Overview


Pearson Education, Inc., 221 River Street, Hoboken, New Jersey 07030, (Pearson) presents this site to provide information about products and services that can be purchased through this site.

This privacy notice provides an overview of our commitment to privacy and describes how we collect, protect, use and share personal information collected through this site. Please note that other Pearson websites and online products and services have their own separate privacy policies.

Collection and Use of Information


To conduct business and deliver products and services, Pearson collects and uses personal information in several ways in connection with this site, including:

Questions and Inquiries

For inquiries and questions, we collect the inquiry or question, together with name, contact details (email address, phone number and mailing address) and any other additional information voluntarily submitted to us through a Contact Us form or an email. We use this information to address the inquiry and respond to the question.

Online Store

For orders and purchases placed through our online store on this site, we collect order details, name, institution name and address (if applicable), email address, phone number, shipping and billing addresses, credit/debit card information, shipping options and any instructions. We use this information to complete transactions, fulfill orders, communicate with individuals placing orders or visiting the online store, and for related purposes.

Surveys

Pearson may offer opportunities to provide feedback or participate in surveys, including surveys evaluating Pearson products, services or sites. Participation is voluntary. Pearson collects information requested in the survey questions and uses the information to evaluate, support, maintain and improve products, services or sites, develop new products and services, conduct educational research and for other purposes specified in the survey.

Contests and Drawings

Occasionally, we may sponsor a contest or drawing. Participation is optional. Pearson collects name, contact information and other information specified on the entry form for the contest or drawing to conduct the contest or drawing. Pearson may collect additional personal information from the winners of a contest or drawing in order to award the prize and for tax reporting purposes, as required by law.

Newsletters

If you have elected to receive email newsletters or promotional mailings and special offers but want to unsubscribe, simply email information@informit.com.

Service Announcements

On rare occasions it is necessary to send out a strictly service related announcement. For instance, if our service is temporarily suspended for maintenance we might send users an email. Generally, users may not opt-out of these communications, though they can deactivate their account information. However, these communications are not promotional in nature.

Customer Service

We communicate with users on a regular basis to provide requested services and in regard to issues relating to their account we reply via email or phone in accordance with the users' wishes when a user submits their information through our Contact Us form.

Other Collection and Use of Information


Application and System Logs

Pearson automatically collects log data to help ensure the delivery, availability and security of this site. Log data may include technical information about how a user or visitor connected to this site, such as browser type, type of computer/device, operating system, internet service provider and IP address. We use this information for support purposes and to monitor the health of the site, identify problems, improve service, detect unauthorized access and fraudulent activity, prevent and respond to security incidents and appropriately scale computing resources.

Web Analytics

Pearson may use third party web trend analytical services, including Google Analytics, to collect visitor information, such as IP addresses, browser types, referring pages, pages visited and time spent on a particular site. While these analytical services collect and report information on an anonymous basis, they may use cookies to gather web trend information. The information gathered may enable Pearson (but not the third party web trend services) to link information with application and system log data. Pearson uses this information for system administration and to identify problems, improve service, detect unauthorized access and fraudulent activity, prevent and respond to security incidents, appropriately scale computing resources and otherwise support and deliver this site and its services.

Cookies and Related Technologies

This site uses cookies and similar technologies to personalize content, measure traffic patterns, control security, track use and access of information on this site, and provide interest-based messages and advertising. Users can manage and block the use of cookies through their browser. Disabling or blocking certain cookies may limit the functionality of this site.

Do Not Track

This site currently does not respond to Do Not Track signals.

Security


Pearson uses appropriate physical, administrative and technical security measures to protect personal information from unauthorized access, use and disclosure.

Children


This site is not directed to children under the age of 13.

Marketing


Pearson may send or direct marketing communications to users, provided that

  • Pearson will not use personal information collected or processed as a K-12 school service provider for the purpose of directed or targeted advertising.
  • Such marketing is consistent with applicable law and Pearson's legal obligations.
  • Pearson will not knowingly direct or send marketing communications to an individual who has expressed a preference not to receive marketing.
  • Where required by applicable law, express or implied consent to marketing exists and has not been withdrawn.

Pearson may provide personal information to a third party service provider on a restricted basis to provide marketing solely on behalf of Pearson or an affiliate or customer for whom Pearson is a service provider. Marketing preferences may be changed at any time.

Correcting/Updating Personal Information


If a user's personally identifiable information changes (such as your postal address or email address), we provide a way to correct or update that user's personal data provided to us. This can be done on the Account page. If a user no longer desires our service and desires to delete his or her account, please contact us at customer-service@informit.com and we will process the deletion of a user's account.

Choice/Opt-out


Users can always make an informed choice as to whether they should proceed with certain services offered by InformIT. If you choose to remove yourself from our mailing list(s) simply visit the following page and uncheck any communication you no longer want to receive: www.informit.com/u.aspx.

Sale of Personal Information


Pearson does not rent or sell personal information in exchange for any payment of money.

While Pearson does not sell personal information, as defined in Nevada law, Nevada residents may email a request for no sale of their personal information to NevadaDesignatedRequest@pearson.com.

Supplemental Privacy Statement for California Residents


California residents should read our Supplemental privacy statement for California residents in conjunction with this Privacy Notice. The Supplemental privacy statement for California residents explains Pearson's commitment to comply with California law and applies to personal information of California residents collected in connection with this site and the Services.

Sharing and Disclosure


Pearson may disclose personal information, as follows:

  • As required by law.
  • With the consent of the individual (or their parent, if the individual is a minor)
  • In response to a subpoena, court order or legal process, to the extent permitted or required by law
  • To protect the security and safety of individuals, data, assets and systems, consistent with applicable law
  • In connection the sale, joint venture or other transfer of some or all of its company or assets, subject to the provisions of this Privacy Notice
  • To investigate or address actual or suspected fraud or other illegal activities
  • To exercise its legal rights, including enforcement of the Terms of Use for this site or another contract
  • To affiliated Pearson companies and other companies and organizations who perform work for Pearson and are obligated to protect the privacy of personal information consistent with this Privacy Notice
  • To a school, organization, company or government agency, where Pearson collects or processes the personal information in a school setting or on behalf of such organization, company or government agency.

Links


This web site contains links to other sites. Please be aware that we are not responsible for the privacy practices of such other sites. We encourage our users to be aware when they leave our site and to read the privacy statements of each and every web site that collects Personal Information. This privacy statement applies solely to information collected by this web site.

Requests and Contact


Please contact us about this Privacy Notice or if you have any requests or questions relating to the privacy of your personal information.

Changes to this Privacy Notice


We may revise this Privacy Notice through an updated posting. We will identify the effective date of the revision in the posting. Often, updates are made to provide greater clarity or to comply with changes in regulatory requirements. If the updates involve material changes to the collection, protection, use or disclosure of Personal Information, Pearson will provide notice of the change through a conspicuous notice on this site or other appropriate way. Continued use of the site after the effective date of a posted revision evidences acceptance. Please contact us if you have questions or concerns about the Privacy Notice or any objection to any revisions.

Last Update: November 17, 2020