HP Integrity iLO 2 Operations Guide
Table Of Contents
- HP Integrity iLO 2 Operations Guide
- Contents
- About This Document
- 1 Introduction to iLO 2
- Features
- Standard Features
- Always-On Capability
- Virtual Front Panel
- Multiple Access Methods
- Security
- User Access Control
- Multiple Users
- IPMI over LAN
- System Management Homepage
- Firmware Upgrades
- Internal Subsystem Information
- DHCP and DNS Support
- Group Actions
- Group Actions Using HP SIM
- SNMP
- SMASH
- SM CLP
- Mirrored Console
- Remote Power Control
- Power Regulation
- Event Logging
- Advanced Features
- Standard Features
- Obtaining and Activating iLO 2 Advanced Pack Licensing
- Supported Systems and Required Components and Cables
- Integrity iLO 2 Supported Browsers and Client Operating Systems
- Security
- Features
- 2 Ports and LEDs
- 3 Getting Connected to iLO 2
- 4 Logging In to iLO 2
- 5 Adding Advanced Features
- Lights-Out Advanced KVM Card for sx2000 Servers
- Lights-Out Advanced KVM card Requirements
- Configuring the Lights-Out Advanced KVM Card
- Lights-Out Advanced KVM Card IRC Feature
- Lights-Out Advanced KVM Card vMedia Feature
- Installing the Lights-Out Advanced KVM Card in a Server
- Lights-Out Advanced KVM Card Quick Setup Steps
- Using Lights-Out Advanced KVM Features
- Mid Range PCI Backplane Power Behavior
- Troubleshooting the Lights-Out Advanced KVM Card
- Core I/O Card Configurations
- Supported PCI-X Slots
- Upgrading the Lights-Out Advanced KVM Card Firmware
- Lights-Out Advanced KVM Card for sx2000 Servers
- 6 Accessing the Host (Operating System) Console
- 7 Configuring DHCP, DNS, LDAP, and Schema-Free LDAP
- 8 Using iLO 2
- Text User Interface
- MP Command Interfaces
- MP Main Menu
- MP Main Menu Commands
- CO (Console): Leave the MP Main Menu and enter console mode
- VFP (Virtual Front Panel): Simulate the display panel
- CM (Command Mode): Enter command mode
- SMCLP (Server Management Command Line Protocol): Switch to the SMASH SMCLP
- CL (Console Log): View the history of the console output
- SL (Show Logs): View events in the log history
- HE (Help): Display help for the menu or command in the MP Main Menu
- X (Exit): Exit iLO 2
- MP Main Menu Commands
- Command Menu
- Command Line Interface Scripting
- Command Menu Commands and Standard Command Line Scripting Syntax
- BP: Reset BMC passwords
- BLADE: Display BLADE parameters
- CA: Configure asynchronous local serial port
- DATE: Display date
- DC (Default Configuration): Reset all parameters to default configurations
- DF: Display FRU information
- DI: Disconnect LAN, WEB, SSH, or Console
- DNS: DNS settings
- FW: Upgrade the MP firmware
- HE: Display help for menu or command in command menu interface
- ID: System information settings
- IT: Inactivity timeout settings
- LC: LAN configuration usage
- LDAP: LDAP directory settings
- LM: License management
- LOC: Locator UID LED configuration
- LS: LAN status
- PC: Power control access
- PM: Power regulator mode
- PR: Power restore policy configuration
- PS: Power status
- RB: Reset BMC
- RS: Reset system through the RST signal
- SA: Set access LAN/WEB/SSH/IPMI over LAN ports
- SNMP: Configure SNMP parameters
- SO: Security option help
- SS: System Status
- SYSREV: Firmware revisions
- TC: System reset through INIT or TOC signal
- TE: Send a message to other mirroring terminals
- UC: User Configuration (users, passwords, and so on)
- WHO: Display a list of iLO 2 connected users
- XD: iLO 2 Diagnostics or reset
- Web GUI
- System Status
- Remote Serial Console
- Integrated Remote Console
- Virtual Media
- Power Management
- Administration
- BL c-Class
- Help
- SMASH Server Management Command Line Protocol
- SM CLP Features and Functionality Overview
- Accessing the SM CLP Interface
- Using the SM CLP Interface
- SM CLP Syntax
- System1 Target
- System Reset Power Status and Power Control
- Map1 (iLO 2) Target
- Text Console Services
- Firmware Revision Display and Upgrade
- Remote Access Configuration
- Network Configuration
- User Accounts Configuration
- LDAP Configuration
- Text User Interface
- 9 Installing and Configuring Directory Services
- Directory Services
- Directory Services for Active Directory
- Directory Services for eDirectory
- Installing and Initializing Snap-In for eDirectory
- Example: Creating and Configuring Directory Objects for Use with iLO 2 Devices in eDirectory
- Directory Services Objects for eDirectory
- Setting Role Restrictions
- Setting Time Restrictions
- Setting Lights-Out Management Device Rights
- Installing Snap-Ins and Extending Schema for eDirectory on a Linux Platform
- Using the LDAP Command to Configure Directory Settings in iLO 2
- User Login Using Directory Services
- Certificate Services
- Directory-Enabled Remote Management
- Directory Services Schema (LDAP)
- Glossary
- Index
Remote System A system other than the one on which the user is working.
S
Schema Definitions that describe what type of information can be stored as entries in the directory. When
information that does not match the schema is stored in the directory, clients attempting to access
the directory may be unable to display the proper results. Schemas come in many forms, such
as a text file, information in a repository, or diagrams.
Serial Console A terminal connected to the serial port on the service processor. A serial console is used to
configure the system to perform other administrative tasks.
Server Blade A single circuit board populated with components such as processors, memory, and network
connections that are usually found on multiple boards.
SM CLP Server Management Command Line Protocol (SM CLP). SM CLP specification defines a user-friendly
command line protocol to manipulate CIM instances defined by the SM profiles specification.
SMASH System Management Architecture for Server Hardware (SMASH). An initiative by the Distributed
Management Task Force (DMTF) that encompasses specifications (SM CLP, SM ME Addressing,
SM Profiles) that address the interoperable manageability requirements of small-to large-scale
heterogeneous computer environments.
SNMP Simple Network Management Protocol. A set of protocols for managing complex networks.
SSH Secure Shell. A UNIX shell program and network protocol that enables secure and encrypted log
in and execution of commands on a remote system over an insecure network.
SSL Secure Sockets Layer. A protocol that enables client-to-server communication on a network to be
encrypted for privacy. SSL uses a key exchange method to establish an environment in which all
data exchanged is encrypted with a cipher and hashed to protect it from eavesdropping and
alteration. SSL creates a secure connection between a web server and a web client. Hypertext
Transfer Protocol Secure (HTTPS) uses SSL.
Subnet A working scheme that divides a single logical network into smaller physical networks to simplify
routing. The subnet is the portion of an Internet Protocol (IP) address that identifies a block of host
IDs.
Subnet Mask A bit mask used to select bits from an Internet address for subnet addressing. The mask is 32 bits
long, and selects the network portion of the Internet address and one or more bits of the local
portion. Also called an address mask.
System Event Log
(SEL)
A log that provides nonvolatile storage for system events that are logged autonomously by the
service processor, or directly with event messages sent from the host.
T
Target A target is the implicitly or explicitly identified managed element that a command is directed
toward. Command targets specify managed elements in the system. Targets follow the SM
addressing specification.
Target Address The target addressing scheme provides an easy-to-use method to accurately address CIM objects.
The target address term of the CLP syntax in this architecture is extensible. The addressing scheme
provides a unique target for CLP commands. The scheme is finite for parsing target names, and
unique for unambiguous access to associated instance information needed to support association
traversal rooted at the MAP AdminDomain instance.
Target Address
Scheme Resolution
Service
This entity is responsible for discovering and enumerating the managed elements within the local
domain, for maintaining the addressing and naming structure of the local domain, and coordinating
this information with the operation invocation engine.
Telnet A telecommunications protocol providing specifications for emulating a remote computer terminal
so that one can access a distant computer and function online using an interface that appears to
be part of the user's local system.
U
Universal Serial
Bus (USB)
An external bus standard that supports data transfer rates of 450 Mb/s (USB 2.0). A USB port
connects devices such as mouse pointers, keyboards, and printers, to the computer system.
213