HP Smart Update Manager 4.2 User Guide
Table Of Contents
- HP Smart Update Manager User Guide
- Abstract
- Notice
- Contents
- Introduction
- HP Smart Update Manager overview
- Using this guide
- New features of HP SUM 4.2.0
- Minimum requirements
- Supported deliverables overview
- Deployment from HP SUM
- Executing HP SUM
- Deploying software using the ProLiant Support Pack (PSP) for Microsoft Windows
- Deploying software using the Integrity Support Pack (ISP) for Microsoft Windows
- Deploying software using the ProLiant Support Pack for Linux
- Deploying firmware for ProLiant servers using the HP Smart Update Firmware DVD
- Deploying firmware using the HP Smart Update Firmware - HP Integrity BL860c/BL870c/BL890c i2 Servers Bundles
- HP SUM User Interface
- Deployment scenarios
- Keyboard support
- Local host installations
- Multiple-host installations
- Selecting remote hosts or groups
- Searching for remote hosts
- Managing hosts
- Managing groups
- Entering credentials for hosts
- Selecting bundles to filter on multiple hosts
- Selecting components to install on multiple hosts
- Updating Firmware on HP Integrity BL860c/BL870c/BL890c i2 Servers
- Viewing the installation results for multiple hosts
- Scripted deployment
- Advanced topics
- Troubleshooting
- Recovering from a failed ROM upgrade
- Recovering from an installation failure
- Recovering from a discovery failure
- Recovering from a loss of Linux remote functionality
- Recovering from a blocked program on Microsoft Windows
- Recovering from operating system limitations when using a Japanese character set
- Recovering from Fatal Error - application will exit message
- Recovering from a missing reboot message when running on SUSE LINUX Enterprise Server 9
- Recovering a lost HP Smart Update Manager connection
- Troubleshooting HP Smart Update Manager in IPv6 networks
- HP SUM found new hardware message
- Non-matching systems error reported when building source Linux RPMs or installing Linux RPMs built from source
- Linux component version discrepancy for source RPMs
- HP SUM displays No components found in the selected repository(ies) message
- Additional/Optional Actions columns are grayed when HP SUM is maximized
- Installation of components failed with 'Update returned an error' when installing Linux RPMs
- Issues related to bundle filtering on the Select Items to be Installed and Select Bundle Filter screens
- HP SUM fails on Windows Vista® due to McAfee firewalls
- Technical support
- Acronyms and abbreviations
- Index

Troubleshooting 103
Recovering from a blocked program on Microsoft
Windows
Configuring Windows firewall settings
The Windows® Security Alert appears when a program is blocked from accepting connections from the
Internet or a network.
To set the rules for the Windows® Firewall and Security Policy, click Unblock, and then set your firewall
settings to the following:
1. Click Start>Control Panel>Administrative Tools>Windows Firewall with Advanced Security>Inbound
Rules>Remote Administration (NP-IN).
2. Select Enabled, and then select Allow the connections.
For Direct to iLO support, you must enable ping.
Enabling ports in HP Smart Update Manager
The ports that HP Smart Update Manager uses cannot be configured. When HP Smart Update Manager port
initiates communications to remote targets, it uses several well-known ports depending on the operating
system. For Windows®, it uses ports 138 and 445 to connect to remote targets (equivalent to remote and file
print share functionality). For Linux, HP Smart Update Manager uses port 22 (SSH) to start the
communications with the remote target.
HP Smart Update Manager uses defined ports to communicate between the remote target and the
workstation where HP Smart Update Manager is executing. When you run HP Smart Update Manager, it
uses the administrator/root privileges to dynamically register the port with the default Windows® and Linux
firewalls for the length of the application execution, then closes and deregisters the port. All communications
are over a SOAP server using SSL with additional functionality to prevent man-in-the-middle, packet spoofing,
packet replay, and other attacks. The randomness of the port helps prevent port scanning software from