readme.txt Driver File Contents (LAN_Broadcom_10.42_XPx86.zip)

Broadcom ASF Firmware v6.26 Installation/Configuration Instructions
-------------------------------------------------------------------

$Archive: /Source/BCM5700/asf/firmware/575x/Generic/readme.txt $
$Revision: 7 $
$Date: 3/31/05 1:14p $
$Author: Swindell $

This version of the ASF firmware uses a new packaging method that
requires b57diag version 7.20 (or later) to update the ASF firmware
in the adapter's NVRAM (using the "seprg -a" command).

This version of the ASF firmware requires b57diag version 7.13 (or later)
to configure the ASF configuration table (version 6) in the adapter's NVRAM.

Version 6 of the ASF firmware adds support for the ASF 2.0 specification.

This firmware only supports the following devices: BCM5750, 5751, 5752, 5753
and 5721, and only in LOM configurations. This firmware will run on a NIC
device, but some of the functionality will be absent, primarily due to the
controller losing power (and the shared memory being cleared) during a reset.


Background
----------
The ASF (Alert Standard Format) defines methods for remote management and
control of systems in OS-absent environments.

The Remote Management and Control Protocol (RMCP) defined as part of ASF 1.0
provided no security mechanisms to protect systems (managed clients) from
unauthorized remote management. A managed client listens for RMCP packets on
UDP port 26Fh (623).

ASF 2.0 introduced the RMCP Security-Extensions Protocol (RSP) to provide
authentication and integrity services for remote management. The secure RMCP
protocol defined in ASF 2.0 listens for secure RMCP packets on UDP port 298h
(664).


About ASF 2.0
-------------
There are 2 supported authenticated "session" types for ASF 2.0 remote
management: Operator and Administrator. The implication is that authenticated
Administrators may have more "rights" than authenticated Operators, but that
determination is actually made by the individual that configures the Security
Policy of the managed client (NIC). It's actually possible for an
Administrator to have fewer rights than an Operator, if the Security Policy
is configured as such.

Most RMCP messages can be sent to an ASF 2.0 managed client using a
"Bypass Session" which provides no authentication or integrity. However, the
potentially destructive RMCP commands (e.g. Reset, PowerDown, etc.) require
an authenticated session with the proper "rights" to send these commands.


You Will Need
-------------
ASF testing requires a minimum of two computers:

1. A managed client with an ASF-enabled Broadcom Ethernet adapter (only LOM
   controllers are officially supported by the ASF firmware). This PC should
   be tested in both OS-present and OS-absent states.

2. A management console with any Ethernet NIC, running ASF Management Console
   software (presumably on Windows).


Software You will need
-------------------
1. A version of b57diag built with Secure ASF support.
   You can verify this version by the existence of the "asfcfg" option after
   running b57diag with both the "-b57eng" and "-asfeng" options:

        ASF 2.0 (Secure RMCP)

2. ASF firmware v6.xx.

3. ASF Management Console (replacement for ASF NetMon), AsfMgmtCon.exe.
   To verify the receipt of PET packets, this application requires Windows
   SNMP Services be installed and running.

4. An ASF configuration application (i.e. ASFConfig.exe, ASFSCfg.exe/asfscfg)
   installed on the managed client.

5. The Broadcom ASF IP Monitor service (aka ASFIpMon) installed on the 
   managed client.


Installation
------------
Program the ASF firmware with the b57diag "seprg -a<filename>" command.
Example: "seprg -aa25721c6.26"


Manual Configuration
--------------------
Run "b57diag -shasta -b57eng -asfeng" on the managed client and use the 
"asfcfg" command to:

1. Set the NIC (client) IP address and the IP address of the management
   console.

2. Enable the RMCP, PET, and Heartbeat options.

3. Enable ASF 2.0 (Secure RMCP), set the Keys to the desired secret
   (password) strings. You can have different Keys for operators and
   administrators (the equivalent of different passwords), but both
   session types use the same Generation Key.

4. Set the Operator and Administrator Rights values to the desired bit mask
   (0x0-0xf), allowing any combination of the following commands to be sent
   from an authenticated management console: PowerUp, Reset, ResetPower,
   PowerDown. These values determine the Security Policy for the managed
   client.

5. Enable ASF in option 24 of the b57diag "secfg" command menu, or use the
   "setasf -e" command to enable this option more easily.

6. Reset the controller to execute the ASF firmware.


Automatic Configuration
-----------------------
The preferred/official method of ASF configuration is to use an ASF
Configuration program which will import the system's ASF! description table
(using the ACPI System Description Table architecture). The system's IP
address will be configured automatically by the ASF IP Monitor service. Other
parameters like the management console IP address and security-related
parameters must still be configured manually (using either b57diag or one of
the ASF configuration applications).

See the documentation for ASFIpMon (Windows or Linux), ASFConfig (Windows
only), or ASFSilentConfig (Windows or Linux) for more details.


Operation
---------
Run AsfMgmtCon on the managment console. Check the "Secure Management"
checkbox if you wish to use/test secure management operation.

Under the "Security" tab, select a "User Role" (Administrator or Operator)
and set the Key values to match the corresponding Key values configured on
the managed client.

You should now be able to click the "Authenticate" button (on either the
"Manage" or "Security" tabs) to authenticate the management console with the
managed client. The "End Session" button should become active on the 
"Security" tab indicating you have been successfully authenticated. If the 
authentication fails, you can check the log output in the "Manage" tab for 
detailed dumps of the authentication packet exchange. Error messages are
prefixed with exclamation marks ('!').

After successful authentication, you should be able to "Ping" the managed
client and send remote control commands (i.e. Reset, PowerUp, PowerDown, 
PowerReset) using the "Send" button or the convenient tool bar buttons on
on the "Manage" tab. The effect of the remote control commands depends on the
ASF compatibility of the managed client platform and the SMBus configuration.

All other RMCP commands (e.g. Ping, Capabilities Request, System State
Request) may be sent without prior authentication. If the "Secure Management"
checkbox is not checked on the "Manage" tab, AsfMgmtCon will operate in ASF
1.0 compatibility mode.

/* End-of-file */                                                                       
Download Driver Pack

How To Update Drivers Manually

After your driver has been downloaded, follow these simple steps to install it.

  • Expand the archive file (if the download file is in zip or rar format).

  • If the expanded file has an .exe extension, double click it and follow the installation instructions.

  • Otherwise, open Device Manager by right-clicking the Start menu and selecting Device Manager.

  • Find the device and model you want to update in the device list.

  • Double-click on it to open the Properties dialog box.

  • From the Properties dialog box, select the Driver tab.

  • Click the Update Driver button, then follow the instructions.

Very important: You must reboot your system to ensure that any driver updates have taken effect.

For more help, visit our Driver Support section for step-by-step videos on how to install drivers for every file type.

server: web4, load: 0.94