HP Integrity iLO 2 Operations Guide

Table Of Contents
Remote System A system other than the one on which the user is working.
S
Schema Definitions that describe what type of information can be stored as entries in the directory. When
information that does not match the schema is stored in the directory, clients attempting to access
the directory may be unable to display the proper results. Schemas come in many forms, such
as a text file, information in a repository, or diagrams.
Serial Console A terminal connected to the serial port on the service processor. A serial console is used to
configure the system to perform other administrative tasks.
Server Blade A single circuit board populated with components such as processors, memory, and network
connections that are usually found on multiple boards.
SM CLP Server Management Command Line Protocol (SM CLP). SM CLP specification defines a user-friendly
command line protocol to manipulate CIM instances defined by the SM profiles specification.
SMASH System Management Architecture for Server Hardware (SMASH). An initiative by the Distributed
Management Task Force (DMTF) that encompasses specifications (SM CLP, SM ME Addressing,
SM Profiles) that address the interoperable manageability requirements of small-to large-scale
heterogeneous computer environments.
SNMP Simple Network Management Protocol. A set of protocols for managing complex networks.
SSH Secure Shell. A UNIX shell program and network protocol that enables secure and encrypted log
in and execution of commands on a remote system over an insecure network.
SSL Secure Sockets Layer. A protocol that enables client-to-server communication on a network to be
encrypted for privacy. SSL uses a key exchange method to establish an environment in which all
data exchanged is encrypted with a cipher and hashed to protect it from eavesdropping and
alteration. SSL creates a secure connection between a web server and a web client. Hypertext
Transfer Protocol Secure (HTTPS) uses SSL.
Subnet A working scheme that divides a single logical network into smaller physical networks to simplify
routing. The subnet is the portion of an Internet Protocol (IP) address that identifies a block of host
IDs.
Subnet Mask A bit mask used to select bits from an Internet address for subnet addressing. The mask is 32 bits
long, and selects the network portion of the Internet address and one or more bits of the local
portion. Also called an address mask.
System Event Log
(SEL)
A log that provides nonvolatile storage for system events that are logged autonomously by the
service processor, or directly with event messages sent from the host.
T
Target A target is the implicitly or explicitly identified managed element that a command is directed
toward. Command targets specify managed elements in the system. Targets follow the SM
addressing specification.
Target Address The target addressing scheme provides an easy-to-use method to accurately address CIM objects.
The target address term of the CLP syntax in this architecture is extensible. The addressing scheme
provides a unique target for CLP commands. The scheme is finite for parsing target names, and
unique for unambiguous access to associated instance information needed to support association
traversal rooted at the MAP AdminDomain instance.
Target Address
Scheme Resolution
Service
This entity is responsible for discovering and enumerating the managed elements within the local
domain, for maintaining the addressing and naming structure of the local domain, and coordinating
this information with the operation invocation engine.
Telnet A telecommunications protocol providing specifications for emulating a remote computer terminal
so that one can access a distant computer and function online using an interface that appears to
be part of the user's local system.
U
Universal Serial
Bus (USB)
An external bus standard that supports data transfer rates of 450 Mb/s (USB 2.0). A USB port
connects devices such as mouse pointers, keyboards, and printers, to the computer system.
213