欢迎访问ic37.com |
会员登录 免费注册
发布采购

4450HG/3-K 参数 Datasheet PDF下载

4450HG/3-K图片预览
型号: 4450HG/3-K
PDF下载: 下载PDF文件 查看货源
内容描述: [Microprocessor, CMOS, PBGA324, ROHS COMPLIANT, HSBGA-324]
分类和应用: 外围集成电路
文件页数/大小: 92 页 / 780 K
品牌: EXAR [ EXAR CORPORATION ]
 浏览型号4450HG/3-K的Datasheet PDF文件第20页浏览型号4450HG/3-K的Datasheet PDF文件第21页浏览型号4450HG/3-K的Datasheet PDF文件第22页浏览型号4450HG/3-K的Datasheet PDF文件第23页浏览型号4450HG/3-K的Datasheet PDF文件第25页浏览型号4450HG/3-K的Datasheet PDF文件第26页浏览型号4450HG/3-K的Datasheet PDF文件第27页浏览型号4450HG/3-K的Datasheet PDF文件第28页  
4.2 4450 Packet Processing Operation  
Inbound packets arrive over the network-side GMAC interface typically connected to the  
PHY device. The packet's payload is buffered and the DPU classifies the header as being  
IPsec and/or IPcomp and uses the SPI, protocol, destination address, ethernet interface,  
and VLAN ID to look-up the SA. Upon successful look-up, the DPU forwards the SA  
information along with the packet to the crypto algorithm processors. The DPU then  
performs the anti-replay check, and a post-crypto inbound policy check. The DPU then  
updates the SA with adjusted sequence numbers and packet/byte counters. The decoded  
packet is then egressed out the host GMAC port typically connected to the host subsystem.  
IPsec/ IPcomp  
Source & Dest IP address  
…)  
Protocol (TCP/UDP/ICMP  
Source & Dest  
VLAN tag  
Port numbers  
SAD  
Ethernet Channel # (0 or 1)  
RAM  
SA  
Fetch  
SA  
Lookup  
Crypto &  
Compression  
Processing  
Policy  
Lookup  
From  
Host  
To  
Network  
Outbound  
Inbound  
SA Mask  
Policy  
SAL  
200 SA’s  
On-chip  
SAL  
TCAM  
SA  
Lookup  
SA  
Fetch  
Crypto &  
Policy  
Selector  
To  
Host  
Decompression  
From  
Network  
Check  
Processing  
SAD = SA Database  
SAL = SA Lookup table  
TCAM = Ternary Content - Addressable Memory  
RAM  
SAD  
Figure 4-2. 4450 Processing Steps  
Any errors in this process are captured to the eSC processor (or optionally the host) for  
statistics logging. Non-IPsec packets are checked against the SPD policy database and  
either discarded or forwarded to the host MAC port, depending on policy. IPsec packet  
fragments are forwarded to the host side MAC port for off-chip reassembly. The  
reassembled packets are then returned via the outbound MAC port with appropriate  
messaging, and re-inserted for inbound IPsec processing. Optionally, packet reassembly  
may occur on-chip in the eSC processor.  
Outbound packets arrive over the Ethernet GMAC interface connected to the host-side  
media access (MAC) port. The packet's payload is buffered and the DPU performs a SPD  
policy look-up (based on the selectors defined for the security protocol), and then a SA  
look-up (based on the selectors defined for the security protocol), and checks the SA  
lifetime counters. The DPU also checks for exceptions and fragmentation. Upon successful  
4450 – Data Sheet, DS-0131-06  
Page24  
Hifn Confidential  
 复制成功!