HP Storage Essentials V5.00.01 installation guide (T4283-96011, January 2006)

Installing the CIM Extension for HP-UX132
Starting the CIM Extension Manually
The management server can only obtain information from this host when the CIM Extension is
running.
Keep in mind the following:
You must have root privileges to run the CIM Extension. The CIM Extension only provides the
information within the privileges of the user account that started the CIM Extension. Only root
has enough privileges to provide the information the management server needs. If you do not
start the CIM Extension with root privileges, the management server will display messages
resembling the following: Data is late or an error occurred.
To configure UNIX CIM Extensions to run behind a firewall, see ”Configuring UNIX CIM
Extensions to Run Behind Firewalls” on page 250.
To start the CIM Extension, type the following in the /opt/APPQcime/tools directory, where
/opt is the directory into which you installed the CIM Extension:
# ./start
The following is displayed:
Starting CIM Extension for HP-UX
..........
The CIM Extension is ready to be contacted by the management server when it displays a message
resembling the following:
Thu Sep 21 14:46:47 EDT xxxx
CXWS x.x.x.x on /192.168.1.5 now accepting connections
where
xxxx is the year.
x.x.x.x is the version of CIM Extension
192.168.1.5 is the IP address of the host
Keep in mind the following:
Depending on your terminal type and processor speed, the message, “CXWS x.x.x.x on
/192.168.1.5 now accepting connections,” may not display all the network interface
IPs on the host. Use the
/opt/APPQcime/tools/cxws.out file to view the output from the CIM Extension.
When you start the CIM Extension, you can restrict the user accounts that can discover the host.
You can also change the port number the CIM Extension uses. See the following topics for more
information. You can also access information about these topics by typing the following:
./start -help
Restricting the Users Who Can Discover the Host
The ./start -users user_name command provides greater security by restricting access.
When you use the management server to discover the host (Discovery > Setup), provide a user