Dell Broadcom NetXtreme Family of Adapters User Manual

Page 59

Advertising
background image

Windows Driver and Management Application Installation: Broadcom NetXtreme II® Network Adapter User Guide

file:///C|/Users/Nalina_N_S/Documents/NetXtremeII/English/umwindrv.htm[9/5/2014 3:45:04 PM]

3. Under Computer Configuration, open the Administrative Templates folder and then open the Windows

Components folder.

4. Select Windows Remote Management (WinRM).
5. Under Windows Remote Management (WinRM), select WinRm Client.
6. Under WinRM Client, double-click Trusted Hosts.
7. In the TrustedHostsList, enter the host names of the clients. If all clients are trusted then enter an asterisk (*) only.
8. Select WinRM Service.
9. Enable Allow Basic Authentication.

10. Enable Allow unencrypted traffic.
11. Close the Group Policy wIndow.
12. From the command prompt, run the following command to configure WinRM with default settings:

winrm qc or winrm quickconfig

13. When the tool displays "Make these changes[y/n]?", enter "y".
14. Enter one of the following commands to check whether an HTTP listener is created:

winrm enumerate winrm/confg/listener

or

winrm e winrm/config/Listener

15. Enter the following command from the command prompt to test locally.

winrm id

Step 5: Perform HTTPS Configuration on the Server (to use HTTPS rather than HTTP)

This step consists of two distinct processes: generating a self-signed certificate, if certificate does not exist, and importing it
to a Windows server. If one does not already exist, you must configure a self-signed certificate on the Windows server to
enable HTTPS/SSL communication with the BACS GUI on the Windows client. The Windows client also must be configured with
the self-signed certificate. See

Perform HTTPS Configuration (if you plan to use HTTPS)

.

NOTE: The self-signed certificate can be created on any Windows server. The server does not require BACS to be installed.

The self-signed certificate generated on any Windows server should be copied on the local drive of client.

1. Click Start (or press the Windows logo key) and select Run.
2. Enter gpedit.msc to open the local Group Policy editor.
3. Under Computer Configuration, open the Administrative Templates folder and then open the Windows

Components folder.

4. Select Windows Remote Management (WinRM).
5. Under Windows Remote Management (WinRM), select WinRm Client.
6. Under WinRM Client, double-click Trusted Hosts.
7. In the TrustedHostsList, enter the host names of the clients. If all clients are trusted then enter an asterisk (*) only.
8. Select WinRM Service.
9. Enable Allow Basic Authentication.

To generate a self-signed certificate for the Windows Server:

Openssl on Windows can be used to generate the self-signed certificate, as follows:

NOTE: You can download and install openssl from

http://gnuwin32.sourceforge.net/packages/openssl.htm

.

1. Enter the following command to generate a private key:

openssl genrsa -des3 -out server.key 1024

2. You are prompted to enter a passphrase. Be sure to remember the passphrase.
3. Use the following steps to generate a Certificate Signing Request (CSR).

During the generation of the CSR, you are prompted for several pieces of information. When prompted for the
"Common Name", enter the Windows Server host name or IP address.

Enter the following command (sample responses are shown):

Advertising