System Management Homepage 6.2 User Guide

Session Timeout....................................................................................................................................68
UI Timeout...........................................................................................................................................68
Log Level..............................................................................................................................................68
Port 2301.............................................................................................................................................68
Multihomed certificate alternative names list.............................................................................................69
Custom UI............................................................................................................................................69
Log-based Directory...............................................................................................................................69
Configurable Logging............................................................................................................................69
Autostart Mode.....................................................................................................................................69
Httpd Error Log.....................................................................................................................................70
Icon View.............................................................................................................................................70
Box Order............................................................................................................................................70
Box Item Order.....................................................................................................................................70
Kerberos Authentication.........................................................................................................................70
User Groups.........................................................................................................................................71
Help message......................................................................................................................................71
File Based Command Line Interface.........................................................................................................71
Command Line Log Reader.....................................................................................................................72
SSL Cipher Suite Configuration...............................................................................................................73
13 Troubleshooting topics.............................................................................75
14 Service and Support................................................................................83
Support and other resources.........................................................................85
Intended Audience................................................................................................................................85
Publishing History.................................................................................................................................85
Typographic Conventions.......................................................................................................................85
Related Documents................................................................................................................................86
HP SMH documentation....................................................................................................................86
HP Encourages Your Comments..............................................................................................................87
A HP SMH file locations...............................................................................89
B HP SMH Ciphers......................................................................................91
Ciphers used in HP SMH.......................................................................................................................91
Glossary....................................................................................................93
Index.........................................................................................................99
Table of Contents 5