advertisement
HP Integrity iLO 2 Operations Guide
HP Part Number: 5992-1085
Published: November 2012
Edition: 14
© Copyright 2006, 2012 Hewlett-Packard Development Company, L.P.
Legal Notices
The information contained herein is subject to change without notice. The only warranties for HP products and services are set forth in the express warranty statements accompanying such products and services. Nothing herein should be construed as constituting an additional warranty. HP shall not be liable for technical or editorial errors or omissions contained herein.
Intel, Pentium, Intel Inside, Itanium, and the Intel Inside logo are trademarks or registered trademarks of Intel Corporation or its subsidiaries in the
United States and other countries.
Microsoft and Windows are U.S. registered trademarks of Microsoft Corporation.
Acrobat is a trademark of Adobe Systems Incorporated.
Java is a US trademark of Sun Microsystems, Inc.
UNIX is a registered trademark of The Open Group.
Contents
About This Document...................................................................................11
1 Introduction to iLO 2.................................................................................17
2 Ports and LEDs.........................................................................................26
Contents 3
3 Getting Connected to iLO 2.......................................................................31
4 Logging In to iLO 2...................................................................................47
5 Adding Advanced Features........................................................................49
6 Accessing the Host (Operating System) Console...........................................61
4 Contents
7 Configuring DHCP, DNS, LDAP, and Schema-Free LDAP................................64
8 Using iLO 2.............................................................................................75
CO (Console): Leave the MP Main Menu and enter console mode..................................77
CM (Command Mode): Enter command mode.............................................................77
SMCLP (Server Management Command Line Protocol): Switch to the SMASH SMCLP........77
HE (Help): Display help for the menu or command in the MP Main Menu........................81
Command Menu Commands and Standard Command Line Scripting Syntax.............................85
HE: Display help for menu or command in command menu interface...................................89
Contents 5
6
Contents
Determining the Session Termination Character Sequence for the System Console...........152
Exiting the System Console Session and Returning to SM CLP.......................................152
Exiting the MP Main Menu Session and Returning to SM CLP.......................................152
Contents 7
Target: map1/enetport1/lanendpt1/ipendpt1/gateway1...........................................158
Target: map1/dnsserver1, map1/dnsserver2, map1/dnsserver3..................................158
vMedia Functionality on Server Blades and Rack-Mounted Servers................................162
9 Installing and Configuring Directory Services .............................................169
Example: Creating and Configuring Directory Objects for Use with iLO 2 in Active Directory.....176
Example: Creating and Configuring Directory Objects for Use with iLO 2 Devices in eDirectory..185
8 Contents
Contents 9
Glossary..................................................................................................208
Index.......................................................................................................215
10 Contents
About This Document
This document provides information and instructions on how to use the HP Integrated Lights-Out 2
(iLO 2) for HP Integrity for BL870c, BL860c, rx2660, rx3600, and rx6600 servers.
The document date and part number indicate the document’s current edition. The date changes when a new edition is published. The document part number changes when extensive changes are made.
Document updates may be issued between editions to correct errors or document product changes.
To ensure that you receive the updated or new editions, subscribe to the appropriate product support service. See your HP sales representative for details.
This document is also a reference for the following HP Integrity servers with Integrity iLO 2:
• rx7640
• rx8640
•
Superdome sx2000
The latest version of this document can be found on the HP website at http://www.hp.com
.
Intended Audience
This document provides technical product and support information for authorized service providers, system administrators, and HP support personnel.
Publishing History
The publishing history below identifies the edition dates of this manual. Updates are made to this publication on an unscheduled, as needed, basis.
Table 1 Publishing History Details
Operating Systems Supported Supported Servers Publication Date Document
Manufacturing Part
Number
5971-4292 rx3600 rx6600
September 2006
AB419-9006A
AD217-9001A
HP-UX 11i v2
OpenVMS 8.3
Microsoft Windows Server 2003
Red Hat Linux and SuSE
HP-UX 11i v2
OpenVMS 8.3
Microsoft Windows Server 2003
Red Hat Linux and SuSE
HP-UX 11i v2
OpenVMS 8.3
Microsoft Windows Server 2003
Red Hat Linux and SuSE rx2660 rx3600 rx6600
BL860c rx2660 rx3600 rx6600
December 2006
February 2007
5991-5983 June 2007
5991-5992
HP-UX 11i v2
OpenVMS 8.3
Microsoft Windows Server 2003
Red Hat Linux and SuSE
HP-UX 11i v2
BL860c rx2660 rx3600 rx6600
BL860c November 2007
Intended Audience 11
12
Table 1 Publishing History Details (continued)
Document
Manufacturing Part
Number
Operating Systems Supported
OpenVMS 8.3 1H1
Microsoft Windows Server 2003
Red Hat Linux and SuSE
5991-6005 HP-UX 11i v2
OpenVMS 8.3 1H1
Microsoft Windows Server 2003
Red Hat Linux and SuSE
5991-6024 HP-UX 11i v3
OpenVMS 8.3 1H1
Microsoft Windows Server 2008
Red Hat Linux and SuSE
5991-8053 HP-UX 11i v3
OpenVMS 8.3 1H1
Microsoft Windows Server 2008
Red Hat Linux and SuSE
5991-8053_ed9 HP-UX 11i v3
OpenVMS 8.3 1H1
Microsoft Windows Server 2008
Red Hat Linux and SuSE
5991-8053_ed10 HP-UX 11i v3
OpenVMS 8.3 1H1
Microsoft Windows Server 2008
Red Hat Linux and SuSE
Supported Servers Publication Date rx2660 rx3600 rx6600 rx7640* rx8640*
Superdome sx2000*
BL870c
BL860c rx2660 rx3600 rx6600 rx7640* rx8640*
Superdome sx2000*
BL870c
BL860c rx2660 rx3600 rx6600 rx7640* rx8640*
Superdome sx2000*
BL870c
BL860c rx2660 rx3600 rx6600 rx7640* rx8640*
Superdome sx2000*
BL870c
BL860c rx2660 rx3600 rx6600 rx7640* rx8640*
Superdome sx2000*
BL870c
BL860c rx2660 rx3600
January 2008
August 2008
May 2009
August 2009
December 2009
Table 1 Publishing History Details (continued)
Document
Manufacturing Part
Number
Operating Systems Supported Supported Servers Publication Date
5991-8053_ed11 HP-UX 11i v3
OpenVMS 8.3 1H1
Microsoft Windows Server 2008
Red Hat Linux and SuSE
5991-8053_ed12 HP-UX 11i v3
OpenVMS 8.3 1H1
Microsoft Windows Server 2008
Red Hat Linux and SuSE
5991-8128
5992-1085
HP-UX 11i v3
OpenVMS 8.3 1H1
Microsoft Windows Server 2008
Red Hat Linux and SuSE
HP-UX 11i v3
OpenVMS 8.3 1H1
Microsoft Windows Server 2008
Red Hat Linux and SuSE rx6600 rx7640* rx8640*
Superdome sx2000*
BL870c
BL860c rx2660 rx3600 rx6600 rx7640* rx8640*
Superdome sx2000*
BL870c
BL860c rx2660 rx3600 rx6600 rx7640* rx8640*
Superdome sx2000*
BL870c
BL860c rx2660 rx3600 rx6600 rx7640* rx8640*
Superdome sx2000*
BL870c
BL860c rx2660 rx3600 rx6600 rx7640* rx8640*
Superdome sx2000*
April 2010
May 2010
January 2011
November 2012
* All of the iLO 2 functionality is not currently available on this server.
Document Organization
This document is divided into the following chapters.
Chapter 1 Introduction Use this chapter to learn about iLO 2 functionality.
Chapter 2 Ports and LEDs Use this chapter to learn about ports and LEDs.
Document Organization 13
Chapter 3
Chapter 4
Chapter 5
Chapter 6
Chapter 7
Chapter 8
Chapter 9
Getting Connected to iLO 2 Use this chapter to connect to iLO 2.
Logging in to iLO 2 Use this chapter to log in to iLO 2.
Adding Advanced Features Use this chapter to learn about the HP Lights-Out
Advanced KVM card functionality and installation on the rx7640, rx8640, and
Superdome sx2000 servers.
Accessing the Host Console Use this chapter to learn how to access the host console of an HP Integrity server through iLO 2.
Configuring DHCP, DNS, LDAP, and Schema-Free LDAP Use this chapter to configure DHCP, DNS, LDAP extended schema, and Schema-Free LDAP.
Using iLO 2 This chapter provides information on the different interfaces you can use to interact with iLO 2 such as text user interface, web GUI, and SMASH SM
CLP.
Installing and Configuring Directory Services Use this chapter to learn about installing and configuring directory services functions.
Use the glossary to learn iLO 2 terms and definitions.
Glossary
Typographic Conventions
This document uses the following typographical conventions:
%
,
$
, or
#
A percent sign represents the C shell system prompt. A dollar sign represents the system prompt for the Bourne, Korn, and
POSIX shells. A number sign represents the superuser prompt.
Command
Computer output
Ctrl+x
ENVIRONMENT VARIABLE
ERROR NAME
Key
Term
User input
Variable
[]
{}
...
Three vertical periods
|
WARNING
A command name or qualified command phrase.
Text displayed by the computer.
A key sequence. A sequence such as Ctrl+x indicates that you must hold down the key labeled Ctrl while you press another key or mouse button.
The name of an environment variable, for example,
PATH
.
The name of an error, usually returned in the errno variable.
The name of a keyboard key. Return and Enter both refer to the same key.
The defined use of an important word or phrase.
Commands and other text that you type.
The name of a placeholder in a command, function, or other syntax display that you replace with an actual value.
The contents are optional in syntax. If the contents are a list separated by |, you must choose one of the items.
The contents are required in syntax. If the contents are a list separated by |, you must choose one of the items.
The preceding element can be repeated an arbitrary number of times.
Indicates the continuation of a code example.
Separates items in a list of choices.
A warning calls attention to important information that if not understood or followed will result in personal injury or nonrecoverable system problems.
14
CAUTION
IMPORTANT
NOTE
A caution calls attention to important information that if not understood or followed will result in data loss, data corruption, or damage to hardware or software.
This alert provides essential information to explain a concept or to complete a task
A note contains additional information to emphasize or supplement important points of the main text.
Related Information
You can find other information on HP server hardware management, Microsoft® Windows®, and diagnostic support tools in the following publications.
HP Technical Documentation Website http://www.hp.com/go/Integrity_Servers-docs for HP Integrity servers http://www.hp.com/go/Blades-docs for HP Integrity server blades
Windows Operating System Information
Find information about administration of the Microsoft Windows operating system on the following website: http://www.microsoft.com/technet/
Diagnostics and Event Monitoring: Hardware Support Tools
Complete information about HP hardware support tools, including online and offline diagnostics and event monitoring tools, is on the HP website at: http://www.hp.com/go/hpux-diagnostics-docs
Website for HP Technical Support http://www.hp.com/hpsc/
Books About HP-UX Published by Prentice Hall
You can find the entire Prentice Hall Professional Series on HP at: http://www.informit.com/imprint/series_detail.aspx?st=61305
HP Contact Information
For the name of the nearest HP authorized reseller:
•
In the United States, see the HP US service locator webpage ( http://welcome.hp.com/country/ us/en/wwcontact.html
.)
•
In other locations, see the Contact HP worldwide (in English) webpage: http://welcome.hp.com/country/us/en/wwcontact.html
.
For HP technical support:
•
In the United States, for contact options see the Contact HP United States webpage: ( http:// welcome.hp.com/country/us/en/contact_us.html
)
To contact HP by phone:
â—¦
Call 1-800-HP-INVENT (1-800-474-6836). This service is available 24 hours a day, 7 days a week. For continuous quality improvement, calls may be recorded or monitored.
â—¦
If you have purchased a Care Pack (service upgrade), call 1-800-633-3600. For more information about Care Packs, see the HP website at: ( http://www.hp.com/go/carepack ).
•
In other locations, see the Contact HP worldwide (in English) webpage ( http:// welcome.hp.com/country/us/en/wwcontact.html
).
Related Information 15
Documentation Feedback
HP welcomes your feedback. To make comments and suggestions about product documentation, send a message to [email protected]
.
Include the document title and manufacturing part number. All submissions become the property of HP.
16
1 Introduction to iLO 2
The Integrated Lights-Out Management Processor (iLO MP) for Integrity servers is an autonomous management subsystem embedded directly on the server. It is the foundation of the server’s High
Availability (HA) embedded server and fault management. It also provides system administrators secure remote management capabilities regardless of server status or location. iLO is available whenever the system is connected to a power source, even if the server main power switch is in the off position.
HP has used several different names to describe the management functionality embedded in servers, including “the management processor.” In addition, HP uses the term “management processor” to refer to any embedded microprocessor that manages a system. Management processor is a descriptive term (such as “server”), and iLO is a brand name or label (such as “Integrity”).
Remote access is the key to maximizing efficiency of administration and troubleshooting for enterprise servers. Integrity servers are designed so all administrative functions that can be performed locally, can also be performed remotely. iLO enables remote access to the operating system console, control over the server’s power and hardware reset functionality, and works with the server to enable remote network booting through a variety of methods.
The iLO 2 is an Integrated Lights-Out 2 management processor with the latest advanced digital video redirection technology. This new feature gives you a higher performance graphics console redirection experience than with the previous iLO.
This documentation addresses HP Integrated Lights-Out 2 (iLO 2) for Integrity servers and server blades. For information on iLO for ProLiant servers and ProLiant BladeSystem server blades, see www.hp.com/go/iLO .
NOTE: Previously, this document used the name iLO 2 MP as a reference to a management processor. For the remainder of this document, we will simply refer to it as iLO 2 unless when referring to physical components such as MP ports, connectors, LEDs, and so on.
IMPORTANT: This guide addresses server-specific details that vary between server products.
These details are frequently updated. For the latest server-specific product information, see the
Integrity iLO 2 Quick Specs on the HP website at www.hp.com/go/integrityilo .
Features
Integrity iLO 2 functionality includes the following:
•
Monitoring of server health and status
•
Control of power, reset, and Transfer of Control (TOC) capabilities
•
Console access
•
Display and recording of system events
•
Display of detailed information about the various internal subsystems and field replaceable units (FRUs)
•
A virtual front panel to monitor system status and see the state of front panel LEDs
Integrity iLO 2 is completely independent of the host system and the operating system. It has its own microprocessor and runs its own firmware. The operating system cannot send packets out on the MP LAN, and packets on the MP LAN cannot go to the operating system. The MP LAN is exclusive to iLO 2 and is driven by an embedded realtime operating system (RTOS) running on iLO 2.
Features 17
NOTE: The following ProLiant iLO 2 features are not available on Integrity iLO 2:
•
Virtual Folder
•
Shared LAN
•
Graphics Console Replay
Integrity iLO 2 offers the following standard and advanced features.
Standard Features
Integrity iLO 2 standard features provide the following basic system board management functions, diagnostics, and essential Lights-Out functionality on iLO 2-supported HP servers.
Always-On Capability
Integrity iLO 2 is active and available through the MP LAN connection and the local serial port connection as long as the power cord is plugged in. In the event of a complete power failure, iLO
2 data is protected by an onboard battery backup.
Virtual Front Panel
The virtual front panel (VFP) presents a summary of the system front panel using direct console addressing.
Multiple Access Methods
The available methods to access iLO 2 are as follows:
IPMI/LAN
LAN
Through the iLO 2 MP MAC address
Using Telnet, web, or SSH to access the iLO 2 MP LAN
Local Serial Port
Web
Using a terminal or laptop computer for direct connection
Using a GUI
Security
Integrity iLO 2 provides security for remote management in IT environments, such as the following:
•
User-defined TCP/IP ports
•
User accounts and access management
•
Lightweight Directory Access Protocol- (LDAP) based directory services authentication and authorization
•
Encrypted communication using SSL and SSH
User Access Control
Integrity iLO 2 is restricted by user accounts. User accounts are password protected and are assigned access rights that define a specific level of access to the server and to the iLO 2 MP commands. iLO 2 supports both LDAP directory user authentication and locally stored iLO 2 user accounts. iLO 2 users can have any of the following access rights:
Console Access Right to access the system console (the host operating system). This does not bypass host authentication requirements, if any.
Power Control Access Right to power on, power off, or reset the server, and the right to configure the power restore policy.
Local User Administration Access
MP Configuration Access
Right to configure locally stored user accounts.
Right to configure all iLO 2 MP settings and some system settings, such as the power restore policy.
18 Introduction to iLO 2
Virtual Media Access Enables Advanced Pack license users the right to use the virtual media applet.
Multiple Users
Multiple users can interact with iLO 2. However, iLO 2 command mode and console mode are mirrored, allowing only one user at a time to have write access to the shared console. When a command is completed, write access is released and any user can initiate another command.
IMPORTANT: Although iLO 2 can support multiple simultaneous connections, to do so can impact performance. HP does not recommend running more than eight simultaneous connections.
Integrity iLO 2 supports the following connections simultaneously:
•
Four web (each web connection can have a remote serial console connection as well and not be counted as part of the total number of connections allowed)
•
Eight SSH
•
One local console serial port (RS-232)
•
Four IPMI over LAN
•
Four Telnet
•
One Integrated Remote Console
•
One vMedia
IPMI over LAN
The Intelligent Platform Management Interface (IPMI) option provides direct access from the MP
LAN port to the server Baseboard Management Controller (BMC) monitoring and controlling functions such as temperature, voltage, fans, and power supplies. IPMI defines a common interface for platform management hardware. With IPMI over LAN enabled, BMC functions are available to other management software applications. This enables you to write your own customizable management applications using IPMI v1.0. iLO 2 supports up to four simultaneous IPMI over LAN connections.
Currently, there is no capability to manage the IPMI user name or password in the iLO 2 command line or web interfaces. There is only the ability to enable or disable access with IPMI through the
SA command.
To set a user name or password using the IPMI over LAN interface, you can use an IPMI tool. HP does not recommend any particular IPMI tools.
IMPORTANT: IPMI traffic is unencrypted, just like Telnet traffic is unencrypted. Also, at initial enablement, there is no password, and the IPMI over LAN port is insecure.
HP recommends that iLO 2 management traffic be on a separate dedicated management network and that only administrators be granted access to that network. Also, set firewalls or routers to accept only specific source and destination addresses. For example, you can allow inbound IPMI traffic into the host server only if it comes from one of the predetermined management workstations.
For more information on IPMI, see the Intel website at: http://developer.intel.com/design/servers/ipmi
System Management Homepage
The HP Insight Management Agents support a web interface for access to runtime management data through the HP System Management Homepage. The HP System Management Homepage is a secure web-based interface that consolidates and simplifies the management of individual servers and operating systems. By aggregating data from HP Insight Management Agents and other management tools, the System Management Homepage provides an intuitive interface to review
Features 19
in-depth hardware configuration and status data, performance metrics, system thresholds, and software version control information.
Firmware Upgrades
Firmware upgrades enhance the functionality of iLO 2.
The MP firmware is packaged along with system, BMC, and FPGA/PSOC firmware. You can download and upgrade the firmware package from the HP website at http://www.hp.com/go/ bizsupport .
Select Download drivers and software, select your server, and follow the instructions provided.
TIP: Before performing certain iLO 2 functions, verify that you have the supported firmware version required to carry out the task.
Internal Subsystem Information
Integrity iLO 2 displays information about the following internal subsystems:
•
FRU information
•
System power state and fan status
•
Processor Status
DHCP and DNS Support
Integrity iLO 2 supports the Dynamic Host Configuration Protocol (DHCP) and the Domain Name
System (DNS) configuration options for acquiring network information through the MP LAN port.
When iLO 2 starts, it acquires the port configuration stored on a DHCP server to assign an IP address to the MP LAN port. If DNS is configured, this information is updated on the DNS server.
The simplest method to initially connect to iLO 2 is with the default DNS name found on the iLO
Network Information Tag on the server, for example, mp0014c29c064f
.
Group Actions
Integrity iLO 2 integrates with HP SIM, HP OpenView, and third-party management tools.
Group Actions Using HP SIM
HP Systems Insight Manager (HP SIM) is a system-level management tool that supports executing commands from HP SIM using the SSH interface. HP SIM enables you to perform similar management activities across multiple iLO 2s (group actions) without requiring you to access each iLO 2 individually. Group actions are launched from the HP SIM GUI and are supported at all times, regardless of the server power state.
You can download HP SIM from the HP website. For more information about HP SIM, see the HP website at http://www.hp.com/go/hpsim .
For the user guide, see the Information Library.
SNMP
The SNMP is part of the TCP/IP protocol suit developed to manage servers on an IP network.
SNMP enables you to manage network performance, find and solve network problems, and plan for network growth.
SMASH
Server Management Architecture for Server Hardware (SMASH) is an initiative by the Distributed
Management Task Force (DMTF) that encompasses specifications (Server Management CLP, SM
ME Addressing, SM Profiles) that address the interoperable manageability requirements of small to large scale heterogeneous computer environments.
20 Introduction to iLO 2
SM CLP
The SM CLP specification defines a user friendly command-line protocol that provides command line interface (CLI) standards for interoperability.
Mirrored Console
The system console output stream is reflected to all connected console users, and any user can provide input.
Remote Power Control
Integrity iLO 2 enables remote power cycle, power on and power off, and TOC. It also provides options to reset the system, the BMC, or iLO 2.
Power Regulation
Although the 24-hour graph function of power regulation feature requires the iLO 2 Advanced
Pack, you can obtain some power regulation information without the license:
•
For both server blades and entry-rack servers, use the
SS command from the MP CLI interface for an instantaneous power reading.
•
For server blades, use the web GUI Server Status page to obtain current power usage and ambient temperature.
Event Logging
Integrity iLO 2 provides event logging, display, and keyword search of console history and system events.
Advanced Features
Integrity iLO 2 advanced features provide additional functionality such as the graphical integrated remote console and virtual media. In addition, the advanced features increase security by integrating iLO 2 user administration with the Active Directory or eDirectory.
iLO advanced features are enabled on Integrity servers in one of two ways. For Integrity entry class and blades, the advanced features are enabled with a license key. For Integrity cell-based servers, the advanced features are enabled with a PCI-X accessory card instead of a key.
IMPORTANT: On HP Integrity server blades, the Advanced Pack license is standard. Remember to save the Advanced Pack license key information that was provided by HP. If you ever need to replace your server blade under warranty, you will need to transfer the key by entering the code on the replacement server blade.
NOTE: A HP ProLiant iLO 2 Advanced Pack license key will not work on an HP Integrity server, and vice versa.
NOTE: Not all advanced features are supported on all systems. For the most current information on accessories, features, and supported products, see the HP website at http://www.hp.com/go/ integrityilo and look for the Quick Specs.
Integrity iLO 2 advanced features include the iLO 2 standard features and the following features:
Virtual Media
Virtual Media (vMedia) enables connections of a CD/DVD physical device or image file from the local client system to the remote server. The virtual device or image file can be used to boot the server with an operating system that supports USB devices.
Virtual Media depends on a reliable network with good bandwidth. This is especially important when you are performing tasks such as large file transfers or OS installs.
Features 21
NOTE: iLO vMedia is automatically disconnected if the iLO management processor is reset. HP does not recommend use of iLO vMedia with firmware update tools such as HPOFM which reset the management processor mid-way through the update process.
Integrated Remote Console
The Integrated Remote Console (IRC) provides a high-performance graphical remote console to
HP Integrity-based Windows servers. IRC supports Windows clients running the Internet Explorer browser. IRC requires that the server have VGA. VGA is optional for some Integrity servers. VGA is included on the Lights-Out Advanced KVM card.
Directory-Based Secure Authorization Using LDAP
The directory-based authentication and authorization option enables iLO 2 user accounts to be defined in a centralized database on an LDAP server. iLO 2 users are authenticated when logging in to iLO 2 and authorization is given each time an iLO 2 command runs. This provides a centralized database (LDAP server) of all user accounts and avoids the overhead of creating users in each iLO
2.
Directory authentication occurs by enabling Extended Schema or Default Schema. When Extended
Schema is used, the schema in the directory server must be extended. When Default Schema is selected, schema extension is not needed.
Schema-Free LDAP
Schema-Free LDAP enables you to use directory authentication to log in to iLO 2 without having to do any schema extension on the directory server or snap-in installation on the client. In addition to general directory integration benefits, iLO 2 schema-free integration provides the following:
•
Minimal maintenance and administration
•
Reliable security
•
Complements two-factor authentication
Not extending the schema on the directory server means the directory server does not know anything about the iLO 2 object or privileges, and the only thing the iLO 2 queries from the directory server is to authenticate the user name and password.
Power Meter Readings
The power meter readings feature enables you to graphically view and monitor server power usage, temperature, and power regulator settings.
The Advanced Pack license enables you to see the Power Regulator graphs from the iLO 2 web
GUI. The license key also enables iLO 2 to share information with Insight Power Manager.
NOTE: You can obtain an instant power reading without a license key through the CLI using the
PS command.
HP Insight Power Manager
HP Insight Power Manager (HP IPM), a plug-in to HP Systems Insight Manager (HP SIM), is an integrated power monitoring and management application that provides centralized control of server power consumption and thermal output.
Leveraging HP power regulator technology, HP IPM makes policy-based power and thermal management possible by enabling you to view and modify the power efficiency regulator mode of the system. It expands the capacity of data centers by reducing the amount of power and cooling required for supported Integrity servers and the server blades.
Information on HP IPM is available on the HP website at http://www.hp.com/go/ipm .
22 Introduction to iLO 2
Obtaining and Activating iLO 2 Advanced Pack Licensing
For Integrity entry class systems, an Integrity iLO 2 Advanced Pack license key can be purchased from your HP sales rep. To find the part number for the option for your system, see the HP website at http:/www.hp.com/go/integrityilO . A free 30-day evaluation license is available for download on the HP website. The evaluation license activates and accesses iLO 2 Advanced Pack features.
You can only install one evaluation license per iLO 2. After the evaluation period, an iLO 2
Advanced Pack license is required to continue using the advanced features. The iLO 2 Advanced
Pack license features automatically deactivate when the evaluation license key expires.
Systems that do not have VGA support all other iLO 2 Advanced Pack license features.
For more information, see the HP website at http://h71028.www7.hp.com/enterprise/cache/
279991-0-0-0-121.html
.
Follow the factory-install or manual install instructions located on the Integrated Lights-Out Advanced
Pack for HP Integrity Servers; Certificate of License to Use; License Installation Card to activate your license.
Lights-Out Advanced KVM Card
The HP Lights-Out Advanced KVM card is a PCI-X card that you install into a partition in any sx2000-based mid-range or high-end HP Integrity server such as rx7640, rx8640, and Superdome sx2000.
The Lights-Out Advanced KVM card extends the basic iLO 2 features built into your server by adding virtual media and integrated remote console features to an individual partition. You must add a card for each partition where vMedia or IRC is desired.
The Lights-Out Advanced KVM card is also a KVM card that offers physical video functionality for servers running Windows, and USB functionality for servers running HP-UX, Windows, and
OpenVMS.
All Lights-Out Advanced features are fully enabled on the Lights-Out Advanced KVM card. There is no additional advanced pack license to purchase. At present, the IRC is only available for servers running Windows, and vMedia is available for servers running HP-UX, Windows, and OpenVMS.
Supported Systems and Required Components and Cables
lists the systems on which iLO 2 is supported and the components and cables that are required to operate iLO 2.
Table 2 Supported Systems and Required Components Matrix
Supported
Systems
Required Components Required Cables
BL860c
Front console serial port (RS-232)
Rear OA/iLO network port
SUV or DB-9 cable
LAN cable rx2660 rx3600, rx6600 iLO 2 hardware is integrated into the system board
LAN, serial, and VGA cables
Core I/O board without VGA; factory installed LAN and serial cables
Core I/O board with VGA (optional)
(This is only supported on Windows Server OS.)
LAN, serial, and VGA cables rx7640, rx8640,
Superdome sx2000 iLO 2 hardware is integrated in the main system.
Lights-Out Advanced KVM cards can be added per partition.
LAN, serial, and VGA cables
1
Obtaining and Activating iLO 2 Advanced Pack Licensing 23
1
Cables are not provided with the server.
Integrity iLO 2 Supported Browsers and Client Operating Systems
Integrity iLO 2's web GUI standard features are supported with Microsoft Internet Explorer 6.0
SP1 or Internet Explorer 7, Mozilla Firefox 2.0.0.10.02 or Firefox 3, and HP Secure Web Browser
1.7-13. iLO 2's advanced feature of Integrated Remote Console, a graphical remote console, is supported only with Internet Explorer browsers and requires DirectX control. All browsers support the iLO 2 Remote Serial Console and vMedia applets using the 32-bit Java Plug-in 1.6.0_01.
You can view the most current list of supported browsers and operating systems in the Quickspecs on the HP website at http://www.hp.com/go/integrityilo .
Related Links
•
Java™ for HP-UX
â—¦ http://www.hp.com/products1/unix/java/versions/index.html
â—¦ http://www.hp.com/products1/unix/java/archives/index.html
•
Java for OpenVMS
â—¦ http://h18012.www1.hp.com/java/alpha
•
Firefox for HP-UX
â—¦ http://www.hp.com/products1/unix/java/firefox/index.html
Note: 1.5.0.00 needs patch
â—¦ http://www.hp.com/go/firefox
•
Firefox for Linux®
â—¦ http://linuxcoe.corp.hp.com
•
Firefox for Windows and Linux
â—¦ http://www.mozilla.com/firefox
•
Browser Support 1.5.0
â—¦ http://java.sun.com/j2se/1.5.0/system-configurations.html
Security
You must have strong security surrounding the iLO 2 device. HP security requirements for iLO 2 include the following:
Authentication Integrity iLO 2 incorporates authentication techniques with the use of 128-bit
Secure Socket Layer (SSL) encryption. It is password based for web and password- and key-based for secure shell (SSH).
Authorization
Integrity
Privacy
Using local accounts, iLO 2 enables you to define up to 19 separate users and to vary the server access rights of each user. The directory services capabilities of iLO 2 enables you to maintain network user accounts and security policies in a central, scalable database that supports thousands of users, devices, and management roles.
Integrity iLO 2 incorporates a trusted Java applet for vMedia.
Integrity iLO 2 uses SSL for web connections, RSL-RC4 encryption for IRC and remote serial console, and 3DES-CBC/AES128-CBD recommended encryption algorithms for SSH-based connections. You can enable or disable
Telnet, IPMI over LAN, web, and SSH connectivity.
24 Introduction to iLO 2
Login After initial failed login attempts (default three), a delay of approximately one second is imposed on the serial connection and the login banner warnings are repeated. All other connection types are disconnected.
IMPORTANT: Ensure that physical access to the server is limited. Anyone can clear passwords by pressing the iLO MP reset button for longer than four seconds.
NOTE: For greater security, HP recommends that iLO 2 management traffic be on a separate dedicated management network that is configured to only allow limited access from selected secure systems by designated system administrators. This acts as the first line of defense against security attacks. A separate network enables you to physically and logically control which systems are allowed to connect to the network and the iLO 2 LAN port.
Protecting SNMP Traffic
Because SNMP uses passwords, known as community strings, that are sent across the network in clear text, you must enhance the network security when using SNMP traffic. To enhance network security, do the following:
•
Reset the community strings (read only) with the same frequency and according to the same guidelines as the administrative passwords. For example, select alphanumeric strings with at least one uppercase letter, one numeral, and one symbol.
•
Set firewalls or routers to accept only specific source and destination addresses. For example, you can allow inbound SNMP traffic into the host server only if it comes from one of the predetermined management workstations.
TIP: Telnet sends data without encryption and is not a secure connection. HP recommends using
SSH instead of Telnet because SSH uses encryption.
To enable and disable Telnet access, use the
SA command.
Security 25
2 Ports and LEDs
All iLO 2 functions are available through the server MP LAN port and the local and remote serial ports. On HP Integrity server blades, all iLO 2 functions are available on the Onboard Administrator
(OA). This chapter describes the available iLO 2 ports, connectors, and LEDs on the HP Integrity server blades, and the rx2660, rx3600, and rx6600 servers.
HP Integrity Server Blade Components
Onboard Administrator (OA) is the enclosure management processor, subsystem, and firmware base used to support the HP Integrity server blades and all the managed devices contained within the enclosure. The OA provides a single point from which to perform basic management tasks on server blades or switches within the enclosure. Using this hard-wired knowledge, the OA performs initial configuration steps for the enclosure, enables runtime management and configuration of the enclosure components, and informs you of problems within the enclosure through email, SNMP, or the Insight Display.
Before setting up the HP BladeSystem OA, HP recommends that you read the HP BladeSystem
Onboard Administrator User Guide on the HP website at: http://h20000.www2.hp.com/bc/docs/support/SupportManual/c00705292/c00705292.pdf
Reading this guide ensures that you understand the HP BladeSystem OA and that you properly complete the initial setup to facilitate its proper functioning.
You can find other OA docs on the HP website at:
HP BladeSystem c-Class Onboard Administrator
Onboard Administrator
shows the OA/iLO network port and components.
Figure 1 OA/iLO Network Port and Components
26 Ports and LEDs
1
2
3
OA/iLO Network Port
OA Bay 1
OA Bay 2 (redundant if used)
shows the OA LEDs and buttons.
Figure 2 Onboard Administrator LEDs and Buttons
4
5
Enclosure Link-Up Port
Enclosure Link-Down Port
1
2
3
OA UID LED
Enclosure UID LED
OA Active LED
4
5
OA Health LED
OA Reset Button
HP Integrity rx2660 Server Components
shows the rear view of the HP Integrity rx2660 server.
The system LAN functionality is integrated into the system board.
Figure 3 HP Integrity rx2660 Server Rear View
1
2
3
4
5
Power Supply 1 and LED
Power Supply 2 and LED
PCI-x/PCIe Slots
Core LAN Ports
Smart Array P400
Controller Slot
8
9
6
7
Auxiliary Serial Port
VGA Port
USB Ports
Console Serial Port
(RS-232)
10
11
12
13
MP LAN Port iLO 2 MP Status LEDs iLO 2 MP Reset Button
UID Button/LED
HP Integrity rx2660 Server Components 27
HP Integrity rx3600 and rx6600 Server Components
shows the controls, ports, and LEDs on the rear of the HP Integrity rx3600 and rx6600 servers.
NOTE: This figure is oriented vertically to match the orientation of the core I/O board.
Figure 4 HP Integrity rx3600 and rx6600 Server Rear Ports and LEDs
1
2 iLO 2 MP Serial Console
Port (RS-232) (DB-9F to
3
USB 2.0 Ports (any USB device)
DB-9F cable) connected to
4
MP LAN Port (10/100 LAN) emulation terminal device
(PC, laptop, or ASCII terminal)
General Use Serial Port
(Printers, etc.)
5
VGA Port (No iLO 2 access;
EFI only)
iLO 2 MP Status LEDs
lists the state of the iLO 2 MP status LEDs during normal operation.
28 Ports and LEDs
Table 3 iLO 2 MP Status LEDs iLO 2 MP Status LED
Standby Power iLO 2 MP Self Test iLO 2 MP Heartbeat
BMC Heartbeat
LED State
Solid green.
Off. The LED is solid amber when AC power is first applied. It remains solid amber for a few seconds until the MP completes its self test; then the LED turns off.
Flashing green.
Flashing green.
iLO 2 MP Reset Button
The iLO 2 MP Reset button enables you to reset iLO 2 and reset the user-specific values to factory default values. A momentary press causes a soft reset of iLO 2 when the button is released. A greater than four second press causes a soft reset of iLO 2 upon release and resets local user accounts and passwords to factory default values.
Resetting Local User Accounts and Passwords to Default Values
If iLO 2 user passwords are lost, or iLO 2 local user accounts are disabled and logging in through
LDAP directory server is unsuccessful because the directory server is down or directory settings have not been configured properly in LDAP command, you can reset local user accounts and passwords to their default values.
To reset local user accounts and passwords to default values:
1.
Connect a serial terminal (or serial-cabled laptop with serial emulation) to the console serial port.
2.
Press and hold the iLO 2 MP Reset button for more than four seconds. iLO 2 reboots to factory default settings automatically.
3.
Respond to the prompt to reset local user accounts and passwords to default values.
Console Serial Port and Auxiliary Serial Port
shows the console serial port connector with numbered labels for each pin on each port.
Figure 5 Console Serial Port (RS-232) Connector
maps the console serial port connector pin number to its signal description on each port.
Table 4 Console Serial Port Pinouts
Pin Number
1
2
3
4
5
Not used
Signal Description
Receives data
Transmits data
Not used
Ground iLO 2 MP Reset Button 29
Table 4 Console Serial Port Pinouts (continued)
Pin Number
6
7
8
9
Not used
Signal Description
Requests to send
Clears to send
Not used
MP LAN Port
shows the MP LAN port connector pins and LEDs.
Figure 6 MP LAN Port
maps the MP LAN port connector pin numbers to their signal descriptions.
Table 5 MP LAN Port Pinouts
Pin Number
1
2
3
6
7
4
5
8
TXP
TXN
RXP
Not used
Signal Description
Not used
RXN
Not used
Not used
MP LAN LEDs
lists the MP LAN link status LEDs and states.
Table 6 MP LAN Link Status LEDs
Link State
Activity
Link with no activity
No link
LED State
Blinking green
Solid green
Off
lists the MP LAN link speed LEDs and states.
Table 7 MP LAN Link Speed LEDs
Link Speed
100 Mb/s
10 Mb/s
LED State
Solid amber
Off
30 Ports and LEDs
3 Getting Connected to iLO 2
This chapter provides information on getting connected to iLO 2 through a rackmount server or a server blade.
Setup Checklist
Table 8 Setup Checklist
Step Action
Standard
•
For rackmount servers, perform all of the following steps.
•
For server blades, see
“Server Blade Connection” (page 39)
first and then continue with steps 3-8 below.
1 Prepare 1.
Determine the access method to select and connect cables.
2.
Determine the LAN configuration method and assign an IP address if necessary.
NOTE: When accessing iLO 2 via LAN, HP recommends that iLO 2 management traffic be on a separate dedicated management network and that only administrators be granted access to that network.
3.
Find and remove the iLO Network Information Tag. This tag contains the default DNS name and iLO 2 login information. Removing the tag ensures ventilation holes are kept clear for proper server cooling.
2
3
Configure the MP LAN
Log in to iLO 2
Choose a method to configure the LAN for iLO 2 access:
•
DHCP with DNS (Use the default DNS name supplied on your iLO Network Information Tag.)
•
ARP Ping (This feature is supported on certain Integrity servers to assign a static IP number to the MP LAN.)
•
Console serial port (RS-232) (You can perform all iLO
2 text commands from a serial console, or you can use this interface to assign a static IP number, disconnect the serial port, and resume from a web browser.)
Log in to iLO 2 from
• a supported web browser if using DNS or static IP
• the TUI if using the console serial port
Use the default user name and password (Admin, Admin) as found on your removable iLO Network Information Tag.
X
4
5
6
7
Change default user name and password
Set up user accounts
Set up security access
Access the host console
Change the default user name and password on the administrator account to your predefined selections.
Set up the user accounts if you are using the local accounts feature.
Set up the security access settings.
Access the host console using your method of choice.
Setup Checklist 31
Table 8 Setup Checklist (continued)
Step
Advanced
8 Activate advanced features
Action
•
Integrity entry class
â—¦
Activate advanced features by entering your HP
Integrity Advanced Pack license key.
•
Integrity server blades
â—¦
Ships with Advanced Pack license key factory installed.
•
Integrity mid range and Superdome
â—¦
Advanced features are enabled per hard partition with installation of Lights-Out Advanced KVM cards.
No Advance Pack license key required.
Setup Flowchart
Use this console setup flowchart as a guide to help set up the Integrity iLO 2.
X
32 Getting Connected to iLO 2
Figure 7 Setup Flowchart
There are differences in how you connect to iLO 2 depending on if you have a rackmount server or a server blade.
Rackmount Server Connection
For a rackmount server, you can connect directly through the serial console or you can connect using the MP LAN.
To set up the console:
Rackmount Server Connection 33
1.
Determine the physical access method to connect cables. There are two physical connections to iLO 2 :
•
Console serial port (RS-232)
•
MP LAN port
2.
Assign an IP address to the iLO 2 MP LAN using one of the following methods:
•
DHCP and DDNS. Though there are several methods to configuring the LAN, HP recommends DHCP with DNS. DHCP with DNS comes preconfigured with default factory settings, including a default user account and password. Use the DNS name on the iLO
Network Information Tag on the server.
To assign a static IP address instead of using DHCP, use one of the following methods:
•
ARP Ping. This method can be used for Integrity entry class only.
•
Console serial port (RS-232)
Preparing to Set Up iLO 2
Perform the following tasks before you configure the iLO 2 MP LAN:
•
Determine the physical access method to select and connect cables.
•
Determine the iLO 2 MP LAN configuration method and assign an IP address if necessary.
NOTE: Server blade iLO 2s are assigned an IP address by the blade chassis OA.
Determining the Physical iLO 2 Access Method
Before you can access iLO 2, you must determine the correct physical connection method.
There are several ways you can physically connect to iLO 2.
lists the appropriate connection method, required connection components, and connectors to the host console.
Table 9 Physical Connection Matrix
Connection Method
Console serial port
(RS-232)
Required Connection Components
•
Host console
•
Console serial port (RS-232) DB-9F to DB-9F cable (modem eliminator cable)
•
Emulation terminal device (for example, a PC, laptop, or ASCII terminal)
These connection methods directly attach to the iLO 2 MP through the console serial port. This is an RS-232 connection from a workstation to the server's iLO 2 MP console serial port. Serial cable concentrators are used to provide switched access from one workstation to multiple servers. Typically, the console serial port method is used by an administrator in the data center.
LAN port 10/100 LAN cable
Remote access to the iLO 2 is a more convenient method. This remote access is through the
MP LAN port. Depending on your LAN administration, this can be restricted to the datacenter, or extended outside the data center to your company's intranet.
For greater security, HP recommends restricting LAN access to well known, trusted and secured networks.
The iLO 2 has a separate LAN port from the system LAN port. It requires a separate LAN drop,
IP address, and networking information from that of the operating system LAN port. See
and
and use
to determine your physical connection method.
Determining the iLO 2 MP LAN Configuration Method
To access iLO 2 through the MP LAN, iLO 2 must acquire an IP address. The way iLO 2 acquires an IP address is dependent upon whether DHCP is enabled or disabled on the server, and if DHCP and DNS services are available to the server (see
34 Getting Connected to iLO 2
No
No
Yes
No
Yes
DHCP
Yes
Yes
No
Once you have determined the iLO 2 access method, you must determine how you will configure the MP LAN in order to acquire an IP address using the following methods:
•
DHCP/DNS through the management LAN (dynamically assigns an IP address): use the DNS name on the iLO Network Information Tag on the server.
•
Setting up a static IP address using a laptop with DHCP services and the management LAN.
•
ARP Ping to set a static IP using a laptop and the management LAN (assigns a static IP address to Integrity entry class only)
•
Local RS-232 serial port and a serial console (assigns a static IP address).
provides all the possible IP address acquisition scenarios. Use this table to help you select the appropriate LAN configuration method to obtain an IP address.
Table 10 LAN Configuration Methods
Yes
Yes
No
No
No
DNS
Yes
Yes
No
Console Serial Port (RS-232)
No DHCP
Yes
No
LAN Configuration Method
DHCP or console serial port
ARP Ping (entry class only)
No
Yes
Yes
Yes
No
ARP Ping (entry class only)
ARP Ping (entry class only); or console serial port
Console serial port
Console serial port or ARP Ping (entry class only)
Cannot set up the LAN; reconsider your criteria
Configuring the iLO 2 MP LAN Using DHCP and DNS
DHCP automatically configures all DHCP-enabled servers with IP addresses, subnet masks, and gateway addresses. All HP Integrity entry class servers with iLO 2 are shipped from the factory with DHCP enabled.
HP recommends using the DHCP and DNS method to simplify access to iLO 2.
NOTE: You can use ARP Ping on entry class servers regardless of the status of DHCP unless an
IP address has ever been acquired using DHCP. Once an IP address is assigned using DHCP, ARP
Ping is permanently disabled.
When you use DHCP and DNS, you can connect to iLO 2 by entering the DNS name in your browser rather than an IP address only if the following applies:
•
DHCP must be enabled (DHCP is enabled by default).
•
You are using a DHCP server that provides the domain name.
•
The primary DNS server accepts dynamic DNS (DDNS) updates.
•
The primary DNS server IP address was configured through the DHCP server.
IMPORTANT: You must know the DNS domain name, which is served out by the DHCP server, unless its domain is local or the same domain.
To configure iLO 2 using DHCP and DNS:
Rackmount Server Connection 35
1.
Obtain the factory-set DNS name from the iLO Network Information Tag on the server. The
DNS name is 14 characters long. It consists of the letters
MP followed by the 12 characters of the MAC address. For example: mp0014c29c064f
This address is assigned to the iLO 2 MP system board. The system board has a unique MAC address that identifies the hardware on the network.
2.
Connect the MP LAN cable from the server to an active network port.
3.
Apply AC power to the server.
4.
Open a browser, Telnet, or SSH client and enter the fully-qualified DNS name (the full path name ending in the DNS name). The iLO 2 Log In window appears.
5.
Log in using the default user name and password (Admin/Admin).
CAUTION: When DHCP is enabled, the system is vulnerable to security risks because anyone can access iLO 2 until you change the default user name and password.
HP strongly recommends you assign user groups and rights before proceeding.
For greater security, HP recommends that iLO 2 management traffic be on a separate dedicated management network that is configured to only allow limited access from selected secure systems by designated system administrators.
Configuring the iLO 2 MP LAN Using ARP Ping
This method can only be used for entry class.
NOTE: You can use ARP Ping regardless of the status of DHCP unless an IP address has ever been acquired using DHCP. Once an IP address is assigned using DHCP, ARP Ping is permanently disabled. Some DHCP server options can cause the apparent issuance of ARP Ping to iLO 2, which negates the DHCP over DNS method.
The Address Resolution Protocol (ARP) and Packet Internet Grouper (Ping) utility uses ARP packets to ping (discover) a device on the local network segment. The IP address you assign to the server must use the same network segment (subnet) as the system assigning the address. ARP does not work across routed or switched networks.
Use the ARP Ping utility to assign a static IP address when you do not have access to the console serial port (RS-232) or when DHCP is not available.
ARP Ping has the following operational issues:
•
The PC and the server must be on the same physical subnet.
•
When a new server is first booted, DHCP is automatically available (factory-set default), but
ARP Ping does not start until three minutes after iLO 2 is booted. This applies to every subsequent boot of iLO 2 until an IP address is obtained by DHCP or is assigned using the
LC command.
•
Upon successfully assigning an IP address using ARP Ping, DHCP is automatically disabled.
Select one of the following methods to use the ARP Ping utility:
1.
Connect a PC to the network that is on the same physical subnet as the server and run the
ARP Ping commands from the PC.
2.
Locate an existing server on the network and log in to it.
3.
Run the ARP Ping commands from the server.
lists the ARP Ping commands.
36 Getting Connected to iLO 2
Table 11 ARP Ping Commands
ARP Command arp -s ping
Description
Assigns the IP address to the iLO 2 MP MAC address. This ARP table entry maps the MAC address of the iLO 2 MP LAN interface to the static IP address designated for that interface.
Tests network connections and verifies that the MP LAN port is configured with the appropriate IP address.
NOTE: The following procedure explains how to use the ARP Ping utility using a PC that is connected to the network that is on the same physical subnet as the server.
To configure a static IP address using the ARP Ping utility:
1.
Obtain the iLO 2 MP MAC address. To set the IP address using ARP, you must know the MAC address of the iLO 2 MP LAN. You can find the MAC address of the iLO 2 MP LAN on a label on the server.
IMPORTANT: Make sure you obtain the MAC address to the iLO 2 MP LAN and not the
MAC address to the server core LAN.
2.
Verify that an active LAN cable on the local subnet is connected to the MP LAN port on the server.
3.
Access a PC on the same physical subnet as the server.
4.
Open a DOS window on the PC.
5.
At the DOS command prompt (
C: >)
, enter
arp -s
to assign the IP address to the iLO
MAC address.
The syntax is as follows: arp -s
<
IP address you want to assign to the iLO MAC address
> <
iLO
2 MAC address
>
Example from Windows
arp -s 255.255.255.0 00-00-0c-07-ac-00
6.
At the DOS command prompt, enter
ping
followed by the IP address to verify that the MP
LAN port is configured with the appropriate IP address. The destination address is the IP address that is mapped to the iLO MAC address. Perform this task from the PC that has the
ARP table entry.
The syntax is as follows: ping
<
IP address just assigned to the iLO MAC address
>
Example from Windows
ping 192.0.2.1
7.
Use this IP address to connect to the iLO 2 MP LAN.
8.
Use web or Telnet access to connect to iLO 2 from a host on the local subnet and configure the rest of the LAN parameters (gateway, subnet).
Configuring the iLO 2 MP LAN Using the Console Serial Port
The terminal emulation device runs software that interfaces with the server. The software emulates console output as it would appear on an ASCII terminal screen and displays it on a console device screen.
To configure the iLO 2 MP LAN using the console serial port (RS-232):
IMPORTANT: Do not configure duplicate IP addresses on different servers within the same network.
The duplicate server IP addresses conflict and the servers cannot connect to the network.
Rackmount Server Connection 37
The
LC command enables you to configure a static IP address, host name, subnet mask, and gateway address.
IMPORTANT: Ensure you have a console connection through the console serial port (RS-232) or a network connection through the LAN to access the iLO 2 MP CLI and use the
LC command.
1.
Ensure the emulation software is correctly configured: a.
Verify that the communication settings are configured as follows:
•
8/none (parity)
•
9600 baud
•
None (receive)
•
None (transmit) b.
Verify that the terminal type is configured appropriately. The following are supported terminal types:
• hpterm
• vt100
• vt100+
• vt-utf8
IMPORTANT: Do not mix hpterm and vt100 terminal types at the same time. If there are two users collaborating and viewing console output with different emulation modes set, their clients will see garbled results if the output from the system is terminal specific.
Consult the help section of the emulation software application for instructions on how to configure the software options.
2.
Use
to determine the required connection components and the ports used to connect the server to the console device.
3.
Connect the cables.
4.
Start the emulation software on the console device.
5.
Log in to iLO 2. See
“Logging In to iLO 2 Using the Command Line Interface” (page 47) .
6.
At the MP Main Menu, enter
CM
and press Enter to select command mode.
7.
At the command mode prompt, enter
LS
and press Enter. The screen displays the default LAN configuration values. Write down the default values or log the information to a file.
8.
To disable DHCP, enter the
LC command.
a.
From the
LC command menu, enter
D
and press Enter.
b.
Follow the instructions on the screen to change the DHCP status from enabled to disabled.
c.
Enter
XD -R
to reset iLO 2 (this is only necessary if you are connected through a serial port).
9.
Use the
LC command to enter information for the IP address, host, subnet mask, gateway parameters, and so on.
10. Enter
XD -R -NC
to reset iLO 2.
11. After iLO 2 resets, log in to iLO 2 again and enter
CM
at the
MP> prompt.
12. To confirm that DHCP is disabled and display a list of updated LAN configuration settings, enter the
LS
command.
NOTE: HP ProLiant servers allow you to assign a static IP address at boot time to iLO 2 using a
VGA monitor, keyboard, and mouse and HP ProLiant BIOS commands. This feature is not available on HP Integrity servers.
38 Getting Connected to iLO 2
Server Blade Connection
For a server blade, you can connect directly through the SUV cable to the serial console or you can connect using the MP LAN internal connection in the blade enclosure.
NOTE: You do not cable up a separate MP LAN cable to each server blade.
In most circumstances, it is not necessary to physically connect to the iLO 2 on a Server Blade. The iLO 2 on server blades typically use the MP LAN connection in the blade enclosure, and typically get their LAN IP addresses assigned using the OA. In the rare cases where a physical connection directly to a server blade iLO 2 is necessary, use one of the following methods:
•
Connect to iLO 2 with DHCP enabled. Use the OA/iLO network port on the rear of the enclosure. If the OA/iLO network port on the enclosure is connected to the local network that has a DHCP server, your iLO 2 MP IP address is automatically generated by the DHCP server.
The server blade is factory set with DHCP enabled.
•
Connect to iLO 2 with no network connection. Use the console serial port on the SUV cable.
If the enclosure is not connected to any network, you must configure your server through the console serial port (RS-232) on the SUV cable.
NOTE: The local video port can be used to access the console at EFI or potentially the OS, but is not a connection to iLO 2. The USB provides keyboard and mouse to the operating system on
HP Integrity server blades. Also, server blades do not support directly connecting a modem to the
MP (called the remote RS-232 port on servers), so there is no remote RS-232 connection on the server blade. In addition, there is no LAN connection on the front of the server blade.
Connecting to a Server Blade iLO 2 Using the Console Serial Port
If the enclosure is not connected to any network, you must configure your server through the console serial port (RS-232) on the SUV cable. Use this procedure to configure the console serial port to enable iLO 2 access. To perform this procedure, you need a terminal emulator (for example, a laptop using hyperterm) to connect to the server blade.
NOTE: On the HP Integrity server blades, you have access to two serial ports through the RS-232 connector. The default setting is for the iLO 2 interface, the other is for an AUX UART directly connected to the host operating system and can be used for any serial device (terminal, debug port, and so on). HP recommends using the AUX UART for server blade setup and debug purposes only.
You can use a command to toggle between the two ports. However, if access to the iLO 2 MP TUI
CLI is not possible through Telnet and if the port mode of operation is set to the AUX UART, perform a hard reset of iLO 2 to set it to the default shipping settings. To perform a hard reset, push the recessed MP Reset button.
TIP: It is not necessary to physically connect to iLO 2 through the console serial port to perform management tasks. Use the OA/iLO 2 LAN port to communicate with any iLO 2 in the enclosure and the OA. You can use the LCD panel and the OA to configure and determine the iLO 2 MP
LAN address.
Server Blade Connection 39
Connecting the SUV Cable to the Server Blade
This section describes how to connect your server blade to a terminal device using the SUV port.
CAUTION: Disconnect the SUV cable from the port when it is not in use. The port and connector are not intended to provide a permanent connection as it may block proper air flow if left attached for extended periods.
On the SUV cable, locking buttons are located on the sides of the server blade connector. Always squeeze the locking buttons on the SUV cable connector before disconnecting the SUV cable from the SUV cable port. Failure to do so can result in damage to the port.
Use caution when walking near the server blade when the SUV cable is installed. Hitting or bumping the cable can cause the port on the server blade to break. This can damage the system board, requiring it to be replaced.
To establish a connection from the server blade to the terminal emulator:
1.
Insert the SUV cable into the SUV port on the rear of the server blade. See
and
.
2.
Connect a standard DB-9F to DB-9F modem eliminator cable to the RS-232 port on the SUV cable.
3.
Connect the other end of the DB-9F to DB-9F modem eliminator cable to the terminal emulator.
4.
Verify the parameters for serial console port communication are set to the following values on your terminal or emulator device:
•
VT 100 protocol
•
8/none (parity)
•
9600 baud
•
None (receive)
•
None (transmit)
5.
To set the parameters, click OK.
6.
If running an emulator, launch it now.
40 Getting Connected to iLO 2
Figure 8 SUV Cable
3
4
1
2
5
6
7
Server Blade Connector
2-Port USB
VGA (no access to iLO 2)
9-Pin Console Serial Port (RS-232)
USB Label
USB-1
USB-0
Server Blade Connection 41
Figure 9 Connecting the SUV Cable To the Server Blade
Connecting the Server Blade To iLO 2 Using the Onboard Administrator
If the OA/iLO network port on the enclosure is connected to the local network that has a DHCP server, your iLO 2 MP IP address is automatically generated by the DHCP server. The server blade is factory set with DHCP enabled.
For complete OA information, the following guides can be found on the HP website:
•
For CLI, see the HP BladeSystem Onboard Administrator Command Line Interface User Guide.
•
For web GUI, see the HP BladeSystem Onboard Administrator User Guide.
To connect to iLO 2 using the OA:
1.
Connect a standard LAN cable to the OA/iLO network port on the rear of the server blade.
2.
Connect the LAN cable to a local network that has a DHCP server. The LCD display panel on the front of the enclosure displays the Main Menu.
3.
Select Blade or Port Info from the options and click OK.
4.
Select the appropriate server blade from the options on the screen and click OK. The screen displays the iLO 2 MP IP address.
5.
Write down the iLO 2 MP IP address.
6.
Access iLO 2 through Telnet, SSH, or the web using the assigned DHCP iLO 2 MP IP address.
NOTE: For the HP Integrity server blades, you can use the OA to set the IP addresses for all iLO
2s. You can also find the iLO 2 MP address so you can log in.
IMPORTANT: Integrity iLO 2 must have a reachable IP address as the default gateway address.
Since the OA is always reachable, HP recommends using the OA IP address as the gateway address for Integrity iLO 2. If you use the Enclosure IP mode, this solution works during a failover.
In the Enclosure IP mode, a static IP address is assigned to the active OA, and during a failover, the same IP address follows the active OA. If the OA IP address is assigned using DHCP, the solution does not work. In such instances, HP recommends manually changing the iLO 2 gateway address.
42 Getting Connected to iLO 2
Auto Login
Auto login provides direct access to iLO 2 from the OA for users who already logged in to the
OA. A user who has authenticated their connection to the OA can follow a link to a server blade in the enclosure without an additional login step. Auto login features and usage are as follows:
•
A user who has authenticated a connection to the OA is able to establish a connection with iLO 2 without providing the user login and password to iLO 2.
•
The OA provides the following auto login connection methods to iLO 2 links to users to launch these connections to iLO 2: iLO CLI SSH Connection If you logged in to the OA CLI through SSH, enter
connect server <bay number>
to establish an
SSH/Telnet connection with iLO 2.
iLO Web GUI Connection If you logged in to the OA web GUI, click on the link to launch the iLO web GUI.
•
Auto login is implemented using IPMI commands over I2C between the OA and iLO 2 to create and delete user commands.
•
Supports a maximum of four simultaneous OA user accounts. The OA keeps track of these users locally. The information maintained for each user is the user name, password, and privilege levels.
•
User accounts for the auto login feature are created in the MP database when an auto login session is established. These accounts are deleted when the auto login session is terminated.
•
If a maximum number of user accounts has already been reached, and the OA creates another account on iLO 2. The OA sends a request to iLO 2 to delete one of the previously created accounts, before attempting to create a new one.
•
If iLO 2 is rebooted or power-cycled, it checks if there are any previously created OA user accounts in the iLO 2 user database when it boots up. If there are any previously-created OA user accounts, it deletes those accounts.
•
View and manage user accounts created in iLO 2 by the OA like any other local user account on iLO 2. To view and manage user accounts, use the TUI
WHO, UC commands; or use the
User Administration Page in the web GUI.
•
View and disconnect user connections established through the auto login feature just like other connections to iLO 2. To view and disconnect user connections, use the TUI
WHO, DI commands, or use the User Administration Page in the web GUI.
•
The OA supports three types of users: administrators, operators, and users. These user types map to the following iLO 2 capabilities:
Administrators Can perform any function including iLO 2 MP configuration. This level equates to an iLO 2 user with all privilege levels such as, Administer
User Accounts, Remote Console Access, Virtual Power and Reset,
Virtual Media, and Configure iLO MP settings. It allows access to all aspects of the OA including configuration, firmware updates, user management, and resetting default settings.
Operators
Users
Provided access to the host system IRC, serial console, and vMedia.
This level equates to an iLO 2 user with Remote Console Access, Virtual
Power and Reset, Virtual Media, and Configure iLO settings. It allows access to all but configuration changes and user management. This account is used for individuals who might be required to periodically change configuration settings.
Provided read-only login access to iLO 2. This account is used for individuals who need to see the configuration of the OA but do not
Server Blade Connection 43
need the ability to change settings. This level equates to an iLO 2 user with no privileges set.
NOTE: For information on how to set user roles and privilege levels in the OA, see the HP
BladeSystem Onboard Administrator User Guide.
Initiating an Auto Login Session
The auto login session is initiated as follows:
1.
The OA finds the first available auto login user by finding the first user entry with a time-created value of 0.(OAtmp1...OAtmp4).
2.
If there are no available users, the oldest user is deleted.
NOTE: This could terminate a currently active session.
a.
The OA sends a request to iLO 2 to delete that user.
3.
The OA sends a command to create an OA user.
4.
The OA launches an SSH or web GUI connection to iLO 2 and logs in with created user’s credentials.
Terminating an Auto Login Session
When the auto login CLI or web GUI session is terminated, the following user clean up is performed:
•
For auto login sessions, the temporary Auto Login iLO 2 account is deleted when the session with the iLO 2 is terminated.
User Account Cleanup During IPF Blade Initialization
During an IPF blade initialization, the OA and iLO 2 perform the following:
•
When a server blade is inserted, or iLO 2 or the OA is reboot or reset, both the OA and iLO
2 perform cleanup of the accounts that could have been created for auto login before the reset.
•
When iLO 2 initializes, the OA marks all four user slots as unused.
•
Integrity iLO 2 scans its local user accounts. If there are any OA created user accounts, they are deleted from the iLO 2 user database.
Auto Login Troubleshooting
There may be times when auto login fails. The following information provides possible reasons for the failure
User Creation When the OA sends a request to iLO 2 to create a new user, iLO 2 attempts to create a user in the local iLO 2 user database. Creation of an OA user could fail for a number of reasons:
•
The local user database is disabled in iLO 2 and LDAP authentication is being used.
•
The iLO 2 user database has reached the maximum number of users
(19 users).
•
There is already a user registered with the same login name.
44 Getting Connected to iLO 2
User Login
User Deletion
After an OA user has been created in the iLO 2 database, the OA user login can still fail for a number of reasons:
•
The iLO 2 upgrade is currently in progress, and no new connections are allowed.
•
Maximum number of connections for the requested connection type
(SSH, Telnet, web GUI) to iLO 2 has been reached.
•
Requested connection type (SSH, Telnet or web) to iLO 2 is currently disabled.
When the OA sends a request to iLO 2 to delete a user, iLO 2 attempts to delete that user from the local iLO 2 user database. Deletion of an OA user could fail for a number of reasons:
•
A user with the specified login does not exist (user could have been deleted through other iLO 2 user interface).
•
The specified user cannot be deleted because it is the only user in the local database with user administration right.
Additional Setup
This section provides additional information to set up iLO 2.
Modifying User Accounts and Default Passwords
Integrity iLO 2 comes preconfigured with default factory settings, including a default user account and password. The two default user accounts on initial login are:
•
All Rights (Administrator) level user: login =
Admin
password =
Admin
•
Console Rights (Operator) level user: login =
Oper
password =
Oper
Login and password are case sensitive.
TIP: For security reasons, HP strongly recommends you modify the default settings during the initial login session.
Make the following changes using any of the iLO 2 user interfaces.
To modify default account configuration settings:
1.
Log in as the administrator to modify default user configuration settings
2.
To modify default passwords: a.
Access the MP Main Menu.
b.
Enter
CM
at the
MP> prompt.
c.
Enter
UC
at the
MP:CM> prompt and follow the prompts to modify default passwords.
3.
To set up user accounts: a.
Access the MP Main Menu.
b.
Enter
CM
at the
MP> prompt.
c.
Enter
UC
at the
MP:CM> prompt and follow the prompts to modify user accounts.
Additional Setup 45
Setting Up Security
For greater security and reliability, HP recommends that iLO 2 LAN management traffic be on a separate dedicated management network or network subnet and that only administrators be granted access to that network. This not only improves performance by reducing traffic load across the main network, it also acts as the first line of defense against security attacks. A separate network enables you to physically control which workstations are connected to the network.
Setting Security Access
Determine the security access required and what user accounts and privileges are needed. iLO 2 provides options to control user access. Select one of the following options to prevent unauthorized access to iLO 2:
•
Change the default user name and password. See
“Modifying User Accounts and Default
CAUTION: When DHCP is enabled, the system is vulnerable to security risks because anyone can access iLO 2 until you change the default user name and password.
HP strongly recommends you assign user groups and rights before proceeding.
•
Create local accounts. You can store up to 19 user names and passwords to manage iLO 2 access. This is ideal for small environments such as labs and small-to-medium sized businesses.
•
Use corporate directory services to manage iLO 2 user access. This is ideal for environments with a large number of frequently changing users. If you plan to use directory services, HP recommends leaving at least one local account enabled as an alternate method of access.
For more information on how to create local accounts and use directory services, see
“Installing and Configuring Directory Services ” (page 169) .
Setting iLO 2 MP LAN From EFI
Integrity iLO 2 supports an EFI utility to view or configure the iLO 2 MP LAN parameters. If the parameters have not been previously configured, you can use this utility to set them from EFI.
To view the iLO 2 MP LAN parameters from EFI:
1.
Boot to the EFI Shell.
2.
Run ilosetup.efi
from EFI.
fs0:\EFI\TOOLS> ilosetup get
Current LAN parameters:
IP Address : 15.255.96.44
Subnet : 255.255.248.0
Gateway : 15.255.96.1
To configure the iLO 2 MP LAN parameters from EFI:
1.
Boot to the EFI Shell.
2.
Run ilosetup.efi
from EFI.
fs0:\EFI\TOOLS> ilosetup get
Current LAN parameters:
IP Address : 127.0.0.1
Subnet : 255.255.255.0
Gateway : 127.0.0.1
fs0:\EFI\TOOLS> fs0:\EFI\TOOLS> ilosetup set -l -i 15.255.96.44 -g 15.255.96.1 -s 255.255.248.0
Attemping to set iLO LAN parameters...
LAN parameters have been set.
The iLO 2 resets after you have successfully configured the LAN parameters.
46 Getting Connected to iLO 2
4 Logging In to iLO 2
This chapter provides instructions on how to log in to iLO 2.
Integrity iLO 2 standard features provide basic system board management functions, diagnostics, and essential Lights-Out functionality on iLO 2-supported HP servers. For a list of the standard features, see
.
Logging In to iLO 2 Using the Web GUI
To log in to iLO 2 using the web GUI:
1.
Open a web browser and enter the DNS name or the IP address for the iLO 2.
2.
Log in using the default iLO 2 user name and password (Admin/Admin).
TIP: For security reasons, HP strongly recommends you modify the default settings during the initial login session. See
“Modifying User Accounts and Default Passwords” (page 45) .
Logging In to iLO 2 Using the Command Line Interface
To log in to the iLO 2 command line interface:
1.
Access iLO 2 using the console serial port (RS-232), or enter through the LAN, using Telnet,
SSH, or console emulation method. The iLO 2 MP login prompt appears.
2.
Log in using the default the iLO 2 user name and password (Admin/Admin).
TIP: For security reasons, HP strongly recommends you modify the default settings during the initial login session. See
“Modifying User Accounts and Default Passwords” (page 45) .
Following is the MP Main Menu:
CO: Console
VFP: Virtual Front Panel
CM: Command Menu
CL: Console Logs
SL: Show Event Logs
SMCLP: Server Management Command Line Protocol
HE: Main Menu Help
X: Exit Connection
See
Section : “Text User Interface” (page 75)
for information on the iLO 2 MP menus and commands.
TIP: When logging in using the local or remote console serial ports, the login prompt may not display if another user is logged in through these ports. In this case, use Ctrl-B to access the MP
Main Menu and the
MP> prompt.
Network Port Usage
The open network ports iLO 2 uses are listed in the following tables.
lists the TCP ports and
lists the UDP ports.
Logging In to iLO 2 Using the Web GUI 47
Table 12 TCP Ports
Port Identifier
Port 22
Port 23
Port 80
Port 443
Port 2023
Port 4644
Port 17988
Port Type
SSH port
Telnet port http port https port remote serial console port vKVM port vMedia port
Port Functionality
This is the default port used by clients connecting to iLO 2 using SSH protocol.
This is the default port used by clients connecting to iLO 2 using Telnet protocol.
This is the default port used by clients connecting to iLO 2 using the web interface or a web browser. This port is not secure. This port provides basic iLO 2 identification information when queried. Any web connection made on port 80 is redirected to the login on the https port for a secure web session.
This is the port used by clients connecting to iLO 2 using the web interface or a web browser securely. This is a secure port.
Clients connect to this port by default when using the Remote Serial
Console connection.
Clients connect to this port when using the Integrated Remote Console connection.
Clients connect to this port when using the Virtual Media applet connection.
Table 13 UDP Ports
Port Number
Port 161
Port 623
Port Functionality
This port is used by clients to query SNMP information from iLO 2.
This port is used by clients to issue IPMI commands to iLO 2.
48 Logging In to iLO 2
5 Adding Advanced Features
Integrity iLO 2 advanced features are enabled on Integrity servers in one of two ways.
•
For Integrity entry class and server blades, the advanced features are enabled with a license key.
•
For Integrity cell-based servers, the advanced features are enabled with a PCI-X accessory card instead of a key.
For a description of the iLO 2 advanced features and information on how to add advanced features, see
.
Lights-Out Advanced KVM Card for sx2000 Servers
The HP Lights-Out Advanced KVM card is a PCI-X card that you install into any sx2000-based mid range or high end HP Integrity server such as rx7640, rx8640, and Superdome sx2000.
The card works in conjunction with the iLO 2 management processor built into your server and enables the iLO 2 management processor and web GUI interface to access the IRC and vMedia in each hard partition (nPar).
The iLO 2 communicates with the Lights-Out Advanced KVM card over an internal system bus. The card has an external management LAN port which must be connected externally to the same subnet as the iLO 2 MP LAN. The Lights-Out Advanced KVM card uses this LAN port to provide IRC and vMedia communication with the remote user.
The card offers physical video functionality (VGA) for servers running Windows, and USB functionality for servers running HP-UX, Windows, and OpenVMS.
This Lights-Out Advanced KVM card (AD307A) is a superset of the previous graphics/USB card
(A6869A or A6869B). The AD307A card should be used instead of A6869A or A6869B cards.
TIP: The AD307A is not “iLO on a card”. It is not like the ProLiant Lights-Out 100 cards, or RILO cards. The AD307A is a card that adds the logic and firmware to enable the Lights-Out Advanced features of vMedia and the IRC. This card works by extending the features of the iLO2 of the main chassis. This card does not require any additional license keys (no “Advanced Pack license”).
You must install one card in each hard partition (nPar) where the Lights-Out Advanced features are required. You can assign an IP number to the Lights-Out Advanced KVM card through the iLO 2 web GUI or the MP command line interface. The Lights-Out Advanced KVM card features are presented to you through the main iLO 2 interfaces.
IMPORTANT: Lights-Out Advanced features are fully enabled on the Lights-Out Advanced KVM card. You do not need to purchase an additional “advanced pack” license to access the functionality.
The Lights-Out Advanced KVM card offers the following features:
•
Provides extra features for flexibility and manageability of sx2000-based Integrity servers for both remote management when being physically in the datacenter is inconvenient or impractical; and management while in the datacenter.
•
The Lights-Out Advanced KVM card enables the advanced IRC and virtual CD/DVD/ISO image file (vMedia) features of iLO 2.
â—¦
Load software from a DVD using vMedia instead of making a trip to the datacenter.
â—¦
IRC enables full VGA graphical console support remotely.
â—¦
View the Windows console or Windows boot process with the IRC instead of a crash cart (monitor, keyboard).
Lights-Out Advanced KVM Card for sx2000 Servers 49
â—¦ vMedia enables remote attachment of a USB read-only CD or DVD storage device, or
ISO file image, including support for bootable media.
â—¦
Use vMedia to easily upgrade firmware on npars.
â—¦
Create an ISO file of a vfat file system with the required files
–
Start vMedia, present .iso file to npar, boot to EFI, go to the fsX: that corresponds to the vMedia, run e.g.
update.nsh
and repeat on next partition
â—¦
For Windows, you can do installs remotely without having to cable up the VGA/USB card to an IP console switch or a physical monitor, keyboard, and mouse.
•
Integrated VGA graphics and USB ports offer flexibility in the datacenter to monitor a system with full KVM functionality from boot, to desktop, to shutdown.
•
Easily accessed through the iLO 2 web GUI.
Additional Lights-Out Advanced KVM card Information
HP Lights-Out Advanced KVM Card for sx2000 Servers White Paper on the HP website at: http://docs.hp.com/en/AD307-90001/AD307-90001.pdf
You can read about the Lights-Out Advanced KVM card on the HP website at: http://www.hp.com/go/integrityilo
You can read the Quick Specs on the HP website at: http://h18000.www1.hp.com/products/quickspecs/12602_na/12602_na.HTML
You can read an example of ordering and configuration information on the HP website at: http://ccesalewspr02.cce.hp.com/docfiles/V7%20Content/KGNew/6158816/c00430232.pdf
Lights-Out Advanced KVM card Requirements
This section addresses the following Lights-Out Advanced KVM card requirements and conditions:
•
You need Java on the browser system to use vMedia.
•
You need Internet Explorer Active-X controls to use the IRC.
•
Internet Explorer 6.0 SP1 (minimum) is required for the IRC.
•
You need to be running Internet Explorer (with Active-X) on the browser system to use the IRC.
Currently, IRC only supports partitions running Windows.
•
You can only launch one vMedia per complex. For example, if you have vMedia running for nPar1, you cannot run vMedia for nPar2.
•
A network link to the partition's Lights-Out Advanced KVM card is required to launch vMedia.
If there is no network link, the following message displays
Status: vMedia is in use or unavailable
.
•
Vista client systems are not currently supported. You can still run your SSH and Telnet sessions to the MP for VFP, character console, and streaming live system event logs.
lists the supported system configurations for the Lights-Out Advanced KVM card at the time this document was written. For the most recent product specifications, see
www.hp.com/go/integrityilo
.
50 Adding Advanced Features
Table 14 Supported System Configurations
System Component nPartition operating system
Supported platforms
•
Microsoft Windows Server 2003
•
HP-UX 11i v2 or later
•
OpenVMS Version 8.3 or later
•
Windows 2008
• rx7640
• rx8640
•
Superdome sx2000
Description
You can install the Lights-Out Advanced KVM card on any sx2000-based Integrity server with updated management processor firmware that provides iLO 2 functionality and uses the web interface to access iLO 2. The Lights-Out Advanced KVM card must be installed in a PCI-X mode-1 slot. It cannot be used in PCI-X mode 2 slots or in PCIe slots. To determine which slots are mode-1 compatible, see the documentation for your server product. A Lights-Out Advanced KVM card is required for each hard partition (nPartition) where you want virtual keyboard, video, mouse (vKVM) and vMedia functionality; Lights-Out Advanced functionality is not currently supported on virtual partitions (vPar).
TIP: Remember, you do not need an iLO 2 Advanced Pack license key to use this card.
lists which features of the Lights-Out Advanced KVM card are available on each operating system.
Table 15 Availability of Features
IRC
1 nPartition Operating System
Windows
HP-UX
Yes
No vMedia
Yes
Yes
VGA Graphics Port
Yes
No
USB Ports
Yes
Yes
OpenVMS
Linux
No Yes
Not currently supported under Linux.
No Yes
Lights-Out Advanced KVM Card for sx2000 Servers 51
1
The remote management workstation must be running Windows with Active-X enabled on Internet Explorer 7.
Configuring the Lights-Out Advanced KVM Card
Usually, the Lights-Out Advanced KVM card obtains its IP address automatically from a DHCP server. If you do not have a DHCP server on your network, you must manually set the Lights-Out
Advanced KVM card IP address. To manually set the Lights-Out Advanced KVM card IP address:
•
If you are using the web GUI, use the LAN Settings page on the Administration tab.
•
If you are using the MP CLI, use the
LC command.
â—¦
MP:CM> lc
MP Configurable LAN devices:
1.
MP Customer LAN
2.
Integrity LO Advanced KVM Card: Cab 0, IO Chas 1, Slot 7
3.
Enter LAN device to change, or [Q] to Quit:
NOTE: If the Lights-Out Advanced KVM card IP settings are not configured, the card still works as a local VGA/USB card, but IRC and vMedia do not work.
NOTE: Before the
LC command allows you to configure an IP address, you must boot the system to EFI so the Lights-Out Advanced KVM card can be detected by system firmware.
TIP: You never need to connect serial cables to the Lights-Out Advanced KVM card. The Lights-Out
Advanced KVM card communicates to iLO 2 through an internal bus.
Lights-Out Advanced KVM Card IRC Feature
The iLO 2 MP that is built into your server provides, as a standard feature, a virtual serial console where you can view the entire managed server in the standard HP-UX, Linux, OpenVMS, or
Windows headless console format. The IRC feature of the Lights-Out Advanced KVM card enables you to view video output from the managed OS hard partition (nPartition) where the Lights-Out
Advanced KVM card is installed, providing a seamless view from the server boot to OS desktop.
The Lights-Out Advanced hardware captures three essential components for the managed (host) nPartition:
•
Keyboard input to the console
•
Video output
•
Mouse input to the console
When a user activates the remote console on the Windows management workstation, the Lights-Out
Advanced KVM card sends all keyboard and mouse input from the IRC / vKVM client to the host nPartition.
For information on how to use the IRC, see
“Integrated Remote Console” (page 109) .
Lights-Out Advanced KVM Card vMedia Feature
Virtual Media support, which is part of the Lights-Out Advanced KVM card feature set, provides users with a virtual disk drive that connects to the managed server through the same management
LAN as the iLO/MP, just as if it were physically connected to the server.
The Lights-Out Advanced KVM card uses a client-server model to perform vMedia functions. The
Lights-Out Advanced KVM card streams virtual media data across a live network connection between the remote management console and the host server. The virtual media Java applet provides data to the Lights-Out Advanced KVM card as it is requested.
52 Adding Advanced Features
The Lights-Out Advanced KVM card contains a USB device that is viewed by the host OS as if it were a physical USB device connected to the server. Under the control of the Lights-Out Advanced
KVM card firmware, a virtual USB device can be remotely connected to the host server. When the virtual media is connected, an OS that is USB-aware loads its standard USB mass storage driver.
Once the USB mass storage driver is loaded, the server OS does not require additional HP drivers running on the server OS.
Additionally, the host server EFI system firmware is extended to support USB virtual devices, making virtual media available end-to-end (in a pre-boot environment, through OS loading and while the
OS is operational).
NOTE: The Lights-Out Advanced KVM card must be connected to the same subnet as the MP
LAN to enable vKVM and vMedia functionality.
For information on how to use vMedia, see
.
Installing the Lights-Out Advanced KVM Card in a Server
You can install the HP Lights-Out Advanced KVM card into any mode-1 slot in a PCI-X backplane, or any mode-1 PCI-X slot in a PCI-X/PCIe backplane.
CAUTION: Observe all electrostatic discharge (ESD) safety precautions before attempting this procedure. Failure to follow ESD safety precautions could cause damage to the server.
CAUTION: You cannot add or replace a Lights-Out Advanced KVM card while the nPartition is running. You must first shut down the nPartition before adding or replacing the card. For more information on shutting down nPartitions and powering off hardware components, see your server documentation.
IMPORTANT: The HP Lights-Out Advanced KVM card requires that your server has the minimum system firmware installed. To see the firmware versions, go to the HP website at www.hp.com/ go/integrityilo .
Before performing certain iLO 2 functions, verify that you have the supported firmware version required to carry out the task.
IMPORTANT: The HP Integrity rx8640 and rx7640 midrange servers support only one Lights-Out
Advanced KVM card per partition, and the card must be installed in an I/O chassis with a core
I/O card installed. If you install multiple Lights-Out Advanced KVM cards on one partition, only the first card that is detected is fully enabled. Subsequent cards will have only USB functionality enabled.
IMPORTANT: The graphics functionality of the Lights-Out Advanced KVM card also takes precedence over the A6869B graphics/USB PCI card. If both a Lights-Out Advanced KVM card and an A6869B card are present on a partition, the A6869B card has only USB functionality enabled. HP recommends removing the A6869B card if you have both cards installed on a partition.
Lights-Out Advanced KVM Card for sx2000 Servers 53
Figure 10 PCI-X or PCI-X/PCIe Card Cage (Common to all supported servers)
1
PCI-X/PCIe Cards
2
PCI-X or PCIe Backplane
IMPORTANT: Cabling requirements:
•
You must connect the LAN port on the Lights-Out Advanced KVM card to the same network as the MP LAN port on the server.
•
You need a network cable to your regular core I/O MP port - one per complex.
•
You need one network cable to each Lights-Out Advanced KVM card.
To install the Lights-Out Advanced KVM card, perform the following steps:
1.
Shut down the nPartition and power-off the appropriate PCI power domain.
2.
Locate an empty mode-1 PCI-X slot where the card will be installed.
3.
Position the card over the empty slot, ensuring that the edge connector keyways match on the
PCI-X or PCI-X/PCIe backplane connector.
4.
Using slow, firm pressure, seat the card in the slot.
5.
Connect the management LAN cable to the LAN port on the card.
NOTE: If you do not wish to use the on-card KVM features, ignore steps 6 and 7, and proceed to step 8.
6.
Connect the monitor cable to the VGA port on the card, and connect the mouse and keyboard cables to the USB ports on the card.
7.
Connect the monitor power cable, and then turn on the monitor.
54 Adding Advanced Features
8.
Power on the PCI power domain, and then boot the nPartition.
By default, the Lights-Out Advanced KVM card uses Dynamic Host Control Protocol (DHCP) to obtain an IP address. Alternatively, you can assign a static IP address to the Lights-Out
Advanced KVM card through a menu in the main iLO 2 web GUI interface or other iLO 2 MP command line.
To remove the Lights-Out Advanced KVM card, reverse these steps.
Lights-Out Advanced KVM Card Quick Setup Steps
To perform a quick setup of the Integrity Lights-Out Advanced KVM card for vMedia and the IRC:
1.
Plug the LAN cable into the MP of the core I/O card for the complex.
2.
Plug the LAN cable into the LAN slot of the Lights-Out Advanced KVM card for each nPar.
NOTE: Usually, the Lights-Out Advanced KVM card obtains its IP address automatically from a DHCP server. If you do not have a DHCP server on your network, you must manually set the Lights-Out Advanced KVM card IP address. To manually set the Lights-Out Advanced KVM card IP address, see
“Configuring the Lights-Out Advanced KVM Card” (page 52)
3.
Browse to iLO 2 (MP) and login.
a.
-> Administration -> Network Settings -> Device to modify:
<npar> KVM b.
-> assign a network address (DHCP or static) -> Submit.
NOTE: You may also need to set up the Domain Name Server if you are not using
DHCP.
4.
Check the status of vMedia availability.
a.
Virtual Media -> select partition:
<npar name>
-> (check status directly under “select partition status” ) it should read “Status: vMedia is available”.
•
If not, there may not be network connectivity to the Lights-Out Advanced KVM card
– check this with ARP ping.
•
If the network is OK, check that another vMedia window for this complex is not open somewhere.
NOTE: Only one vMedia window is shared among all the npars in the complex.
b.
If this fails, log out of iLO 2 and log back in again.
5.
Once the vMedia window opens, select
Local Image File
.
6.
Browse to the iso file and click
Connect
.
NOTE: The IRC is only supported on Windows systems. You can only open one IRC session at a time with one iLO 2 web GUI session.
7.
If not yet done, go to the EFI Shell: acpiconfig windows and reset.
8.
Start the IRC. If you get the following “dvc.cab unknown publisher” error:
Lights-Out Advanced KVM Card for sx2000 Servers 55
Figure 11 dvc.CAB Error
Follow these steps: a.
Close the IRC window.
b.
Open a vMedia window for that npar (no need to connect).
c.
Select
Always trust content from this publisher in the Warning - Security window after opening vMedia.
d.
Re-open the IRC window.
9.
When rebooting. you should see the output of the console on both the serial console and the
IRC. This will not appear if acpiconfig is in default mode. When it displays in graphic mode, you only see it on the IRC.
Using Lights-Out Advanced KVM Features
To access the iLO 2 web GUI, browse to the main iLO 2. The following functionality is available:
•
Server status
•
Firmware versions
•
System event log
•
Remote power
•
Remote reset for partitions
•
MP and Lights-Out Advanced-KVMs
•
MP user administration
•
MP and Lights-Out Advanced-KVM network settings
The only user access to the Lights-Out Advanced KVM card is through the main iLO 2 web GUI.
•
The Lights-Out Advanced KVM card is not “iLO on a card”; and it is not a RILOE.
•
The web browser does not connect directly to the Lights-Out Advanced KVM card. The web browser connects to the main iLO 2 for the whole chassis.
•
The iLO 2 then communicates with the Lights-Out Advanced KVM card.
•
The firmware does not allow direct communication with the Lights-Out Advanced KVM card.
In the main iLO 2 web GUI, there are a number of new tools that are unique to the Integrity cell-based servers. Specifically, there are pull-down tabs that enable you to select individual partitions for power (on/off/reset) management, vMedia, and IRC / vKVM. The last two, vMedia and IRC, are enabled per partition with the Lights-Out Advanced KVM card. The pull-down tabs for vMedia and IRC only show partitions that have Lights-Out Advanced KVM cards installed.
56 Adding Advanced Features
Mid Range PCI Backplane Power Behavior
On Integrity cell-based servers, you can power off the Lights-Out Advanced KVM card separately from the iLO 2 management processor. For example, you can power off a partition containing a
Lights-Out Advanced KVM card, while keeping other partitions powered on. Or, you can power off the entire complex (all the partitions). In either case, the iLO 2 management processor is still accessible because it is powered separately from the partitions.
If iLO 2 is accessed while a partition is powered off, the Lights-Out Advanced KVM card in that partition could still appear in the partition drop-down lists for vMedia or IRC. However, you will not be able to start a vMedia or IRC session and the status will be “In use or unavailable”. If a vMedia or IRC session was already open when the partition was powered off, the session window remains open, but is not active.
Troubleshooting the Lights-Out Advanced KVM Card
When troubleshooting the Lights-Out Advanced KVM card, consider the following:
•
Verify that the card is installed in the proper/supported slot. Be aware of slot restrictions.
•
Check for Lights-Out Advanced KVM card seating and connections to the slot connector.
•
Check that the slot MRL is closed.
•
Make sure the supported firmware version for the MP, the server, and the Lights-Out Advanced
KVM card is installed.
•
Check that the Lights-Out Advanced and MP network cables are connected correctly.
•
Check the LED link indicators on the bulkhead LAN port.
•
Understand the Lights-Out Advanced RJ45 LAN connector LED definitions.
•
Check that the cables are correctly connected to the Lights-Out Advanced bulkhead ports
(LAN, VGA, USB1, & USB2).
•
Check for the use of the correct DNS name for access/connection.
•
Check the web browser support and configuration/restrictions.
lists possible problems with the Lights-Out Advanced KVM card, and provides suggested solutions.
Table 16 General Troubleshooting
Problem
Graphics error:
Black screen. No text is displayed.
Solutions
Hardware problem:
•
Must have supported power enabled.
•
Must have a functional mode-1 PCI-X slot. Try selecting another mode-1 slot on same partition/backplane.
•
Must have the card firmly seated in PCI-X/PCI-Xe backplane slot.
•
Must have a supported monitor.
•
Must have verified cable connections to the card.
•
Must have a functional Lights-Out Advanced KVM card.
Lights-Out Advanced KVM Card for sx2000 Servers 57
Table 16 General Troubleshooting (continued)
Problem
Graphics error:
Display is unreadable.
vKVM or vMedia features are not available.
Solutions acpiconfig problem:
•
Must have acpiconfig set to windows or enable vgaroute
.
•
Boot to EFI mode and check with acpiconfig command.
•
Ensure that the system firmware supports the Lights-Out
Advanced KVM card.
•
Ensure that the graphics resolution is compatible and set correctly.
•
Ensure that the LAN cable is connected properly.
•
Ensure that the Lights-Out Advanced KVM card is connected to the same network as the server iLO 2 MP.
Error message received when launching vKVM: Windows has blocked this software because it can't verify the publisher.
ActiveX Error:
•
Open a vMedia session on the server before running vKVM.
Publisher: Unknown Publisher dvc.CAB
•
Select
Always trust content from this publisher.
in Warning – Security window after opening vMedia.
•
Open vKVM again.
Error message when using vKVM and Reflection X.
Web display not formatted properly when using Firefox or Mozilla.
Internet Explorer errors when opening vMedia or vKVM.
vKVM in fullscreen mode is not supported when using
Reflection X.
Use Internet Explorer only (other browsers are not supported).
Ensure that the latest versions of Java and ActiveX are installed.
Core I/O Card Configurations
Both the HP Integrity rx7640 8-socket server and the HP rx8640 16-socket server always have at least one core I/O card (factory installed in I/O chassis 1 in the rx7640, and in I/O chassis 0 in the rx8640).
•
In an rx7640 with only one core I/O card and one Lights-Out Advanced KVM card, you must install the Lights-Out Advanced KVM card in I/O chassis 1.
•
In an rx8640 with only one core I/O card and one Lights-Out Advanced KVM card, you must install the Lights-Out Advanced KVM card in I/O chassis 0.
•
For rx7640 or rx8640 servers with two core I/O cards, you can install the Lights-Out Advanced
KVM card in either I/O chassis (with only one Lights-Out Advanced KVM card per partition).
lists examples of unsupported core I/O card configurations with the Lights-Out Advanced
KVM card and possible solutions.
58 Adding Advanced Features
Table 17 Unsupported Core I/O Configurations with Possible Solutions
Server rx7640 rx8640
Configuration Result
•
One core I/O card installed in
I/O chassis 1.
•
Lights-Out Advanced KVM card installed in I/O chassis 0.
Operating system does not boot with this unsupported configuration.
•
One core I/O card installed in
I/O chassis 0.
•
Lights-Out Advanced KVM card installed in I/O chassis 1.
Operating system does not boot with this unsupported configuration.
Solution
Move the Lights-Out Advanced
KVM card to I/O chassis 1.
Move the Lights-Out Advanced
KVM card to I/O chassis 0.
Supported PCI-X Slots
lists supported mode-1 PCI-X slots for each supported server with either PCI-X or PCI-X/PCIe backplanes.
Table 18 Mode-1 PCI-X Slots by Server and Backplane
Server rx7640
PCI-X Backplane
•
Use slots 1, 2, or
7
•
Do not use slots
3, 4, 5, or 6
PCI-X/PCIe
Backplane Notes
•
Use slots 1, 2, or
7
•
Do not use slots
3, 4, 5, or 6
•
Slot 8 must be occupied by a core I/O card for the
Lights-Out Advanced KVM card to function.
•
If a core I/O board is not present, use the lowest numbered cell with a core I/O board.
•
Use slot 7, 8, or the lowest numbered slot in the rootcell I/O chassis if a core I/O board is present.
When using slot 7 or 8, make sure there are no other Lights-Out Advanced KVM cards in the I/O chassis, or they will be selected over the cards in slots 7 or 8.
rx8640
Superdome sx2000
•
Use slots 1, 2, 7,
•
8
Do not use slots
3, 4, 5, or 6
•
Use slots 1, 2,
7, 8
•
Do not use slots
3, 4, 5, or 6
•
Use the lowest numbered slot in the rootcell I/O chassis if a core I/O board is present.
•
If a core I/O board is not present, use the lowest numbered cell with a core I/O board.
•
Must be installed in slot 0 on Windows partitions.
•
In acpiconfig
= default mode, USB devices
(including vMedia) are not initialized by default.
•
Use the search and map -r
EFI Shell commands to attach drivers and map file systems. (Create a boot option to avoid this step on future resets.)
•
Use slots 0, 1, 2,
3, 4, 7, 8, 9, 10,
11
•
Do not use slots 5 or 6
•
Use slots 0, 1,
8, 9, 10, 11
•
Do not use slots
2, 3, 4, 5, 6, or
7
Use the lowest numbered slot in the rootcell I/O chassis.
Upgrading the Lights-Out Advanced KVM Card Firmware
The following utilities and the associated firmware files are available on the HP website at www.hp.com
.
kvmFlasher An EFI utility used to update the firmware of the RMP3 on the Lights-Out
Advanced KVM card.
Lights-Out Advanced KVM Card for sx2000 Servers 59
fpgaFlasher An EFI utility to update the firmware of the virtual video FPGA chip on the
Lights-Out Advanced KVM card.
TIP: Before performing certain iLO 2 functions, verify that you have the supported firmware version required to carry out the task.
60 Adding Advanced Features
6 Accessing the Host (Operating System) Console
This chapter describes several ways to access the host console of an HP Integrity server.
Accessing a Text Host Console through iLO 2 Virtual Serial Console
Web browser access is an embedded feature of iLO 2.
Before starting this procedure, you must have the following information:
•
DNS name for the iLO 2 MP LAN. This is found on the iLO Network Information Tag on the server.
•
Host name
To interact with iLO 2 through the web:
1.
Open a web browser and enter the DNS name or the IP address for the iLO 2 MP.
2.
Log in using your user account name and password at the login page. (
).
Figure 12 Web Login Page
NOTE: The iLO 2 web interface session times out after five minutes if there is no activity. If you open a remote console terminal window, the system remains open in the web interface session until you sign out. Also, the web session does not timeout if vMedia is connected.
3.
Click Sign In. The Status Summary page ( Figure 13
) appears after login.
Accessing a Text Host Console through iLO 2 Virtual Serial Console 61
Figure 13 Status Summary Page
4.
Select the web interface functions by clicking the Primary tabs at the top of the page. Each function lists options in the Navigation Control on the left side of the page.
5.
To display data in the content area; select an option and click Refresh to update the display.
6.
Click the Remote Console tab. The remote console provides the following options to access the console:
•
A serial console that behaves similarly to the TUI
•
The virtual KVM console
Accessing Online Help
The iLO 2 web interface has a robust help system. To launch iLO 2 help, click Help. Alternately, click the
?
at the top right corner of each page to display help about that page.
Accessing a Text Host Console Using the TUI
To access the host console using the text user interface (TUI):
1.
Log in using your user account name and password at the login page.
2.
To switch the console terminal from the MP Main Menu to mirrored/redirected console mode, enter the
CO command at the
MP> login prompt. All mirrored data appears.
3.
To return to the iLO 2 MP command interface, enter Ctrl-B or Esc (.
Help System
Integrity iLO 2 has a robust help system.
To access the Help menu from the TUI, enter
HE
at the
MP> prompt. The following is the MP Help
Main Menu:
==== MP Help: Main Menu ===============================================
Integrated Lights-Out for HP Integrity and HP 9000 - Management Processor (MP) MP Help System
Enter a command at the help prompt:
OVerview : Launch the help overview
LIst : Show the list of MP Main Menu commands
62 Accessing the Host (Operating System) Console
<COMMAND> : Enter the command name for help on individual command
TOPics : Show all MP Help topics and commands
HElp : Display this screen
Q : Quit help
====
MP:HE
To display the Main Menu Command List, enter
LI
at the
MP HE: prompt.
To return to the MP Main Menu, enter
Q
.
To access help from the web GUI, click Help. You can also click the
?
at the top right corner of each page to display help about that page.
Accessing a Graphic Host Console Using the Integrated Remote Console
For information on how to access the host console using the vKVM feature through the Integrated
Remote Console (IRC), see
“Accessing the IRC” (page 112)
.
Accessing a Text Host Console Using SMASH SM CLP
For information on how to access the host console using the SMASH SM CLP, see
.
Accessing a Graphic Host Console Using the Integrated Remote Console 63
7 Configuring DHCP, DNS, LDAP, and Schema-Free LDAP
This chapter provides information on how to configure DHCP, DNS, LDAP extended schema, and schema-free LDAP.
Configuring DHCP
DHCP enables you to automatically assign reusable IP addresses to DHCP clients. This section provides information on how to configure DHCP options such as the Domain Name System (DNS).
The iLO 2 MP host name you set through this method displays at the iLO 2 MP command mode prompt. Its primary purpose is to identify the iLO 2 MP LAN interface in a DNS database.
NOTE: The HP-UX system name displayed by the uname -a command is different than the iLO
2 MP host name.
If the IP address, gateway IP address, and subnet mask are obtained through DHCP, you cannot change them without first disabling DHCP. If you change the host name and the IP address was obtained through DHCP and registered with dynamic DNS (DDNS), a “delete old name” request for the old host name and an “add name request” for the new host name are sent to the DDNS server.
If you change the DHCP status between enabled and disabled, the IP address, subnet mask, and gateway IP address are set to default values (127.0.0.1:0xffffff00). Also, the DNS parameters are voided. When you change the DHCP status from enabled to disabled, the DNS parameters for using DHCP are set to disabled, and the
Register with DDNS parameter is set to
No
. When you change the DHCP status from disabled to enabled, the DNS parameters for using DHCP are set to enabled, and the
Register with DDNS parameter is set to
Yes
.
NOTE: DNS is the comprehensive RFC standard; DDNS provides only a part of the DNS standard functionality.
To configure DHCP, use the
LC command to perform the following actions:
•
Set all default LAN settings.
MP:CM> LC -all DEFAULT –nc
•
Display current LAN settings.
MP:CM> LC -nc
•
Modify the MP DHCP status.
MP:CM> LC -dhcp disabled
•
Modify the MP IP address.
MP:CM> LC -ip 192.0.2.1
•
Modify the MP host name.
MP:CM> LC -h hostname
•
Modify the MP subnet mask.
MP:CM> LC -s 255.255.255.0
•
Modify the MP gateway address.
MP:CM> LC -g 192.0.2.1
•
Set the link state to autonegotiate.
MP:CM> LC -link auto
64 Configuring DHCP, DNS, LDAP, and Schema-Free LDAP
•
Set the link state to 10 BaseT.
MP:CM> LC -link t
•
Set the remote console serial port address.
MP:CM> LC -web 2023
•
Set the SSH console port address.
MP:CM> LC -ssh 22
Configuring DNS
To use the DNS command to display and modify the DNS configuration:
1.
From the MP Main Menu, enter command mode.
2.
At the
MP:CM> prompt, enter
DNS
. The screen displays the current DNS data.
3.
When prompted, enter
A
to select all parameters. The screen displays the current DHCP for
DNS servers status.
4.
When prompted, enter
Enabled
or
Disabled
. The screen displays the current DHCP for
DNS domain name status.
5.
When prompted, enter
Enabled
or
Disabled
. The screen displays the current register with
DDNS server value.
6.
When prompted, enter
Yes
or
No
. The screen displays the current DNS domain name.
7.
When prompted, enter a new value. The screen displays the primary DNS server IP address.
8.
When prompted, enter a new value. The screen displays the optional secondary DNS server
IP address.
9.
When prompted, enter a new value. The screen displays the optional tertiary DNS server IP address.
10. When prompted, enter a new value.
The DNS configuration is updated as follows:
New DNS Configuration (* modified values):
* S - DHCP for DNS Servers : Disabled
* D - DHCP for DNS Domain Name : Disabled
R - Register with DDNS Server : Yes
* N - DNS Domain Name : mpdns.company.com
* 1 - Primary DNS Server IP : 192.0.2.1
2 - Secondary DNS Server IP :
3 - Tertiary DNS Server IP :
Enter parameter(s) to revise, Y to confirm, or [Q] to Quit: Y
-> DNS Configuration has been updated
[mpserver] MP:CM>
Configuring LDAP Extended Schema
The following procedure shows how to configure iLO 2 to use a directory server to authenticate a user login using the iLO 2 MP TUI.
NOTE: The LDAP connection times out after 30 minutes of inactivity in Active Directory. For Novell directory, there is no inactivity timeout.
To configure using the web interface, see
.
NOTE: The LDAP feature is only available if you have the iLO 2 Advanced Pack license.
Configuring DNS 65
To configure LDAP extended schema:
1.
From the MP Main Menu, enter command mode.
2.
At the
MP:CM> prompt, enter
LDAP
.
3.
To select Directory Settings, enter
D
. The current LDAP directory settings appear.
4.
To select all parameters enter
A
. The current LDAP directory authentication status appears.
The local iLO 2 user accounts database status also appears. If enabled, the local iLO 2 user database is used if there is an authentication failure using the LDAP Directory.
5.
Enter
D
for disabled, or
E
for enabled. You must enter
E
if LDAP directory authentication is disabled. The current LDAP server IP address appears.
6.
Enter the IP address of the LDAP server. The current LDAP server port address appears.
7.
Enter a new port number. The screen displays the current object distinguished name. This specifies the full distinguished name of the iLO 2 device object in the directory service. For example,
CN=RILOE2OBJECT, CN=Users, DC=HP, DC=com
. Distinguished names are limited to 255 characters maximum plus one for the
NULL terminator character.
8.
Enter a new name. The Current User Search Context 1 appears.
9.
Enter a new search setting. The Current User Search Context 2 appears.
NOTE: The context settings 1, 2, and 3 point to areas in the directory service where users are located, so that users do not have to enter the complete tree structure when logging in.
For example,
CN=Users, DC=HP, DC=com
. Directory user contexts are limited to 127 characters maximum plus one for the
NULL terminator character for each directory user context.
10. Enter a new search setting. The screen displays the Current User Search Context 3.
11. When prompted, enter a new search setting.
The updated LDAP configuration is as follows:
New Directory Configuration (* modified values):
* L - LDAP Directory Authentication : Enabled
M - Local MP User database : Enabled
* I - Directory Server IP Address : 192.0.2.1
P - Directory Server LDAP Port : 636
D - Distinguished Name (DN) : cn=mp,o=demo
1 - User Search Context 1 : o=mp
2 - User Search Context 2 : o=demo
3 - User Search Context 3 : o=test
Enter Parameter(s) to revise, Y to confirm, or [Q] to Quit: y
-> LDAP Configuration has been updated
Login Process Using Directory Services with Extended LDAP
You can choose to enable directory services to authenticate users and authorize user privileges for groups of iLO 2s. The iLO 2 directory services feature uses the industry-standard LDAP. HP layers LDAP on top of SSL to transmit the directory services information securely to the directory servers. More information about using iLO with directory services is available from the HP website at: http://h20000.www2.hp.com/bc/docs/support/SupportManual/c00190541/c00190541.pdf?
jumpid=reg_R1002_USEN
HP provides a tool for Active Directory support of HP management processors. This tool,
HPQLOMIG.exe
, is part of HP Directories Support for Management Processors softpaq
(SP31581.exe). It assists with installing the schema and snap-ins needed for Active Directory to work with iLO 2 products including Integrity iLO 2. This is for set up and management. It will not do automatic migration for you. For Integrity iLO 2, you must manually add iLO 2 objects to the
66 Configuring DHCP, DNS, LDAP, and Schema-Free LDAP
directory server and set up user accounts and privileges. You can find the tool on the HP website at: http://h20000.www2.hp.com/bizsupport/TechSupport/SoftwareDescription.jsp?lang=en&cc=US& swItem=MTX-UNITY-I23896
Using directory services after users enter their login and password, the browser sends the cookie to iLO 2. The iLO 2 processor accesses the directory service to determine which roles are available for that user login. iLO 2 first uses the credentials to access the iLO 2 device object in the directory.
The directory service returns only the roles for which the user has rights. If the user credentials allow read access to the iLO 2 device object and the role object, iLO 2 determines the role object’s distinguished name and the associated user privileges. iLO 2 then calculates the current user privileges based on those roles and grants them to that user.
Configuring Schema-Free LDAP
IMPORTANT: Due to command syntax changes in schema-free LDAP, some customer-developed scripts may not run. You must change any scripts you developed to enable them to run with the new schema-free LDAP syntax.
Integrity iLO 2 schema-free directory integration enables you to use the standard directory schema instead of adding HP’s schema to the directory database. You accomplish this by authenticating users from the directory database and authorizing iLO 2 privileges based on matching groups stored on each iLO 2.
NOTE: Schema-Free LDAP is available only if you have the iLO 2 Advanced Pack license.
In addition to general directory integration benefits, iLO 2 schema-free integration provides the following advantages:
•
Easy implementation without schema extensions.
iLO 2 schema-free integration is configured from any iLO 2 user interface (browser, command line, or script).
•
Minimal administration and maintenance.
â—¦
After initial setup, only groups and permissions require maintenance support on iLO 2; typically group and permission changes occur infrequently.
â—¦
The schema-free approach does not require updating directory databases with new iLO
2 devices objects.
•
Reliable security.
Integrity iLO 2 schema-free integration does not affect standard directory attributes, avoiding conflicting use of attributes that can result over time.
•
Complements two-factor authentication.
Integrity iLO 2 schema-free integration can be used in conjunction with iLO 2 two-factor authentication to provide asset protection using strong authentication.
NOTE: If you have already extended your directory with HP schema, there is no need to switch to the schema-free approach. Schema extension provides the lowest maintenance approach for directory integration. Once this process has taken place, there is no advantage for the schema-free approach until a schema change is required.
To configure schema-free LDAP:
1.
Follow the procedure for
“Configuring LDAP Extended Schema” (page 65)
, but omit Step 8.
It is not necessary to enter a new port number.
2.
Set up directory security groups.
Configuring Schema-Free LDAP 67
Setting Up Directory Security Groups
The following procedure describes how to set up directory security groups in schema-free LDAP using the iLO 2 MP TUI. To use the web interface, see
.
NOTE: Due to command syntax changes in schema-free LDAP, some customer-developed scripts may not run. You must change any scripts you developed to enable them to run with the new schema-free LDAP syntax.
NOTE: You must select the default schema from the
LDAP command for the schema-free LDAP settings to work.
To set up directory security groups, follow these steps.
1.
At the
MP:CM> prompt, enter
LDAP
. The screen displays the current LDAP options.
[hqgstlb3] MP:CM> ldap
LDAP
Current LDAP options:
D - Directory settings
G - Security Group Administration
2.
Enter
G
. The current group configuration appears.
Enter menu item or [Q] to Quit:G
Current Group Configuration:
Group Names Group Distinguished Names Access Rights
--------------------------------------------------------------------------
1 - Administrator C, P, M, U
2 - User C, P
3 - Custom1 None
4 - Custom2 None
5 - Custom3 None
6 - Custom4 None
Only the first 30 characters of the Group Distinguished Names are displayed.
Enter number to view or modify, or [Q] to Quit:
3.
Enter the number for the group you want to view or modify. The current LDAP group settings appear.
4.
Set up a group distinguished name.
5.
Select rights for the group.
6.
Enter
Y
to confirm.
Login Process Using Directory Services Without Schema Extensions
You can control access to iLO 2 using directories without schema extensions. iLO 2 acquires the user name to determine group membership from the directory. iLO 2 then cross-references the group names with its locally stored names to determine user privilege level. iLO 2 must be configured with the appropriate group names and their associated privileges. To configure iLO 2, use one of the following methods:
•
Web GUI (Administration > Directory Settings > Group Administration page)
• iLO 2 MP TUI (
LDAP command)
68 Configuring DHCP, DNS, LDAP, and Schema-Free LDAP
LDAP and MP Login for Integrity Cell-Based Servers
This section provides information on LDAP and MP login access rights and partition configuration in iLO 2 for Integrity cell-based servers. System administrators can use this information to create and assign access rights.
This section explains the following:
•
User login functions when configured with different rights for different partitions
•
User management and privileges required to execute commands in iLO 2
Integrity iLO 2 is an independent support processor that provides system manageability features for a multi-partition server.
The following rules apply:
•
Multiple users can simultaneously log in through the LAN port and independently manage partitions or view the server status.
•
Local or LDAP users can have rights.
•
A user who has rights on multiple partitions can have the same or different rights for each partition.
•
For all operations that are not partition-specific, a user must have a specific right for all partitions to which access is granted.
The iLO 2 supports multiple sessions that perform independent tasks and enables the following usage models:
•
A user can have multiple windows logged into iLO 2, and can perform long-term tasks such as monitoring virtual front panels or studying event logs in some windows while simultaneously performing short-term tasks like administering partitions from other windows.
•
A user can independently connect to different partitions and manage them simultaneously.
•
A user can reset a partition from one window and monitor the boot from another window while interacting with the console from yet another.
User Accounts
LDAP enables you to define iLO 2 user accounts in a centralized database on an LDAP server.
LDAP directory support is an iLO 2 advanced feature that enables centralized, user account administration using directory services.
Commands
The iLO 2 commands have access levels to manage users effectively. Because iLO 2 commands work at different combinations of these access levels, you must understand how to categorize the commands.
The iLO 2 user interface has commands that can be classified into the following categories. Each category requires certain access rights as shown in
.
Partition-specific Commands
These commands are partition-specific. They include commands that operate on a specified partition.
LDAP and MP Login for Integrity Cell-Based Servers 69
te who x he pwrgrd pd vfp ups fw io if ls ma ps de df du he
MP-Wide Commands cp cc id lt lc ldap date dc di fw parperm rl sa sysrev dns loc snmp
Composite Commands
These commands have sub commands within them that require different rights to execute. For example the
SO command has
User Parameters
,
MP-wide parameters within it. Each sub command needs rights as follows:
•
MP:CM> so
â—¦
MP wide parameters [U]
â—¦
User parameters [M]
â—¦
IPMI password [M]
â—¦
OS initiated firmware update permissions [M]
â—¦
Regenerate the SSH server public key [M]
Special Commands
These commands include operations that affect the cell, cabinet, or complex, and only users having
‘All’ rights for ‘All’ supported partitions are allowed to execute these commands.
MP-wide Commands
MP-wide commands require a specific command right for all partitions that a user has access to.
The iLO 2 commands are grouped in the above-mentioned categories, as shown in
Table 19 Command Categories
Partition-Specific
Commands bo tc co rr rs cl
Composite Commands xd so cl sl
Special Commands pe re ru (KMIX only) vm (sx2000 only)
70 Configuring DHCP, DNS, LDAP, and Schema-Free LDAP
Access Rights
An iLO 2 user can have any, or all, of the following access rights:
Table 20 Access Rights for Cell-Based Servers
Access Right
Login Access
Single Letter
Representation
L
Description
This right is required to perform any operation on iLO 2.
A user must have this right for each partition to which access is granted.
With this right, a user can run Status or Read-only commands.
Console Access
Server Power Access
MP Configuration Access
User Administration Access
Virtual Media Access
C
P
M
U
V
This right enables a user to access the console of the specified partition (such as the host OS).
Console Access Level
CO
Command.
This right enables a user to power on and off or reset the host platform.
This right enables a user to configure iLO 2 parameters.
Some examples of commands that are used to configure MP parameters are
CA, CC, CG, DATE, DC, DI, ID, IT,
LC, LDAP, MFG, PARPERM
, and
RL
.
This right enables a user to create, modify, and delete local iLO
2 user accounts and set the default partition for a session.
Examples of an MP Local User Administration Level Command are
SO and
PD
.
This right enables a user to control and access vMedia for the selected partition.
lists the iLO 2 commands and the access right associated with each command.
Table 21 Commands and Associated Access Right
Access Right Command
BO
RR
DATE
DC
DE
DF
RS
TC
CC
CP
DI
DU
HE
ID
IF
Location
Command Menu Server Power Access
Server Power Access
Server Power Access
Server Power Access
MP Configuration Access
Login Access
MP Configuration Access
MP Configuration Access
Login Access
Login Access
MP Configuration Access
Login Access
Login Access
MP Configuration Access
Login Access
LDAP and MP Login for Integrity Cell-Based Servers 71
Table 21 Commands and Associated Access Right (continued)
Location Command
IT
LC
LDAP
LS
MA
PARPERM
PD
PE
PS
PWRGRD
RE
RU (KMIX only)
SA
SO
Access Right
MP Configuration Access
MP Configuration Access
MP Configuration Access
Login Access
Login Access
MP Configuration Access
User Administration Access
All for all supported partitions
Login Access
Server Power Access
All for all supported partitions
All for all supported partitions
MP Configuration Access
1.
MP Wide Parameters - MP Configuration rights for all partitions to which the user has access
2.
User Parameters - User Admin rights for all partitions to which the user has access
3.
IPMI Password - MP Configuration rights for all partitions to which the user has access
4.
OS initiated FW - MP Configuration rights for all partitions to which the user has access
5.
Regenerate SSH Certificate - MP Configuration rights for all partitions to which the user has access
SYSREV
TE
WHO
XD
DNS
LOC
SNMP
UPS
FW
MP Configuration Access
Login Access
Login Access
1.
Parameters Checksum and Ping - Login rights for all partitions that user has access to
2.
Soft Reset for Master/Slave & IOX Master/Slave MP - MP Configuration rights for all partitions to which the user has access
3.
Clear Persistent Parameters - User Admin rights and MP Configuration rights (for all partitions to which the user has access)
4.
Reset Security Parameters - User Admin rights for all partitions to which the user has access
5.
Force/Recover Master - Slave FailOver - MP Configuration rights for all partitions to which the user has access
6.
Toggle Master/Slave FailOver Enable - MP Configuration rights for all partitions to which the user has access
MP Configuration Access
MP Configuration Access
MP Configuration Access
MP Configuration Access
MP Configuration Access
72 Configuring DHCP, DNS, LDAP, and Schema-Free LDAP
Table 21 Commands and Associated Access Right (continued)
Command
CI
CO
HE
SL
VFP
X
MPEL
IO (sx2000 only)
VM (sx2000 only)
Location Access Right
1.
View logs - Console rights for a partition
2.
Clear logs - MP Configuration rights for all partitions to which the user has access
Console Access
Login Access
1.
View SEL, FPL, LIVE - Login rights for all partitions to which the user has access
2.
View iLO 2 event log - Login rights for all partitions to which the user has access
3.
View MPEL Logs - MP Configuration rights for all partitions to which the user has access
4.
Clear SEL & FPL Logs - MP Configuration rights for all partitions to which the user has access
Command Menu
Command Menu
Login Access
Login Access
MP Configuration Access
Login Access
All for all supported partitions
These access rights work in conjunction with the three different kinds of partition user support options.
Partition User Support Options
In a server that supports multiple partitions, the following options are available for partition users.
A user can be configured for any of the following partition usage levels:
Single Partition Use
A user could have access to any one partition with rights defined.
Multipartition User, Same Rights
A user can have access to multiple partitions of a server but with the same rights for all the partitions.
Multipartition User, Different Rights
A user can have access to multiple partitions with different rights for all the partitions.
If a server has multiple partitions, the following rules apply for a user:
•
Each user, at the time of creation, is classified either as an all or
#partition user. A partition might or might not be configured in the system.
•
Login rights are required for a user to login. These rights are checked before running each command to ensure that LOGIN rights are not revoked in the interim. A user with
L rights can run all commands related to status and read-only commands.
•
When a user tries to run partition-specific commands but the partition is not configured, a message appears that the partition is not configured
•
Special commands such as pe
, ru
, and re require a user to have all rights to all partitions.
These commands can affect cells that are considered ‘free cells’ (not associated with any partitions). Therefore, this mandate applies to users before running special commands.
LDAP and MP Login for Integrity Cell-Based Servers 73
•
For all MP-wide commands (such as ldap
, lc
, and so on), a user must have corresponding rights for all partitions that the user has access to.
•
When assigning rights to user logins in a multiserver environment, remember the various combinations of available rights, types of commands, and partition authority.
74 Configuring DHCP, DNS, LDAP, and Schema-Free LDAP
8 Using iLO 2
This chapter provides information on the different interfaces you can use to interact with iLO 2 such as text user interface, web GUI, and SMASH SM CLP.
Text User Interface
This section provides information on the text user interface commands you can run in iLO 2.
NOTE: HP Integrity server blades do not have fans or power supplies. Therefore, their response to certain commands are different than a rackmount server.
MP Command Interfaces
lists and describes the available MP command interfaces.
Table 22 MP Command Interfaces
MP Command Interface
MP Main Menu
Command Menu
SMASH SM CLP
Description
The MP Main Menu appears when you first access the iLO 2 MP. The MP Main Menu supports the basic MP commands for server control and the iLO 2 MP configuration, such as setting up the iLO 2 MP LAN, retrieving events, resetting and powering on control of the server, switching to the console, and so on. You can enter the MP Main Menu commands at the
MP> prompt.
The Command menu provides a set of commands that help monitor and manage the server.
It switches the console terminal from the MP Main Menu to command interface mode. You can access commands that are not displayed in the MP Main Menu by entering
CM at the
MP Main Menu and entering
HE LI
at the
MP:CM> prompt to get a list of the available commands.
The Systems Management Architecture for Server Hardware (SMASH), Server Management
Command Line Protocol (SM CLP) initiative is an effort within the Distributed Management
Task Force (DMTF) to standardize commands for servers. The SMASH SM CLP specifies common command line syntax and message protocol semantics for server management.
NOTE: SMASH SM CLP commands are only available for entry class servers.
For information on using SMASH SM CLP scripting commands, see
Server Management Command Line Protocol” (page 141)
.
displays the MP command interface options.
Text User Interface 75
Figure 14 MP Command Interfaces
MP Main Menu
After logging in to the iLO 2 MP, the MP Main Menu appears. The MP Main Menu runs as a private session. Other iLO 2 users do not see the actions you perform in the private session.
Integrity iLO 2 can support multiple sessions to perform independent tasks:
•
Multiple windows logged into iLO 2 to monitor VFP or study event logs in one window while administering the server from another window.
•
Resetting a server from one window and monitoring the boot from another window while interacting with the console from a third window.
lists the MP Main Menu commands.
Table 23 MP Main Menu Commands
Command
CO
VFP
CM
SMCLP
CL
SL
HE
X
Description
Selects console mode
Displays the virtual front panel
Enters command interface mode
Accesses the SMASH SM CLP
Views the console log
Shows event logs
Displays help for the menu or command
Exits
TIP: An effective method for using iLO 2 is to log in more than once with different views for each session. For instance, one window logged in viewing the console, and another viewing the virtual front panel.
MP Main Menu Commands
MP Main Menu command descriptions are listed as follows:
76 Using iLO 2
CO
(Console): Leave the MP Main Menu and enter console mode
CO switches the console terminal from the MP Main Menu to mirrored/redirected console mode.
All console output is mirrored to all users in console mode. Only one of the mirrored users at a time has write access to the console. To get console write access, press
Ctrl-Ecf
.
Press either
Ctrl-B
or Esc and ( to return to the iLO 2 MP command interface. Verify that all mirrored consoles are of the same terminal type for proper operation.
To run an ASCII screen-oriented application (SAM) or a file transfer program ( ftp
), the console is not the recommended connection. HP recommends using the LAN and connecting directly with
Telnet or the web to the system over the system LAN.
VFP
(Virtual Front Panel): Simulate the display panel
VFP simulates the display panel on the front of the server. It gives realtime feedback on the results of system events and user actions. VFP works by decoding system events. It provides a live display of major states of the system, the latest system activity, and the state of front panel LEDs.
VFP shows forward progress during boot by indicating how many events have been received since the boot started and whether there have been any errors (events with alert level 3 or greater) since the last boot. To clear the yellow attention indicator on the front of the system, use the
SL command and access the System Event Log (SEL).
Each user viewing VFP is in private session mode.
See also:
LOC
(locator LED) and,
SL
(show logs).
CM
(Command Mode): Enter command mode
CM switches the console terminal from the MP Main Menu to mirrored command interface mode.
The Command menu provides you with a set of standard command line interface commands that help monitor and manage the server.
To display the list of MP command mode commands that are not displayed in the MP Main Menu:
1.
From the MP Main Menu, enter
HE
.
2.
Enter
LI
after the
MP HELP:> prompt.
If a command is in progress, a system status message appears.
To return to the MP Main Menu, press
CTRL-B
.
SMCLP
(Server Management Command Line Protocol): Switch to the SMASH SMCLP
SMCLP switches the console terminal from the MP Main Menu to the SMASH SMCLP interface. For information on SMASH SM CLP see
“SMASH Server Management Command Line Protocol”
.
CL
(Console Log): View the history of the console output
CL displays up to 60 KB of logged console data (about 60 pages of display in text mode) sent from the system to the console path and stored for later analysis.
Console data is stored in a buffer in nonvolatile memory. By default, data is displayed from the beginning of the buffer to end of the buffer. You can control the starting point from which the data displays and navigate through the data.
An image of the console history appears when you enter the
CL command. Console output continues to be logged while this buffer is read, and nothing is lost.
SL
(Show Logs): View events in the log history
SL displays the contents of the event logs that are stored in nonvolatile memory.
Events communicate system information from the source of the event to other parts of the system, then to you. Events are produced by intelligent hardware modules, the operating system, and
Text User Interface 77
Event
+
-
Enter (<CR>)
D
J
H
F
L
Q
?
Ctrl-B
A
U
K
T system firmware. Events funnel into the BMC from different sources throughout the server. iLO 2 polls the BMC for new events and stores them in nonvolatile memory.
SL also displays the contents of the iLO 2 Event Log. The records the following events:
• iLO 2 MP login and logout attempts
•
Command logging for specific commands
•
All entries in the existing history log with more detail
Each time a user logs in or out of iLO 2, an event is logged. In the event of a login failure, an event is logged if the number of continuous login failure attempts equals the password fault value.
Command logging is run for the following commands:
BP, CA, DC, DI, DNS, FW, ID,
IT, LC, LDAP, LM, PC, PM, PR, RB, RS, SA, SNMP, SO, TC, UC
Events are listed as follows:
SEL: System Error Log
FPL: Forward Progress Log
Boot Log
High-attention events and errors
All events
All events between start of boot and boot complete
Previous Boot Log The events from the previous boot
Reading the SEL is the only way to turn off the attention LED (flashing yellow light).
lists the events and actions used to navigate within the logs.
Table 24 Events
Action
Displays the next block (forward in time)
Displays the previous block (backward in time)
Continues to the next or previous block
Dumps the entire log for capture or analysis
Displays the first entry
Displays the last entry
Jumps to entry number
Displays the mode configuration (hex)
Displays the mode configuration (keyword)
Displays the view mode configuration (text)
Displays the alert level filter options
Displays the alert level unfiltered
Quits and returns to the Event Log Viewer Menu
Displays the Help Menu
Exits and returns to the MP Main Menu
Integrity iLO 2 Event Log navigation provides additional filtering options as shown in
Table 25 iLO 2 Event Log Filter Options
Filtering Option
N: User Login
P: Port Name
Filter Criteria
Filter by user Login ID
Filter by port name (Serial, Telnet, SSH, WEB)
78 Using iLO 2
Table 25 iLO 2 Event Log Filter Options (continued)
Filtering Option
I: IP Address
M: Date
Filter Criteria
Filter by user IP Address (dotted decimal format)
Filter by date stamp of the records entries (MM/DD/YYYY)
If you select more than one filtering option, it acts as an additional filter. For example, if you select the filtering option
N followed by
P
, the logs displayed are the logs that satisfy the filtering criteria for options
N and
P
.
NOTE: The iLO2 Event Logs cannot be cleared.
A finite number of records are stored. The older records are replaced as the log fills up.
lists alert (severity) levels.
Table 26 Alert Levels
Severity
0
3
5
1
2
7
Minor forward progress
Major forward progress
Informational
Warning
Critical
Fatal
Definition
See also: DC (default configuration) and VFP (virtual front panel).
SL Command for Integrity Cell-Based Servers
SL
: Show Logs - View the events in the log history.
SL displays the contents of the events that have been stored in nonvolatile memory.
Events are data items that communicate system information from the source of the event to other parts of the system, and ultimately to the system administrator. Events are produced by intelligent hardware modules, the operating system, and system firmware. Events funnel into iLO 2 from different sources throughout the server.
Events can be a result of a failure or an error (such as fan failure, machine-check, and so on). They can indicate a major change in system state (firmware boot start, system power on/off) or they might be forward progress markers, (such as CPU self test complete). Event data indicates what the event was, where it happened, and the severity of the event. The most important events are error logs (alert level 3 or higher), and major change of state logs, because they give information that can provide clues about the cause of anomalous behavior. The log viewer contains an event decoder to help you interpret events.
lists events, actions, and functions of the logs.
Table 27 Events and Actions
Event
FPL
SEL
Action
Forward Progress Log -
Stores all events of level
0 or greater
Functions
New events overwrite old FPL events once the FPL is full.
System Error Log - Stores all events of level 2 or greater
New events are not logged to the SEL when the SEL is full. Thus, it is necessary for a user or an application to periodically clear the SEL. Reading the SEL turns off the attention LED. Accessing this buffer is the only way to turn off the attention LED when it is flashing.
Text User Interface 79
Table 27 Events and Actions (continued)
Event
MPEL
Action
MP Event Log - Stores user action events including user login
Functions
New events overwrite old MPEL events once the MPEL is full.
The iLO 2 MPEL records the following events:
• iLO 2 MP login, logout attempts and login failure records
•
MP firmware upgrade
•
MP firmware activate event
•
Console access
•
Clearing of logs
MPEL logs cannot be cleared.
Formatting options are not available for MPEL.
Live Logs
Clear Logs
Displays events, live as they occur
Clears the activity and error log buffers
The
Live Logs feature enables you to apply a filter, and filter out logs by cell or by partition, or to view only error logs.
The
Clear Logs command clears both the FPL and SEL. It is useful for getting a "clean log trace". A user with Console access right can view the System
Event Log. Only a user with iLO Configuration access right can clear the logs.
Login rights are sufficient to view the logs. But for clearing the logs, iLO
Configuration rights are required for all the partitions to which user has access.
But MPEL logs cannot be cleared.
Keyword Format
For the event logs, the default format is Keyword (keyword plus hex). SEL and FPL provide formatting options, the other two formats are raw hex mode and text mode. Text mode gives a multi-line display that is more readable and decodes any physical location data.
The (
D
)ump command dumps the entire log in keyword format. It is useful for capturing the log contents to a file and emailing it for analysis by support personnel.
Navigation
Navigation commands enable you to move forward or back a screen at a time, and to jump to a specific log number or to the first or last log entry.
lists the navigation commands and their actions.
Table 28 Navigation Commands
Navigation
Command
D
F
L
J
+
-
<cr>
<sp>
?
Ctrl-B
Action
Dump log starting at current block for capture and analysis (for SEL and FPL) Dump log starting from the beginning (for MPEL)
Display first (oldest) block
Display last (newest) block
Jump to specified entry and display previous block
Display next (forward in time) block
Display previous (backward in time) block
Repeat previous +/- command
Repeat previous +/- command
Display help
Exit viewer
80 Using iLO 2
NOTE: The MPEL log history display provides the same navigation commands as the FPL and the SEL except for the
D command.
MPEL log navigation provides the following filtering options:
Table 29 MPEL Log Navigation Filter
MPEL Log Navigation Filter
S : User Login
P : Login Method
I : IP Address
T : Date
U : Unfiltered
Action
Filter by User Login ID
Filter by User Login Method (Serial, Telnet, SSH, WEB)
Filter by user IP Address (dotted decimal format)
Filter by date stamp of the record entries (MM/DD/YYYY)
Switch back to unfiltered state
HE
(Help): Display help for the menu or command in the MP Main Menu
HE displays help for the menu or command.
•
If executed from the MP Main Menu,
HE displays general information about iLO 2, and those commands available in the MP Main Menu.
•
If executed in command mode,
HE displays a list of Command menu commands available. It also displays detailed help information in response to a topic or command at the help prompt.
X
(Exit): Exit iLO 2
X exits you from the MP Main Menu. If the terminal is the local serial port, the login prompt appears.
For all other types of terminals, you are disconnected from iLO 2.
Command Menu
The Command menu provides you with a set of standard command line interface commands that help monitor and manage the server.
lists the Command menu commands.
Table 30 Command Menu Commands
Command
BP
BLADE
CA
DATE
DC
DF
DI
DNS
FW
HE
ID
Description
Resets the BMC passwords
Displays blade parameters
NOTE: This command is available only on a server blade.
Configures asynchronous local serial port
Displays the current date
Resets all parameters to default configuration
Displays field replaceable unit (FRU) information
Disconnects the LAN console
Sets the DNS configuration
This command is only available to authorized HP service personnel
Displays help for the menu or command
Displays or modifies system information
Text User Interface 81
Table 30 Command Menu Commands (continued)
Command
IT
LC
LDAP
LM
LOC
LS
PC
PM
PR
PS
RB
RS
SA
SNMP
SO
SS
SYSREV
TC
TE
UC
WHO
XD
Description
Modifies the iLO 2 inactivity timeouts
Displays the LAN configuration
Displays the LDAP configuration
License management
Displays and configures locator LED
Displays the LAN status
Remote power control
Remote power mode control
Configures the power restore policy
Displays the power management module status
Resets the BMC
Resets the system through the RST signal
Sets access options
Configures SNMP parameters
Configures security options
Displays system processor status
Displays all firmware revisions
Resets through transfer of control (TOC)
“Tell” (sends a message to other users)
Displays a user configuration
Displays connected iLO 2 users
Diagnoses or resets iLO 2
The following is a quick reference list that provides MP Command mode activities:
To access the Command menu, enter
CM
at the MP Main Menu.
To see all the available commands, enter
HE LI
at the
MP:CM> prompt.
To access the Command menu help, enter
HE
at the
MP:CM> prompt. The Command menu help provides information on all the Command menu items.
To modify the inactivity timeout, enter the
IT
command. The inactivity timer aborts a command if you do not complete it within a certain time period and redirects you back to the command prompt.
To abort most commands, enter
Q
at the point when the iLO 2 MP is asking for input.
To return to the MP Main Menu from any of these commands, press
Ctrl-B
.
Command Line Interface Scripting
A command line interface is provided for all commands to assist you in scripting. This section provides syntax examples used in the iLO 2 MP command-line or scripted interface.
Typically, tools like Expect (see
“Expect Script Example” (page 83) ) and
(http://expect.nist.gov/ ) are used to string together several commands to accomplish a task. These scripting tools enable
82 Using iLO 2
you to write a script for one iLO 2, and use it to apply the same commands to additional iLO 2s.
Scripting tools have capabilities that enable you to do the following:
•
Write scripts that make decisions based on the output of commands
•
Use variables in the script to customize it for each target automatically
•
Compensate for delays in output
Scripting tools and the command-line interfaces enable you to carry out commands to multiple iLO
2s such as setting the IP address on 10 iLO 2s pulled from a list of 10 IP addresses read from a file local to your script. To automatically administer any part of the system during any stage of its operation, you can use the scripting tool to log in to iLO 2, access the console, and send and receive commands in EFI or the OS.
NOTE: This guide is not meant as a substitute for instruction on various scripting tools that are available for automating command-line interfaces. The iLO 2 MP TUI (when used with command-line arguments) and the SMASH command-line interface were created with these types of scripting tools in mind to facilitate powerful automation capabilities.
Expect Script Example
The following provides a simple Expect script example with no timeouts and no error checking using Telnet instead of SSH.
#!/usr/local/bin/expect -f
#
# (Portions of) this Expect script (were) was generated by autoexpect on
# Tue Nov 21 08:45:11 2006
# Expect and autoexpect were both written by Don Libes, NIST.
#
# Note that autoexpect does not guarantee a working script. It
# necessarily has to guess about certain things. Two reasons a script
# might fail are:
#
# 1) timing - A surprising number of programs (rn, ksh, zsh, telnet,
# etc.) and devices discard or ignore keystrokes that arrive "too
# quickly" after prompts. If you find your new script hanging up at
# one spot, try adding a short sleep just before the previous send.
# Setting "force_conservative" to 1 (see below) makes Expect do this
# automatically - pausing briefly before sending each character. This
# pacifies every program I know of. The -c flag makes the script do
# this in the first place. The -C flag allows you to define a
# character to toggle this mode off and on.
set force_conservative 0 ;# set to 1 to force conservative mode even if
;# script wasn't run conservatively originally if {$force_conservative} {
set send_slow {1 .1}
proc send {ignore arg} {
sleep .1
exp_send -s -- $arg
}
}
#2) differing output - Some programs produce different output each time
# they run. The "date" command is an obvious example. Another is
# ftp, if it produces throughput statistics at the end of a file
# transfer. If this causes a problem, delete these patterns or replace
# them with wildcards. An alternative is to use the -p flag (for
# "prompt") which makes Expect only look for the last line of output
# (i.e., the prompt). The -P flag allows you to define a character to
# toggle this mode off and on.
#
# Read the man page for more info.
Text User Interface 83
#
# -Don
#
# (End of auto-expect generated content)
#######################################################################
# USER set mp_user "Admin"
# PASSWORD- get password from terminal instead of storing it in the script stty -echo send_user "For user $mp_user\n" send_user "Password: " expect_user -re "(.*)\n" set mp_password $expect_out(1,string) stty echo
# Other Constants set timeout 20
########################################################################
## BEGIN
## spawn $env(SHELL) match_max 100000
#foreach mp_name {puma_mp lion_mp cougar_mp} { set mp_name "puma_mp"
send_user "\n\n----- $mp_name -----\n\n"
# Frequently used Strings
set MA_PROMPT "$mp_name\] MP> $"
set CM_PROMPT "$mp_name\] MP:CM> $"
# Expect the UNIX prompt...
#expect "-> $"
#### Log into the MP #####
send -- "telnet $mp_name\r"
expect ".*MP login: $"
send -- "$mp_user\r"
expect "MP password: $"
send -- "$mp_password\r"
expect "$MA_PROMPT"
#Run SL command to dump logs
#send "sl -forward -view text -nc\r"
send -- "cm\r"
expect "$CM_PROMPT"
#Run PC command to power on the system
send -- "pc -on -nc\r"
expect "$CM_PROMPT"
send "ma\r"
expect "$MA_PROMPT"
send "x\r"
#} expect eof
84 Using iLO 2
Command Menu Commands and Standard Command Line Scripting Syntax
The following list of commands is provided to help you learn about the Command menu commands.
Command-line interface scripting syntax for each command is provided to help you accomplish a scripting task. The following rules apply to scripting syntax:
•
The
-nc
(no confirmation) is optional. This special keyword designates that no user confirmation is required to execute the command. If you enter
-nc
at the end of the command line, the command is executed without asking you for user input. Without the
-nc option, you are asked to confirm the changes. The only exception to this rule is when a password must be entered. In that case, you are prompted for a password separately. However, commands that require a password can have that password entered on the command line (
FW
,
UC
).
If
-nc is specified on a command with no other parameters or with only a specific multilevel selector, the command displays all or just the specific multilevel parameters. The absence of a specific multilevel parameter on a command that has multilevels causes all the multilevel parameters to display.
•
Most commands accept
-all default
. This causes all parameters for that command to be set to their default values.
•
In some multilevel commands, you can use default to set that level to its default values.
•
Further use of default on many individual parameters causes that parameter to be set to its default value.
•
-?
(MP command-specific help) is optional. If you enter
-?
by itself with the command, a usage display appears. In the event of an incorrect command line usage, in addition to the error message, the usage display appears.
•
Arguments in brackets
[ ] are optional.
•
Without arguments, the system prompts you for answers to questions.
•
Entering a command without parameters takes you through the command interactively and prompts you for all the options.
BP
: Reset BMC passwords
Command access level: MP configuration access
BP resets the passwords that control the interface between the SFW and the BMC.
NOTE: The passwords that control the interface between the SFW and the BMC have nothing to do with the MP login/passwords.
Setting these passwords at EFI, enables you to restrict access to various information. To clear these passwords, use the
BP command.
Command line usage and scripting:
BP [ -nc ]
-?
See also:
DC, RB, UC
BLADE:
Display BLADE parameters
NOTE: This command is available only on a server blade.
Command access level: Login access
BLADE facilitates the cabling and initial installation of HP Integrity server blades. It also provides a quick view of the enclosure status. You must have configuration access right to turn the enclosure locator UID LED on or off.
Onboard Administrator Configuration
Text User Interface 85
OA IP Address IP address of the OA.
OA MAC Address MAC address of the OA.
Server Blade Configuration
Rack Name Logically groups together enclosures in a rack. The rack name is shared with the other enclosures in the rack.
Rack UID Rack unique identifier.
Bay Number The blade enclosure can support up to eight HP Integrity server blades. When viewed from the rack front, the bays are numbered from left to right, from 1 to
8. The bay number is used to locate and identify a blade.
Enclosure Information
Enclosure Name Logically groups together the server blades installed in the same enclosure.
The enclosure name is shared with the other server blades in the enclosure.
Health Indicates one of three states of health of this enclosure.
OK Normal operation, any issues have been acknowledged.
Degraded Typically loss of redundancy or partial failure of a component.
Critical Failure with loss or imminent loss of system function.
Command line usage and scripting:
BLADE [ -nc ]
blade -?
Example of the
BLADE
Command With Output
[gstlhpg1] MP:CM> blade
BLADE
Onboard Administrator Information:
IP Address : 192.0.2.1
MAC Address : 0x00xxxxxexxbb
Server Blade Information:
Rack name : RACK
Rack UID : 000z00xx0000
Bay Number : 3
Enclosure Information:
Enclosure name : encl
Health : OK
-> Command successful.
[gstlhpg1] MP:CM>
CA
: Configure asynchronous local serial port
Command access level: MP configuration access
CA sets the parameters for the local and the remote serial console. Input and output data rates are the same. The value returned by the stty command on HP-UX is the local serial port console speed.
Set up the local serial port parameters as follows:
BAUD RATES Input and output data rates are the same. Possible values are as follows: 4800,
9600, 19200, 38400, 115200 bit/sec.
FLOW CONTROL Hardware uses RTS/CTS; software uses Xon/Xoff.
86 Using iLO 2
For HP Integrity server blades, the
CA command also provides an option to change between the
Integrity iLO mode or the dedicated AUX UART mode. Switching to AUX UART mode when MP remote access is disabled or LAN parameters are not configured requires a push button reset to change back to iLO MP mode.
NOTE: Inconsistent bit rate settings can result in improper MP UI while switching between these modes.
The operation mode settings are saved on the MP NVRAM and are permanent for reset and firmware upgrade of iLO 2, but the settings are not permanent for power cycles or blade ejection.
For power cycle to the blade, the console serial port is set back to the iLO mode.
If you cannot access iLO 2 through Telnet and the port mode of operation is AUX UART, you must change the port operation mode to Integrity iLO mode to access the MP through the serial port.
To change the port operation mode to iLO, perform a hard reset to the MP by pushing the recessed push button through a hole in the front panel. The hard reset resets the MP hardware and sets the
MP to the default settings. The hard reset returns the port default connection to MP.
NOTE: Both short and long reset button presses return the port default connection to the MP.
The iLO 2 mirrors the system console to the iLO 2 MP local and LAN ports. One console output stream is reflected to all connected console users. If several different terminal types are used simultaneously, some users can see unexpected results.
Command line usage and scripting:
CA [ -local ] [ -bit <n> ] [ -flow >software|hardware> ] ] [ -nc ]
-?
Server blade usage
CA [ -local ] [ -bit <n> ] [ -flow >software|hardware> ]
[ -mode ,aux|ilo> ] ] [ -nc ]
-?
See also:
SA
DATE
: Display date
Command access level: Login access
DATE displays the date, as best known to iLO 2. The iLO 2 clock is updated from the BMC/SFW and cannot be modified. The realtime clock is used only when iLO 2 is first powered on or rebooted, until it can obtain the correct date from the BMC.
Command line usage and scripting:
DATE [ -nc ]
-?
DC
(Default Configuration): Reset all parameters to default configurations
Command access level: MP configuration access
DC sets all iLO 2 parameters back to their default values. To restore specific configurations to their default values, use the following commands:
MP IP configuration : LC -all DEFAULT
Remote Access Configuration : SA -all DEFAULT
Command Interface configuration : IT -all DEFAULT
MP Security configuration : SO -opt DEFAULT
MP Session configuration : IT -all DEFAULT
MP User configuration : UC -all DEFAULT
MP LDAP directory configuration : LDAP -all DEFAULT
SNMP Configuration : SNMP - all DEFAULT
Text User Interface 87
Use any of the following methods to reset passwords in iLO 2:
•
In the
UC command, change individual users or reset all users to default values.
•
Reset passwords by pressing the MP reset button on the back panel of your HP server for longer than four seconds. After iLO 2 reboots, the local console terminal displays a message for five seconds. Responding to this message in time enables a local user to reset the passwords.
NOTE: All user information (logins, passwords, and so on) is erased when you use any of the previous reset methods.
Command line usage and scripting:
DC [ -all default [ -nc ] ]
-?
DF
: Display FRU information
Command access level: Login access
DF displays FRU information for FRU devices located behind the BMC. Information provided includes serial number, part number, model designation, name and version number, and manufacturer.
Command line usage and scripting:
DF [ -specific[ <fruid> ] | -all ] [ -view <text|hex> ] [ -nc ]
-?
DI
: Disconnect LAN, WEB, SSH, or Console
Command access level: MP configuration access
DI disconnects LAN, web SSL, or SSH users from iLO 2. It does not disable the ports. To disable the ports, see the
SA command for LAN/WEB/SSH/IPMI over LAN access. Use the
TE and
WHO commands to identify the connected users before running this command.
Command line usage and scripting:
DI [ -telnet] [ —web ] [ -ssh ] [ -nc ]
-?
See also:
EX, SA, TE, WHO
DNS
: DNS settings
Command access level: MP configuration access
DNS configures the DNS domain name and up to three DNS servers either manually or automatically with DHCP. You can use this command only with DHCP enabled. You can also perform a DDNS update through the primary DNS server as long as it is authoritative for the zone.
If no DNS server IP addresses are specified, or the DNS domain is undefined, DNS is not used.
If an IP address was obtained through DHCP, an add name request is sent to the DDNS server if it is enabled and registered.
Command line usage and scripting:
DNS [ [ -server <e|d> ] [ -domain <text> ] [ -name <e|d> ]
[ -register <y|n> ] [ -1ip <ipaddr> ] [ -2ip <ipaddr> ]
[ -3ip <ipaddr> ] ] | [ -all default ] [ -nc ]
-?
See also:
LC
FW
: Upgrade the MP firmware
This command is only available to authorized HP service personnel.
88 Using iLO 2
The MP firmware is packaged along with system, BMC, and FPGA/PSOC firmware. You can download and upgrade the firmware package from the HP website at http://www.hp.com/go/ bizsupport .
IMPORTANT: When performing a firmware upgrade that contains system programmable hardware, you must properly shut down any OS that is running before starting the firmware upgrade process.
Select Download drivers and software, select your server, and follow the directions provided.
After the upgrade, reconnect and log in as user
Admin
and password
Admin
(case sensitive).
TIP: Before performing certain iLO 2 functions, verify that you have the supported firmware version required to carry out the task.
HE
: Display help for menu or command in command menu interface
Command access level: Login access
HE displays help for a menu or command.
•
If executed from the MP Main Menu,
HE displays general information about iLO 2 and those commands available in the MP Main Menu.
•
If executed in command mode,
HE displays the MP Help: Command Menu List.
HE also displays detailed help information in response to a topic or command at the help prompt.
Command line usage and scripting:
HE [ -topic | command ] [ -nc ]
-?
ID
: System information settings
Command access level: MP configuration access
ID displays and modifies the following:
SNMP contact person Name, telephone, email, and pager number.
Server information Location, rack ID, position, asset tag.
System host name The system host name of the operating system.
NOTE: The system host name information is not retained across iLO 2 reboots.
Command line usage and scripting:
ID [ { -host [ <text> ] }
| { -person [ -name <text> ] [ -telephone <text> ]
[ -email <text> ] [-pager <text> ] }
| { -server [ -location <text> ] [ -rackid <text> ]
[ -position <text> ] } ]
[ -tag <text> } ] [ -nc ]
-?
IT
: Inactivity timeout settings
Command access level: MP configuration access
IT prevents sessions on the system from being inadvertently left open. When you initiate an iLO
2 MP command, other users are prohibited from running any commands until the first command has been completed or until it times out. Command interface inactivity timeout specifies that timeout value. This prevents a user from inadvertently keeping iLO 2 locked in a command, preventing other users from running iLO 2 MP commands.
Text User Interface 89
The inactivity timeout effects how long a user can stay inactive within a command in the text user interface before they are placed back at the command prompt. There is no session timeout on the
Integrity iLO 2 text interfaces.
NOTE: The iLO 2 MP command interface inactivity timeout cannot be deactivated.
Use the flow control timeout to prevent any user who is using a terminal that does not obey flow control from locking the system out from other users.
The following are
IT command parameters: iLO 2 inactivity timeout One to 30 minutes (default is three minutes).
Flow control timeout Zero to 60 minutes. If the flow control timeout is set to zero, no timeout is applied. A mirroring flow control condition ceases when no flow control condition exists on any port.
This timeout prevents mirrored flow control from blocking other ports when inactive.
Command line usage and scripting:
IT [ -command <n> ] [ -flow <n> ] [ -nc ]
-?
See also:
SA
LC
: LAN configuration usage
Command access level: MP configuration access
LC modifies the LAN configuration parameters.
IMPORTANT: If you are connected through a network and you make any changes to DHCP status, IP address, subnet mask, or gateway IP address, iLO 2 automatically resets once you confirm the change.
If you are connected through a serial console and you make any changes to DHCP status, IP address, subnet mask, or gateway IP address, iLO 2 alerts you to manually reset iLO 2.
Configurable parameters include the following:
• iLO 2 MP IP address
•
DHCP status (default is enabled)
â—¦
If the IP address, gateway IP address, or subnet mask was obtained through DHCP, you cannot change the DHCP status without first disabling DHCP.
â—¦
If you change the DHCP status to enabled or disabled, the IP address, subnet mask, and gateway address are set to their default values (127.0.0.1:0xffffff00), and the DNS parameters are voided.
â—¦
When you change the DHCP status from enabled to disabled, the DNS parameters for
DHCP are set to disabled, and the Register with DDNS parameter is set to
No
.
â—¦
When you change the DHCP status from disabled to enabled, the DNS parameters for
DHCP are set to enabled, and the Register with DDNS parameter is set to
Yes
.
90 Using iLO 2
• iLO 2 MP host name
â—¦
The iLO 2 MP host name set in this command is displayed at the iLO 2 MP command mode prompt. Its primary purpose is to identify the iLO 2 MP LAN interface in a DNS database.
â—¦
If you change the iLO 2 MP host name and the IP address was obtained through DHCP and DDNS is registered, a delete old name request for the old host name and an add
name request for the new host name are sent to the DDNS server.
â—¦
Typically you enter the DNS name for the LAN IP. You can program this field to any useful name or phrase. For clarity, enter
MPNAME-on-SYSTEM
as the MP Host name, so both names show up in the prompt. The limit is 19 characters, and no spaces are allowed.
•
Subnet mask
•
Gateway IP address
•
Local console serial port
•
Link state
•
SSH access port number
Command line usage and scripting:
LC [ -ip <ipaddr> ] [ -subnet <subnet> ] [ -gateway <ipaddr> ]
[ -host <text> ] [ -web <n> ] [ -link <auto|T<10baseT)> ]
[ -ssh <n> ] [ -dhcp <e|d> ] [ -nc ]
-?
See also:
DNS, LS, SA
LDAP
: LDAP directory settings
Command access level: MP configuration access
LDAP displays and modifies the following LDAP directory settings:
•
Directory Authentication: Activates or deactivates directory support on iLO 2.
â—¦
Enable with Extended Schema: Selects directory authentication and authorization using directory objects created with the HP schema. Select this option if the directory server is extended with the HP schema and you plan to use it.
â—¦
Enable with Default Schema: Selects directory authentication and authorization using user accounts in the directory which has not been extended with the HP schema. User accounts and group memberships are used to authenticate and authorize users. Data in the Group Administration page must be configured after you select this option. In the
Group Administration page, configure one or more directory groups by entering the distinguished name of the group and privileges to be granted to users who are members of that group.
â—¦
Disable: Deactivates directory support on iLO 2.
•
Local User Accounts: Includes or excludes access to local iLO 2 user accounts. If local user accounts are enabled, you can log in to iLO 2 using locally stored user credentials. If they are disabled, access is limited to valid directory credentials only.
NOTE: Locally stored user accounts can be active while directory support is enabled. This enables both local- and directory-based user access. If both directory authentication and local user accounts are enabled, login is attempted using the directory first, then using local accounts.
•
Directory Server IP Address: IP address or host name of the directory server.
Text User Interface 91
•
Directory Server LDAP Port: Port number for the secure LDAP service on the server. The default value for this port is 636.
•
Distinguished Name: Specifies where this iLO 2 instance is listed in the directory tree. For example: cn=MP Server,ou=Management Devices,o=hp
•
User Search Contexts (1,2,3): User name contexts that are applied to the login name entered to access iLO 2.
User name contexts are used to locate an object in the tree structure of the directory server and applied to the login name entered to access iLO 2. All objects listed in the directory can be identified using their unique distinguished name. However, distinguished names can be long, users might not know their distinguished names, or they might have accounts in different directory contexts. Search contexts enables users to specify common directory contexts, so that they do not have to enter their full distinguished name at login. iLO 2 attempts to authenticate a user in the directory first by the login name entered, and then by applying user search contexts to that login name until login succeeds. For example:
Instead of logging in as cn=user,ou=engineering,o=hp
, search context of ou=engineering,o=hp enables a user to log in as user
When extended schema is selected and Active Directory is used as a directory server. Microsoft
Active Directory has an alternate user credential format. A user can log in as: [email protected]
, in which case a search context of
@domain.hp.com
enables the user to login as user
.
NOTE: For instances when user authentication uses the LDAP directory server that is configured for Microsoft Active Directory, a user can log in using the username format [email protected]
. Currently, this user credential format is only supported on Internet
Explorer.
Command line usage and scripting:
LDAP [ -directory [ -ldap <d|x|s> ] [ -mp <e|d>]
[ -ip <hostname/ipaddr> ] [ -port <n>]
[ -dn <text> ] [ -1context <test>]
[ -2context <text>] [ -3context <text>]
| -groups [ -change <groupNo.> [ -dn <text>]
[ rights <e|d>]
<console|mp|power|user|virtual|all|none> ]
[ -list <groupNo.> ]]
| -nc ]
-?
See also:
LOGIN, US
LDAP
: LDAP group administration
LDAP enters one or more directory groups by specifying the distinguished name of the group and privileges to be granted to users who are members of that group.
You must configure group administration information when the directory is enabled with the default schema.
The group administration section of the LDAP command enables users to enter one or more directory groups by specifying the distinguished name of the group and privileges to be granted to users who are members of that group.
When a user attempts to log in to iLO 2, iLO 2 reads that user’s directory name in the directory to determine which groups the user is a member of. iLO 2 compares this information with a list of configured groups. The rights of all the matched groups are combined and assigned to that user.
92 Using iLO 2
LDAP
: Schema-Free LDAP
Schema-Free LDAP enables you to use directory authentication for logging in to iLO 2 without having to do any schema extension on the directory server or snap-in installation on the client.
For information on schema-free LDAP, see
“Configuring Schema-Free LDAP” (page 67)
.
LM
: License management
Command access level: MP configuration access
LM displays your current license status. Use it to enter a license key to enable the Advanced Pack license features.
Command line usage and scripting:
LM [ -key <license key> ] [ -nc ]
-?
LOC
: Locator UID LED configuration
Command access level: MP configuration access
LOC displays the current status of the locator UID LED and enables you to turn the locator UID LED on or off.
In HP Integrity server blades, this command also enables you to turn the enclosure locator UID LED on or off. The UID LED physically identifies the blade in a data center environment. It emits a blue light when turned on. It does not have an associated button. You can control the UID LED from the
BMC only.
Command line usage and scripting:
LOC [ -on | -off [ -nc ] ]
-?
Server blade usage
LOC [ -server <on | off> ] [-enclosure <on | -off>] [ -nc ]
-?
LS
: LAN status
Command access level: Login access
LS displays all parameters and the current status of the iLO 2 MP LAN connections. The LAN parameters are not modified by this command.
Command line usage and scripting:
LS [ -nc ]
-?
See also:
DNS, LC, SA
PC
: Power control access
Command access level: Power control access
PC enables control of the power management module. It provides the following options for remote control of system power:
ON
Turns the system power on. This command has no affect if the power is already on.
OFF
Turns the system power off. This command is equivalent to turning the system power off at the front panel switch. There is no signal sent to the OS to shut the software down before power is turned off. To turn the system off gracefully, ensure that the OS is shut down before running this command.
Text User Interface 93
CYCLE
Turns the system power off, then on. The delay between off and on is
30 seconds.
Graceful Shutdown
The BMC sends a signal to the OS to shut down prior to turning off the system power.
Command line usage and scripting:
PC [ -on | -off | -graceful | -cycle ] [ -nc ]
-?
Example:
[gstlhpg1] MP:CM> pc -on -nc
PC -on -nc
System will be powered on.
-> System is being powered on.
-> Command successful.
[gstlhpg1] MP:CM>
See also:
PR, PS
PM
: Power regulator mode
Command access level: Power control access
PM provides the following options for remote control of the system power regulator:
Dynamic Enables the system to dynamically change the processor power level when needed based on current operating conditions. The system remains in this mode unless the system is reset or an OS-hosted application requests a processor state change. In these cases, power management mode changes to OS Control Mode.
Low
High
Sets the processor to the lowest supported processor state and forces it to stay in that lowest state until the system is reset. If the processor is reset, the power mode changes to OS Control Mode.
Sets the processor to the highest supported processor state and forces it to stay in that highest state unless the system is reset or an OS- hosted application requests a state change. If the processor is reset, the power mode changes to OS Control Mode.
OS Sets the control of the power regulator to the OS.
Command line usage and scripting
Example
[gstl0074] MP:CM> pm
PM [ -dynamic | -low | -high | -os ] [ -nc ]
PM -?
[gstl0074] MP:CM> pm
PM
Current System Power Mode : Dynamic Mode
Power Regulator Menu:
D - Dynamic Power Savings Mode
L - Static Low Power Mode
H - Static High Performance Mode
O - OS Control Mode
Enter menu item or [Q] to Quit: O
O
94 Using iLO 2
Power mode will be set to OS Control.
Confirm? (Y/[N]): y y
Please wait ..
-> Power mode has been successfully changed
See also:
PC, PR
PR
: Power restore policy configuration
Command access level: MP configuration access
PR configures the power restore policy. The power restore policy determines how the system behaves when AC power returns after an AC power loss.
•
If
PR is set to
On
, the system powers on after AC is applied.
•
If
PR is set to
Off
, the system stays powered off after AC is applied. Push the system power button or run the
PC command to power on the system.
•
If
PR is set to
Previous
, the power is restored to the state that was in effect when the AC power was removed or lost.
Command line usage and scripting:
PR [ -on | -off | -previous ] [ -nc ]
-?
See also:
PC
PS
: Power status
Command access level: Login access
PS displays the system power state, the temperature, and status of the power supplies and fans.
You can obtain an instant power reading without a license key using this command.
Command line usage and scripting:
PS [ -nc ]
-?
See also:
PC, SS
RB
: Reset BMC
Command access level: MP configuration access
RB resets the BMC by toggling the GPIO BMC reset line.
Command line usage and scripting:
RB [ -nc ]
-?
See also:
PC, SS
RS
: Reset system through the RST signal
Command access level: Power control access
IMPORTANT: During normal system operation, shut down the OS before issuing the
RS command.
RS resets the system (except iLO 2) through the RST signal.
Running this command irrecoverably halts all system processing and I/O activity and restarts the system. The effect of this command is similar to cycling the system power. The OS is not notified, no dump is taken as the system shuts down, and so on.
Command line usage and scripting:
Text User Interface 95
RS [ -nc ]
-?
See also:
TC
SA
: Set access LAN/WEB/SSH/IPMI over LAN ports
Command access level: MP configuration access
SA sets access permissions for users logging in to iLO 2 over the LAN. You can set iLO 2 to allow
Telnet access, web access, SSH, IPMI over LAN, or all four.
There is no capability to manage the IPMI user name or password in iLO 2. There is only the ability to enable or disable access with IPMI through the
SA command.
If LAN or web users are connected when a disable from this command runs, they are disconnected.
Any future incoming connection request to the corresponding port is rejected.
Command line usage and scripting:
SA [ -telnet <e|d> ] [ -web <e|d> ] [ -ssh <e|d> ]
[ -lanipmi <e|d> ] [ -command <mpmenu|smclp> ] [ -nc ]
-?
SNMP
: Configure SNMP parameters
Command access level: MP configuration access
WARNING!
Until it is completely booted, iLO 2 does not send out SNMP trap information. If the
SNMP traps are enabled and if an MP reset occurs, iLO 2 cannot send SNMP trap information from the start of the reset.
SNMP performs the following actions:
•
Enable or disable the SNMP server. Disabling the SNMP server prevents all access to the
SNMP management information base (MIB) objects and also prevents sending of any SNMP alerts.
•
Enable or disable the SNMP alerts feature separate from the general SNMP server.
•
Configure up to four destination IP addresses where SNMP alerts will be sent. Alerts are sent by iLO 2 to these destinations for power shutdown, system reset, and system fatal error events.
•
Configure the community string, thereby securing the access to the MIB objects.
To configure SNMP parameters:
1.
At the
MP:CM> prompt, enter
SNMP
.
2.
To change the SNMP status, enter
N
. Enabled is the default.
3.
Enter
E
to enable or
D
to disable all SNMP access. The screen displays the new SNMP configuration settings.
4.
To change the SNMP alert status, enter
T
. Disabled is the default.
5.
Enter
E
to enable or
D
to disable all SNMP alerts. The screen displays the new SNMP configuration settings.
6.
To configure a destination IP address for SNMP alerts, enter
1 2 3 4
. The default is blank
(unused).
7.
To configure the community string to secure the access to the MIB objects, enter
C
. The default is public
.
Command line usage and scripting
SNMP [ -status <e|d> ] [ -community [ <text> ] ] [ -nc ]
-?
Command line usage and scripting for server blades:
SA [ -status <e|d> ] [ -community [ <text> ] ] [ -traps <e|d> ]
[ -1dest <ipaddr> ] [ -2dest <ipaddr> ] [ -3dest <ipaddr> ]
96 Using iLO 2
[ -4dest <ipaddr> ] [ -nc ]
-?
See also:
ID
SO
: Security option help
Command access level: MP configuration access
SO modifies the security option of iLO 2 (login timeouts, password faulty, SSL certificate generation,
SSH keys).
The following are
SO command parameters:
•
Login timeout: Zero to five minutes. This is the maximum time allowed to enter login name and password after the connection is established. The connection is interrupted when the timeout value is reached. The local console restarts the login; for all other terminal types, the connection is closed. A timeout value of 0 means there is no timeout set for the login.
The login timeout and the timeout value is effective on all ports including the local port.
However, the local port cannot be disconnected like other ports on login timeout. For example, if a local port user sits at the
MP Login: prompt, nothing happens even if a timeout occurs.
But, if a local port user enters a login name, sits at the
MP Password: prompt, and if a timeout occurs at this stage, this login is cancelled and the
MP Login: prompt reappears.
•
Number of password faults allowed: 1 to 10. This parameter defines the number of times a user can attempt to log in to a console before being rejected and having its connection closed.
•
SSL certificate: Enables the generation of SSL certificates.
•
SSH keys generation: Enables SSH keys authorization.
• iLO 2 reset: Enables an iLO 2 reset through IPMI from BMC, system, or IPMI over LAN.
• iLO 2 password reset: Enables iLO 2 password reset through IPMI from BMC, system, or IPMI over LAN.
Command line usage and scripting:
SO [ { -options [ -login <n> ] [ -number <n> ] [ -fwpci <e|d> ]
[ -reset <e|d> ] [ -pwdreset <e|d> ] }
| { -ss1 [ -name <text> ] [ -organization <text>] [ -unit <text> ]
[ country <text> ] [ -region <text> ] [ -locality <text> ]
[ -email <text> ] }
| { -ssh } ] [-nc ]
-?
SS
: System Status
Command access level: Login access
SS displays the status of the system processors and which processor is the monarch.
The iLO 2 learns the system configuration through the events it receives from the system. There is usually a delay between any processor configuration change and what is displayed by this command. For the most up-to-date processor configuration information, use the EFI or BCH prompt.
Command line usage and scripting:
SS [ -nc ]
-?
See also:
PS
SYSREV
: Firmware revisions
Command access level: Login access
SYSREV displays the current firmware revisions in the system.
Command line usage and scripting:
Text User Interface 97
SYSREV [ -nc ]
-?
Example:
MP:CM> SYSREV
Current firmware revisions
MP FW : F.01.57
BMC FW : 75.12
EFI FW : ROM A 05.63, ROM B 05.60
System FW : 01.40
PDH FW : 00.0d
UCIO FW : 03.0a
PRS FW : 00.08 UpSeqRev: 01, DownSeqRev: 01
TC
: System reset through INIT or TOC signal
Command access level: MP configuration access
NOTE: During normal operation, shut down the OS before issuing this command.
TC resets the system through the INIT or TOC signal. Running this command irrecoverably halts all system processing and I/O activity and restarts the computer system. It is different from the
RS command in that the processors are signaled to dump state as they shut down.
Command line usage and scripting:
TC [ -nc ]
-?
See also:
RS
TE
: Send a message to other mirroring terminals
Command access level: MP configuration access
TE treats all displayable characters following the command as a comment. Characters typed are broadcast to the connected console clients when you press Enter. The string size is limited to 80 characters. Any extra characters are not broadcast to other console clients.
NOTE: The broadcast message is sent only to Command menu clients, and does not include users connected to MP Main Menu functions.
Command line usage and scripting:
TE <text> [ -nc ]
-?
UC
: User Configuration (users, passwords, and so on)
Command access level: User administration access
UC adds, modifies, re-enables, or deletes any of the following user parameters:
•
Login ID
•
Password
•
User Name
•
User Workgroup
•
User Access Rights
•
User Operating Mode
•
User Enabled
98 Using iLO 2
There are two default users,
Admin and
Oper
. The
Admin user has all rights
(C, P, M, U, and V)
. The
Oper user has the console access right by default. You can change the configuration of these default users with the
UC command.
All users have the right to log in to iLO 2 and to run Status (read-only) commands (view event logs, check system status, power status, and so on), but not to run any commands that alter the state of iLO 2 or the system.
The following commands are available to all users:
CL
,
DATE
,
DF
,
HE
,
LS
,
PS
,
SL
,
SS
,
SYSREV
,
TE
,
VFP
,
WHO
,
XD
(status options)
An iLO 2 user can also have any or all of the following access rights:
Console Access Right to access the system console (the host OS). This does not bypass host authentication requirements, if any.
Command:
CO
Power Control Access
Local User Administration Access
MP Configuration Access
Virtual Media Access
Right to power on, power off, or reset the server, and to configure the power restore policy.
Commands:
PC
,
PR
,
RS
,
TC
Right to configure locally stored user accounts.
Commands:
UC
Right to configure all iLO 2 MP settings (and some system settings, such as the power restore policy).
Commands:
BP
,
CA
,
CL
,
DC
,
DI
,
FW
,
ID
,
IT
,
LC
,
LDAP
,
LOC
,
PG
,
RB
,
SA
,
SO
,
XD
Enables Advanced Pack license users the right to use the vMedia applet.
NOTE: The vMedia feature is available only if you have the iLO 2 Advanced Pack license and the user vMedia access right.
Command line usage and scripting:
UC [ -new <login> —user <text> [ -workgroup <text> ]
[ -rights <e|d> <console|mp|power|user|virtual|all|none> ]
[ -mode <single|multiple> ] [ -enable <e|d> ]
[ -password <value> ] ]
[ -change <login> [-login<newlogin> ] [ -user <text> ]
[ -rights <e|d> <console|mp|power|user|virtual|all|none> ]
[ -workgroup <text> ] [ -mode <single|multiple> ]
[ -enable <e|d> \ [ -password [ <value> ]
[ -delete <login> ] | [ -list <login> ] ] [ -nc ]
-?
Example:
[gstlhpg1] MP:CM> uc -delete Oper -nc
UC -delete Oper -nc
Current User Parameters:
User Login ID : Oper
User Password : ************
User Name : Default Operator
User Workgroup :
User Access Rights : Console access, Virtual Media
User Operating Mode : Multiple
User Enabled/Disabled : Enabled
Text User Interface 99
-> Current User will be deleted
User may be disconnected in this process
-> User Configuration has been updated.
-> Command successful.
[gstlhpg1] MP:CM>
See also:
CA, SO, LDAP
WHO
: Display a list of iLO 2 connected users
Command access level: Login access
WHO displays the login name of the connected console client users, the ports on which they are connected, and the mode used for the connection.
•
Login name
•
Login type (LDAP or local authentication)
•
User access rights
•
Connection port (local, remote, Telnet, web, SSH)
•
IP address (for Telnet, web, SSH)
•
Current MP mode that user is in (MA-MP Main Menu, CM-Command menu, LIVE-live event viewer, VFP-VFP mode)
For LAN and serial console clients, the command displays the IP address. When DNS is integrated, the host name appears as well.
The local port now requires a login. A user must be logged into the system, or no local port displays.
Command line usage and scripting:
WHO [ -nc ]
-?
See also:
DI, TE
XD
: iLO 2 Diagnostics or reset
Command access level: MP configuration access for resetting the iLO 2, console access for all other
XD options
XD performs simple checks to confirm the iLO 2 health and its connectivity status. The following tests are available:
• iLO 2 Parameter Checksum in NVRAM
•
Verify I2C connection (get BMC device ID)
•
LAN connectivity test using the ping command
You can use the
XD command plus its
R command option to reset iLO 2. You can safely perform an iLO 2 reset without affecting the operation of the server.
You can also reset iLO 2 through the web interface or by pressing the MP reset button.
Command line usage and scripting:
XD [ -parameter | -i2c |-lan <ipaddr> | -reset ] [ -nc ]
-?
Web GUI
This section describes the functions and features of the web graphical user interface (GUI).
100 Using iLO 2
Some of the functionality in the web GUI only display if you have the iLO 2 Advanced Pack license.
For more information on the iLO 2 Advanced Pack license, see
“Obtaining and Activating iLO 2
Advanced Pack Licensing” (page 23)
and the HP website at: http://h71028.www7.hp.com/enterprise/cache/279991-0-0-0-121.html
NOTE: Cookies must be enabled on the web browser in order to successfully login to the iLO 2 web GUI.
System Status
The System Status tab enables you to access the following pages:
•
Status Summary: General, Active Users, and FW Revisions
•
Server Status: General and Identification
•
SEL
Status Summary > General
The Status Summary General page ( Figure 15
) displays a brief status summary of the system.
NOTE: Depending on your server, this page might look slightly different.
Figure 15 Status Summary General Page
NOTE: The BL c-Class tab is available only on HP Integrity server blades.
lists the fields and descriptions.
Table 31 Status Summary General Page Description
Field
System Power
Latest SEL Entry
Description
The current power state (
ON/OFF/STANDBY
) of the system and the corresponding power
LED state.
The most recent entry in the SEL.
Web GUI 101
Table 31 Status Summary General Page Description (continued)
Field
Firmware Revisions iLO 2 MP IP Address
Date & Time
Locator UID LED
Description
Displays the current firmware revisions for iLO MP, BMC, EFI, system firmware, PDH,
UCIO, PRS, and PMPIC for entry class server blades.
The IP address of the iLO 2 subsystem.
Displays the date and time as known to the iLO 2.
Displays the status of the blue locator or UID LED and enables you to turn the Locator
LED on or off.
Note: The system's (Yellow) attention LED, which is separate from the locator LED, is lit automatically if a Warning event is present in the SEL. To clear the attention LED, read the SEL.
Status Summary > Active Users
The Active Users page ( Figure 16
) displays information about the users currently logged in to iLO
2.
NOTE: Depending on your server, this page might look slightly different.
Figure 16 Status Summary Active Users Page
NOTE: The BL c-Class tab is available only on HP Integrity server blades.
lists the fields and descriptions.
Table 32 Active Users Page Description
Access Type
Field
User Login
IP Address
Description
Multiple access methods are available: Serial, Telnet, SSH, SSL web or IPMI over LAN.
IPMI, vMedia, and IRC/vKVM users are not listed in web GUI sessions.
The user currently logged in through a particular access type.
The IP address of the active user.
102 Using iLO 2
Table 32 Active Users Page Description (continued)
Field
Authorized
Rights
Mode
Disconnect
Description
The type of authentication: LDAP directory user authentication (LDAP) or locally stored iLO 2 user accounts (local).
Rights control the iLO 2 functions a user can perform. There are five user access rights: console access, MP configuration, power control, virtual media, and user administration.
A user can be configured to have some, none, or all the access rights.
Current iLO 2 mode that the user is in. TUI modes are: MA, MP Main Menu; CM, MP
Command menu; CO, console; LIVE, Live event viewer; VFP, VFP mode.
Enables a user with sufficient privileges to disconnect users of a certain access type.
Status Summary > FW Revisions
The FW Revisions page displays current revisions of the system firmware.
NOTE: Depending on your server, this page might look slightly different.
Figure 17 FW Revisions Page
lists the fields and descriptions.
Table 33 FW Revisions Page Descriptions
Field iLO MP
BMC
EFI
System Firmware
PDH
UCIO
Description iLO Management Processor firmware version
Base Management Controller firmware version
Extensible Firmware Interface firmware version
System platform firmware version
Platform Dependent programmable Hardware version
Universal Core I/O firmware version
Web GUI 103
Table 33 FW Revisions Page Descriptions (continued)
Field
PRS
PMPIC
Description
Power Reset Sequencer
Power Management Programmable Interrupt Controller for entry class server blades
Server Status > General
The Server Status General page ( Figure 18
) displays the status of server components. It also displays the status of the system processors and which processor is the monarch.
NOTE: Depending on your server, this page might look slightly different.
Figure 18 Server Status General Page
NOTE: The BL c-Class tab is available only on HP Integrity server blades.
lists the fields and descriptions.
Table 34 Server Status General Page Description
Field
System Power
Temperature
Power Supplies
Fans
System Processors
Description
Displays the current power state of the system and the corresponding power LED state.
Displays the temperature status.
Lists the power supplies and their status and type.
Lists the fans and fan status.
Displays the status of the processor.
NOTE: For BL c-Class servers, you can obtain information on power supplies and fans through the OA. See
Server Status > Identification
The Identification page enables you to configure system information for identifying the server.
104 Using iLO 2
NOTE: Depending on your server, this page might look slightly different.
Figure 19 Server Status Identification Page
lists the fields and descriptions.
Table 35 Server Status Identification Page Description
Field
Server Host Name
Rack UID
Bay
Asset Tag
Contact Person
Description
Displays the server host name.
Displays the rack unique identifier: a known unique identifier for the rack.
Displays the bay number. The blade enclosure can support as many as eight HP Integrity server blades. When viewed from the rack front, the bays are numbered from left to right and from 1 to 8. The bay number is used to locate and identify a blade.
Enter the asset tag information.
Enter the contact information in these fields.
NOTE: Many of the fields are published by the iLO 2's SNMP for visibility to management applications on the network.
System Event Log
The System Event Log (SEL) page ( Figure 20
) enables you to view the contents of the event logs that have been stored in nonvolatile memory. If you have login rights, you can view the SEL. You must have iLO configuration access right to clear the logs.
NOTE: Depending on your server, this page might look slightly different.
Web GUI 105
Figure 20 System Event Log Page
NOTE: The BL c-Class tab is available only on HP Integrity server blades.
lists the fields, buttons, and descriptions.
Table 36 System Event Log Page Description
Fields and Buttons
System Event Log
Forward Progress Log
Boot Log
Previous Boot Log
Delete Log
Description
High attention events and errors. Reading the SEL off the attention LED (blinking yellow light).
Contains events of all types. Does not need to be cleared. In a web GUI session you cannot view forward progress logs, only SEL logs.
All events between start of boot and boot complete. You cannot view boot logs or previous boot logs from a web session.
The boot log from the previous boot.
Deletes the log.
NOTE: You can view only the most pertinent fields for each event on the web. For a more complete decoding of the events, use the TUI available by logging in to iLO 2 through Telnet or SSH.
Events
Events can be a result of a failure or an error (such as fan failure, Machine-Check Abort, and so on). They can indicate a major change in system state (such as, firmware boot start or, system power on/off), or they can be forward progress markers (such as CPU selftest complete).
Events are produced by intelligent hardware modules, the OS, and system firmware. Events funnel into the BMC from different sources throughout the server. iLO 2 polls the BMC for new events and stores them in nonvolatile memory. Events communicate system information from the source of the event to other parts of the system, and ultimately to the system administrator.
The log viewer contains an event decoder to help you interpret events.
The following event severity (or alert) levels are defined:
0: Minor forward progress
106 Using iLO 2
1: Major forward progress
2: Informational
3: Warning
5: Critical
7: Fatal
Remote Serial Console
The Remote Serial Console page (
Figure 21 ) enables you to securely view and manage a remote
server. You must have console access right to use this feature.
You can also connect to the system console by launching View Console from the Remote Serial
Console page.
NOTE: Depending on your server, this page might look slightly different.
Figure 21 Remote Serial Console Page
NOTE: The BL c-Class tab is available only on HP Integrity server blades.
The remote serial console is a Java applet that requires Java Plug-in 1.4.2-10 to be installed on the client system. This applet enables connection to the server serial console over default port 2023.
You can configure this port through the Administration > Access Settings page. All data on this port is encrypted using RC4. The remote serial console provides terminal emulation. Remote serial console operates with all the operating systems and browsers supported by iLO 2.
NOTE: Pop-up blocking applications prevent remote serial console from running. Disable any pop-up blocking applications before starting the remote serial console.
The iLO 2 mirrors the system console to the iLO 2 MP local, remote, and LAN ports. One console output stream is reflected to all of the connected console users. If several different terminal types are used simultaneously by the users, some users may see unexpected results. Only one of the mirrored users at a time has write access to the console. Write access is retained until another user requests console write access. To get console write access, enter
Ctrl-Ecf
.
Web GUI 107
To ensure proper operation of the remote serial console, verify the following conditions:
•
Your emulator can run the supported terminal type.
•
The iLO 2 terminal setting in the applet is a supported setting.
•
The operating system environment settings and your client terminal type are set properly.
•
All mirrored consoles are of the same terminal type for proper operation. Supported terminal types are:
Table 37 Supported Terminal Types hpterm
Vt100
Vt100+
Vt-utf8
HP-UX
X
X
NS
NS
Windows
NS
NS
NS
X
Linux
NS
X
X
NS
EFI
NS
X
X
X
IMPORTANT: Do not mix hpterm and vt100 terminal types at the same time. If there are two users collaborating and viewing console output with different emulation modes set, their clients will see garbled results if the output from the system is terminal specific.
To connect to the system console ( Figure 22 ), click Launch.
NOTE: If Launch is disabled, the user does not have console access right. See the User
Administration page under the Administration tab to add the access right.
Figure 22 Remote Serial Console Window
Using this feature you can do the following:
•
View and interact with the boot sequence of your server.
•
Perform maintenance activities in text mode.
•
Manage non-graphical mode operating systems.
108 Using iLO 2
The console window remains open until you sign out of the iLO 2 interface using the provided link in the banner, leave the iLO 2 site, or refresh the entire page.
The remote serial console provides the console, and the GUI provides the iLO 2 MP Main Menu functionality.
Output from the console is stored in nonvolatile memory in the console log, regardless of whether or not any users are connected to a console. The Remote Serial Console page refreshes every 10 seconds.
The remote serial console option relies on the virtual serial port.
Virtual Serial Port
Integrity iLO 2 contains a virtual serial port that enables it to actually be the console hardware device for the OS. This port is a serial interface between the host system and iLO 2. iLO 2 converts the serial data stream to be available remotely through the remote serial console (a VT320 Java applet). The virtual serial port must be correctly enabled and configured in the host.
The virtual serial port function is a bidirectional data flow of the data stream appearing on the server's serial port. Using the remote console paradigm, a remote user can operate as if a physical serial connection is present on the server's serial port.
With the virtual serial port feature of iLO 2, an administrator can access a console application such as Windows EMS remotely over the network. iLO 2 contains the functional equivalent of the standard serial port (16550 UART) register set, and the iLO 2 firmware provides a Java applet that connects to the server serial port. If the serial redirection feature is enabled on the host server, iLO 2 intercepts the data coming from the serial port, encrypts it, and sends it to the web browser applet.
For Linux users, the iLO virtual serial port feature provides an important function for remote access to the Linux server. By configuring a Linux login process attached to the server serial port, you can use the iLO virtual serial port feature to remotely log in to the Linux operating system over the network.
For more information on using the virtual serial port, see Integrated Lights-Out Virtual Serial Port
configuration and operation HOW TO on the HP website at: http://h20000.www2.hp.com/bc/docs/support/SupportManual/c00263709/c00263709.pdf
Integrated Remote Console
The Integrated Remote Console (IRC) is a high-performance graphical console interface for Windows clients running Internet Explorer. The IRC provides Virtual Keyboard, Video (monitor), and Mouse
(vKVM) capabilities with KVM over IP performance. The IRC data stream is encrypted, enabling you to securely view and manage the server. The IRC does not use Java.
The IRC functionality enables a user with console access right and the Advanced Pack license to perform the following:
•
View the server graphics console and control the keyboard and mouse, as if you were standing in front of the remote server
•
Access the server from any location on the same network
•
Perform maintenance activities.
•
Diagnose server failures interactively
•
Perform a controlled reset of the server, regardless of the state of the host operating system, and remain connected to monitor the reboot process
•
View a complete boot sequence following an automatic server recovery event
•
View a log of remote console events
Web GUI 109
•
Modify login passwords without administrator access right
•
Remotely change the configuration parameters of the IRC
Because the iLO 2 IRC is hardware-based, it is available regardless of the state of the operating system.
IRC Requirements and Usage
The IRC feature is only available if you have the iLO 2 Advanced Pack license. If iLO 2 is not licensed to use the IRC, see the Licensing page under the Administration tab to activate the Advance
Pack license.
You can view the list of supported operating systems and browsers on the HP website at http:// www.hp.com/go/integrityilo .
Only one user has access to the IRC at a time. You must have console access right to use this feature. If you do not have console access right, see the User Administration page under the
Administration tab to add this access right.
You must allow downloading and usage of signed ActiveX controls. The IRC runs as an ActiveX control that is downloaded to clients running Internet Explorer 7.0 with Service Pack 1 and above on Windows clients. No additional software is required on the remote server or client system.
The ActiveX control automatically downloads from iLO 2 on the first client connection.
The IRC uses encryption and compression to provide a secure connection.
NOTE: When working on multiple systems, controls for each system are displayed on a separate screen for each server. Additionally, you must allow downloading and usage of signed ActiveX controls.
Before running the IRC, note the following:
1.
Verify that the IRC is available. Only one user can control the IRC at a time. If a remote console session already exists on the system, you are notified that IRC use is unavailable. To determine if the remote console/IRC is available for use, click
Remote Console Integrated Remote
Console
. If Launch is grayed out and the
Maximum console number has been reached status message appears, the remote console/IRC is in use by another client.
2.
Verify that you have console access right on the User Administration page, or if the right must be granted.
3.
Verify that the system is licensed for IRC use. View this information on the
Administration Licensing tab. For more information, see
“Obtaining and Activating iLO 2
Advanced Pack Licensing” (page 23)
.
4.
Disable any popup-blocking applications. Popup-blocking applications prevent the IRC from running.
5.
Accept the IRC certificate. Refusing to accept the IRC certificate causes a red X to be displayed in the IRC and prevents the IRC from working on that client.
6.
If you are using a Japanese keyboard on a Windows operating system, but are communicating in English, make sure the keyboard layout is set to Japanese. This ensures that the Japanese keyboard is properly working while running the IRC.
Limitations of the IRC Mouse and Keyboard
The IRC does not yet provide identical virtualization of the Windows keyboard. Some known issues are:
•
No support for system-level commands such as
Ctrl + Esc
, or
Print Screen
.
•
Pressing the Ctrl key locks the virtual mouse. Releasing the Ctrl key unlocks the virtual mouse.
•
No support for simultaneous mouse click and keystroke combinations.
110 Using iLO 2
•
The web session will timeout after 15 minutes if no mouse or keyboard activity is detected in the web interface and the vMedia, RSC, or IRC are not launched. An inactivity timeout configuration option is currently unavailable.
•
A slight delay might be observed between the physical and virtual mouse pointer.
NOTE: If you run system discovery utilities such as MAPPER or IOSCAN, the output might display an extra keyboard and mouse that are not physically connected. This is a consequence of the IRC feature.
Browsers and Client Operating Systems that Support the IRC
You can view the list of supported browsers and client operating systems for IRC and vKVM on the HP website at http://www.hp.com/go/integrityilo .
IRC-Supported Resolutions and Browser Configurations
This section provides information on Microsoft Windows and HP-UX graphics settings for the IRC.
Microsoft Windows Server 2003 and HP-UX Graphics Resolution Settings for the IRC
To properly access and view the IRC and optimize performance, set your Windows-based HP
Integrity server to the specifications listed below.
For display and mouse properties, the following settings are suggested:
Server Display Properties
•
Set the background to plain (no wallpaper pattern) on the host server.
•
Set the client screen resolution higher than the host server for best remote console performance.
•
Set the display resolution to 800 x 600 pixels, or the maximum supported resolution of 1024 x 768 pixels.
NOTE: The resolution on the host server must not exceed 1024 x 768 pixels. Higher resolutions can produce unpredictable results.
•
Set the display color mode to 256 colors, or 24-bit colors.
Server Mouse Properties
•
For mouse pointer scheme, select None.
•
Select Disable Pointer Trails.
•
Deselect Enable Pointer Shadow.
•
Select Motion or Pointer Options, and set the pointer speed slider to the middle position.
•
Deselect Enhanced pointer precision.
To automate setting an optimal mouse configuration, download the Lights-Out Optimization utility from the HP website at: http://www.hp.com/servers/lights-out
Click the Best Practices graphic and select Maximize Performance .
Console Settings
The default console is the serial console.
HP recommends leaving the console settings on serial to preserve SSH access and the iLO 2 console logs.
Web GUI 111
Console settings affect the information that you see on the IRC. In HP-UX, if you modify the console settings in EFI to graphics, the modivication affects the IRC as follows:
•
If you set VGA-Primary and Serial-Not Configured in EFI, the IRC is a system console. If you configure HP-UX to start X Windows, IRC also acts as an X terminal.
•
If you set Serial-Primary and VGA-Not Configured in EFI, the IRC is only an X terminal.
In all cases, the EFI console is available on the remote serial console as well as the IRC. But, the
OS console for HP-UX appears according to the device settings in EFI.
If an HP-UX operating system is configured to use VGA as the console, the HP-UX console is available only through the IRC and VGA. iLO 2 no longer receives HP-UX console traffic through the serial connection. The remote serial console data stream stops, so:
•
Serial cable, SSH, Telnet, and remote serial console through the web do not provide the HP-UX console.
•
The console log in iLO 2 does not contain any HP-UX console output.
•
The HP-UX console is only available from iLO 2 through the IRC application.
For instructions on how to configure the system console to use VGA, see the HP-UX 11i v3 Installation
and Update Guide on the HP website at http://docs.hp.com/en/5992-5795/index.html
and follow the instructions on Task 1: Selecting Your HP-UX Console for Itanium-based Systems.
Enabling X Windows on HP-UX
You can use the IRC to access the graphics display not only when X Windows is running, but also before X Windows starts.
Typically, X Windows is disabled by default on HP-UX. For instructions on enabling X Windows using the graphics application through the IRC, see the graphics administration guide for HP-UX
servers on the HP website at http://docs.hp.com/en/5992-5398/5992-5398.pdf
.
Accessing the IRC
shows the IRC page.
IMPORTANT: The operating system server console output does not display on the console device screen until the server boots to the EFI Shell. To view console output prior to booting to the EFI
Shell, either start a console session using the console serial port (RS-232), or access iLO 2 virtual
serial port, or IRC. See “Configuring the iLO 2 MP LAN Using the Console Serial Port” (page 37)
.
NOTE: Depending on your server, this page might look slightly different.
112 Using iLO 2
Figure 23 Integrated Remote Console Page
NOTE: The BL c-Class tab is available only on HP Integrity server blades.
To access the IRC, select Remote Console > Integrated Remote Console and click Launch. The IRC might experience a slight delay as it first loads on your browser.
The IRC page refreshes every 10 seconds.
lists the fields, buttons, and actions.
Table 38 IRC Page Description
Fields and Buttons
Fullscreen
Launch
Action
Resizes the IRC page.
For fullscreen with multi-head client, launch the browser from the primary display.
Resizes the IRC page to the same display resolution as the remote host. To open the server’s graphic console in a new browser window, click Launch.
The IRC displays the host server’s graphics console ( Figure 24 ).
Web GUI 113
Figure 24 Integrated Remote Console Window
lists the menu bar, buttons, and actions you can perform in the IRC window.
Table 39 IRC Window Description
Menu Bar Buttons
Thumb Tack
Ctrl+Alt+Del
Exit (red button)
Action
Enables you to keep the menu open, or retracts it when the mouse is moved away.
Enables you to simulate the Ctrl Alt Del keyboard sequence on a remote console.
Enables you to close and exit the console and return to the client desktop.
IMPORTANT: For security purposes, if you log in to a host server through the IRC, you should log out before closing the IRC.
NOTE: When you run system discovery utilities such as MAPPER or IOSCAN, the output might display an extra keyboard and mouse that are not physically connected. This is a consequence of the IRC feature.
Integrated Remote Console Fullscreen
The IRC Fullscreen causes your client to resize its screen to the same resolution as the remote server.
The IRC Fullscreen automatically chooses the best client display settings for that resolution; however, some monitors have trouble with the highest screen refresh rates supported by the video adapter.
If this occurs:
1.
To check our desktop properties, right-click the desktop and select
Properties>Settings>Advanced>Monitor.
2.
Select a lower screen refresh rate.
3.
To resize the IRC to the same display resolution as the remote host, select Fullscreen before you click Launch.
4.
Use the red X to exit the IRC and return to your client desktop.
114 Using iLO 2
Virtual Media
Virtual Media (vMedia) provides you with virtual devices that mimic physical hardware devices such as a virtual floppy disk drive and a CD/DVD drive that connects through the network to the managed server just as if it was physically connected. The vMedia device can be a physical
CD/DVD drive on the management workstation, or it can be an image file stored on a local disk drive or network drive.
Booting from the iLO 2 CD/DVD enables administrators to upgrade the host system ROM, upgrade device drivers, deploy an OS from network drives, and perform disaster recovery of failed operating systems, among other tasks.
The iLO 2 device uses a client-server model to perform the vMedia functions. The iLO 2 device streams the vMedia data across a live network connection between the remote management console and the host server. The vMedia Java applet provides data to the iLO 2 as it requests it.
The Virtual Media page refreshes every 10 seconds. Only one user can connect a virtual device at a time.
NOTE: The iLO 2 vMedia is automatically disconnected if the iLO 2 management processor is reset. HP does not recommend use of iLO 2 vMedia with firmware update tools such as HPOFM which reset the management processor mid-way through the update process.
Using iLO 2 Virtual Media Devices
Connect client-based vMedia to a host HP Integrity server through a graphical interface using a signed Java applet. Refusing to accept the applet certificate prevents browser-based vMedia from functioning (a red X appears). It also prevents the remote console applet from functioning because it is also signed using the same certificate.
Virtual media functionality is part of the iLO 2 Advanced Pack feature set and is enabled by purchasing the optional iLO 2 Advanced Pack license and granting the vMedia right. If not licensed, the message
“iLO 2 feature not licensed” appears. For more information, see
“Obtaining and Activating iLO 2 Advanced Pack Licensing” (page 23) .
NOTE: You can use the vMedia applet only on x86 clients.
To access the iLO 2 vMedia devices using the graphical interface:
Web GUI 115
1.
Select Virtual Media. The Virtual Media page appears ( Figure 25
)
NOTE: Depending on your server, this page might look slightly different.
Figure 25 Virtual Media Page
2.
Click Launch to load the vMedia applet. The vMedia applet loads in support of the vMedia device.
3.
At this point, you can connect to a virtual CD/DVD or virtual floppy/USB key device or create an iLO 2 disk image file.
NOTE: When you disconnect the iLO 2 vMedia, you might receive a warning message from the host operating system regarding unsafe removal of a device. This warning can be avoided by using the operating system's-stop-device function before disconnecting it from the vMedia.
Virtual CD/DVD
The iLO 2 virtual CD/DVD is available during server boot for operating systems specified in (insert operating system web link here)
Booting from the iLO 2 virtual CD/DVD enables you to deploy an operating system from network drives with DVDs or CDs that contain data in the El Torito Bootable CD format, as well as perform other tasks.
If the host server operating system supports USB mass storage devices, the iLO 2 virtual CD/DVD is also available after the host server operating system loads. Use the iLO 2 virtual CD/DVD when the host server operating system is running to upgrade device drivers, install software, and perform other tasks. Having the virtual CD/DVD available when the server is running can be especially useful if you must diagnose and repair a problem with the NIC driver.
The virtual CD/DVD can be the physical CD/DVD drive on the client system (which you are running on the web browser), or an image file stored on the client or network drive. For maximum performance, HP recommends using local image files stored either on the hard drive of your client system or on a network drive accessible through a high-speed network link.
The iLO 2 vMedia CD/DVD appears to your operating system just like any other CD/DVD. When using the iLO 2 for the first time, the host operating system might prompt you to complete a New
Hardware Found wizard.
116 Using iLO 2
NOTE: This feature requires that the Java Plug-in 1.4.2 or 1.5 is installed.
This feature requires the vMedia right and the Advance Pack License. For more information, see
“Obtaining and Activating iLO 2 Advanced Pack Licensing” (page 23) . If a user does not have
the vMedia right, it can be granted from the User Administration page under the Administration tab by a user with Admin privileges.
To use a physical CD/DVD drive in your client system:
1.
Select Virtual Media. The Virtual Media content page appears.
2.
Click Launch to load the applet and connect to USB CD/DVD devices and disk image files
available on the client as virtual devices on the server. The vMedia applet appears ( Figure 26 ).
NOTE: Only one user and one device can be connected at a time.
IMPORTANT: Only CD and DVD-ROM image files are supported.
If you use a USB key image file, you must select the Floppy/USB Key option. The USB key image file is not interchangeable with the CD or DVD-ROM and vice versa.
Figure 26 Virtual Media Dialog Box (Before Connection)
3.
Select Local Media Drive.
4.
Select the drive letter of the desired physical CD/DVD drive on your client system from the list.
Web GUI 117
5.
Click Connect. The connected drive icon and LED changes states to reflect the current status of the virtual CD/DVD.
Figure 27 Virtual Media Dialog Box (after connection)
After you are connected, virtual devices are available to the host server until you close the vMedia applet or sign out from a web session. When you are finished using the virtual CD/DVD, disconnect the device from the host server or close the applet.
NOTE: The vMedia applet must remain open when using a vMedia device.
Virtual Media CD/DVD Operating System
You can view the list of supported operating systems on the HP website at http://www.hp.com/ go/integrityilo .
vMedia CD/DVD operating systems information is listed as follows:
•
Currently, EFI console only supports El Torito bootable CD format media.
•
Windows Server 2003:
The virtual CD/DVD displays automatically after Windows has recognized the mounting of the USB device. Use it as you would a locally attached CD/DVD device.
•
Linux
On servers with a locally attached IDE CD/DVD, the virtual CD/DVD device is accessible at
/dev/cdrom1
. However, on servers without a locally attached CD/DVD (such as the HP
Integrity server blades) the virtual CD/DVD is the first CD/DVD accessible at
/dev/cdrom
.
The virtual CD/DVD can be mounted as a normal CD/DVD device using: mount
/mnt/cdrom1
.
•
HP-UX 11.23
To recognize the hardware path and special files, run the ioscan -kfnC disk command.
To mount the virtual CD/DVD/image file on a directory, use the
# mount <special files path> /<dir-name> command.
•
OpenVMS
Creating the iLO 2 Disk Image Files
The iLO 2 vMedia feature enables you to create CD and DVD image files within the same applet.
The image files created are ISO-9660 file system images and El Torito bootable CD images. The
118 Using iLO 2
performance of the iLO 2 vMedia is faster when image files are used. The utility to create the iLO
2 CD/DVD disk image files is integrated into the vMedia applet.
Store image files on your client computer or on a network drive that can be accessed from the client using a fast network segment. A disk image file produces better performance than using a physical CD in your client computer.
To create image files from physical diskettes, CDs, or DVDs, use the Disk>>Image option. The
Image>>Disk option is not valid for a virtual CD/DVD image. The Disk>>Image button changes to Image>>Disk when clicked.
NOTE: The iLO 2 Create Media Image utility does not currently support USB devices in Linux or
NetWare.
The following procedure explains how to create an iLO 2 disk image file:
1.
Select Local Image File in the Virtual CD-ROM section of the vMedia applet.
2.
Select Local Media Drive from the list.
Figure 28 Local Image File Dialog Box
3.
Enter the path or file name of the image in the text box or click Browse to open the Create
Media Image dialog box and locate the image file.
Figure 29 Create Media Image Dialog Box
4.
Click Create Disk Image. The vMedia applet begins the process of creating the image file.
The process is complete when the progress bar reaches 100%. This creates a file that emulates a CD/DVD on the local system. To cancel the creation of an image file, click Cancel.
Web GUI 119
To insert the next CD during an OS installation or any application installation with multiple image files:
1.
To select the next image file or to replace the CD/DVD with the next CD/DVD, click Browse
2.
To continue the installation, click OK on the host server.
IMPORTANT: Do not click Disconnect to select the next CD/DVD image file.
The connected drive icon and LED changes states to reflect the current status of the virtual CD/DVD.
After you are connected, virtual devices are available to the host server until you close the vMedia applet. When you are finished using the virtual CD/DVD, you can choose to disconnect the device from the host server or close the applet. The vMedia applet must remain open when using a vMedia device.
The iLO 2 vMedia CD/DVD appears to your operating system just like any other CD/DVD. When using the iLO 2 for the first time, the host operating system might prompt you to complete a New
Hardware Found wizard.
Virtual Floppy/USB Key
The iLO 2 vMedia devices connect to the host server using USB technology. Using USB also enables new capabilities for the iLO 2 vMedia devices when connected to USB-supported operating systems.
IMPORTANT: If the virtual floppy/USB key capability is enabled, the floppy and USB key drive normally cannot be accessed from the client operating system.
Under certain conditions, you can access the virtual floppy and USB key drive from the client operating system while it is connected. However, it is important that access to the virtual floppy or
USB key drive from the client operating system not be attempted while it is connected as a virtual media device. Doing so could cause data loss on the floppy drive. Always disconnect virtual media before trying to access it from the client operating system.
The iLO 2 virtual floppy disk is available at server boot time for all operating systems. Booting from the iLO 2 virtual floppy enables you to upgrade the host system ROM, deploy an operating system from network drives, and perform disaster recovery of failed operating systems, among other tasks.
If the host server operating system supports USB mass storage devices, the iLO 2 virtual floppy/USB key is also available after the host server operating system loads. You can use the iLO 2 virtual floppy/USB key when the host server operating system is running to upgrade device drivers, create an emergency repair diskette, and perform other tasks. Having the virtual floppy available when the server is running can be especially useful if you must diagnose and repair a problem with the
NIC driver.
The virtual floppy/USB key can be the physical floppy or USB key drive on which you are running the web browser, or an image file stored on your local hard drive or network drive. For maximum performance, HP recommends using the local image files stored either on the hard drive of your client PC or on a network drive accessible through a high-speed network link.
To use a physical floppy or USB key drive in your client PC:
1.
Select Local Media Drive in the virtual floppy/USB key section.
2.
Select the drive letter of the desired local floppy or USB key drive on your client PC from the menu. To ensure the source diskette or image file is not modified during use, select Force read-only access.
3.
Click Connect. The connected drive icon and LED changes state to reflect the current status of the virtual floppy Drive.
120 Using iLO 2
Figure 30 Virtual Floppy/USB Key
To use an image file:
1.
Click Launch.
2.
Within the virtual USB key section of the vMedia applet, select Local Image File.
3.
In the textbox, enter the path or file name of the image, or to locate the image file by using the Choose Disk Image File dialog, click Browse. To ensure the source diskette or image file is not modified during use, select Force read-only access.
IMPORTANT: You must select the USB key image file with this option.
If you use CD or DVD-ROM image files, you must select the CD/DVD-ROM option. The CD or DVD-ROM option is not interchangeable with the USB key image file and vice versa.
4.
Click Connect. The connected drive icon and LED change state to reflect the current status of the virtual USB key drive. When connected, the virtual devices are available to the host server until you close the vMedia applet.
5.
When you are finished using the virtual USB key, disconnect the device from the host server or close the applet.
The iLO 2 Virtual floppy/USB key is available to the host server at run time if the operating system on the host server supports USB floppy or key drives.
The iLO 2 Virtual floppy/USB key appears to your operating system just like any other drive. When using iLO 2 for the first time, the host operating system might prompt you to complete a New
Hardware Found wizard.
Virtual Media Applet Timeout
The vMedia applet does not timeout when it is connected to a host server. The vMedia applet must remain open when using a vMedia device. The vMedia applet closes when you log out.
Supported Operating Systems and USB Support for vMedia
To use vMedia devices, your operating system must support USB mass storage devices.
Different operating systems provide different levels of USB support. iLO 2 uses the operating system's built-in USB drivers. The level of USB support in the operating system affects the level of support for iLO 2 vMedia. In general, any operating system issues that affect a USB CD/DVD drive also affect iLO 2 vMedia.
Web GUI 121
The HP server ROM provides support during server boot for vMedia with the El Torito bootable
CD format.
You can view the list of supported operating systems on the HP website at http://www.hp.com/ go/integrityilo .
Java Plug-in Version
The vMedia feature requires prior installation of Java Plug-in 1.4.2_10 or higher.
Client Operating System and Browser Support for vMedia
You can view the list of supported client operating systems on the HP website at http:// www.hp.com/go/integrityilo .
Power Management
For entry class and server blades, the iLO 2 power management feature enables you to view and control the power state of the server, monitor power usage, monitor the processor, and modify power settings. The Power Management page has three menu options:
•
Power & Reset
•
Power Meter Readings
•
Power Regulator
Power & Reset
The Power & Reset page ( Figure 31 ) enables you to view and control the power state of the server.
It also provides you with options to reset the system, the BMC, or iLO 2.
NOTE: Depending on your server, this page might look slightly different.
Figure 31 Power & Reset Page
122 Using iLO 2
NOTE: The BL c-Class tab is available only on HP Integrity server blades. For information on how to set the power management options in the OA, see the HP BladeSystem Onboard Administrator
User Guide on the HP website at: http://h20000.www2.hp.com/bc/docs/support/SupportManual/c00705292/c00705292.pdf
lists the fields, buttons, and descriptions.
Table 40 Power & Reset Page Description
Fields and Buttons
System Power
System Power Control
System Power Restore
Settings
System Reset
BMC
Description
The current power state of the system.
A user with power control access can issue the following options for remote control of the system power:
•
Power Cycle: Turns system power off and on. The delay between off and on is 30 seconds.
•
Power On: Turns system power on (it has no effect if power is already on).
•
Power Off: Turns system power off. This is equivalent to forcing the system power off with the front panel power switch. There is no signal sent to the OS to bring the software down before power is turned off. For proper system shutdown, shutdown the OS before issuing this command.
•
Graceful Shutdown: BMC sends a signal to the OS to shutdown, prior to turning off system power supported by IPF operating systems.
This option enables you to configure the power restore policy. The power restore policy determines how the system behaves when AC power returns after an AC power loss.
You must have iLO configuration access right to use this option.
•
Restore Previous Power State: The power is restored to the state that was in effect when AC was removed or lost.
•
Automatically Power On: The system is powered up after AC is applied.
•
Remain Powered Off: The system stays powered off after AC is applied. Pushing the system power switch or choosing the Power On option under System Power Control is required to power on the system.
This feature has the following options:
•
Reset through RST signal: This option causes the system to reset through the RST signal.
Under normal operation, shut down the OS before issuing this command. Execution of this command irrecoverably halts all system processing and I/O activity and restarts the computer system. The effect of this command is very similar to cycling the system power - the OS is not notified, no dump is taken on the way down, and so on. You must have power control access right to issue this option.
•
Reset through INIT or TOC signal: This option causes the system to be reset through the INIT or Transfer of Control (TOC) signal. Under normal operation, shut down the
OS before issuing this command. Execution of this command irrecoverably halts all system processing and I/O activity and restarts the computer system. It is different from the previous option in that the processors are signaled to dump state on the way down. You must have iLO configuration access right to issue this option.
This feature has the following options:
•
Reset BMC passwords: This resets BMC (EFI Shell) passwords.
•
Reset BMC: This option enables you to issue a BMC reset. Under normal operation, shut down the OS before issuing this command. You must have iLO configuration access right to issue this option.
Web GUI 123
Table 40 Power & Reset Page Description (continued) iLO 2
Fields and Buttons
Submit
Description
This feature has the following options:
•
Reset to the iLO 2 default configuration: This option enables you to set all iLO 2 parameters back to their default values. You must have iLO configuration access right to issue this option.
•
Reset the iLO 2: This option enables you to reset the iLO 2. You can safely perform an iLO 2 reset without affecting the operation of the server. You must have iLO configuration access right to issue this option.
Click to submit selections.
Power Meter Readings
The Power Meter Readings page ( Figure 32 ) enables you to graphically view and monitor server
power usage, temperature, and power regulator settings.
Power meter readings is a licensed feature and requires the Advanced Pack license to see the
Power Regulator graphs from the iLO 2 web GUI. The license key also enables iLO 2 to share information with Insight Power Manager.
NOTE: You can obtain an instant power reading without a license key through the CLI using the
PS command.
The Power Meter Readings page has two sections: Power Meter Readings and 24-hour Power
History.
NOTE: Depending on your server, this page might look slightly different.
Figure 32 Power Meter Readings Page
NOTE: The BL c-Class tab is available only on HP Integrity server blades.
IMPORTANT: Power consumption data readings are dependent on the configuration, architecture, components, and levels of activity of the server at any given time.
124 Using iLO 2
lists the fields, buttons, and descriptions.
Table 41 Power Meter Readings Page Description
Fields and Buttons
Power Meter Readings
Peak
Average
Minimum
24-hour Power History
Section
Average Power
Maximum Power
Minimum Power
Show values in BTu/hr
Refresh Data
Description
Data is displayed using a bar graph. Each bar represents the power usage taken over a five minute interval. Peak and average power usage are displayed by default. You can display or hide peak, average, and minimum power samples by using the appropriate checkbox. Samples are collected over a 24-hour period. Samples are not retained over a management processor or server reset. Data can be displayed in Watts or Btu/hr.
To display a tool tip that indicates the power usage, power regulator mode, temperature, and timestamp, pause the mouse over the particular sample on the bar graph.
Displays the peak power reading from the server over the last 24-hour period.
Displays the average power reading from the server over the last 24-hour period.
Displays the minimum power reading from the server over the last 24-hour period.
The 24-hour History section displays the average, maximum, and minimum power averages. The peak and minimum samples are recorded along with the average of the averages from the 24-hour time period.
Displays the average of the power readings from the server over the last 24-hour period.
If the server has not been running for 24 hours, the value is the average of all the readings since the server was booted.
Displays the maximum power reading from the server over the last 24-hour period. If the server has not been running for 24 hours, the value is the maximum of all the readings since the server was booted.
Displays the minimum power reading from the server over the last 24-hour period. If the server has not been running for 24 hours, the value is the minimum of all the readings since the server was booted.
Changes the displayed data from watts to BTu/hr. and from BTu/hr. to watts.
Refreshes the data graph.
Power Regulator
The Power Regulator page (
Figure 33 ) enables you to view and modify the power efficiency
regulator mode of the system.
The Power Regulator feature is available on systems where support is provided by the operating system, processors, processor dependant hardware (PDH), system firmware (SFW), and iLO 2 firmware.
On Integrity servers, power regulation requires the server to have both a CPU and an operating system that is capable of power regulation. Power regulation functions are available only when the OS is booted, and the system has the required hardware, firmware, OS, and software.
The Power Regulator feature does not require the Advanced Pack license.
The following is required before you can use this feature:
•
You must have the power control right to view and modify the power regulation modes.
•
To access power and thermal history or the power regulator through IPM, requires both an
IPM license and an iLO 2 (select or advanced ) license.
•
You must have a power-aware OS installed and running to use any mode of Power Regulation
(static, dynamic, or OS control). Power Regulation on Integrity servers works in cooperation with the OS. For information on operating systems that currently support power regulation, see the HP website at: http://www.hp.com/go/integrityiLO .
NOTE: Depending on your server, this page might look slightly different.
Web GUI 125
Figure 33 Power Regulator Page
NOTE: The BL c-Class tab is available only on HP Integrity server blades.
lists the fields, buttons, and descriptions.
Table 42 Power Regulator Page Description
Fields and Buttons
Power Regulator Mode
Enable Dynamic Power
Savings Mode
Enable Static Low Power
Mode
Enable Static High
Performance Mode
Enable OS Control Mode
Submit
Cancel
Description
Three are four modes in which the power regulator can operate. The power regulator modes (Static Low, Static High and Dynamic) are independent of the operating system and work for any operating system. The OS Control Mode requires Microsoft Windows
Server 2003 SP1 or later or Red Hat Linux 4 Update 2 or later.
Sets the processors to the appropriate power level based on the utilization of each CPU core during the last 1/8 second. The CPU is set to the power saving processor power state if the CPU is operating at a utilization level that can be completed at the slower
CPU frequency. The CPU is set to the maximum performance processor power state if the CPU is operating at a utilization level that requires the fastest CPU frequency.
Sets the processor to the lowest supported processor state and forces the CPUs to stay in that lowest state. This mode saves the maximum amount of resources, but it might affect the system performance if processor utilization stays at or above 75% utilization.
Sets the processor to the highest supported processor state and forces the CPUs to stay in that highest state. This mode ensures maximum performance, but it does not save any resources. This mode can be used to create a baseline of power consumption data without the power regulator.
Configures the server to enable the operating system to control the processor power states. This is the necessary setting for OS power management. Moving from this state to any of the three previous states does not require a server reboot because Integrity iLO
2 power regulation works in cooperation with the OS. (This is different from ProLiant iLO power regulation).
Submits the selected function.
Cancels the action.
126 Using iLO 2
The power regulation functionality is achieved through two different interfaces:
•
Power Regulation through HP SIM (using the HP IPM plug in)
HP Insight Power Manager (HP IPM), a plug-in to HP Systems Insight Manager (HP SIM), is an integrated power monitoring and management application that provides centralized control of server power consumption and thermal output. It extends the unified infrastructure management framework of HP SIM by providing new energy levers into the server. Leveraging
HP power regulator technology, HP IPM makes policy-based power and thermal management possible. It expands the capacity of data centers by reducing the amount of power and cooling required for supported Integrity servers and the server blades.
An Advanced Pack license is required to use the power regulation feature through the IPM.
Information on HP IPM is available on the HP website at http://www.hp.com/go/ipm .
•
Power Regulation through the iLO 2
The iLO 2 reads ACPI registers to gather information and display the current power efficiency mode of the system. The available power regulator mode settings are sent to the OS through an ACPI interface. If the OS is able to respond to the settings, it sets return codes to note success or failure to reach these settings.
You do not need an Advanced Pack license to use the power regulation feature through iLO
2.
Administration
The Administration tab enables you to access the following pages:
•
Firmware Upgrade
•
Licensing
•
Local Accounts
•
Group Accounts
•
Settings
•
Access Settings: LAN, Serial, and Login Options
•
Directory Settings: LDAP Parameters
•
Network Settings: Standard and Domain Name Server
•
BL c-Class (Available only for server blade.)
•
SNMP Settings
•
Help
Firmware Upgrade
The Firmware Upgrade page functionality is only available to authorized HP service personnel.
The MP firmware is packaged along with system, BMC, and FPGA/PSOC firmware. To perform a firmware upgrade, you can download and upgrade the firmware package from the HP website at http://www.hp.com/go/bizsupport .
IMPORTANT: When performing a firmware upgrade that contains system programmable hardware
(FPGA, EFI, PSOC, BMC), you must properly shut down any OS that is running before starting the firmware upgrade process.
Select Download drivers and software, select your server, and follow the directions provided.
After the upgrade, reconnect and log in as user
Admin
and password
Admin
(case sensitive).
Web GUI 127
TIP: Before performing certain iLO 2 functions, verify that you have the supported firmware version required to carry out the task.
Licensing
The Licensing page (
Figure 34 ) is used to enter a license key to enable the iLO 2 Advanced Pack
features.
NOTE: Licensing keys are not used with cell-based servers, the Lights-Out Advanced KVM card is used instead. For information on the Lights-Out Advanced KVM card, see
.
IMPORTANT: A HP ProLiant iLO 2 Advanced Pack license key will not work on an HP Integrity server, and vice versa.
NOTE: Depending on your server, this page might look slightly different.
Figure 34 Licensing Page
NOTE: The BL c-Class tab is available only on HP Integrity server blades.
IMPORTANT: On HP Integrity server blades, an Advanced Pack license is standard. Remember to save the Advanced Pack license key information that was provided by HP. If you ever need to replace your server blade under warranty, you will need to transfer the key by entering the code on the replacement server blade.
Integrity iLO 2 offers some advanced features, which can be used only with the iLO 2 Advanced
Pack license:
•
Virtual Media
•
Integrated Remote Console
•
Directory-based authentication and authorization using LDAP
128 Using iLO 2
•
LDAP schema-free integration
•
Integration with Insight Power Manager
lists the fields, buttons, and descriptions.
Table 43 Licensing Page Description
Fields and Buttons
Licensing Key Status
Licensing Key
Install Date
Submit
Cancel
Description
The status of the license - inactive if no license has been installed, the type of the license
(Evaluation or Permanent), and the number of days remaining if the license installed is an Evaluation license.
Enter the 25-character HP Integrity license key used to enable the iLO 2 Advanced Pack features. Fields are case sensitive.
Displays the date the license was installed.
Submits the key for activation.
Cancels the action.
Integrity iLO provides a mechanism to install a license key which unlocks the advanced pack features. There are two types of licenses:
1.
iLO 2 Advanced Evaluation License, a 30-day evaluation license allows usage of advanced features for 720 hours of iLO 2 uptime.
2.
iLO 2 Advanced Permanent License allows perpetual use of the advanced features.
User Administration > Local Accounts
The Local Accounts page (
Figure 35 ) displays the current list of users, their privilege rights and
whether they are enabled or disabled, and the mode (CM, MA, VFP). This page enables you to modify the user configuration of iLO 2, add new users assign rights, and modify or delete existing users. You must have administration access right to use this feature.
NOTE: Depending on your server, this page might look slightly different.
Figure 35 Local Accounts Page
Web GUI 129
NOTE: The BL c-Class tab is available only on HP Integrity server blades.
There are two default users:
1.
Admin: The Admin user has all five rights (console access, power control, MP configuration, user administration, virtual media).
2.
Oper: The Oper user has the login and console access rights by default.
lists the fields and descriptions.
Table 44 Local Accounts Page Description
Select User
Field
Add/Edit
Delete
Description
Select an existing user from the list of user names to edit or delete that account or select
New User to add a new user.
Click this button after selecting the user account to modify or to add a new account. For an existing account, you can modify any of the parameters shown, provided the user has sufficient privileges. By default, a new user is granted the login and console access right, their operating mode is set to multiple logins and the user is enabled.
Click this button after selecting the user account to delete. If you do not have the user administration access right, this button is disabled.
Group Accounts
The Group Accounts page ( Figure 36
) enables you to enter one or more directory groups by specifying the distinguished name of the group and privileges that should be granted to users who are members of that group.
You must configure group administration information when the directory is enabled with the default schema.
When a user attempts to login into iLO 2, iLO 2 reads that user’s directory name in the directory to determine the groups the user is a member of. iLO 2 compares this information with a list of groups configured by the user. The rights of all the matched groups are combined and assigned to that user.
This feature is only available if you have the iLO 2 Advanced Pack license.
NOTE: Depending on your server, this page might look slightly different.
130 Using iLO 2
Figure 36 Group Accounts Page
NOTE: The BL c-Class tab is available only on HP Integrity server blades.
lists the fields, buttons, and descriptions.
Table 45 Group Accounts Page Description
Fields and Buttons
Administrator
User
Custom (1,2,3,4)
Edit
Cancel
Description
Click Administrator and click Edit to open the Group Settings page and enter information.
Click User and click Edit to open the Group Settings page and enter information.
Click Custom 1,2,3,4 and click Edit to open the Group Settings page and enter information
Opens the Group Settings page.
Cancels the action.
Access Settings
The Access Settings tab enables you to access the following pages:
•
LAN
•
Serial
•
Login Options
LAN
The LAN page (
Figure 37 ) enables you to modify LAN settings. You must have iLO configuration
access right to use this feature.
NOTE: Depending on your server, this page might look slightly different.
Web GUI 131
Figure 37 LAN Page
NOTE: The BL c-Class tab is available only on HP Integrity server blades.
lists the fields, buttons, and descriptions.
Table 46 LAN Page Description
Telnet
Fields and Buttons
SSH
Web SSL
Description
You can enable or disable Telnet access to iLO 2 using the enable or disable option.
You can enable or disable SSH access to the iLO 2 using the enable or disable option.
An industry-standard client-server connectivity protocol that provides a secure remote connection. The iLO 2 supports:
•
SSH2 implementation
•
Authentication algorithms RSA and DSA
•
Encryption algorithms 3DES-CBC and AES128-CBD
•
Integrity algorithms HMAC-SHA1 and MD5
You can enable or disable the web SSL access to iLO 2 using the enable or disable option. In order to make an SSL connection, you need to generate a certificate. The certificate status indicates if a certificate has been generated previously.
To generate a new certificate, fill in the fields shown and check Generate New Certificate.
The system alerts you when the certificate is about to expire or if it has already expired.
You will need to generate a new certificate before you can continue.
You must reset the iLO MP after you generate a new certificate.
Submit
Cancel
Submits the information.
Cancels the action.
Serial Page
The Serial page (
Figure 38 ) enables you to set the serial port parameters. You must have iLO
configuration access right to use this feature.
NOTE: Depending on your server, this page might look slightly different.
132 Using iLO 2
Figure 38 Serial Page
NOTE: The BL c-Class tab is available only on HP Integrity server blades.
lists the fields, buttons, and descriptions.
Table 47 Serial Page Description
Fields and Buttons
Bit Rate in Bits per Second
Flow Control
Submit
Cancel
Description
This option enables you to set the baud rate. Input and output data rates are the same.
Flow control can be through hardware or software. Hardware uses RTS/CTS; software uses Xon or Xoff.
Submits the information.
Cancels the action.
Login Options Page
The Login Options page (
Figure 39 ) enables you to modify the security options of iLO 2. You must
have iLO configuration access right to use this feature.
NOTE: Depending on your server, this page might look slightly different.
Web GUI 133
Figure 39 Login Options Page
NOTE: The BL c-Class tab is available only on HP Integrity server blades.
lists the fields, buttons, and descriptions.
Table 48 Login Options Page Description
Fields and Buttons
Login Timeout in Minutes
Password Faults Allowed
Submit
Cancel
Description
The timeout value in minutes is effective on all ports, including local ports.
This sets a limit on the number of password faults allowed when logging in to iLO 2. The default number of password faults allowed is three.
Submits the information.
Cancels the action.
Current LDAP Parameters
The Current LDAP Parameters page (
Figure 40 ) enables you to edit LDAP parameters. You must
have iLO configuration access right to use this feature.
The LDAP feature is only available if you have the iLO 2 Advanced Pack license.
NOTE: Depending on your server, this page might look slightly different.
134 Using iLO 2
Figure 40 Current LDAP Parameters Page
NOTE: The BL c-Class tab is available only on HP Integrity server blades.
lists the fields and descriptions.
Table 49 Current LDAP Parameters Page Description
Field
Directory Authentication
Description
Choosing enable or disable, activates or deactivates directory support on iLO 2:
•
Enable with Extended Schema: selects directory authentication and authorization using directory objects created with HP schema. Select this option if the directory server has been extended with the HP schema.
•
Enable with Default Schema: selects directory authentication and authorization using user accounts in the directory which has not been extended with the HP schema. User accounts and group memberships are used to authenticate and authorize users. Data in the Group Administration page must be configured after this option is selected.
Local User Accounts
Directory Server IP Address
Directory Server LDAP Port
Includes or excludes access to local iLO 2 user accounts. Locally-stored user accounts can be active while LDAP directory support is enabled. If local user accounts are enabled, you may log in to the iLO 2 using locally-stored user credentials. If they are disabled, access is limited to valid directory credentials only.
IP address of the directory server.
Port number for the secure LDAP service on the server. The default value for this port is
636.
Distinguished Name Distinguished Name of iLO 2, specifies where this iLO 2 instance is listed in the directory tree.
Example: cn=MP Server,ou=Management Devices,o=hp
User Search Contexts (1,2,3) User name contexts are used to locate an object in the tree structure of the directory server and applied to the login name entered to access iLO 2.
NOTE: For instances when user authentication uses the LDAP directory server that is configured for Microsoft Active Directory, a user can log in using the username format [email protected]
. Currently, this user credential format is only supported on
Internet Explorer.
Web GUI 135
Table 49 Current LDAP Parameters Page Description (continued)
Field Description
Submit
Cancel
Submits the information.
Cancels the action.
Network Settings
The Network Settings tab enables you to access the following pages:
•
Standard
•
Domain Name Server
IMPORTANT: If you are connected through a network and you make any changes to DHCP status, IP address, subnet mask, or gateway IP address, iLO 2 automatically resets once you confirm the change. The automatic reset occurs only after a warning displays before you commit the changes. If you enter
-nc
, no warning displays and iLO 2 reboots.
If you are connected through a serial console and you make any changes to DHCP status, IP address, subnet mask, or gateway IP address, iLO 2 alerts you to manually reset iLO 2. A warning about dropped network connections is sent prior to committing the change. The warning does not display if you enter
-nc
.
If a firmware upgrade is in progress, the commitment phase to the
LC command fails and indicates that an upgrade or reset is in progress and changes to the
LC parameters are not made.
Network Settings > Standard
) enables you to configure the network settings and LAN configuration.
You must have iLO configuration access right to configure the network settings.
NOTE: Depending on your server, this page might look slightly different.
Figure 41 Standard Page
NOTE: The BL c-Class tab is available only on HP Integrity server blades.
136 Using iLO 2
lists the fields, buttons, and descriptions.
Table 50 Standard Page Description
Fields and Buttons
MAC Address
DHCP Status iLO 2 MP Host Name
IP Address
Subnet Mask
Gateway Address
Link State
Submit
Cancel
Description
The 12 digit (hexadecimal) MAC address.
Enable or Disable.
The host name set here is displayed at the iLO 2 command interface prompt.
The iLO 2 MP IP address. If DHCP is being used, the IP address is automatically supplied.
The subnet mask for the iLO 2 IP network. If DHCP is being used, the subnet mask is automatically supplied.
The IP address of the network gateway. If DHCP is being used, the gateway IP address is automatically supplied.
Auto Negotiate or 10 BaseT option.
Submits the information.
Cancels the action.
Domain Name Server
The Domain Name Server (DNS) page ( Figure 42
) enables you to configure the DNS server settings, domain name, and up to three DNS servers manually or automatically through DHCP. It further enables a DDNS update through the primary DNS server as long as it is authoritative for the zone.
You must have iLO configuration access right to use this feature.
You can only configure the DNS server if DHCP is enabled.
NOTE: Depending on your server, this page might look slightly different.
Figure 42 Domain Name Server Page
NOTE: The BL c-Class tab is available only on HP Integrity server blades.
lists the fields, buttons, and descriptions.
Web GUI 137
Table 51 DNS Page Description
Fields and Buttons Description
Use DHCP supplied domain name
Use the DHCP server-supplied domain name.
Domain name
Use DHCP supplied DNS servers
This represents the factory-default DNS name of the subsystem, for example, “hp.com” in “ilo.hp.com”. You can enter a new DNS name.
Use the DHCP server-supplied DNS server list.
Register with Dynamic DNS Register its name with a DDNS server.
Submit
Cancel
Submits the DNS information.
Cancels the action.
SNMP Settings
The SNMP Settings page ( Figure 43
) enables you edit SNMP feature settings.
You must have iLO configuration access right to use this feature.
NOTE: Depending on your server, this page might look slightly different.
Figure 43 SNMP Settings Page
NOTE: The BL c-Class tab is available only on HP Integrity server blades.
lists the fields and descriptions.
Table 52 SNMP Settings Page Description
SNMP
Field
SNMP Alerts
Description
Choosing Enable or Disable, activates or deactivates the SNMP feature support on this iLO 2.
Enter
E
to enable or
D
to disable all SNMP alerts.
138 Using iLO 2
Table 52 SNMP Settings Page Description (continued)
Field Description
Enter
1, 2, 3, 4
to configure a destination IP address for SNMP alerts. The default is blank (unused).
Community String
Submit
Cancel
Configure the community string to secure the access to the management information base
(MIB) objects. The default is public.
Submits the information.
Cancels the action.
NOTE: If SNMP was disabled earlier and then enabled, you will receive the following message:
Reset MP (XD command option ‘R’) for configuration to take effect.
Click OK and reset iLO 2.
BL c-Class
The Onboard Administrator page (
Figure 44 ) is used to facilitate the cabling and initial installation
of servers blade. It also provides a quick view of the enclosure status. You must have configuration access right to turn the enclosure locator UID LED on or off.
NOTE: Depending on your server, this page might look slightly different.
Figure 44 Onboard Administrator
NOTE: The BL c-Class tab is available only on HP Integrity server blades.
lists the fields and descriptions.
Web GUI 139
Table 53 Onboard Administrator Page Description
Field
OA IP Address
OA MAC Address
Active OA Sign In Page
Rack Name
Rack UID
Bay Number
Enclosure Name
Enclosure Health
Enclosure Locator UID LED
Description
The IP address of the OA.
IMPORTANT: Integrity iLO 2 must have a reachable IP address as the default gateway address. Since the OA is always reachable, HP recommends using the OA IP address as the gateway address for Integrity iLO 2. If you use the Enclosure IP mode, this solution works during a failover. In the Enclosure IP mode, a static IP address is assigned to the active OA, and during a failover, the same IP address follows the active OA. If the OA
IP address is assigned using DHCP, the solution does not work. In such instances, HP recommends manually changing the iLO 2 gateway address.
The MAC address of the OA.
Click this button to launch the Onboard Administrator Sign In page.
This is used to logically group together enclosures in a rack. The rack name is shared with the other enclosures in the rack.
This is the rack unique identifier.
The enclosure can support as many as eight HP Integrity server blades. When viewed from the rack front, the bays are numbered from left to right and from 1 to 8. The bay number is used to locate and identify a server blade.
This is used to logically group together the server blades installed in the same enclosure.
The enclosure name is shared with the other servers in the enclosure.
This displays the health of the enclosure.
This allows you to turn the enclosure Locator UID LED on or off. The iLO Configuration access right is needed. If a user does not have sufficient rights, the button is disabled.
Before setting up the HP BladeSystem OA, HP recommends that you read the HP BladeSystem
Onboard Administrator User Guide on the HP website at: http://h20000.www2.hp.com/bc/docs/support/SupportManual/c00705292/c00705292.pdf
Reading this guide ensures that you will obtain an overall understanding of the HP BladeSystem
OA and that you properly complete the initial setup to facilitate proper functioning of the OA.
The HP BladeSystem Onboard Administrator User Guide provides the following information in detail:
•
Access Requirements
•
Running the OA for the first time
•
Signing in to the OA GUI
•
Running the setup wizard
•
Using online help
•
Changing enclosure and device configurations
•
Recovering the administrator password
•
Flash disaster recovery
Help
The iLO 2 has a robust help system.
To access iLO 2 help, click the Help tab.
NOTE: Depending on your server, this page might look slightly different.
140 Using iLO 2
Figure 45 Help Page
NOTE: The BL c-Class tab is available only on HP Integrity server blades.
You can also click the ? at the top right corner of each page to display help about the page you are on.
Select any of the topics listed in the left navigation bar to access that particular help screen.
SMASH Server Management Command Line Protocol
The Systems Management Architecture for Server Hardware (SMASH) initiative is an effort within the Distributed Management Task Force (DMTF) to standardize commands for servers. The Server
Management Command Line Protocol (SM CLP) specifies common command line syntax and message protocol semantics for server management.
IMPORTANT:
•
The current DMTF CLI implementation is a prestandard release and is subject to change.
•
SMASH SM CLP is not the primary text user interface (TUI) or the primary scripting interface for iLO 2.
•
The HP proprietary TUI is the primary text interface of iLO 2.
•
The entire text user interface of iLO 2, available on Telnet and SSH, supports all MP functionality.
•
SMASH CLP does not support all iLO 2 features, and is a prototype implementation only.
•
SMASH CLP is only available for entry class servers.
SM CLP Features and Functionality Overview
SM CLP includes the following features:
•
Provides a user-friendly method to view and manage server information with commands in formats that facilitate scripting.
•
Offered in addition to the iLO 2 existing CLI.
SMASH Server Management Command Line Protocol 141
•
Uses scripts to automate some iLO 2 tasks, especially when you are setting up many identical servers.
•
Available from any TUI (serial, Telnet, and SSH).
•
CLP sessions are independent from each other and nonmirrored.
•
Provides a subset of MP CLI commands.
•
Provides access to the MP Main Menu interface and system console interface.
SM CLP Session
Sessions between a client and an SM CLP service are established over a transport protocol. Once the session is authenticated, the client begins to submit commands using the SM CLP service.
The CLP is a command and response protocol (not a command-line interface). Each CLP command is sent over the transport protocol to iLO 2. The command is received and processed by iLO 2, which then transmits a response back to the CLP client. There are no interactive commands, so no state information is retained.
The privilege level of the logged-in user is checked against the privilege required for the command.
The command is run only if a user has the privilege level required for that command.
Accessing the SM CLP Interface
When you log in to the iLO 2 MP, by default you access the MP Main Menu interface. To use the
SM CLP:
1.
Access the MP Main Menu.
2.
At the MP Main Menu, enter
SMCLP
to access SM CLP. The screen displays the SM CLP hpiLO-> prompt.
MP MAIN MENU:
CO: Console
VFP: Virtual Front Panel
CM: Command Menu
SMCLP: Server Management Command Line Protocol
CL: Console Log
SL: Show Event Logs
HE: Main Help Menu
X: Exit Connection
[hqgstlv7] MP>
[hqgstlv7] MP> SMCLP
HP SMASH SM CLP interface.
Type "help" to display all supported commands.
Type "show" to display information about the current target.
Type "start /map1/textredirectsap1" to switch to iLO Main Menu interface.
=== SMCLP v1.0.0 Hewlett-Packard Company ===
</> hpiLO->
Exiting the SM CLP Interface
To terminate an SM CLP session and disconnect from iLO 2, use the exit command. To switch from SM CLP to the MP Main Menu interface, use the start /map1/textredirectsap1 command.
Changing the iLO 2 Default Interface to SM CLP
The iLO 2 has a configurable setting that enables you to select your default interface, MP Main
Menu or SM CLP.
142 Using iLO 2
To change the default interface from MP Main Menu to SM CLP:
1.
At the MP Main Menu, enter
CM
.
2.
From the
CM prompt, enter
SA
to modify iLO 2 access configuration.
3.
Use the following example as you follow the prompts on the screen to change the default interface from MP Main Menu to SM CLP.
MP:CM>SA
This command allows you to modify MP access configuration.
Current Set Access Configuration:
R - Remote : OS SESSION
T - Telnet : Enabled
H - SSH : Disabled
W - Web SSL : Enabled
I - IPMI over LAN : Enabled
C - Command Mode : MP Menu
Enter parameter(s) to change, A to modify All, or [Q] to Quit: c c
For each parameter, enter:
New value, or
<CR> to retain the current value, or
DEFAULT to set the default value, or
Q to Quit
Default Command Mode Configuration:
Current -> M - MP Menu (default)
S - SM CLP
Enter new value, or Q to Quit: s s
-> Default Command Mode Configuration will be updated
New Set Access Configuration (* modified values):
R - Remote : OS SESSION
T - Telnet : Enabled
H - SSH : Disabled
W - Web SSL : Enabled
I - IPMI over LAN : Enabled
* C - Command Mode : SM CLP
Enter Parameter(s) to revise, Y to confirm, or [Q] to Quit: y y
-> Set Access Configuration has been updated.
MP:CM>
Using the SM CLP Interface
After initiating an SM CLP session, the iLO 2 CLP prompt appears. Each time a command is run, the CLP prompt appears as shown in the following example.
<current default target>hpiLO->
Where
<current default target> is your current target.
Each time a CLI command runs, the output follows this general format:
</> hpiLO-> {CLPcommand}
status=0
status_tag=COMMAND COMPLETED
... command output returned...
</>hpiLO->
If you enter an invalid command, the status and status_tag values reflect the error as shown:
SMASH Server Management Command Line Protocol 143
</> hpiLO-> badcommand
status=2
status_tag=COMMAND PROCESSING FAILED
error_tag=COMMAND NOT RECOGNIZED
</>hpiLO->
If an invalid target is specified, the response differs as follows:
</> hpiLO-> show /badtarget1
status=3
status_tag=COMMAND PROCESSING FAILED
error_tag=COMMAND SYNTAX ERROR
‘/badtarget1’ is an invalid target.
</>hpiLO->
SM CLP Syntax
The following sections provide terms, descriptions, and examples of the SM CLP syntax.
Command Line Terms
The command syntax consists of a command verb, options, target address, and properties. The general syntax of the SM CLP command is as follows:
<verb> <options> <target> <properties>
Where:
<verb> The command verb.
<options>
<target>
<properties>
Selections that affect the action, behavior, or output of the verb.
The implicitly or explicitly-identified managed element the command is directed to.
Attributes of the target relative to the command execution.
Command Verbs
Command verbs select a management action for target.
The command verbs listed in
consist of several reserved words in the following categories:
Retrieve Information cd, help, show, version
Configure a target create, delete, load, set
Change target state exit, reset, start, stop
lists the supported command verbs.
Table 54 Supported Command Verbs
Command cd
Action
Changes the current default target.
The root of the CLP target namespace is
/
, and this is the starting point for a CLP system. By changing the current default target by running cd <some target>
, you can shorten commands.
For example, to find the current MP firmware version, run the command show
/map1/swinventory1/swid1
. However, if you run the cd /map1/swinventory1/swid1 command, the show command displays the information.
create delete exit help
Creates a new instance of an object.
Deletes an instance of a target object.
Terminates the SM CLP session.
Displays context-sensitive help.
144 Using iLO 2
Table 54 Supported Command Verbs (continued)
Command Action help displays general help and all supported commands.
help <some verb> displays help for the specified verb.
help <some target> displays help for the specified target.
help <some property> displays help for the specified property.
load reset set show
Moves a binary image to iLO 2 from a URI.
Causes a target to cycle from enabled to disabled and back to enabled.
Sets a property to a specific value.
Displays information about managed elements (targets, their supported properties and verbs).
.
You can also run the show command with an explicit or implicit target. For more information on implicit and explicit targets, see
“Map1 (iLO 2) Target” (page 149) ,
Causes a targeted object to change its state to a higher level.
Causes a targeted object to change its state to a lower level.
Queries the version of the SM CLP implementation.
start stop version
The following verbs are available for execution from any target:
• show
• help
• cd
• version
• exit
Command Targets
The command target address identifies the specific managed element or association to be affected by the command verb. All SM CLP commands have a command target, whether explicitly or implicitly identified.
For instance, the target
/map1/telnetsvc1/ can be identified in any of the following ways:
Using the target’s absolute path:
</> hpiLO-> show /map1/telnetsvc1
Using the target’s relative path form map1 target:
</map1> hpiLO-> show telnetsvc1
Using implicit (current) target’s with the verb show
</map1/telnetsvc1> hpiLO-> show
:
Command Target Properties
Target properties are identifying and descriptive information related to and defined by the target.
Target properties are identified by property names. Each class of target defines a set of valid property names. Property values are expressed in
name=value format.
You can specify one or more properties on the command line. If you specify multiple properties on the same command line, they must be separated by a space.
SMASH Server Management Command Line Protocol 145
Command Options
Command options control verb behavior.
Command options can appear immediately after the verb and must be prefaced with a dash (-).
Most command options have both a full name and a short form; for example: show –level all or
show –l all
Level Option
The level option instructs the command verb to include n number of levels in the scope of its execution. A level typically refers to the depth of containment to be processed by the verb.
Forms:
-level <n>
-l <n>
Where n is the number of levels to include in command scope.
The value of n is interpreted as follows: n
=1 Verb is interpreted for the command target only (default).
n
=2 Verb acts on the command target and any directly contained Managed Elements (MEs).
n
=3 Verb acts on the command target, directly contained MEs, and any MEs contained by those
MEs (such as – current target and two down).
n
=all Verb acts on the command target and all target MEs recursively contained in the command.
The following examples show command display option syntax:
Show information about default target and one level of contained MEs:
</>hpiLO-> show -l 2
Show all contained MEs:
</>hpiLO-> show -l all
Show information about system1 and all contained MEs:
</>hpiLO-> show -l all system1
Display Option
The display option filters the information returned in command results.
The following examples show command display option syntax:
Display targets under
/map1 target:
</map1> hpiLO-> show -d targets
Display properties of
/map1 target:
</map1> hpiLO-> show -d properties
Display verbs of
/map1 target:
</map1> hpiLO-> show -d verbs
Display the name property of
/map1 target:
</>hpiLO-> show -d properties=name /map1
Find a target that has a property name with value of
MP Menu
:
</>hpiLO-> show -l all -d properties=(name==”MP Menu”)
Find a target that has a property name with value of
MP Menu and display all verbs supported for that target:
</>hpiLO-> show -l all -d properties=(name==”MP Menu”)
, verbs
146 Using iLO 2
Find and display all targets that have the
EnabledState property:
</map1> hpiLO-> show -l all -d properties=”enabled state”
Find and display all
Account targets in the system and their information:
</> hpiLO-> show -l all account*
shows the available command options.
Table 55 Command Options
Option
-display <name>
-force
-help
-level <n>
-source <URI>
-version
Short Form
-d
-f
-h
-l
None
-v
Description
Selects the data you want to display.
Instructs the verb to ignore warning conditions that otherwise prevent execution.
Provides command-specific help.
Instructs manageability access point (MAP) to execute the command for the specified target and for targets contained through the specified level of depth.
Indicates the location (URI) of the source image or target.
Displays the version of the command.
Character Set, Delimiters, Special, and Reserved Characters
All implementations of the SM CLP must interpret the characters provided by the transport as UTF8 representation of the characters, including those in
. They must interpret the characters according to the descriptions in
lists the SM CLP reserved characters.
Table 56 SM CLP Reserved Characters and Character Sequences
Name Description and Uses
‘
“ “
Character or
Sequence
Space
Escape character
End of line
Command line term separator.
Escape character (the backquote character). Use in front of reserved characters to instruct the command parser to use the reserved character without special meaning. When the escape character is not followed by a reserved character, it is treated as a normal character in the string that contains it.
Each of these sequences are accepted as an end-of-line indicator.
<cr>
<lf>
<cr><lf>
-
,
<escape character><end-of-line>
Line continuation
=
==
Comma
Assignment operator
Equivalence operator
Hyphen
An escape character placed immediately before the end-of-line sequence indicates that the current line is continued to the following line. The following line is appended to the current line.
Delimits items in an option argument term to be interpreted as a list of option arguments. Also delimits values for an option argument.
Separates a property name from a desired value for the property when used with verbs that modify or create an instance. It can not have a space before or after it in an expression of a property and its value.
Two consecutive equals signs without white space between them are used to separate a property name from a number value when filtering instances for which results must be returned.
When preceded by a space, the hyphen is the SM CLP option indicator.
SMASH Server Management Command Line Protocol 147
Table 56 SM CLP Reserved Characters and Character Sequences (continued)
Character or
Sequence
Name Description and Uses
/ Address term separator Separates the UFiT terms of a target address.
.
..
()
“
“->”
Dot
Dot-dot
Parentheses
Double quote
Recognized as a special target address token meaning this container.
Recognized as a special target address token meaning the container
of this container.
In a comma-separated option argument term list, delineates the values of an argument from the next option argument.
Delineates a string of text that can contain the SM CLP term separator
(space) so that the SM CLP command processor treats the delineated text as one string.
SM CLP PROMPT (hyphen, greater-than, space)
Literal representation of the SM CLP prompt.
System1 Target
Target: SYSTEM1
/ system1
The system1 target represents the root of the system namespace. Functions and information such as OS console, system power status and control, system LED status, and so on, related to the system are located under this target.
shows system1 target properties.
Table 57 system1 Properties
Property Name
EnabledState
Description
Provides information about the system power state.
Access and Values
Read-only
Values:
•
Enabled: System power is off.
•
Disabled: System power is on.
Verbs
show help reset start stop
Displays information about managed elements (targets, their supported properties and verbs).
Displays context-sensitive help.
Resets the system.
Turns system power on.
Performs graceful shutdown of the system. If used with force option, turns system power off.
System Reset Power Status and Power Control
This section describes the system reset power status and power control commands.
Resetting the System
To reset the system, apply the reset command to the system1 target. For example:
</>hpiLO-> reset system1 status=0
148 Using iLO 2
status_tag=COMMAND COMPLETED system1 has been issued a reset
Displaying Power Status
To display the power state of the system, query the value of the enabledstate property of the system1 target. For example:
</>hpiLO-> show -d properties=enabledstate system1 status=0 status_tag=COMMAND COMPLETED
/system1
Properties
EnabledState=Enabled
Powering Off the System
To power off the system, apply the stop
(graceful shutdown) or stop-force
(power off) commands to the system1 target. For example:
</system1> hpiLO-> stop -f status=0 status_tag=COMMAND COMPLETED
System is being powered off.
</system1> hpiLO-> stop status=0 status_tag=COMMAND COMPLETED system has been requested graceful shutdown.
Powering On the System
To power on the system, apply the start command to the system1 target. For example:
</>hpiLO-> start system1 status=0 status_tag=COMMAND COMPLETED system1 has been powered on
Map1 (iLO 2) Target
Target: map1
The map1 target (management access point) represents the root of the iLO 2 namespace. Functions and information related to iLO 2 are located under the map1 target.
shows map1 target properties.
Table 58 map1 Properties
Property Name
Dedicated
Name
Description Access and Values
Indicates whether the computer system is a special purpose system
(for example, dedicated to a particular use), or a general-purpose system.
Read-only
Set to management.
Name that identifies iLO 2.
Read-only
Set to iLO 2 Advanced, HP Integrity.
Verbs
show help reset
Displays information.
Displays context-sensitive help.
Resets iLO 2.
SMASH Server Management Command Line Protocol 149
Map1 Example
The following example displays information about map1
:
</> hpiLO-> show map1 status=0 status_tag=COMMAND COMPLETED
/map1
Targets
dhcpendpt1
dnsendpt1
dnsserver1
dnsserver2
dnsserver3
enetport1
gateway1
group1
settings1
sshsvc1
swinstallsvc1
swinventory1
telnetsvc1
textredirectsap1
textredirectsvc1
Properties
Name=iLO Advanced, HP Integrity
Dedicated=Management
Verbs
cd help show load reset
</> hpiLO->
Resetting iLO 2
To reset iLO 2, run the reset command to the
MAP1 target as in the following example:
</>hpiLO-> reset map1 status=0 status_tab=COMMAND COMPLETED iLO was issued a reset
Text Console Services
This section describes targets, their properties, and supported verbs necessary to implement the console services in SM CLP.
You can invoke the system console and the MP Main Menu from SM CLP.
Any text console service is represented by a dedicated to it textredirectsap target.
Target / map1/textredirectsvc1 represents iLO 2’s ability to provide text console redirection service.
Opening the MP Main Menu from SM CLP
This section provides information on how to invoke the MP Main Menu from the SM CLP.
Target: map1/textredirectsap1
The textredirectsap1 target represents the MP Main Menu interface.
shows textredirectsap1 target properties.
150 Using iLO 2
Table 59 /map1/textredirectsap1 Properties
Verbs
cd help show start
Property Name
EnabledState
SessionTerminateSequence
Description
Name
Description
Shows whether the text redirection is enabled.
A string sequence used for terminating text redirection session and returning to SM CLP.
Access and Values
Read-only
The value is set to
Enabled
.
Read-only
The value is set to
SMCLP
.
Enter
SMCLP
at the MP Main Menu to return to the SM CLP interface.
Description of this text redirection service access point.
Read-only
The value is set to
MP Main Menu
Interface
.
Uniquely identifies this access point.
Read-only
The value is set to
MP Main Menu
Changes the current default target.
Displays context-sensitive help.
Displays information.
Switch to MP Main Menu.
Opening the System Console Interface from SM CLP
This section provides information on how to open the system console from the SM CLP.
Target: system1/consoles1/textredirectsap1
This target represents the system text console (currently launched through the iLO 2
CO command).
shows textredirectsap1 target properties.
Table 60 /system1/consoles1/textredirectsap1 Properties
Property Name
EnabledState
SessionTerminateSequence
Description
Name
Shows if the test redirection is enabled.
Description Access and Values
Read-only
Set to
Enabled
.
A string sequence used for terminating text redirection session and returning to SM CLP.
Read-only
Set to
Esc
.
Enter Esc at the system console to return to the
SM CLP interface.
Description of this text redirection service access point.
Uniquely identifies this access point.
Read-only
Set to
System Test Console Interface
.
Read-only
Set to
System Test Console
.
Verbs
cd help show start
Changes the current default target.
Displays context-sensitive help.
Displays information.
Switch to system text console.
Switching Between the System Console and the SM CLP
The following examples show commands used to switch between the system console and the SM
CLP.
SMASH Server Management Command Line Protocol 151
Starting a System Console Session
To start a system console session, enter the following command:
</>hpiLO->start /system1/consoles1/textredirectsap1
Determining the Session Termination Character Sequence for the System Console
To determine the session termination character sequence for the system console, enter the following command:
</> hpiLO-> show -d properties=SessionTerminateSequence
/system1/consoles1/testredirectsap1 status 0 status_tag=COMMAND COMPLETED
/system1/consoles1/testredirectsap1
Properties
SessionTerminateSequence=Esc (
Exiting the System Console Session and Returning to SM CLP
To exit the system console session and return to SM CLP, enter
Esc + (
at the system text console.
Entering the MP Main Menu Interface From SM CLP
To enter the MP Main Menu from SM CLP, enter the following command:
</>hpiLO->start
/map1/textredirectsap1
Exiting the MP Main Menu Session and Returning to SM CLP
To exit the MP Main Menu interface and return to the SM CLP session, enter
SMCLP
Firmware Revision Display and Upgrade
This section describes how to view firmware revisions in the system.
Each installed firmware in the system known to MP (MP FW, BMC FW, EFI FW, System FW, and so on) is represented by a swid target.
•
/map1/swinstallsvc1 represents iLO 2’s ability to install firmware.
•
/map1/swinventory1 represents a collection of all swids installed in the system.
SM CLP Firmware Targets
This section describes targets, target properties, and supported verbs necessary to implement the firmware model in SM CLP.
Target: map1/swinstallsvc1
SoftwareInstallationService provides the ability to transfer images into a managed element from a source location, local or remote (such as the ability to upgrade firmware).
shows swinstallsvc1 target properties.
Table 61 swinstallsvc1 Properties
Property Name
Description
Description
Provides a textual description of the object.
Access and Values
Read-only
The value is set to firmware installation service
.
Verbs
cd Changes the current default target.
152 Using iLO 2
help Displays context-sensitive help.
show Displays information.
Target: map1/swinventory1
SoftwareInventory is a dedicated collection for all firmware in the system known to iLO 2.
shows swinventory1 target properties.
Table 62 swinventory1 Properties
Property Name
Description
Description
Provides a textual description of the object.
Access and Values
Read-only
The value is set to firmware inventory
.
Verbs
cd Changes the current default target.
help Displays context-sensitive help.
show Displays information.
Target: map1/swinventory1/swid#
SoftwareIdentity represents software in the system known to iLO 2 (map1).
shows swid# target properties.
Table 63 swid# Properties
Property Name
TargetType
VersionString
Description
Identifies what type of firmware this swid target represents
Represents firmware revision string; for example, F.01.40.
Verbs
cd Changes the current default target.
help Displays context-sensitive help.
show Displays information.
load Moves an image to iLO 2.
The following is a possible list of swid in the system:
•
/map1/swinventory1/swid1: represents iLO 2 firmware
•
/map1/swinventory1/swid2: represents BMC firmware
•
/map1/swinventory1/swid3: represents EFI firmware
•
/map1/swinventory1/swid4: represents System Firmware
•
/map1/swinventory1/swid5: represents PDH firmware
•
/map1/swinventory1/swid6: represents UCIO firmware
•
/map1/swinventory1/swid7: represents PRS firmware
Access and Values
Read-only
Read-only
Displaying Firmware Revisions
This example displays only the iLO 2 firmware revision:
</map1/swinventory1> hpiLO-> show -d properties= `
(TargetType=="MP FW",versionstring) status=0 status_tag=COMMAND COMPLETED
/map1/swid1
SMASH Server Management Command Line Protocol 153
Properties
VersionString=F.01.57
This example displays all the firmware revisions.
</>hpiLO-> show /map1/swinventory1/swid*
/map1/swinventory1/swid1
TargetType=MP FW
VersionString=F.01.57
/map1/swcollection1/swid2
TargetType=BMC FW
VersionString=01.60
/map1/swcollection1/swid3
TargetType=EFI FW
VersionString=ROM A 05.11, ROM B 255.255
/map1/swcollection1/swid4
TargetType=System FW
VersionString=ROM A 62.03, ROM B 255.255, Boot ROM B
/map1/swcollection1/swid5
TargetType=PDH FW
VersionString=00.0b
/map1/swcollection1/swid6
TargetType=UCIO FW
VersionString=03.03
/map1/swcollection1/swid7
TargetType=PRS FW
VersionString=00.05 UpSeqRev: 09, DownSeqRev: 07 or
</>hpiLO-> show -level all swid*
Firmware Upgrade
Firmware upgrades enhance the functionality of iLO 2.
The MP firmware is packaged along with system, BMC, and FPGA/PSOC firmware. You can download and upgrade the firmware package from the HP website at http://www.hp.com/go/ bizsupport .
IMPORTANT: When performing a firmware upgrade that contains system programmable hardware, you must properly shut down any OS that is running before starting the firmware upgrade process.
Select Download drivers and software, select your server, and follow the directions provided.
After the upgrade, reconnect and log in as user
Admin
and password
Admin
(case sensitive).
TIP: Before performing certain iLO 2 functions, verify that you have the supported firmware version required to carry out the task.
Remote Access Configuration
Integrity iLO 2 supports the use of Telnet and SSH to access the iLO 2 MP command line interface.
154 Using iLO 2
Telnet SM CLP Targets
This section describes targets, their properties, and supported verbs necessary to enable or disable
Telnet access to iLO 2.
Target: map1/telnetsvc1
The telnetsvc1 target represents the telnetsvc service provided by map1
.
shows telnetsvc1 target properties.
Table 64 telnetsvc1 Properties
Property Name
EnabledState
Description
Shows whether Telnet is enabled or disabled.
Access and Values
Read-only
The following are valid values:
Enabled, Disabled
Protocol The protocol this service provides.
Read-only
Set to telnet
Verbs
start show stop help
Enables iLO 2 Telnet service.
Displays information.
Disables iLO 2 Telnet service.
Displays context-sensitive help.
Telnet Examples
The following examples show specific Telnet commands.
Enable Telnet Service
</>-> start /map1/telnetsvc1
Disable Telnet Service
</>-> stop /map1/telnetsvc1
SSH
This section describes targets, their properties, and supported verbs necessary to enable or disable
SSH access to iLO 2.
Target: map1/sshsvc1
The sshsvc1 target represents the SSH service provided by map1
.
shows sshsvc1 target properties.
Table 65 sshsvc1 Properties
Property Name
EnabledState
Description
Shows whether SSH service is enabled or disabled.
Access and Values
Read-only
The following are valid values:
Enabled, Disabled
Protocol The protocol this service provides.
Read-only
Set to
SSH
.
Verbs
start stop
Enables iLO 2 SSH service.
Disables iLO 2 SSH service.
SMASH Server Management Command Line Protocol 155
show help
Displays information.
Displays context-sensitive help.
SSH Examples
The following examples show specific SSH commands.
Enable SSH Service
</>-> start /map1/sshsvc1
Disable SSH Service
</>-> stop /map1/sshsvc1
Network Configuration
Network commands enable you to display or modify network settings.
SM CLP Network Targets, Properties, and Verbs
This section describes targets, target properties, and supported verbs necessary to implement the iLO 2 network configuration through SM CLP.
Target: map1/enetport1
The enetport1 target represents capabilities and management of the iLO 2 MP Ethernet port.
shows enetport1 target information.
Table 66 enetport1 Properties
Property Name
AutoSense
PermanentAddress
Description
Specified if the iLO 2 AutoSense feature is enabled. If it is disabled, iLO 2 network speed is set to 10 mb/s.
Represents iLO 2 MP MAC address.
Access and Values
Read/write
Boolean values accepted.
Read-only
The iLO 2 MP MAC address is formatted as twelve hexadecimal digits
(10203040506) with each pair representing one of the six octets of the
MAC address.
Verbs
cd Changes the current default target.
help Displays context-sensitive help.
show Displays information.
set Sets a property to a specific value.
Target: map1/enetport1/lanendpt1
The lanendpt1 target represents the iLO 2 LAN endpoint settings.
shows lanendpt1 target properties.
Table 67 lanedpt1 Properties
Property Name
EnabledState
Description
Represents the iLO 2 MP LAN state.
Access and Values
Read-only
The following are valid values:
156 Using iLO 2
Table 67 lanedpt1 Properties (continued)
Property Name Description Access and Values
Enabled, Disabled
MACAddress Represents the iLO 2 MP MAC address.
Read-only
The MAC address is formatted as twelve hexadecimal digits (010203040506), with each pair representing one of the six octets of the MAC address.
Verbs
cd Changes the current default target.
help Displays context-sensitive help.
show Displays information.
Target: map1/enetport1/lanendpt1/ipendpt1
The ipendpt1 target represents the iLO 2 MP IP endpoint settings.
shows ipendpt1 target properties.
Table 68 ipendpt1 Properties
Property Name
IPv4Address
SubnetMask
AddressOrigin
Description iLO 2 MP IP address.
Access and Values
Read/write
The value of the property must be expressed in dotted decimal notation.
iLO 2 MP subnet mask.
Read/write
The value of the property must be expressed in dotted decimal notation.
Indicates the configuration method that resulted in the configuration being assigned to this ipendpt
.
Read-only
The following are valid values:
Static: The iLO 2 MP IP address and subnet mask were assigned statically.
DHCP: The iLO 2 MP IP address and subnet mask were acquired using DHCP.
Verbs
cd Changes the current default target.
help Displays context-sensitive help.
show Displays information.
set Sets a property to a specific value.
Target: map1/dhcpendpt1
The dhcpendpt1 target represents the iLO 2 DHCP client.
shows dhcpendpt1 target properties.
Table 69 dhcpendpt1 Properties
Property Name
EnabledState
Description
Represents the state of iLO 2
DHCP.
Access and Values
Read-only
The following are valid values:
Enabled: The iLO 2 DHCP client is enabled.
SMASH Server Management Command Line Protocol 157
Table 69 dhcpendpt1 Properties (continued)
Property Name Description
OtherTypeDescription Textual description of this protocol endpoint.
Access and Values
Disabled: The iLO 2 DHCP client is disabled.
Read-only
Set to
DHCP
.
Verbs
cd help show start stop
Changes the current default target.
Displays context-sensitive help.
Displays information.
Enables iLO 2 DHCP.
Disables iLO 2 DHCP.
Target: map1/dnsendpt1
The dnsendpt1 target represents the iLO 2 DNS client.
shows dnsendpt1 target properties.
Table 70 dnsendpt1 Properties
Property Name
EnabledState
Description
Represents the state of iLO 2 DNS.
Hostname
OtherTypeDescription
Represents the host name currently assigned to iLO 2.
Textual description of this protocol endpoint.
Verbs
cd Changes the current default target.
help Displays context-sensitive help.
show Displays information.
Access and Values
Read only
The following are valid values:
Enabled: The iLO 2 DNS client is enabled.
Disabled: The iLO 2 DNS client is disabled.
Read-only iLO 2 current host name.
Read-only
Set to
DNS
.
Target: map1/enetport1/lanendpt1/ipendpt1/gateway1
The gateway1 target represents the gateway server.
shows gateway1 target properties.
Table 71 gateway1 Properties
Property Name
AccessInfo
AccessContext
Description Access and Values
Represents the IP address of the gateway server.
Read/write
The value of the property must be expressed in dotted decimal notation.
Represents access context (description) of this access point.
Read-only
Set to default gateway
.
Target: map1/dnsserver1, map1/dnsserver2, map1/dnsserver3
The dnsserver1
, dnsserver2
, and dnsserver3 targets represent the iLO 2 primary, secondary, and tertiary DNS servers respectively.
158 Using iLO 2
shows dnsserver1
, dnsserver2
, and dnsserver3 target properties
Table 72 dnsserver1, dnsserver2, dnsserver3 Properties
Property Name
AccessInfo
AccessContext
Description Access and Values
Represents the IP address of the DNS server.
Read/write
The value of the property must be expressed in dotted decimal notation.
Represents access context (description) of this access point.
Read-only
Set to
DNS server
.
Verbs
show Displays information.
help Displays context-sensitive help.
set Sets a property to a specific value.
Target: map1/settings1/dnssettings1
The dnssettings1 target contains iLO 2 DNS settings.
shows dnssettings1 target properties.
Table 73 dnssettings1 Properties
Property Name
DNSServerAddress
Description
Contains the IP addresses of the primary, secondary, and tertiary
DNS servers.
DomainName
RegisterThisConnections Address iLO 2 domain name.
Indicates whether iLO 2 registers with the DDNS server.
Access and Values
Read/write
This is an array property.
The value of each element of this property must be expressed in dotted decimal notation. The elements of the property are separated by commas
(DNSServerAddressess=192.0.2.1,
192.0.2.2, 192.0.2.3 means that the IP addresses of the primary, secondary and tertiary DNS servers are set to 192.0.2.1, 192.0.2.2,
192.0.2.3 respectively).
Read/write
Read/write.
The following are valid values:
Yes: register with DDNS server.
No: do not register with DDNS server.
Read/write.
RequestedHostName iLO 2 host name.
Verbs
cd Changes the current default target.
help Displays context-sensitive help.
show Displays information.
set Sets a property to a specific value.
SM CLP Network Command Examples
The following examples list specific network commands.
Determine the iLO 2 MP MAC Address
SMASH Server Management Command Line Protocol 159
</>hpiLO-> show -d properties=macaddress /map1/enetport1/lanendpt1 or
</>hpiLO-> show -d properties=permanentaddress /map1/enetport1/
Determine current IP Address
</>hpiLO-> show -d properties=ipv4address /map1/enetport1/lanendpt1/ipendpt1
Determine Subnet Mask
</>hpiLO-> show -d properties=subnetmask /map1/enetport1/lanendpt1/ipendpt1
Set IP Address and Subnet Mask
To modify a Static IP Address and Subnet Mask, set IPv4Address and SubnetMask properties of the ipendpt1 target:
</>hpiLO-> set /map1/enetport1/lanendpt1/ipendpt1 ipv4address=192.0.2.1 subnetmask=255.255.255.0
Determine Gateway Address
</>hpiLO-> show -d properties=accessinfo
/map1/enetport1/lanendpt1/ipendpt1/gateway1
Set Gateway Address
</>hpiLO-> set /map1/enetport1/lanendpt1/ipendpt1/gateway1
AccessInfo=192.0.2.1
Determine Link State (Autosense)
</>hpiLO-> show -d properties=autosense /map1/enetport1
Set Link (Autosense)
</>hpiLO-> set /map1/enetport1 autosense=true
AccessInfo=192.0.2.1
Enable/Disable DHCP
</>hpiLO-> stop /map1/dhcpendpt1
</>hpiLO-> start /map1/dhcpendpt1
Determine all DNS settings
</>hpiLO-> show /map1/settings1/dnssettings1
Determine IP Address of the DNS Servers (primary, secondary, and tertiary)
</>hpiLO-> show -d properties=AccessInfo /map1/dnsserver* or
</>hpiLO-> show -d properties=DNSServerAddresses
/map1/settings1/dnssettings1
Set Primary and Secondary DNS Server IPs
</map1/settings1/dnssettings1> set
DNSServerAddressess=192.0.2.1, 192.0.2.4
Set Tertiary DNS Server IP
</map1/settings1/dnssettings1> set DNSServerAddressess=,,192.0.2.6
vMedia
This section provides information on SM CLP vMedia targets, properties, and supported verbs. It also lists examples of SM CLP vMedia use cases.
The scriptable vMedia feature is supported on server blade platforms (OA version 2.0 and beyond) and on rackmounted servers as described in the following sections.
160 Using iLO 2
NOTE:
•
Scriptable vMedia is available only if you have the iLO 2 Advanced Pack license and the vMedia user privilege.
•
Only one vMedia connection is supported at a time. You cannot connect with the scriptable vMedia while the Applet vMedia is connected and vice versa.
Scriptable vMedia Supported Operating Systems
•
Linux (Red Hat and SuSE)
•
Windows
•
HP-UX
•
OpenVMS
•
EFI
Setting Up IIS for Scripted vMedia
Before setting up Internet Information Services (IIS) for scripted vMedia, make sure IIS is operational.
Use IIS Manager to set up a simple website and verify that it is working correctly by browsing to the site.
To configure IIS to serve diskette or ISO-9660 CD images for read only access:
1.
Add a directory to your website, and place your images in the directory.
2.
Verify that IIS can access the MIME type for the files you are serving. For example, if you name your diskette images with the extension .img, you must add a MIME type for that extension. Use the IIS Manager to access the Properties dialog of your website. On the HTTP
Headers tab, click
MIME Types
to add additional MIME types.
HP recommends you add the following types:
.img – application/octet-stream
.iso – application/octet-stream
3.
Browse to the location of your images with a web browser, and download them to a client.
Your web server is configured properly for serving read-only diskette and CD images.
To configure IIS to serve diskette images for read/write operations:
1.
Install Perl (if necessary). Active State's ActivePerl is an installer program that also sets itself up to be a script interpreter for IIS. You can obtain it from the web at:
http:// www.activestate.com/
2.
Create a directory on your web site to hold the vMedia helper script, and copy the script to that location.
3.
To create an application directory, use the properties page for your directory. Under
Application Settings, click
Create
.
The icon for your directory in IIS Manager should change from a folder to a gear.
4.
Set Execute Permissions to
Scripts Only
.
5.
Verify that Perl is set up as a script interpreter. To view the application associations, click
Configuration
on the properties page. Verify that Perl is configured as follows:
.pl c:\perl\bin\perl.exe "%s" %s GET,HEAD,POST
6.
Verify your Web Service Extensions allows Perl scripts to execute. If not, click
Web Service
Extensions
, and set Perl CGI Extension to
Allowed
.
7.
Verify the prefix variable in the helper script is set correctly. You can set it to the same path as your document root, which can be similar to C:\inetpub\wwwroot.
SMASH Server Management Command Line Protocol 161
vMedia Functionality on Server Blades and Rack-Mounted Servers
Administrators can easily transfer data to the managed system from the web (Apache or IIS) server containing the vMedia ISO images. On the client side, the web (Apache or IIS) server is running and the ISO images are stored so they can be accessed over HTTP.
NOTE: HTTPS is currently not supported through the SM CLP interface.
The drives (connected ISO images) on the client side appear as local drives (USB CD Read-only) on the managed server. With the help of vMedia, the server can boot from the DVD, CD, or image on the client, perform OS and applications installation on the server from the client’s drives or data transfer, and so on.
To access the SM CLP interface, enter
SMCLP at the MP Main menu after you login.
Target: map1/oemhp_vm1/cddr1
The cddr1 target represents the virtual CD-ROM device.
Table 74 cddr1 Properties
Property Name oemhp_image oemhp_connect oemhp_applet_connected
The image path and name for vMedia access.
Description Access and Values
Read/write
The value is a URL with a maximum length of
80 characters.
Used to connect or disconnect a vMedia device and display the connection status.
Read/write
The following are valid values:
•
Yes: Connect.
•
No: Disconnect.
Indicates if the Java applet is connected.
Read-only
Set to:
•
Yes
•
No
Verbs
set Sets a property to a specific value.
show Displays information.
help Displays context-sensitive help.
Using Scriptable vMedia on Server Blades and Rack-Mounted Servers
The following examples show actions you can perform using SM CLP for vMedia on server blades and on rack-mounted servers.
Change the current context to point to the SMCLP target representing the virtual the CD drive
–> cd / map1 / oemhp_vm1 / cddr1
Display
/ map1 / oemhp_vm1 / cddr1 target properties and show the current status to verify that the media is not in use
–> show
Insert the desired image into the drive
–> set oemhp_image=http://<Apache server ip address>/cgi-bin/ISO/install_disk1.iso
Connect to the media
–> set / oemhp_connect=yes
162 Using iLO 2
NOTE: The oemhp_applet_connected has a value equal to yes
.
If you attempt to connect when there is no valid image location set in the oemhp_image property, you will receive an error.
Disconnect vMedia
This command disconnects the media and clears the oemhp_image value.
–> set / map1 / oemhp_vm1 / cddr1 oemhp_connect=no
NOTE: If you attempt to disconnect when the drive is not connected, you will receive an error.
Using Scriptable vMedia on Server Blades Only
This section provides information on using scriptable vMedia on server blades only.
On HP Integrity server blades, all iLO 2 functions are available on the Onboard Administrator
(OA).
The OA presents its bootable physical CD/DVD media as an ISO image. DVD/CD connect and disconnect sequences are initiated from the OA by the OA user. The drives (connected ISO images) on the client side appear as local drives (USB CD read-only) on the managed server. With the help of vMedia, the server can boot from the DVD/CD (or image) on the client, perform OS and applications installation on the server from the client’s drives or data transfer, and so on.
The OA has two types of CD/DVD interfaces to access scriptable vMedia:
Built-in DVD Interface
The c3000 Enclosure has a built-in DVD drive you can use to connect using scriptable vMedia.
External CD/DVD Drive Interface
On a c7000 Enclosure, an external CD/DVD drive is connected to the additional USB port on the enclosure itself. This is used to connect using scriptable vMedia.
To connect using scriptable vMedia on server blades:
•
On a c3000 enclosure, insert a DVD in the built-in DVD drive.
•
On a c7000 enclosure, insert a CD/DVD in the external CD/DVD drive that is connected to the USB port.
There are three methods to connect:
SMASH Server Management Command Line Protocol 163
1.
Using the LCD display on the OA enclosure, navigate to the
DVD Drive - Attach...
option.
2.
Using the Telnet/SSH connection to the OA.
NOTE: While in the OA, you will not be entering the SM CLP vMedia commands directly in MP. Instead, you will issue the commands from the Telnet/SSH connection of the OA to connect or disconnect vMedia.
• Enter the following commands to either connect or disconnect vMedia: set server dvd connect <slot #> (or all to connect for all blades) set server dvd disconnect <slot #> (or all to disconnect for all blades)
164 Using iLO 2
3.
Using the OA GUI, navigate to Enclosure Information/Enclosure Settings/DVD Drive.
The OA web GUI interface provides an easy-to-navigate graphical interface. Select a specific action for vMedia, such as inserting a disk, connecting, and so on.
Known Issues
•
Only DVD/CD is supported at this time.
•
Floppy/USB Key is currently not supported.
•
Only one device is supported at a time with scriptable vMedia (either DVD/CD or Floppy/Key).
•
Scriptable vMedia cannot connect while another vMedia Applet is connected and vice versa.
•
Apache server cannot support large ISO images (greater than 2 GB).
•
Scriptable vMedia does not currently have fully supported DNS. As a result, it does not support using the hostname in the CLI. Instead you must specify the IP address of the Apache server while specifying the image path in the command line.
•
The vMedia feature is supported using the USB 1.1 protocol (since MP FW uses Philips 1181
USB device). As a result, USB 2.0 is not currently supported.
•
DVD appears as the large CD.
•
Currently there is no support on fully compliant DVD.
Typical Scriptable vMedia Usage
Using the scriptable vMedia feature, you can perform the following:
Deploying Operating Systems
•
Installing (RHEL and SLES) Linux using ISO images
•
Installing (RHEL and SLES) Linux using a set of physical CDs
•
Installing Windows Server 2003 using Re-install Media using CD
•
Installing Windows Server 2003 using Re-install Media using ISO image
SMASH Server Management Command Line Protocol 165
•
Installing Windows Server 2003 using Smart-setup and RTM-bit physical CDs
•
Installing Windows Server 2003 using Smart-setup and RTM-bit ISO images
•
Installing HP-UX using a physical CD
•
Installing HP-UX using ISO images
Installing an Application
Installing MS SQL Server from an MSDN DVD
User Accounts Configuration
This section describes targets, their properties, and supported verbs used for configuring and viewing iLO 2 user accounts using SM CLP.
Target: map1/group1
The group1 target represents a collection of user accounts on iLO 2.
shows group1 target information.
Table 75 group1 Properties
Property Name
Description
Description
Textual description of this collection target.
Access and Values
Read-only
Set to collection of user accounts
.
Verbs
cd Changes the current default target.
help Displays context-sensitive help.
show Displays information.
Target: map1/group1/account#
The account# target represents a user account on this iLO 2 where
# is the instance number of the specific account. You can configure up to 19 user accounts on the iLO 2.
shows account# target properties.
Table 76 account# Properties
Property Name Description Access and Values
UserID
UserPassword
Name
Login name of this user account.
User password.
User name of this account.
oemhp_privileges Privileges of this user account.
Read/write.
Specified in ASCII characters up to 24 characters long.
Read/write.
Specified in ASCII characters and must be least six characters long.
Read/write.
Specified in ASCII characters up to 24 characters long.
Read/write.
The following are valid values:
<console,power,mp,user,virtual),
<all> or <none>.
Verbs
cd help show set
166 Using iLO 2
Changes the current default target.
Displays context-sensitive help.
Displays information.
Sets a property to a specific value.
create delete
Create a new user account.
Delete a user account.
User Account Examples
The following examples show specific user account commands.
Display all user accounts on this iLO 2
</> hpiLO-> show /map1/group1/account*
Create a new account
</map1/group1> hpiLO-> create account3 userid=testuser userpassword=testpass name=”Test User” oemhp_privileges=console,power
Delete an account
</map1/group1> hpiLO-> delete account1
Modify account properties
</map1/group1/accuont3> hpiLO-> set oemhp_privileges=console name=”Console User”
LDAP Configuration
This section describes targets, their properties, and supported verbs used for configuring and viewing iLO 2 LDAP settings using SM CLP.
NOTE: You can only configure LDAP with extended HP schema from the SM CLP interface.
You can configure LDAP with default schema using the iLO 2 web GUI or the iLO 2 MP TUI
Command menu.
Target: map1/settings1/oemhp_ldapsettings1
The oemhp_ldapsettings1 target represents iLO 2 LDAP directory configuration settings.
shows oemhp_ldapsettings1 target information.
Table 77 oemhp_ldapsettings1 Properties
Property Name oemhp_dirauth
Description
Represents the iLO 2 directory access setting.
Access and Values
Read write.
Valid values are:
DefaultSchema: enable directory authentication using default schema.
ExtendedSchema: enable directory authentication using extended HP schema.
Disabled: disable directory authentication oemhp_localacct oemhp_dirsrvaddr oemhp_ldapport oemhp_dirdn oemhp_usercntxt1 oemhp_usercntx2 oemhp_usercntxt3
Represents iLO 2 local user accounts access setting.
Read write.
Valid values are:
Enable: enable local iLO 2 user accounts.
Disabled: disable local iLO 2 user accounts.
IP address or hostname of the directory server.
Read write.
Directory server LDAP port number.
iLO 2 object distinguished name.
Read write.
Valid values are: 636, 2000-2400.
Read write.
Directory user search context #1.
Directory user search context #2.
Directory user search context #3.
Read write.
Read write.
Read write.
SMASH Server Management Command Line Protocol 167
Verbs
cd Changes the current default target.
help Displays context-sensitive help.
show Displays information.
set Sets a property to a specific value.
LDAP Configuration Examples
Configure LDAP parameters.
This command:
</map1/settings1/oemhp_ldapsettings1> hpiLO-> set oemhp_dirauth=
ExtendedSchema `oemhp_dirsrvaddr=192.0.2.1
oemhp_dirdn=cn=iLO2,ou=ManagementDevices,o=hp oemhp_usercntxt1=cn=user,ou= engineering,o=hp
Applies the following LDAP settings:
•
Enable LDAP authentication with extended schema.
•
Set LDAP IP address.
•
Set iLO 2 DN name as it is configured in the directory server. In this example it is set to cn=iLO2,ou=ManagementDevices,o=hp
.
•
Set user search context #1. In this example it is set to cn=user,ou= engineering,o=hp.
168 Using iLO 2
9 Installing and Configuring Directory Services
This chapter provides information on how to install and configure iLO 2 directory services.
You can install and configure iLO 2 directory services to leverage the benefits of a single point of administration for iLO 2 user accounts.
Directory Services
The following are benefits of directory integration:
Scalability Leverage the directory to support thousands of users on thousands of iLO 2s.
Security
Role-based administration
Single point of administration
Immediacy
Reuse of user name and password
Flexibility
Compatibility
Standards
Robust user password policies are inherited from the directory. User password complexity, rotation frequency, and expiration are policy examples.
You can create roles (for instance, clerical, remote control of the host, complete control), and associate users or user groups with those roles. When you change a single role, the change applies to all users and the iLO 2 devices associated with that role.
You can use native administrative tools, like Microsoft
Management Console (MMC) and ConsoleOne, to administer the iLO 2 users.
A single change in the directory rolls out immediately to associated iLO 2s, eliminating the need to script this process.
You can use existing user accounts and passwords in the directory without having to record or remember a new set of credentials for iLO 2.
You can create a single role for a single user on a single iLO 2; you can create a single role for multiple users on multiple iLO 2s; or you can use a combination of roles to best fit your enterprise.
The iLO 2 directory integration applies to the iLO 2 products and supports the popular directories Active Directory and eDirectory.
The iLO 2 directory support builds on the LDAP 2.0 standard for secure directory access.
Features Supported by Directory Integration
The iLO 2 directory services functionality enables you to do the following:
•
Authenticate users from a shared, consolidated, scalable user database.
•
Control user privileges (authorization) using the directory service.
•
Use roles in the directory service for group-level administration of iLO 2 and iLO 2 users.
To install directory services for the iLO 2, a schema administrator must extend the directory schema.
The local user database is retained. You can choose not to use directories, to use a combination of directories and local accounts, or to use directories exclusively for authentication.
Directory Services 169
Directory Services Installation Prerequisites
Before installing directory services, you must do the following:
•
Obtain an iLO 2 Advanced Pack license.
•
Configure LDAP.
TIP: Before performing certain iLO 2 functions, verify that you have the supported firmware version required to carry out the task. To make sure you have the latest supported firmware version, see the HP website at http://www.hp.com/go/bizsupport .
Installing Directory Services
To successfully enable directory-enabled management on any iLO 2, complete the following steps:
1.
Plan
Review the following sections:
•
“Directory Services” (page 169)
•
“Directory Services Schema (LDAP)” (page 201)
•
“Directory-Enabled Remote Management” (page 196)
2.
Install a.
Download the HP Lights-Out Directory Package containing the schema installer, the management snap-in installer, and the migrations utilities from the HP website ( http:// www.hp.com/servers/lights-out ).
b.
Run the schema installer once to extend the schema. See “Schema Installer” (page 172)
.
c.
Run the management snap-in installer and install the appropriate snap-in for your directory
service on one or more management workstations. See “Management Snap-In Installer”
.
3.
Update a.
With the directory-enabled firmware, flash the ROM on iLO 2.
b.
From the Directory Settings in the iLO 2 user interface, set directory server settings and the distinguished name of the iLO 2 objects.
4.
Manage a.
Create a management device object and a role object using the snap-in. See “Directory
.
b.
Assign rights to the role object, as necessary, and associate the role with the management device object.
c.
Add users to the role object.
For more information about managing directory service, see
. Examples are available in:
“Directory Services for Active Directory”
and
“Directory Services for eDirectory” (page 184)
.
Schema Documentation
To assist with the planning and approval process, HP documents the changes made to the schema during the schema setup process. To review the changes made to your existing schema, see
“Directory Services Schema (LDAP)” (page 201)
.
170 Installing and Configuring Directory Services
Directory Services Support
Integrity iLO 2 supports the following directory services:
•
Microsoft Active Directory
•
Microsoft Windows Server 2003 Active Directory
•
Novell eDirectory 8.6.2
•
Novell eDirectory 8.7
The iLO 2 software is designed to run within the Microsoft Active Directory Users and Computers, and Novell ConsoleOne management tools. This enables you to manage user accounts on Microsoft
Active Directory or Novell eDirectory. There is no distinction made between eDirectory running on
NetWare, Linux, or Windows. To spawn an eDirectory schema extension, you must have Java
1.4.2 or later for SSL authentication.
Integrity iLO 2 supports Microsoft Active Directory running on one of the following operating systems:
•
Windows 2000 family
•
Windows Server 2003 family
NOTE: For instances when user authentication uses the LDAP directory server that is configured for Microsoft Active Directory, a user can log in using the username format [email protected]
.
Currently, this user credential format is only supported on Internet Explorer.
Integrity iLO 2 supports eDirectory 8.6.2 and 8.7 running on one of the following operating systems:
•
Windows 2000 family
•
Windows Server 2003 family
•
NetWare 5.x
•
NetWare 6.x
•
Red Hat Enterprise Linux AS 2.1
•
Red Hat Linux 7.3
•
Red Hat Linux 8.0
eDirectory Installation Prerequisites
Directory services for iLO 2 uses LDAP over SSL to communicate with the directory servers. iLO 2 software is designed to install in eDirectory Version 8.6.1 (and later) tree. HP does not recommend installing this product if you have eDirectory servers with a version earlier than eDirectory 8.6.1.
Before installing snap-ins and schema extensions for eDirectory, read and have available the following technical information documents (available at Novell Support at: http://support.novell.com
)
•
TID10066591 Novell eDirectory 8.6 or greater NDS compatibility matrix
•
TID10057565 Unknown objects in a mixed environment
•
TID10059954 How to test whether LDAP is working properly
•
TID10023209 How to configure LDAP for SSL (secure) connections
•
TID10075010 How to test LDAP authentication
To install directory services for iLO 2, an administrator must extend the eDirectory schema.
Directory Services 171
Required Schema Software
The iLO 2 requires specific software to extend the schema and provide snap-ins to manage the iLO 2 network. An HP Smart Component that contains the schema installer and the management snap-in installer is available for download from the HP website at http://www.hp.com/go/ integrityiLO .
The two components you need for Integrity iLO 2 directory integration are the Schema Extender
Utility and the Snap-in Installer.
Schema Installer
One or more
.xml
files are bundled with the schema installer. These files contain the schema that is added to the directory. Typically, one of these files contains core schema that is common to all the supported directory services. Additional files contain only product-specific schema. The schema installer requires the use of the .NET Framework.
The schema installer includes three important screens:
•
Schema Preview
•
Setup
•
Results
Schema Preview Screen
The Schema Preview screen (
) enables you to view proposed extensions to the schema.
This application reads the selected schema files, parses the XML, and displays the schema on the screen in a tree view listing all of the details of the attributes and classes that are installed.
Figure 46 Schema Preview Screen
Setup Screen
Use the Setup screen (
Figure 47 ) to enter information before extending the schema.
172 Installing and Configuring Directory Services
Figure 47 Schema Setup Screen
The Directory Server section of the Setup screen enables you to select whether to use Active Directory or eDirectory, and to set the computer name and the port to be used for LDAP communications.
IMPORTANT: To extend the schema on Active Directory you must be an authenticated schema administrator, the schema must not be write protected, and the directory must be the flexible single master operation (FSMO) role owner in the tree. The installer attempts to make the target directory server the FSMO schema master.
To obtain write access to the schema in Windows 2000, you must change the registry safety interlock. If you select the Active Directory option, the schema extender attempts to change the registry. The schema extender can only change the registry if the administrator who is extending the schema has the appropriate rights. Write access to the schema is automatically enabled on
Windows Server 2003.
The Directory Login section of the Setup screen enables you to enter your login name and password which may be required to complete the schema extension. The Use SSL During Authentication option sets the form of secure authentication to be used. If selected, directory authentication using
SSL is used. If not selected and Active Directory is selected, Windows NT® authentication is used.
If not selected and eDirectory is selected, the administrator authentication and the schema extension continues using an unencrypted (clear text) connection.
Results Screen
The Results screen (
Figure 48 ) displays the results of the installation, including whether the schema
could be extended and what attributes were changed.
Directory Services 173
Figure 48 Schema Results Screen
Management Snap-In Installer
The management snap-in installer installs the snap-ins required to manage iLO 2 objects in a
Microsoft Active Directory Users and Computers directory or in a Novell ConsoleOne directory.
To create an iLO 2 directory using iLO 2 snap-ins, perform the following tasks:
1.
Create and manage iLO 2 objects and role objects.
2.
Make the associations between iLO 2 objects and role objects.
Directory Services for Active Directory
HP provides a utility to automate much of the directory setup process. You can download the HP
Directories Support for iLO 2 on the HP website at: http://h20000.www2.hp.com/bizsupport/TechSupport/
The following sections provide installation prerequisites, preparation, and a working example of directory services for Active Directory.
Active Directory Installation Prerequisites
The following are prerequisites for installing Active Directory:
•
The Active Directory must have a digital certificate installed to enable iLO 2 to connect securely over the network.
•
The Active Directory must have the schema extended to describe iLO 2 object classes and properties.
•
The MP firmware must be Version F.01.57 or later.
NOTE: Before performing certain iLO 2 functions, verify that you have the supported firmware version required to carry out the task. To make sure you have the latest supported firmware version, see the HP website at http://www.hp.com/go/bizsupport .
•
The iLO 2 advanced features must be licensed.
Directory services for iLO 2 uses LDAP over SSL to communicate with the directory servers. Before installing snap-ins and schema for Active Directory, read and have available the following documentation:
174 Installing and Configuring Directory Services
IMPORTANT: To install directory services for iLO 2, an Active Directory schema administrator must extend the schema.
•
Extending the schema in the Microsoft Windows 2000 Server Resource Kit, available at: http://www.microsoft.com
•
Installing Active Directory in the Microsoft Windows 2000 Server Resource Kit, available at: http://www.microsoft.com
•
Microsoft Knowledge Base articles:
â—¦
216999 “How to Install the Remote Server Administration Tools in Windows”
â—¦
314978 “How to Use
Adminpak.msi
to Install a Specific Server Administration Tool in
Windows 2000”
â—¦
247078 “How to Enable SSL Communication over LDAP for Windows 2000 Domain
Controllers”
â—¦
321051 “How to Enable LDAP over SSL with a Third-Party Certification Authority”
â—¦
299687 MS01-036 “Function Exposed by Using LDAP over SSL Could Enable Passwords to Be Changed”
Integrity iLO 2 requires a secure connection to communicate with the directory service. This secure connection requires the installation of the Microsoft CA. For more information, see the following
Microsoft technical references:
•
Securing Windows 2000, Appendix D, Configuring Digital Certificates on Domain Controllers for Secure LDAP and SMTP Replication at: http://www.microsoft.com
•
Microsoft Knowledge Base Article 321051 “How to Enable LDAP over SSL with a Third-Party
Certification Authority”
Preparing Directory Services for Active Directory
To set up directory services for use with iLO 2:
1.
Install Active Directory. For more information, see the resource kit, Installing Active Directory in the Microsoft Windows 2000 Server.
2.
Install the Microsoft Admin Pack (the
ADMINPAK.MSI
file, which is located in the i386 subdirectory of the Windows 2000 Server or Advanced Server CD). For more information, see the Microsoft Knowledge Base Article 216999.
3.
In Windows 2000, the safety interlock that prevents accidental writes to the schema must be temporarily disabled. The schema extender utility can do this if the remote registry service is running and you have appropriate rights. You can also do this by setting
HKEY_LOCAL_MACHINE SYSTEM CurrentControlSet Services NTDS Parameters Schema
Update Allowed
in the registry to a nonzero value (see the “Order of Processing When
Extending the Schema” section of the Installation of Schema Extensions in the Windows 2000
Server Resource Kit), or by doing the following:
CAUTION: Incorrectly editing the registry can severely damage your system. HP recommends creating a backup of any valued data on the computer before making changes to the registry.
NOTE: This step is not necessary if you are using Windows Server 2003.
a.
Start the MMC.
b.
In MMC, install the Active Directory schema snap-in.
c.
Right-click Active Directory Schema and select Operations Master.
d.
Select The Schema may be modified on this Domain Controller.
Directory Services for Active Directory 175
e.
Click OK.
The Active Directory schema folder may need to be expanded for the checkbox to be available.
4.
Create a certificate or install Certificate Services. This step is necessary because iLO 2 uses
SSL to communicate with Active Directory.
5.
To specify that a certificate be issued to the server running Active Directory, do the following: a.
Launch MMC on the server and add the default domain policy snap-in (Group policy and browse to default domain policy object).
b.
Click Computer Configuration>Windows Settings>Security Settings>Public Key Policies.
c.
Right-click Automatic Certificate Requests Settings, and select New>Automatic Certificate
Request.
d.
Using the wizard, select the domain controller template and the certificate authority you want to use.
6.
Download the Smart Component that contains the installers for the schema extender and the snap-ins. You can download the Smart Component from the HP website at http://www.hp.com/ go/integrityiLO .
7.
Run the schema installer application to extend the schema, which extends the directory schema with the proper HP objects.
The schema installer associates the Active Directory snap-ins with the new schema. The snap-in installation setup utility is a Windows MSI setup script and runs anywhere MSI is supported
(Windows XP, Windows 2000, Windows 98). However, some parts of the schema extension application require the .NET Framework, which you can download from the Microsoft website at http://www.microsoft.com
.
Installing and Initializing Snap-Ins for Active Directory
Follow these steps to install the snap-ins and configure the directory service:
1.
To install the snap-ins, run the snap-in installation application.
2.
Configure the directory service with the appropriate objects and relationships for iLO 2 management: a.
Use the management snap-ins from HP to create iLO 2 policy, admin, and user role objects.
b.
Use the management snap-ins from HP to build associations between the iLO 2 object, the policy object, and the role object.
c.
Point the iLO 2 object to the admin and user role objects (admin and user roles automatically point back to the iLO 2 object).
For more information about iLO 2 objects, see
“Directory Services Objects” (page 179) .
At a minimum, create:
•
One role object that contains one or more users and one or more iLO 2 objects.
•
One iLO 2 object corresponding to each iLO 2 using the directory.
Example: Creating and Configuring Directory Objects for Use with iLO 2 in Active
Directory
The following example shows how to set up roles and HP devices in an enterprise directory with the domain mpiso.com
, which consists of two organizational units: Roles and MPs.
NOTE: Roles, such as hpqTargets and so on, are for extended schema LDAP only. They are not used in schema-free LDAP.
Assume that a company has an enterprise directory including the domain mpiso.com, arranged as shown in
176 Installing and Configuring Directory Services
Figure 49 Directory Example
1.
Create an organizational unit to contain the iLO 2 devices managed by the domain. In this example, two organizational units are created, Roles and MPs.
2.
Use the Active Directory Users and Computers snap-ins provided by HP to create iLO 2 objects for several iLO 2 devices in the MP organizational unit.
a.
In the mpiso.com
domain, right-click the MPs organizational unit and select
NewHPObject.
b.
In the Create New HP Management Object dialog box (
), select Device for the type.
Figure 50 Create New HP Management Object Dialog Box
Directory Services for Active Directory 177
c.
In the Name field of the dialog box, enter an appropriate name In this example, the DNS host name of the iLO 2 device, lpmp
, is used as the name of the iLO 2 object, and the surname is iLO 2.
d.
Enter and confirm a password in the Device LDAP Password and Confirm fields (this is optional).
e.
Click OK.
3.
Use the HP provided Active Directory Users and Computers snap-ins to create HP role objects in the roles organizational unit.
4.
Right-click the Roles organizational unit, select New, and select Object. The Create New HP
Management Object dialog box appears.
a.
In the Type field, select Role.
b.
In the Name field, enter an appropriate name. In this example, the role contains users trusted for remote server administration and is named remoteAdmins.
c.
Click OK d.
Repeat the process, creating a role for remote server monitors named remoteMonitors.
5.
Use the Active Directory Users and Computers snap-ins provided by HP to assign the roles rights, and associate the roles with users and devices.
a.
In the Roles organizational unit in the mpiso.com domain, right-click the remoteAdmins role , and select Properties.
b.
Select the HP Devices tab and click Add.
c.
From the Select Users dialog box ( Figure 51
), select the iLO 2 object created in step 2:
( lpmp in folder mpiso.com
/MPs). Click OK.
Figure 51 Select Users Dialog Box d.
To save the list, click Apply.
e.
To add users to the role, click the Members tab and use the Add button and the Select
Users dialog box. Devices and users are now associated.
6.
To set the rights for the role, use the Lights-Out Management tab (
groups within a role have rights assigned to the role on all of the iLO 2 devices managed by the role. In this example, the users in the remoteAdmins role are given full access to the iLO
2 functionality. Select the appropriate rights and click Apply.
178 Installing and Configuring Directory Services
Figure 52 Lights-Out Management Tab
7.
Click OK.
8.
Using the same procedure in step 4, edit the properties of the remoteMonitors role, add the lpmp device to the Managed Devices list on the HP Devices tab, and use the Members tab to add users to the remoteMonitors role.
9.
On the Lights-Out Management tab, click the Login checkbox.
10. Click Apply and OK. Members of the remoteMonitors role are able to authenticate and view the server status.
User rights to any iLO 2 are calculated as the sum of all the rights assigned by all the roles in which the user is a member and the iLO 2 is a managed device. Following the preceding examples, if a user is included in both the remoteAdmins and remoteMonitors roles, he or she has all the rights of those roles, because the remoteAdmins role also has those rights.
To configure iLO 2 and associate it with an iLO 2 object, use settings similar to the following (based on the preceding example) in the iLO 2 Directory Settings text user interface:
RIB Object DN = cn=lpmp,ou=MPs,dc=mpiso,dc=com
Directory User Context 1 = cn=Users,dc=mpiso,dc=com
For example, user Mel Moore (with the unique ID MooreM, located in the Users organizational unit within the mpiso.com domain, and a member of one of the remoteAdmins or remoteMonitors roles) would be allowed to log in to the iLO 2. To log in, he would enter
mpiso moorem
, or
, or
Mel Moore
, in the Login Name field of the iLO 2 login, and use his
Active Directory password in the Password field.
Directory Services Objects
One of the keys to directory-based management is proper virtualization of the managed devices in the directory service. This virtualization enables the administrator to build relationships between a managed device and user or groups already contained within the directory service. The iLO 2 user management requires the following basic objects in the directory service:
• iLO 2
•
Role
•
User
Each object represents a device, user, or relationship that is required for directory-based management.
NOTE: After you install the snap-ins, restart ConsoleOne and MMC to display the new entries.
Directory Services for Active Directory 179
After the snap-in is installed, you can create iLO 2 objects and roles in the directory. Using the
Users and Computers tool, you can:
•
Create iLO 2 objects and role objects.
•
Add users to the role objects.
•
Set the rights and restrictions of the role objects.
Active Directory Snap-Ins
The following sections discuss the additional management options available in Active Directory
Users and Computers after you have installed the HP snap-ins.
Managing HP Devices In a Role
To add HP devices to be managed in a role, use the HP Devices tab ( Figure 53 ).
•
To browse to a specific HP device and add it to the list of member devices, click Add.
•
To browse to a specific HP device and remove it from the list of member devices, click Remove.
Figure 53 HP Devices Tab
Managing Users In a Role
After user objects are created, use the Members tab (
Figure 54 ) to manage the users within the
role.
•
To add a user, browse to the specific user you want to add, and click Add.
•
To remove a user from the list of valid members, highlight an existing user and click Remove.
180 Installing and Configuring Directory Services
Figure 54 Members Tab
Setting Login Restrictions
The Role Restrictions tab (
Figure 55 ) enables you to set login restrictions for a role. These restrictions
include:
•
Time Restrictions
•
IP Network Address Restrictions
â—¦
IP/Mask
â—¦
IP Range
â—¦
DNS Name
Directory Services for Active Directory 181
Figure 55 Role Restrictions Tab
Setting Time Restrictions
•
To manage the hours available for login by members of the role, click the Effective Hours
button. The Logon Hours screen appears ( Figure 56
).
•
To select the times available for login each day of the week in half-hour increments, use the
Logon Hours screen. You can change a single square by clicking it, or you can change a section of squares by clicking and holding the mouse button, dragging the cursor across the squares to be changed, and releasing the mouse button.
•
Use the default setting to allow access at all times.
Figure 56 Logon Hours Screen
Defining Client IP Address or DNS Name Access
From the Role Restrictions tab you can grant or deny access to an IP address, IP address range, or DNS names.
182 Installing and Configuring Directory Services
In the By Default list, select whether to grant or deny access from all addresses except for specified
IP addresses, IP address ranges, and DNS names.
To restrict an IP address:
1.
From the Role Restrictions tab, select IP/MASK and click Add. The New IP/Mask Restriction dialog box appears (
).
Figure 57 New IP/Mask Dialog Box
2.
In the New IP/Mask Restriction dialog box, enter the information and click OK.
3.
To restrict access based on a DNS, select DNS Name and click Add. The New DNS Name
Restriction dialog box appears. The DNS Name option enables you to restrict access based on a single DNS name or a subdomain, entered in the form of host.company.com or
*.domain.company.com.
4.
Enter the information and click OK.
5.
To save the changes, click OK.
To remove any of the entries, highlight the entry in the display list and click Remove.
Setting User or Group Role Rights
After you create a role, you can select rights for that role. You can enable users and group objects to be members of the role, giving each the rights granted by the role.
Use the Lights-Out Management tab (
) to manage rights.
Directory Services for Active Directory 183
Figure 58 Lights-Out Management Tab
lists the available Lights-Out Management rights.
Table 78 Lights-Out Management Rights
MP Rights
Login
Description
This option controls whether users can log in to the associated devices and execute
Status or
Read-only commands (view event logs and console logs, check system status, power status, and so on) but not execute any commands that would alter the state of iLO 2 or the system.
Remote Console This option enables users to access the system console (the host OS).
Virtual Media
Server Reset and Power
This option enables users to connect devices through the network such as CD, DVD, and network drives as virtual devices.
This option enables users to execute iLO 2 power operations to remotely power on, power off, or reset the host platform, as well as configure the system's power restore policy.
Administer Local
User Accounts
This option enables users to administer local iLO 2 user accounts.
Administer Local
Device Settings
This option enables users to configure all iLO 2 settings, as well as reboot LO 2.
Directory Services for eDirectory
The following sections provide installation prerequisites, preparation, and a working example of directory services for eDirectory.
NOTE: Schema-Free LDAP is not supported with eDirectory.
Installing and Initializing Snap-In for eDirectory
For instructions on using the snap-in installation application, see
“Installing and Initializing Snap-Ins for Active Directory” (page 176)
.
NOTE: After you install snap-ins, restart ConsoleOne and MMC to show the new entries.
184 Installing and Configuring Directory Services
Example: Creating and Configuring Directory Objects for Use with iLO 2 Devices in eDirectory
The following example demonstrates how to set up roles and HP devices in a company called samplecorp, which consists of two regions: region1 and region2.
Assume that samplecorp has an enterprise directory arranged according to that in
.
Figure 59 Roles and Devices Example
Begin by creating organizational units in each region to contain iLO 2 devices and roles specific to that region. In this example, two organizational units are created, roles and HP devices, in each organizational unit (region1 and region2).
Creating Objects
To create iLO 2 objects:
1.
Use the ConsoleOne snap-ins provided by HP to create iLO 2 objects in the HP devices organizational unit for several iLO 2 devices.
Directory Services for eDirectory 185
2.
From in the region1 organizational unit, right-click the HP devices organizational unit. Select
New, and select Object.
a.
Select hpqTarget from the list of classes, and click OK.
b.
Enter an appropriate name and surname in the New hpqTarget dialog box. In this example, the DNS host name of the iLO 2 device, rib-email-server, is used as the name of the iLO 2 object, and the surname is RILOEII (iLO 2). Click OK. The Select Object
Subtype dialog box ( Figure 60 ) appears.
Figure 60 Select Object Subtype Dialog Box c.
Select Lights-Out Management Device from the list, and click OK.
d.
Repeat the process for several more iLO 2 devices with the DNS names rib-nntp-server and rib-file-server-users1 in HP devices under region1, and rib-file-server-users2 and rib-app-server in HP devices under region2.
Creating Roles
To create roles:
1.
Use the ConsoleOne snap-ins provided by HP to create HP role objects in the roles organizational units.
a.
From the region2 organizational unit, right-click the roles organizational unit. Select New, and select Object.
b.
Select hpqRole from the list of classes, and click OK.
c.
Enter an appropriate name in the New hpqRole dialog box. In this example, the role contains users trusted for remote server administration and is named remoteAdmins.
d.
Click OK. The Select Object Subtype dialog box appears.
e.
Select Lights-Out Management Devices from the list, and click OK.
2.
Repeat the process, creating a role for remote server monitors named remoteMonitors in region1 roles, and a remoteAdmins and remoteMonitors role in region2.
3.
Use the ConsoleOne snap-ins provided by HP to assign rights to the role and associate the roles with users and devices.
186 Installing and Configuring Directory Services
a.
Right-click the remoteAdmins role in the roles organizational unit in the region1 organizational unit, and select Properties.
b.
Select the Role Managed Devices subtab of the HP Management tab, and click Add.
c.
Using the Select Objects dialog box, browse to the HP devices organizational unit in the region1 organizational unit. Select the three iLO 2 objects created in step 2. Click OK and click Apply.
d.
Add users to the role. Click the Members tab, and add users using Add and the Select
Objects dialog box. The devices and users are now associated.
e.
To set the rights for the role, use the Lights-Out Management Device Rights subtab of the
HP Management tab ( Figure 61 ).
Figure 61 Setting Role Rights
All users within a role will have rights assigned to the role on all he iLO 2 devices managed by the role. In this example, users in the remoteAdmins role are given full access to iLO
2 functionality. Select the boxes next to each right, and click Apply.
f.
To close the property sheet, click Close.
4.
Using the same procedure as in step 3, edit the properties of the remoteMonitors role: a.
Add the three iLO 2 devices within HP devices under region1 to the Managed Devices list on the Role Managed Devices subtab of the HP Management tab.
b.
Add users to the remoteMonitors role using the Members tab.
c.
Using the Lights-Out Management Device Rights subtab of the HP Management tab, click the Login checkbox, and click Apply and Close. Members of the remoteMonitors role are now able to authenticate and view the server status.
User rights to any iLO 2 device are calculated as the sum of all the rights assigned by all the roles in which the user is a member, and in which the iLO 2 device is a managed device. Using the preceding examples, if a user is in both the remoteAdmins and remoteMonitors roles, he or she has all rights, because the remoteAdmins role has those rights.
To configure an iLO 2 device from the previous example and associate it with an iLO 2 object, use settings similar to the following on the iLO 2 directory settings TUI.
NOTE: In LDAP Distinguished Names, use commas, not periods, to separate each component.
RIB Object DN = cn=rib-email-server,ou=hp
Directory Services for eDirectory 187
devices,ou=region1,o=samplecorp
Directory User Context 1 = ou=users,o=samplecorp
For example, user CSmith (located in the users organizational unit within the samplecorp organization, who is also a member of one of the remoteAdmins or remoteMonitors roles) would be allowed to log in to iLO 2. He would type
csmith
(case insensitive) in the Login Name field of the iLO 2 login, and use his eDirectory password in the Password field to gain access.
Directory Services Objects for eDirectory
Directory services objects enable virtualization of managed devices and the relationships between a managed device and a user or groups already contained within the directory service.
Adding Role Managed Devices
Use the Role Managed Devices subtab under the HP Management tab (
) to add HP devices to be managed within a role.
Figure 62 Role Managed Devices Subtab
To browse to the specific HP device and add it as a managed device, click Add.
Adding Members
After you create user objects, use the Members tab (
Figure 63 ) to manage users within a role.
188 Installing and Configuring Directory Services
Figure 63 Members Tab (eDirectory)
To browse to the specific user you want to add, click Add.
To remove a user from the list of valid members, highlight the user name and click Delete.
Setting Role Restrictions
The Role Restrictions subtab (
Figure 64 ) enables you to set login restrictions for a role.
Figure 64 Role Restrictions Subtab (eDirectory)
Directory Services for eDirectory 189
These restrictions include the following:
•
Time Restrictions
•
IP Network Address Restrictions
â—¦
IP/Mask
â—¦
IP Range
•
DNS Name
Setting Time Restrictions
You can manage the hours available for login by members of a role using the time grid displayed
in the Role Restrictions subtab ( Figure 64 ). You can select the times available for login for each
day of the week in half-hour increments. You can change a single square by clicking it or change a section of squares by clicking and holding the mouse button, dragging the cursor across the squares to be changed, and releasing the mouse button. The default setting is to allow access at all times.
Defining Client IP Address or DNS Name Access
You can grant or deny access to an IP address, IP address range, or DNS names.
Using the By Default list, select whether to allow or deny access from all addresses except the specified IP addresses, IP address ranges, and DNS names.
1.
To restrict an IP address, select IP/MASK in the Role Restrictions subtab and click Add. The
Add New Restriction dialog box for the IP/Mask option appears.
2.
In the Add New Restriction dialog box ( Figure 65
), enter the information, and click OK.
Figure 65 Add New Restriction Dialog Box
3.
In the Role Restrictions subtab, select DNS Name and click Add. The DNS Name option enables you to restrict access based on a single DNS name or a subdomain, entered in the form of host.company.com or *.domain.company.com. The New DNS Name Restriction dialog box appears.
4.
Enter the information and click OK.
5.
To save the changes, click Apply.
To remove any of the entries, highlight the entry in the display field and click Delete.
190 Installing and Configuring Directory Services
Setting Lights-Out Management Device Rights
After you create a role, you can select rights for the role and make users and group objects members of the role, which gives users or groups of users the rights granted by that role. Use the Lights-Out
Management Device Rights subtab of the HP Management tab ( Figure 66
) to manage rights.
Figure 66 Lights-Out Management Device Rights Tab
lists the available management device rights.
Table 79 Management Device Rights
Option
Login
Description
This option controls whether users can log in to the associated devices and execute status or read-only commands (view event logs and console logs, check system status, power status, and so on) but not execute any commands that would alter the state of iLO 2 or the system.
This option enables users to access the system console (the host OS).
Remote Console
Virtual Media
Server Reset and Power
This option enables users to connect devices through the network such as CD, DVD, and network drives as virtual devices.
This option enables users to execute iLO 2 power operations to remotely power on, power off, or reset the host platform, as well as configure the system's power restore policy.
This option enables users to administer local iLO 2 user accounts.
Administer Local User
Accounts
Administer Local Device
Settings
This option enables users to configure all iLO 2 settings, as well as reboot iLO 2.
Installing Snap-Ins and Extending Schema for eDirectory on a Linux Platform
This section describes a method that does not require a Windows client to install snap-ins and extend schema for eDirectory on a Linux platform.
Schema extension is the addition of new classes to existing classes. You can use these classes to create objects to support a specific utility. New classes are added, such as hpqTarget, hpqPolicy and hpq role. HP has created objects using these classes to support iLO 2 devices (created using the hpqTarget class), and iLO 2 admins and monitors (created using the hpqRole class). These
Directory Services for eDirectory 191
objects support the Login Authentication utility to the iLO 2 device and enable iLO 2 users to execute commands based on their assigned roles.
Installing the Java Runtime Environment
As a prerequisite for extending schema, you must have Java Runtime Environment (JRE) 1.4.2
installed.
To ensure you have the correct version of JRE installed on your system:
1.
To determine the Java version, execute the following command:
#
java -version
The Java version installed on your system is displayed.
2.
If Java is not installed on your system, execute the following command:
#
rpm –iv j2re-1_4_2_04-linux-i586.rpm
NOTE: You can download this rpm file from the Java website.
3.
Execute the following command if:
•
Java is installed and the version is older than 1.4.2.
•
You want to upgrade the Java version and uninstall an older version.
#
rpm –Uv j2re-1_4_2_04-linux-i586.rpm
4.
Add the entry
/usr/java/j2re1.4.2_04/bin
to the
.bash_profile
file.
Installing Snap-Ins
Create the HP directory under the
/usr/ConsoleOne/snapins/ directory, and copy the two
.jar
snap-in files, hpqLOMv100.jar
and hpqMgmtCore.jar
, to the HP directory. When the hpdsse.sh
file is executed, the HP directory is automatically created and the two
.jar
files are copied to it.
NOTE: The hpdsse.sh
file is obtained when the
Schema.tar
tar file is extracted. This process is explained in the Schema Extension section. You can download schema extensions from the HP website at: http://h18013.www1.hp.com/products/servers/management/directorysupp/index.html
Select Software and Drivers, and the operating system for the schema extension you want to install.
Extending Schema
To obtain the hpdsse.sh
file:
1.
Download the tar file to the Linux system where eDirectory is installed.
2.
Extract the tar file to obtain the hpdsse.sh
file by executing the following command:
#
tar –xvf Schema. tar
3.
Run this file by executing the following command:
#
./hpdsse.sh
This command displays instructions. As indicated in the instructions to extend the schema, provide the server name, admin DN, and admin password as command line arguments.
4.
To see the results, view the schema.log
file, (created after the schema extension is complete).
The log file lists the created classes and attributes. In addition, it shows the result as
“Succeeded”. If the objects already exist, the message “Already Exists” appears in the log file.
The Already Exists message appears only when you try to run the same
.sh
file after the schema extension is complete.
192 Installing and Configuring Directory Services
The SSL port (636) is used during the schema extension. You can verify this by running the netstat
–nt grep :636 command while the hpdsse.sh
file is being executed.
Verifying Snap-In Installation and Schema Extension
To verify the installation of snap-ins and schema extension:
1.
Run ConsoleOne and log on to the tree.
2.
Verify the new classes by opening the Schema Manager from the Tools list.
All the classes related to the HP directory services must be present in the classes list. The classes are hpqRole, hpqTarget, hpqPolicy, and hpqLOMv100.
Using the LDAP Command to Configure Directory Settings in iLO 2
Use the LDAP Command Menu in the iLO 2 MP TUI to configure iLO 2 LDAP directory settings.
The following is an example of the LDAP command output:
[mp1] MP:CM> LDAP
Current LDAP Directory Configuration:
L – LDAP Directory Authentication : Disabled
M – Local MP User database : Enabled
I - Directory Server IP Address : 192.0.2.1
P - Directory Server LDAP Port : 636
D - Distinguished Name (DN) : cn=mp,o=demo
1 - User Search Context 1 : o=mp
2 - User Search Context 2 : o=demo
3 - User Search Context 3 : o=test
Enter parameter(s) to change, A to modify All, or [Q] to Quit: a
For each parameter, enter:
New value, or
<CR> to retain the current value, or
DEFAULT to set the default value, or
Q to Quit
LDAP Directory Authentication:
E – Enabled
Current > D – Disabled (default)
Enter new value, or Q to Quit: e
> LDAP Directory Authentication will be updated
Local MP User Accounts:
D - Disabled (default)
Current > E - Enabled
Enter new value, or Q to Quit: <CR>
-> Current Local MP User Accounts has been retained
Directory Server IP Address:
Current -> 127.0.0.1 (default)
Enter new value, or Q to Quit: 192.0.2.1
-> Directory Server IP Address will be updated
Directory Server LDAP Port:
Current -> 636 (default)
Enter new value, or Q to Quit: <CR>
-> Current Directory Server LDAP Port has been retained
Distinguished Name (DN):
Current -> cn=mp,o=demo
Directory Services for eDirectory 193
Enter new value, or Q to Quit: <CR>
-> Current Distinguished Name has been retained
User Search Context 1:
Current -> o=mp
Enter new value, or Q to Quit: <CR>
-> Current User Search Context 1 has been retained
User Search Context 2:
Current -> o=demo
Enter new value, or Q to Quit: <CR>
-> Current User Search Context 2 has been retained
User Search Context 3:
Current -> o=test
Enter new value, or Q to Quit: <CR>
-> Current User Search Context 3 has been retained
New Directory Configuration (* modified values):
*L – LDAP Directory Authentication: Enabled
M – Local MP User database : Enabled
*I - Directory Server IP Address : 192.0.2.1
P - Directory Server LDAP Port : 636
D - Distinguished Name (DN) : cn=mp,o=demo
1 - User Search Context 1 : o=mp
2 - User Search Context 2 : o=demo
3 - User Search Context 3 : o=test
Enter Parameter(s) to revise, Y to confirm, or [Q] to Quit: y
-> LDAP Configuration has been updated
User Login Using Directory Services
The MP Login Name field accepts all of the following:
•
Directory users
•
LDAP Fully Distinguished Names
Example: CN=John Smith,CN=Users,DC=HP,DC=COM, or @HP.com
The short form of the login name by itself does not identify which domain you are trying to access. To identify the domain, provide the domain name or use the LDAP Distinguished Name of your account.
•
Domain user name form (Active Directory only)
Example: HP\jsmith
• username@domain form (Active Directory only)
Directory users that are specified with the @ searchable form can be located in one of three searchable contexts that are configured within Directory Settings.
Example: [email protected]
•
User name form
Example: John Smith
194 Installing and Configuring Directory Services
Directory users that are specified with the user name form can be located in one of three searchable contexts that are configured within Directory Settings.
•
Local users - Login ID
For the iLO 2 login, the maximum length of the Login Name is 25 characters for local users.
For directory services users, the maximum length of the Login Name is 256 characters.
Certificate Services
The following sections provide instructions for installing Certificate Services, verifying directory services, and configuring automatic certificate requests.
Installing Certificate Services
To install Certificate Services:
1.
Select Start>Settings>Control Panel.
2.
Double-click Add/Remove Programs.
3.
Click Add/Remove Windows Components to start the Windows Components wizard.
4.
Select Certificate Services and click Next.
5.
At the warning that the server cannot be renamed, click OK. The Enterprise root CA option is selected because there is no CA registered in the Active Directory.
6.
Enter the information appropriate for your site and organization. Accept the default time period of two years in the Valid for field and click Next.
7.
Accept the default locations of the certificate database and the database log. Click Next.
8.
Browse to the c: I386 folder when prompted for the Windows 2000 Advanced Server CD.
9.
Click Finish to close the wizard.
Verifying Directory Services
Because iLO 2 communicates with Active Directory using SSL, you must create a certificate or install
Certificate Services. Install an enterprise CA because you are issuing certificates to objects within your organizational domain.
To verify that certificate services is installed, select Start>Programs>Administrative Tools>Certification
Authority. If Certificate Services is not installed, an error message appears.
Configuring an Automatic Certificate Request
To request that a certificate be issued to the server:
1.
Select Start>Run, and enter
mmc
.
2.
Click Add.
3.
Select Group Policy, and click Add to add the snap-in to the MMC.
4.
Click Browse, and select the Default Domain Policy object. Click OK.
5.
Select Finish>Close>OK.
6.
Expand Computer Configuration>Windows Settings>Security Settings>Public Key Policies.
7.
Right-click Automatic Certificate Requests Settings, and select New>Automatic Certificate
Request.
8.
When the Automatic Certificate Request Setup wizard starts, click Next.
9.
Select the Domain Controller template, and click Next.
10. Select the certificate authority listed. (the same CA defined during the Certificate Services installation). Click Next.
11. Click Finish to close the wizard.
Certificate Services 195
Directory-Enabled Remote Management
This section is for administrators who are familiar with directory services and with the iLO 2 product.
To familiarize yourself with the product and services, see
“Directory Services” (page 169) . Be sure
you understand the examples and are comfortable with setting up the product.
In general, you can use the HP provided snap-ins to create objects. It is useful to give the iLO 2 device objects meaningful names, such as the device's network address, DNS name, host server name, or serial number.
Directory-enabled remote management enables you to:
•
Create iLO 2 objects:
Each device object created represents each device that will use the directory service to authenticate and authorize users. For more information, see the following sections:
“Directory Services for Active Directory” (page 174)
“Directory Services for eDirectory” (page 184)
•
Configure iLO 2 devices:
Every iLO 2 device that uses the directory service to authenticate and authorize users must be configured with the appropriate directory settings. For details about the specific directory settings, see
“Using the LDAP Command to Configure Directory Settings in iLO 2” (page 193)
.
In general, each device is configured with the appropriate directory server address, iLO 2 object distinguished name, and any user contexts. The server address is either the IP address or DNS name of a local directory server, or, for more redundancy, a multihost DNS name.
Using Existing Groups
Many organizations arrange users and administrators into groups. In many cases, it is convenient to use existing groups and associate these groups with one or more iLO 2 role objects. When the devices are associated with role objects, you can control access to the iLO 2 devices associated with the role by adding or deleting members from the groups.
When using Microsoft Active Directory, you can place one group within another, or create nested groups. Role objects are considered groups and can include other groups directly. To include other groups directly, add the existing nested group directly to the role and assign the appropriate rights and restrictions. Add new users to either the existing group or to the role.
Novell™ eDirectory does not allow nested groups. In eDirectory, any user who can read a role is considered a member of that role. When adding an existing group, organizational unit, or organization to a role, add the object as a read trustee of the role. All the members of the object are considered members of the role. Add new users to either the existing object or to the role.
When you use trustee or directory rights assignments to extend role membership, users must be able to read the iLO 2 object representing the iLO 2 device. Some environments require the trustees of a role to also be read trustees of the iLO 2 object to successfully authenticate users.
Using Multiple Roles
Most deployments do not require that the same user be in multiple roles managing the same device.
However, these configurations are useful for building complex rights relationships. When building multiple-role relationships, users receive all the rights assigned by every applicable role. Roles only grant rights, not revoke them. If one role grants a user a right, the user has the right, even if the user is in another role that does not grant that right.
Typically, a directory administrator creates a base role with the minimum number of rights assigned and then creates additional roles to add additional rights. These additional rights are added under specific circumstances or to a specific subset of the base role users.
196 Installing and Configuring Directory Services
For example, an organization might have two types of users: administrators of the iLO 2 device or host server, and users of the iLO 2 device. In this situation, it makes sense to create two roles, one for the administrators and one for the users. Both roles include some of the same devices, but grant different rights. Sometimes, it is useful to assign generic rights to the lesser role, and include the iLO 2 administrators in that role, and the administrative role.
shows one way that an administrative user gains admin role right. The admin user’s initial login right is granted through the regular user role. After the initial login, more advanced rights are assigned to the admin user through the admin role such as server reset and remote console.
Figure 67 Admin User Gaining Admin Role Right, Example 1
In
Figure 68 , the admin user gains the admin role right in a different way. The admin user initially
logs in through the admin role and is immediately assigned admin rights (server reset, remote console, and login).
Figure 68 Admin User Gaining Admin Role Right, Example 2
Creating Roles that Follow Organizational Structure
Often, administrators within an organization are placed into a hierarchy in which subordinate administrators must assign rights independently of ranking administrators. In this case, it is useful to have one role that represents the rights assigned by higher-level administrators, and to allow subordinate administrators to create and manage their own roles.
Restricting Roles
Restrictions enable you to limit the scope of a role. A role only grants rights to those users who satisfy the role's restrictions. Using restricted roles creates users with dynamic rights that change based on the time of day or network address of the client.
For step-by-step instructions on how to create network and time restrictions for a role, see
or
“Setting Time Restrictions” (page 190) .
Directory-Enabled Remote Management 197
Role Time Restrictions
You can place time restrictions on iLO 2 roles. Users are only granted rights that are specified for the iLO 2 devices listed in the role if they are members of the role and meet the time restrictions for that role.
The iLO 2 devices use local host time to enforce time restrictions. If the iLO 2 device clock is not set, the role time restriction fails (unless no time restrictions are specified on the role).
Role-based time restrictions can only be enforced if the time is set on the iLO 2 device. The time is normally set when the host is booted and is maintained by running the agents in the host operating system, which enables iLO 2 device to compensate for leap years and minimize clock drift with respect to the host. Events such as unexpected power loss or the flashing of MP firmware can cause the iLO 2 device clock not to be set. Also, the host time must be correct for the iLO 2 device to preserve time across firmware flashes.
IP Address Range Restrictions
IP address range restrictions enable you to specify network addresses that are granted or denied access by the restriction. The address range is typically specified in a low-to-high range format.
You can specify an address range to grant or deny access to a single address. Addresses that fall within the low-to-high IP address range meet the IP address restriction.
IP Address and Subnet Mask Restrictions
IP address and subnet mask restrictions enable you to specify a range of addresses that are granted or denied access by the restriction. This format has similar capabilities to those in an IP address range but can be more native to your networking environment. An IP address and subnet mask range is typically specified using a subnet address and address bit mask that identifies addresses on the same logical network.
In binary math, if the bits of a client machine address are added to the bits of the subnet mask, and these bits match the restriction subnet address, the client machine meets the restriction.
DNS-Based Restrictions
DNS-based restrictions use the network naming service to examine the logical name of the client machine by looking up machine names assigned to the client IP addresses. DNS restrictions require a functional name server. If the name service fails or cannot be reached, DNS restrictions cannot be matched and will fail.
DNS-based restrictions can limit access to a single, specific machine name or to machines sharing a common domain suffix. For example, the DNS restriction www.hp.com matches hosts that are assigned the domain name www.hp.com. However, the DNS restriction *.hp.com matches any machine originating from HP.
DNS restrictions can cause some ambiguity because a host can be multi-homed. DNS restrictions do not necessarily match one-to-one with a single system.
Using DNS-based restrictions can create some security complications. Name service protocols are insecure. Any individual with malicious intent and access to the network can place a rogue DNS service on the network, creating fake address restriction criteria. Organizational security policies should be taken into consideration when implementing DNS-based address restrictions.
Role Address Restrictions
Role address restrictions are enforced by the MP firmware, based on the client's IP network address.
When the address restrictions are met for a role, the rights granted by the role apply.
Address restrictions can be difficult to manage if access is attempted across firewalls or through network proxies. Either of these mechanisms can change the apparent network address of the client, causing the address restrictions to be enforced in an unexpected manner.
198 Installing and Configuring Directory Services
Enforcing Directory Login Restrictions
The following figure shows how two sets of restrictions potentially limit a directory user's access to iLO 2 devices. User access restrictions limit a user's access to authenticate to the directory. Role access restrictions limit an authenticated user's ability to receive iLO 2 privileges based on rights specified in one or more roles.
shows the user and role access restrictions.
Figure 69 User and Role Access Restrictions
Enforcing User Time Restrictions
You can place a time restriction on directory user accounts. Time restrictions limit the ability of the user to log in (authenticate) to the directory. Typically, time restrictions are enforced using the time on the directory server, but if the directory server is located in a different time zones or a replica in a different time zone is accessed, time zone information from the managed object can be used to adjust for relative time.
While directory server evaluates user time restrictions, the determination can be complicated by time zone changes or by the authentication mechanism.
shows the user time restrictions.
Directory-Enabled Remote Management 199
Figure 70 User Time Restrictions
User Address Restrictions
You can place network address restrictions on a directory user account, and the directory server enforces these restrictions. See the directory service documentation for information about the enforcement of address restrictions on LDAP clients, such as a user logging in to an iLO 2 device.
Network address restrictions placed on the user in the directory may not be enforced in the expected manner if the directory user logs in through a proxy server. When a user logs in to an iLO 2 device as a directory user, the iLO 2 device attempts authentication to the directory as that user, which means that address restrictions placed on the user account apply when accessing the iLO 2 device.
However, because the user is proxied at the iLO 2 device, the network address of the authentication attempt is that of the iLO 2 device, not that of the client workstation.
Creating Multiple Restrictions and Roles
The most useful application of multiple roles includes restricting one or more roles so that rights do not apply in all situations. Other roles provide different rights under different constraints. Using multiple restrictions and roles enables you to create arbitrary, complex rights relationships with a minimum number of roles.
For example, an organization might have a security policy in which iLO 2 administrators are allowed to use the iLO 2 device from within the corporate network but are only able to reset the server outside of regular business hours.
Directory administrators may be tempted to create two roles to address this situation, but extra caution is required. Creating a role that provides the required server reset rights and restricting it to an after-hours application might allow administrators outside the corporate network, to reset the server, which is contrary to most security policies.
shows how security policy dictates that general use is restricted to clients within the corporate subnet, and server reset capability is additionally restricted to after hours.
200 Installing and Configuring Directory Services
Figure 71 Restricting General Use
Alternatively, the directory administrator could create a role that grants the login right and restrict it to the corporate network, create another role that grants only the server reset right and restrict it to after-hours operation. This configuration is easier to manage but more dangerous because ongoing administration can create another role that grants users from addresses outside the corporate network the login right, which could unintentionally grant the iLO 2 administrators in the server reset role the ability to reset the server from anywhere, provided they satisfy the time constraints of that role.
The previous configuration satisfies corporate security policy. However, adding another role that grants the login right can inadvertently grant server reset privileges from outside the corporate subnet after hours. A more manageable solution would be to restrict the reset role, as well as the general use role.
Figure 72 Restricting the Reset Role
Directory Services Schema (LDAP)
A directory schema specifies the types of objects that a directory can have and the mandatory and optional attributes of each object type. The following sections describe both the HP management core, and the LDAP object identifier classes and attributes that are specific to iLO 2.
HP Management Core LDAP Object Identifier Classes and Attributes
Object identifiers (OIDs) are unique numbers that are used by LDAP to identify object class, attribute, syntaxes (data types), matching rules, protocol mechanisms, controls, extended operation and supported features.
Directory Services Schema (LDAP) 201
Changes made to the schema during the schema setup process include changes to the following:
•
Core classes
•
Core attributes
NOTE: Roles such as hpqTargets, and so on, are for extended schema LDAP only. They are not used in schema-free LDAP.
Core Classes
lists the core LDAP OID classes.
Table 80 Core Classes
Class Name hpqTarget hpqRole hpqPolicy
Assigned OID
1.3.6.1.4.1.232.1001.1.1.1.1
1.3.6.1.4.1.232.1001.1.1.1.2
1.3.6.1.4.1.232.1001.1.1.1.3
Core Attributes
lists the core LDAP OID attributes.
Table 81 Core Attributes
Attribute Name hpqPolicyDN hpqRoleMembership hpqTargetMembership hpqRoleIPRestrictionDefault hpqRoleIPRestrictions hpqRoleTimeRestriction
Assigned OID
1.3.6.1.4.1.232.1001.1.1.2.1
1.3.6.1.4.1.232.1001.1.1.2.2
1.3.6.1.4.1.232.1001.1.1.2.3
1.3.6.1.4.1.232.1001.1.1.2.4
1.3.6.1.4.1.232.1001.1.1.2.5
1.3.6.1.4.1.232.1001.1.1.2.6
Core Class Definitions
define the HP management core classes.
hpqTarget
Table 82 hpqTarget
OID
Description
Class Type
SuperClasses
Attributes
Remarks
1.3.6.1.4.1.232.1001.1.1.1.1
This class defines target objects, providing the basis for HP products using directory-enabled management.
Structural
User hpqPolicyDN—1.3.6.1.4.1.232.1001.1.1.2.1hpqRoleMembership—1.3.6.1.4.1.232.1001.1.1.2.2
None
202 Installing and Configuring Directory Services
hpqRole
Table 83 hpqRole
OID
Description
Class Type
SuperClasses
Attributes
Remarks
1.3.6.1.4.1.232.1001.1.1.1.2
This class defines role objects, providing the basis for HP products using directory-enabled management.
Structural
Group hpqRoleIPRestrictions—1.3.6.1.4.1.232.1001.1.1.2.5hpqRoleIPRestrictionDefault—1.3.6.1.4.1.232.1001.1.1.2.4
hpqRoleTimeRestriction—1.3.6.1.4.1.232.1001.1.1.2.6hpqTargetMembership—1.3.6.1.4.1.232.1001.1.1.2.3
None hpqPolicy
Table 84 hpqPolicy
OID
Description
Class Type
SuperClasses
Attributes
Remarks
1.3.6.1.4.1.232.1001.1.1.1.3
This class defines policy objects, providing the basis for HP products using directory-enabled management.
Structural
Top hpqPolicyDN—1.3.6.1.4.1.232.1001.1.1.2.1
None
Core Attribute Definitions
through
define the HP management core class attributes.
hpqPolicyDN
Table 85 hpqPolicyDN
OID
Description
Syntax
Options
Remarks
1.3.6.1.4.1.232.1001.1.1.2.1
This attribute provides the Distinguished Name of the policy that controls the general configuration of this target.
Distinguished Name—1.3.6.1.4.1.1466.115.121.1.12
Single Valued
None hpqRoleMembership
Table 86 hpqRoleMembership
OID
Description
Syntax
Options
Remarks
1.3.6.1.4.1.232.1001.1.1.2.2
This attribute provides a list of hpqTarget objects to which this object belongs.
Distinguished Name—1.3.6.1.4.1.1466.115.121.1.12
Multi Valued
None
Directory Services Schema (LDAP) 203
hpqTargetMembership
Table 87 hpqTargetMembership
OID
Description
Syntax
Options
Remarks
1.3.6.1.4.1.232.1001.1.1.2.3
This attribute provides a list of hpqTarget objects that belong to this object.
Distinguished Name—1.3.6.1.4.1.1466.115.121.1.12
Multi Valued
None hpqRoleIPRestrictionDefault
Table 88 hpqRoleIPRestrictionDefault
OID
Description
Syntax
Options
Remarks
1.3.6.1.4.1.232.1001.1.1.2.4
This attribute is a Boolean expression representing access by unspecified clients, which partially specifies rights restrictions under an IP network address constraint.
Boolean—1.3.6.1.4.1.1466.115.121.1.7
Single Valued
If this attribute is TRUE, IP restrictions are satisfied for unexceptional network clients. If this attribute is FALSE, IP restrictions are unsatisfied for unexceptional network clients.
hpqRoleIPRestrictions
Table 89 hpqRoleIPRestrictions
OID
Description
Syntax
Options
Remarks
1.3.6.1.4.1.232.1001.1.1.2.5
This attribute provides a list of IP addresses, DNS names, domain, address ranges, and subnets, which partially specify right restrictions under an IP network address constraint.
Octet String-1.3.6.1.4.1.1466.115.121.1.40
Multi Valued
This attribute is only used on role objects. The IP restrictions are satisfied when the address matches and general access is denied, and unsatisfied when the address matches and general access is allowed. Values are an identifier byte followed by a type-specific number of bytes specifying a network address. For IP subnets, the identifier is <0x01>, followed by the IP network address in network order, followed by the IP network subnet mask in network order. For example, the IP subnet 127.0.0.1/255.0.0.0 would be represented as <0x01 0x7F 0x00 0x00 0x01
0xFF 0x00 0x00 0x00>. For IP ranges, the identifier is <0x02>, followed by the lower bound
IP address, followed by the upper bound IP address. Both are inclusive and in network order.
For example, the IP range 10.0.0.1 to 10.0.10.255 is represented as <0x02 0x0A 0x00 0x00
0x01 0x0A 0x00 0x0A 0xFF>. For DNS names or domains, the identifier is <0x03>, followed by the ASCII encoded DNS name. DNS names can be prefixed with a * (ASCII 0x2A), to indicate they should match all names that end with the specified string. For example, the DNS domain *.acme.com is represented as <0x03 0x2A 0x2E 0x61 0x63 0x6D 0x65 0x2E 0x63
0x6F 0x6D>. General access is allowed.
hpqRoleTimeRestriction
Table 90 hpqRoleTimeRestriction
OID
Description
Syntax
1.3.6.1.4.1.232.1001.1.1.2.6
This attribute represents a 7-day time grid, with 30-minute resolution, which specifies rights restrictions under a time constraint.
Octet String {42}-1.3.6.1.4.1.1466.115.121.1.40
204 Installing and Configuring Directory Services
Table 90 hpqRoleTimeRestriction (continued)
Options
Remarks
OID 1.3.6.1.4.1.232.1001.1.1.2.6
Single Valued
This attribute is only used on role objects. Time restrictions are satisfied when the bit corresponding to the current local side real time of the device is 1, and unsatisfied when the bit is 0. The least significant bit of the first byte corresponds to Sunday, from 12 midnight, to Sunday
12:30 AM. Each more significant bit and sequential byte corresponds to the next consecutive half-hour blocks within the week. The most significant (8th) bit of the 42nd byte corresponds to
Saturday at 11:30 PM, to Sunday at 12 midnight.
iLO 2-Specific LDAP OID Classes and Attributes
The schema attributes and classes in
and
might depend on attributes or classes defined in the HP management core classes and attributes.
iLO 2 Classes
Table 91 iLO 2 Classes
Class Name hpqLOMv100 1.3.6.1.4.1.232.1001.1.8.1.1
Assigned OID
iLO 2 Attributes
Table 92 iLO 2 Attributes
Class Name hpqLOMRightLogin hpqLOMRightRemoteConsole hpqLOMRightVirtualMedia hpqLOMRightServerReset hpqLOMRightLocalUserAdmin hpqLOMRightConfigureSettings
1.3.6.1.4.1.232.1001.1.8.2.1
Assigned OID
1.3.6.1.4.1.232.1001.1.8.2.2
1.3.6.1.4.1.232.1001.1.8.2.3
1.3.6.1.4.1.232.1001.1.8.2.4
1.3.6.1.4.1.232.1001.1.8.2.5
1.3.6.1.4.1.232.1001.1.8.2.6
iLO 2 Class Definitions
hpqLOMv100
Table 93 hpqLOMv100
OID
Description
Class Type
SuperClasses
Attributes
1.3.6.1.4.1.232.1001.1.8.1.1
This class defines the rights and settings used with HP iLO 2 products.
Auxiliary
None hpqLOMRightConfigureSettings-1.3.6.1.4.1.232.1001.1.8.2.1
hpqLOMRightLocalUserAdmin-1.3.6.1.4.1.232.1001.1. 8.2.2
hpqLOMRightLogin-1.3.6.1.4.1.232.1001.1.8.2.3
hpqLOMRightRemoteConsole-1.3.6.1.4.1.232.1001.1.8.2.4
hpq LOMRightServerReset-1.3.6.1.4.1.232.1001.1.8.2.5
hpqLOMRightVirtualMedia-1.3.6.1.4.1.232.1001.1.8.2.6
Remarks None
Directory Services Schema (LDAP) 205
iLO 2 Attribute Definitions
through
define the iLO 2 core class attributes.
hpqLOMRightLogin
Table 94 hpqLOMRightLogin
OID
Description
Syntax
Options
Remarks
Login right for HP iLO 2 products.
Boolean-1.3.6.1.4.1.1466.115.121.1.7
1.3.6.1.4.1.232.1001.1.8.2.1
Single Valued
The attribute is meaningful only on role objects. If TRUE, members of the role are granted the right.
hpqLOMRightRemoteConsole
Table 95 hpqLOMRightRemoteConsole
OID
Description
Syntax
Options
Remarks
1.3.6.1.4.1.232.1001.1.8.2.2
Remote console right for iLO 2 products. Meaningful only on role objects.
Boolean-1.3.6.1.4.1.1466.115.121.1.7
Single valued
This attribute is only used on role objects. If this attribute is TRUE, members of the role are granted the right.
hpqLOMRightRemoteConsole
Table 96 hpqLOMRightRemoteConsole
OID
Description
Syntax
Options
Remarks
1.3.6.1.4.1.232.1001.1.8.2.3
Virtual media right for HP iLO 2 products.
Boolean-1.3.6.1.4.1.1466.115.121.1.7
Single valued
This attribute is only used on role objects. If this attribute is TRUE, members of the role are granted the right.
hpqLOMRightServerReset
Table 97 hpqLOMRightServerReset
OID
Description
Syntax
Options
Remarks
1.3.6.1.4.1.232.1001.1.8.2.4
Remote server reset and power button right for HP iLO 2 products.
Boolean-1.3.6.1.4.1.1466.115.121.1.7
Single valued
This attribute is only used on role objects. If this attribute is TRUE, members of the role are granted the right.
206 Installing and Configuring Directory Services
hpqLOMRightLocalUserAdmin
Table 98 hpqLOMRightLocalUserAdmin
OID
Description
Syntax
Options
Remarks
1.3.6.1.4.1.232.1001.1.8.2.5
Local user database administration right for HP iLO 2 products.
Boolean-1.3.6.1.4.1.1466.115.121.1.7
Single valued
This attribute is only used on role objects. If this attribute is TRUE, members of the role are granted the right.
hpqLOMRightConfigureSettings
Table 99 hpqLOMRightConfigureSettings
OID
Description
Syntax
Options
Remarks
1.3.6.1.4.1.232.1001.1.8.2.6
Configure devices settings right for HP iLO 2 products.
Boolean-1.3.6.1.4.1.1466.115.121.1.7
Single valued
This attribute is only used on role objects. If this attribute is TRUE, members of the role are granted the right.
Directory Services Schema (LDAP) 207
Glossary
A
Address
Address Path
Administrator
ARP
Authentication
Authorization
In networking, a unique code that identifies a node in the network. Names such as host1.hp.com
are translated to dott-quad addresses such as 168.124.3.4 by the Domain Name Service (DNS).
An address path is one in which each term has the appropriate intervening addressing association.
A person managing a system through interaction with management clients, transport clients, and other policies and procedures.
Address Resolution Protocol. A protocol used to associate an Internet Protocol (IP) address with a network hardware address (MAC address).
The process that verifies the identity of a user in a communication session, or a device or other entity in a computer system, before that user, device, or other entity can access system resources.
Session authentication can work in two directions: a server authenticates a client to make access control decisions, and the client can also authenticate the server. With Secure Sockets Layer (SSL), the client always authenticates the server.
The process of granting specific access privileges to a user. Authorization is based on authentication and access control.
B
Bind
BIOS
BMC
In the Lightweight Directory Access Protocol (LDAP), refers to the authentication process that LDAP requires when users access the LDAP directory. Authentication occurs when the LDAP client binds to the LDAP server.
Basic Input/Output System. System software that controls the loading of the operating system and testing of hardware when the system is powered on. The BIOS is stored in read-only memory
(ROM).
Baseboard Management Controller. A device used to manage chassis environmental, configuration, and service functions, and receive event data from other parts of the system. It receives data through sensor interfaces and interprets this data by using the sensor data record (SDR) for which it provides an interface. The BMC also provides an interface to the SEL. Typical functions of the
BMC are measuring processor temperature, power supply values, and cooling fan status. The
BMC can take autonomous action to preserve system integrity.
C
CIM
Client
See Common Information Model.
A client is a logical component that manages a system through a manageability access point
(MAP). A client can run on a management station or other system. A client is responsible for:
•
Providing an interface to the functionality provided by the MAP in a form consistent with the
SM architecture
•
Accessing a MAP using one of the SM CLP architecture defined management protocol specifications. This involves interacting with the MAP through the following actions:
â—¦
Initiating a session with a MAP
â—¦
Transmitting protocol-specific messages to the MAP
â—¦
Receiving protocol-specific output messages from the MAP
A text-based interface that enables users to enter executable instructions at a command prompt.
Command Line
Interface (CLI)
Command Line
Protocol (CLP)
The CLP defines the form and content of messages transmitted from and responses received by a client within the context of a text-based session between that client and the CLP service for a
Manageability Access Point (MAP).
208 Glossary
Common
Information Model
(CIM)
Console
The CLP consists of a set of command verbs that manipulate command targets representing
Managed Elements (ME) that are within the scope of access by a MAP. Each CLP interaction consists of a command line transmitted to the CLP service and a subsequent response transmitted back to the client. Each command transmitted generates only one response data transmission to the client.
The CLP allows for extensibility through different mechanisms: verbs, targets, target properties, and option names, and option arguments. The conventions allow for implementers to extend the interface in a non-conflicting mechanism that allows for differentiation and experimentation without encroaching upon the standard CLP syntax and semantics.
An industry standard that was developed by the DMTF. CIM describes data about applications and devices so that administrators and software management programs can control applications and devices on different platforms in the same way, ensuring interoperability across a network.
CIM provides a common definition of management information for systems, components, networks, applications, and services, and it allows for vendor extensions. CIM common definitions enable vendors to exchange management information between systems.
Using techniques of object-oriented programming, CIM provides a consistent definition and structure of data, including expressions for elements such as object classes, properties, associations, and methods.
For example, if an enterprise purchases four different servers from four different vendors and networks them together, using CIM, the administrator can view the same information about each of the devices, such as manufacturer and serial number, the device’s model number, its location on the network, its storage capacity, and its relationship to the applications that run throughout the network.
The interface between iLO 2 and the server that controls basic functionality. Also known as host
console.
D
DDNS
DHCP
Directory Server
Distinguished
Name (DN)
DMTF
DNS
Dynamic Domain Name System. DDNS is how iLO 2 automatically registers its name with the
Domain Name System so that when iLO 2 receives its new IP address from DHCP, users can connect to the new iLO 2 using the host name, rather than the new IP address.
Dynamic Host Configuration Protocol. A protocol that enables a DHCP server to assign Internet
Protocol (IP) addresses dynamically to systems on a Transmission Control Protocol/Internet Protocol
(TCP/IP) network. Without DHCP, IP addresses must be entered manually at each computer, and when computers are moved to another location on another part of the network, a new IP address must be entered.
In the Lightweight Directory Access Protocol (LDAP), a server which stores and provides information about people and resources within an organization from a logically centralized location.
In the Lightweight Directory Access Protocol (LDAP), a unique text string that identifies an entry's name and location within the directory. A DN can be a fully qualified domain name (FQDN) that includes the complete path from the root of the tree.
Distributed Management Task Force. The industry organization that authors and promotes management standards and integration technology for enterprise and Internet environments to further the ability to remotely manage computer systems.
Domain Name Server. The server that typically manages host names in a domain. DNS servers translate host names, such as www.example.com, into Internet Protocol (IP) addresses, such as
030.120.000.168.
Domain Name Service. The data query service that searches domains until a specified host name is found.
Domain Name System. A distributed, name resolution system that enables computers to locate other computers on a network or the Internet by domain name. The system associates standard
Internet Protocol (IP) addresses, such as 00.120.000.168, with host names, such as www.hp.com.
Machines typically acquire this information from a DNS server.
209
Domain
Domain Name
A grouping of hosts that is identified by a name. The hosts usually belong to the same Internet
Protocol (IP) network address.
The unique name assigned to a system or group of systems on the Internet. The host names of all the systems in the group have the same domain name suffix. Domain names are interpreted from right to left.
E
Ethernet An industry-standard type of local area network (LAN) that enables real-time communication between systems connected directly through cables. Ethernet uses a Carrier Sense Multiple
Access/Collision Detection (CSMA/CD) algorithm as its access method, which all nodes listen for, and any node can begin transmitting data. If multiple nodes attempt to transmit at the same time (a collision), the transmitting nodes wait for a random time before attempting to transmit again.
Event A change in the state of a managed object. The event-handling subsystem can provide a notification, to which a software system must respond when it occurs, but which the software did not solicit or control.
Extended Schema A platform-specific schema derived from the common model. An example is the Win32 schema.
F
Firmware
FPGA
FTP
Software that is typically used to help with the initial booting stage of a system and with system management. Firmware is embedded in read-only memory (ROM) or programmable ROM (PROM).
Field Programmable Gate Array. A semiconductor device containing programmable logic components and programmable interconnects.
File Transfer Protocol. A basic Internet protocol based on Transmission Control Protocol/Internet
Protocol (TCP/IP) that enables the retrieving and storing of files between systems on the Internet without regard for the operating systems or architectures of the systems involved in the file transfer.
G
Gateway A computer or program that interconnects two networks and passes data packets between the networks. A gateway has more than one network interface.
Gateway Address Where the packet needs to be sent. This can be the local network card or a gateway (router) on the local subnet.
GUI Graphical User Interface. An interface that uses graphics, along with a keyboard and mouse, to provide easy-to-use access to an application.
H
Host
Host Console
Host ID
Host Name
HTTP
A system, such as a backend server, with an assigned Internet Protocol (IP) address and host name. The host is accessed by other remote systems on the network.
The interface between iLO 2 and the server that controls basic functionality. Also known as
console.
Part of the 32-bit Internet Protocol (IP) address used to identify a host on a network. Host ID is also known as DNS Name or Host Name.
The name of a particular machine within a domain. Host names always map to a specific Internet
Protocol (IP) address.
Hypertext Transfer Protocol. The Internet protocol that retrieves hypertext objects from remote hosts. HTTP messages consist of requests from client to server, and responses from server to client.
HTTP is based on Transmission Control Protocol/Internet Protocol (TCP/IP).
I
In-band System
Management
A server management capability that is enabled only when the operating system is initialized and the server is functioning properly.
210 Glossary
Integrated
Lights-Out (iLO)
IP
IP Address
IPMI
The iLO functionality offers remote server management through an independent management processor (MP). iLO was introduced into most HP Integrity entry class servers in late 2004. Prior to that, embedded remote server management was referred to as MP functionality. All legacy
MP functionality has been carried forward and combined with new features, all under the heading of "iLO". Therefore, "iLO" and "MP" mean the same thing for entry class servers.
Internet Protocol. IP specifies the format of packets and the packet addressing scheme. Most networks combine IP with a higher-level protocol called Transmission Control Protocol (TCP), which establishes a virtual connection between a destination and a source. TCP/IP establishes a connection between two hosts so that they can send messages back and forth for a period of time. The format of an IP address is a 32-bit numeric address written as four numbers separated by periods. Each number can be zero to 255; for example, 1.160.10.240. Within an isolated network, you can assign IP addresses at random as long as each one is unique. However, connecting a private network to the Internet requires using registered IP addresses (called Internet addresses) to avoid duplicates.
An identifier for a computer or device on a TCP/IP network.
Intelligent Platform Management Interface. A hardware-level interface specification designed primarily for the out-of-band management of server systems over a number of different physical interconnects. The IPMI specification describes extensive abstractions regarding sensors, enabling a management application running on the operating system (OS) or in a remote system to comprehend the environmental makeup of the system and to register with the system's IPMI subsystem to receive events. IPMI is compatible with management software from heterogeneous vendors. IPMI functionality includes inventory reporting, system monitoring, logging, system recovery (including local and remote system resets, and power on and power off capabilities), and alerting.
K
Kernel
KVM Switch
The core of the operating system (OS) that manages the hardware and provides fundamental services that the hardware does not provide, such as filing and resource allocation.
Keyboard, Video, Mouse. A hardware device that allows a user, or multiple users, to control multiple computers from a single keyboard, video monitor and mouse.
L
LDAP
Lights-Out
Advanced KVM card
Lightweight Directory Access Protocol. A directory service protocol used for the storage, retrieval, and distribution of information, including user profiles, distribution lists, and configuration data.
LDAP runs over Transmission Control Protocol/Internet Protocol (TCP/IP) across multiple platforms.
The HP Lights-Out Advanced KVM card is a PCI-X card that you install into any sx2000-based mid-range or high-end HP Integrity server such as rx7640, rx8640, and Superdome sx2000.
The Lights-Out Advanced KVM card enables the Lights-Out Advanced IRC and vMedia features of iLO 2.
The Lights-Out Advanced KVM card is also a KVM card that offers physical video functionality for servers running Windows, and USB functionality for servers running HP-UX, Windows, and
OpenVMS.
M
Managed Object The actual item in the system environment that is accessed by the provider. For example, a Network
Interface Card (NIC).
Management
Information Base
(MIB)
Management
Processor (MP)
The MIB defines the properties of the managed object within the device to be managed. Every managed device keeps a database of values for each definition written in the MIB. MIB is not the actual database itself and is implementation dependant.
The component that provides a LAN interface to the system console and system management.
Prior to iLO 2, embedded remote server management was referred to as MP functionality. All legacy MP functionality has been carried forward and combined with new features, all under the heading of "iLO 2". Therefore, "iLO 2" and "MP" mean the same thing for entry class servers.
211
MAP
MAP Address
Space
Media Access
Control (MAC)
Manageability Access Point. A network-accessible interface for managing a computer system. A
MAP can be initiated by a management process, a management processor, a service processor, or a service process.
This is the hierarchical graph of the UFiTs contained in the MAP’s AdminDomain. Each instance starting at the AdminDomain is a node in the graph. Each supported association forms a link in the graph to another instance node, and so on, until a terminating instance node is encountered.
Worldwide unique, 48-bit, hardware address number that is programmed in to each local area network interface card (NIC) at the time of manufacture. In the Ethernet standard, every network connection must support a unique MAC value.
N
Network Interface
Card (NIC)
Network mask
Node
An internal circuit board or card that connects a workstation or server to a networked device.
A number used by software to separate a local subnet address from the rest of an Internet Protocol
(IP) address.
An addressable point or device on a network. A node can connect a computing system, a terminal, or various peripheral devices to the network.
O
Onboard
Administrator
Options
Out-of-band
System
Management
P
Port
The Onboard Administrator (OA) is the enclosure management processor, subsystem, and firmware base used to support HP Integrity server blades and all the managed devices contained within the enclosure. The OA provides a single point from which to perform basic management tasks on server blades or switches within the enclosure. Utilizing this hard-wired information, the OA performs initial configuration steps for the enclosure, allows for run-time management and configuration of enclosure components, and informs administrators about problems within the enclosure through email, SNMP, or the Insight Display.
Used in the SMASH SM CLP. Options control verb behavior.
Server management capability that is enabled when the operating system network drivers or the server are not functioning properly.
Port Number
POST
Properties
Protocol
Proxy
The location (socket) where Transmission Control Protocol/Internet Protocol (TCP/IP) connections are made. Web servers traditionally use port 80, the File Transfer Protocol (FTP) uses port 21, and Telnet uses port 23. A port enables a client program to specify a particular server program in a computer on a network. When a server program is started initially, it binds to its designated port number. Any client that wants to use that server must send a request to bind to the designated port number.
A number that specifies an individual Transmission Control Protocol/Internet Protocol (TCP/IP) application on a host machine, providing a destination for transmitted data.
Power-On Self-Test. The series of steps that the host system CPU performs following power-on.
Steps include testing memory, initializing peripherals, and executing option ROMs. Following
POST, the host ROM passes control to the installed operating system.
Properties are attributes that are relevant to a target that are passed as parameters to the command.
Property keywords map to properties of CIM class.
A set of rules that describes how systems or devices on a network exchange information.
A mechanism whereby one system acts on behalf of another system in responding to protocol requests.
R
Rackmount Electronic equipment and devices designed to fit industry-standard-sized computer racks and cabinets (19" wide). Rackmount devices are also standard 1.75 inch units.
212 Glossary
Remote System
S
Schema
A system other than the one on which the user is working.
Serial Console
Server Blade
SM CLP
SMASH
SNMP
SSH
SSL
Subnet
Subnet Mask
System Event Log
(SEL)
U
Universal Serial
Bus (USB)
Definitions that describe what type of information can be stored as entries in the directory. When information that does not match the schema is stored in the directory, clients attempting to access the directory may be unable to display the proper results. Schemas come in many forms, such as a text file, information in a repository, or diagrams.
A terminal connected to the serial port on the service processor. A serial console is used to configure the system to perform other administrative tasks.
A single circuit board populated with components such as processors, memory, and network connections that are usually found on multiple boards.
Server Management Command Line Protocol (SM CLP). SM CLP specification defines a user-friendly command line protocol to manipulate CIM instances defined by the SM profiles specification.
System Management Architecture for Server Hardware (SMASH). An initiative by the Distributed
Management Task Force (DMTF) that encompasses specifications (SM CLP, SM ME Addressing,
SM Profiles) that address the interoperable manageability requirements of small-to large-scale heterogeneous computer environments.
Simple Network Management Protocol. A set of protocols for managing complex networks.
Secure Shell. A UNIX shell program and network protocol that enables secure and encrypted log in and execution of commands on a remote system over an insecure network.
Secure Sockets Layer. A protocol that enables client-to-server communication on a network to be encrypted for privacy. SSL uses a key exchange method to establish an environment in which all data exchanged is encrypted with a cipher and hashed to protect it from eavesdropping and alteration. SSL creates a secure connection between a web server and a web client. Hypertext
Transfer Protocol Secure (HTTPS) uses SSL.
A working scheme that divides a single logical network into smaller physical networks to simplify routing. The subnet is the portion of an Internet Protocol (IP) address that identifies a block of host
IDs.
A bit mask used to select bits from an Internet address for subnet addressing. The mask is 32 bits long, and selects the network portion of the Internet address and one or more bits of the local portion. Also called an address mask.
A log that provides nonvolatile storage for system events that are logged autonomously by the service processor, or directly with event messages sent from the host.
T
Target
Target Address
Target Address
Scheme Resolution
Service
Telnet
A target is the implicitly or explicitly identified managed element that a command is directed toward. Command targets specify managed elements in the system. Targets follow the SM addressing specification.
The target addressing scheme provides an easy-to-use method to accurately address CIM objects.
The target address term of the CLP syntax in this architecture is extensible. The addressing scheme provides a unique target for CLP commands. The scheme is finite for parsing target names, and unique for unambiguous access to associated instance information needed to support association traversal rooted at the MAP AdminDomain instance.
This entity is responsible for discovering and enumerating the managed elements within the local domain, for maintaining the addressing and naming structure of the local domain, and coordinating this information with the operation invocation engine.
A telecommunications protocol providing specifications for emulating a remote computer terminal so that one can access a distant computer and function online using an interface that appears to be part of the user's local system.
An external bus standard that supports data transfer rates of 450 Mb/s (USB 2.0). A USB port connects devices such as mouse pointers, keyboards, and printers, to the computer system.
213
User
User Account
User Friendly class
Tag (UFcT)
User Friendly instance Path
(UFiP)
User Friendly instance Tag (UFiT)
User Friendly Tag
(UFT)
User Name
UTF-8
The CLP User represents an instance of a client which transmits and receives CLP-compliant messages. The CLP is part of the SM CLP architecture. It is intended to either be a person or a script interacting with a terminal service such as Telnet or SSHv2.
A record of essential user information that is stored on the system. Each user who accesses a system has a user account.
A short, user-friendly synonym for a CIM class name. It has the same properties and methods as the CIM class it represents.
A unique path to an instance formed by concatenating the UFiTs of each instance from the root instance to the terminating instance. The intervening ‘/’ between each UFiT represents an address association.
A unique instance tag within the scope of the target instance’s containment class. A UFiT is created by adding an nonzero positive-integer suffix to the target instance’s UFcT.
A short, user-friendly tag for a CIM class name or instance. There are two types of UFTs; UFcT and UFiT.
A combination of letters, and possibly numbers, that identifies a user to the system.
Unicode Transformation Format (8-bit). A variable-length character encoding for Unicode.
V
Verb vKVM
VPN
Used with SMASH SM CLP. The verb selects a management action for a target.
Virtual keyboard, video, mouse. The iLO 2 graphical IRC provides virtual keyboard, video
(monitor), and mouse (vKVM) capabilities with KVM-over-IP performance.
Virtual private network. A network that is constructed using public wires (the Internet) to connect nodes. These systems use encryption and other security mechanisms to ensure only authorized users can access the network and that the data cannot be intercepted.
214 Glossary
Index
A
access options,
access rights console access,
local user administration access,
MP configuration access,
power control access,
virtual media access,
accounts creating,
modifying,
resetting to default values,
active directory,
advanced features,
advanced pack license,
obtaining and activating,
alert levels, system status logs,
ARP ping commands,
using to configure a static IP address,
using to configure iLO 2 MP LAN,
auto login
CLI SSH connection,
features and usage,
initiating a session,
terminating a session,
web GUI connection,
B
BLADE command,
BMC command,
password resetting,
resetting,
BMC, firmware,
boot log,
BP command,
broadcast messages, sending,
C
CA command,
CD/DVD disk image files,
certificate services certificate request,
installing,
verifying,
CL command,
client operating systems,
CM command,
CO command,
command menu commands,
BLADE,
BP,
CA,
DATE,
DC,
DF,
DI,
DNS,
FW,
HE,
ID,
IT,
LC,
LDAP,
LM,
LOC,
LS,
PC,
PM,
PR,
PS,
RB,
RS,
SA,
SNMP,
SO,
SS,
SYSREV,
TC,
TE,
UC,
WHO,
XD,
command mode entering,
switching to console mode,
connecting to iLO 2, physically,
connections, simultaneous,
console access,
determining LAN configuration method,
HP-UX ,
log,
mode, switching from command mode,
settings,
setup,
setup checklist,
setup flowchart,
console access right,
console serial port, physical access,
controls, ports, and LEDs,
D
DATE command,
DC command,
DDNS,
default gateway address,
default user name and password,
DF command,
DHCP DNS
215
configuring the LAN,
configuring using the command menu,
configuring with the LC command,
DHCP, security risk when enabled,
DI command,
diagnostics,
directory objects, configuring for Active Directory,
directory services benefits,
features,
installing,
prerequisites,
schema,
supported directories and operating systems,
user login,
directory services for Active Directory,
creating and configuring directory objects,
defining client IP address or DNS name access,
directory services objects,
installation prerequisites,
preparation,
setting login restrictions,
setting time restrictions,
setting user or group role rights,
snap-in installation and initialization,
snap-ins,
directory services for eDirectory,
adding members,
adding role-managed devices,
creating and configuring directory objects,
creating objects,
creating roles,
defining client IP address or DNS name access,
directory services objects,
setting lights-out management device rights,
setting role restrictions,
setting time restrictions,
snap-in installation and initialization,
directory settings configuring using the command menu,
configuring using the web GUI,
directory-enabled remote management configuring iLO 2 devices,
creating iLO 2 objects,
creating multiple restrictions and roles,
creating roles to follow organizational structure,
DNS-based restrictions,
enforcing login restrictions,
enforcing user time restrictions,
IP address restrictions,
restricting roles,
role address restrictions,
role restrictions,
subnet mask restrictions,
user address restrictions,
using existing groups,
using multiple roles,
disk image files
CD/DVD,
216 Index
DMTF,
DNS,
command,
configuring using the command menu,
configuring using the web GUI,
E
eDirectory see directory services for eDirectory
EFI, firmware,
emulation device, configuring,
enabling password reset through IPMI,
events,
exiting the main menu,
Expect scripting tool,
F
Firefox for HP-UX,
Firefox for Linux,
Firefox for Windows and Linux,
firmware,
BMC,
display current revisions,
EFI,
iLO MP,
PDH,
PRS,
system,
UCIO,
upgrading KVM card,
firmware upgrade,
flow control timeout, modifying,
Forward Progress Log,
FRUID information, displaying,
FW command,
G
gateway address, default,
H
HE command using the command menu,
using the MP main menu,
help command,
MP main menu command,
web GUI,
HP management object identifiers,
core attribute definitions,
core attributes,
core class definitions,
core classes,
HP-UX console setting,
I
ID command,
iLO 2 event log,
image files
CD/DVD disk,
inactivity timeout,
inactivity timeout configuration,
inactivity timers, modifying,
installing certificates,
directory services,
Integrated Lights-Out Management Processor,
integrated remote console (IRC) accessing,
full screen,
introduction,
mouse and keyboard limitations,
mouse properties,
usage,
vKVM supported resolutions and browser configurations,
IP address, how iLO 2 MP acquires,
IPMI over LAN,
IT command,
J
Japanese keyboard,
java for HP-UX,
java for OpenVMS,
Java runtime environment, installing,
L
LAN configuration methods,
configuring using ARP ping,
configuring using console serial port (RS-232),
configuring using DHCP and DNS,
console,
port,
status,
LAN LEDs,
LAN port, physical access,
LC command,
LDAP command,
configuring extended schema,
configuring iLO 2 to use a directory server,
configuring parameters,
configuring schema-free,
configuring settings using SM CLP,
fully distinguished names (FDN),
group administration,
modifying directory settings,
schema-free,
LDAP, cell-based servers,
access rights,
commands,
composite commands,
partition-specific commands,
user accounts,
LEDs iLO 2 MP status,
MP LAN link speed,
MP LAN link status,
license, advanced pack,
license, displaying the current status,
licensing,
Lights-Out Advanced KVM card,
cards supported per partition,
core I/O card configurations,
features,
graphics functionality,
installing,
IRC feature,
operating system feature availability,
PCI-X or PCI-X/PCIe card cage,
requirements,
restrictions on adding or replacing card,
supported PCI-X slots,
supported system configurations,
troubleshooting,
upgrading firmware,
vMedia features,
Linux eDirectory snap-ins and schema extension installing the Java runtime environment,
schema extension,
snap-ins,
verification,
LM command,
LOC command,
local serial port, configuring,
local user administration access,
local user administration access right,
locator LED,
log, console,
logging in to iLO 2
TUI,
logging in to TUI,
login timeout,
LS command,
M
MAC address, iLO 2 MP,
management processor,
management snap-in installer,
messages, sending broadcast,
modifying inactivity timers,
MP,
MP configuration access,
MP configuration access right,
MP LAN port pinouts,
MP main menu,
MP main menu commands,
CL,
CM,
CO,
HE,
SL,
VFP,
X,
MP reset button,
N
nPartitions,
217
O
OA IP address as default gateway address,
,
Object Identifiers see HP management object identifiers
OIDs see HP management object identifiers
Onboard Administrator,
accessing iLO 2,
cabling,
components,
IP addresses,
LEDs and buttons,
operating systems, client,
operating systems, supported,
P
partitions,
,
password clearing,
modifying default,
number of faults allowed,
resetting BMC,
resetting default,
resetting factory default,
PC command,
PDH, firmware,
physical access console serial port,
LAN port,
PM command,
ports network,
open,
power control access,
management,
,
meter readings,
regulator,
regulator mode,
reset,
restore,
status,
power control access right,
powering the system on and off,
PR command,
processors,
PRS, firmware,
PS command,
R
RB command,
remote console, disconnecting,
required components
,
reset button, MP,
reset, BMC password,
resetting password to factory default,
resetting through IPMI,
roles address restrictions,
creating multiple,
218 Index creating multiple restrictions,
creating to follow organizational structure,
DNS-based restrictions,
enforcing,
IP address restrictions,
restricting,
subnet mask restrictions,
time restrictions,
user address restrictions,
using multiple,
RS command,
RS-232, configuring the LAN,
RST signal,
rx2660 controls, ports, and LEDs,
rx3600 and rx6600 controls, ports, and LEDs,
S
SA command,
schema installer,
schema, directory services,
schema-free LDAP,
scriptable vMedia,
scripting,
security access settings,
parameters,
risk with DHCP enabled,
,
setting up,
serial port pinouts,
server blades connecting to iLO 2 using Onboard Administrator,
SUV cable,
SL command,
SM CLP,
accessing,
changing default to SM CLP,
command,
display option,
exiting,
firmware revision display,
LDAP configuration,
level option,
map1 target,
network configuration,
opening system console interface,
remote access configuration,
syntax,
system target,
text console services,
user accounts configuration,
using the interface,
verbs,
SMASH,
SNMP alerts (server blades only),
command menu commands,
enabling or disabling using SNMP command,
enabling or disabling using web GUI,
trap information,
using the ID command,
SO command,
specific object identifiers,
attribute definitions,
attributes,
classes,
SPU host name,
SS command,
standard features,
static IP address assigning with ARP ping,
assigning with LC command,
status LEDs,
supported systems,
SYSREV command,
system checking status of,
firmware,
,
resetting through the RST signal,
system error log,
system event log viewing using the web GUI,
system status logs,
,
system, firmware,
T
TC command,
TE command,
timeout inactivity configuration,
U
UC command,
UCIO, firmware,
user name default,
users changing parameters,
configuration,
default name,
displaying,
using directory services,
V
VFP command,
virtual front panel (VFP),
virtual media access right,
CD/DVD,
disk image files,
virtual media access,
vKVM,
vMedia scriptable,
setting up IIS for scripted,
SM CLP command verbs,
supported operating systems,
W
web GUI active users,
DNS settings, configuring,
editing LDAP parameters,
group accounts,
help,
interacting with,
LAN access settings,
licensing,
local accounts,
login options,
network settings,
Onboard Administrator,
Power & Reset page,
power meter readings,
power regulator,
remote console IRC,
remote serial console,
serial port parameters, setting,
server status general,
server status identification,
SNMP settings,
system event log,
system status,
upgrading firmware,
virtual media,
WHO command,
X
X command,
XD command,
219
advertisement
* Your assessment is very important for improving the workof artificial intelligence, which forms the content of this project
Related manuals
advertisement
Table of contents
- 11 Intended Audience
- 11 Publishing History
- 13 Document Organization
- 14 Typographic Conventions
- 15 Related Information
- 15 HP Contact Information
- 16 Documentation Feedback
- 17 Features
- 18 Standard Features
- 18 Always-On Capability
- 18 Virtual Front Panel
- 18 Multiple Access Methods
- 18 Security
- 18 User Access Control
- 19 Multiple Users
- 19 IPMI over LAN
- 19 System Management Homepage
- 20 Firmware Upgrades
- 20 Internal Subsystem Information
- 20 DHCP and DNS Support
- 20 Group Actions
- 20 Group Actions Using HP SIM
- 20 SNMP
- 20 SMASH
- 21 SM CLP
- 21 Mirrored Console
- 21 Remote Power Control
- 21 Power Regulation
- 21 Event Logging
- 21 Advanced Features
- 21 Virtual Media
- 22 Integrated Remote Console
- 22 Directory-Based Secure Authorization Using LDAP
- 22 Schema-Free LDAP
- 22 Power Meter Readings
- 22 HP Insight Power Manager
- 23 Obtaining and Activating iLO 2 Advanced Pack Licensing
- 23 Lights-Out Advanced KVM Card
- 23 Supported Systems and Required Components and Cables
- 24 Integrity iLO 2 Supported Browsers and Client Operating Systems
- 24 Security
- 25 Protecting SNMP Traffic
- 26 HP Integrity Server Blade Components
- 26 Onboard Administrator
- 27 HP Integrity rx2660 Server Components
- 28 HP Integrity rx3600 and rx6600 Server Components
- 28 iLO 2 MP Status LEDs
- 29 iLO 2 MP Reset Button
- 29 Resetting Local User Accounts and Passwords to Default Values
- 29 Console Serial Port and Auxiliary Serial Port
- 30 MP LAN Port
- 30 MP LAN LEDs
- 31 Setup Checklist
- 32 Setup Flowchart
- 33 Rackmount Server Connection
- 34 Preparing to Set Up iLO 2
- 34 Determining the Physical iLO 2 Access Method
- 34 Determining the iLO 2 MP LAN Configuration Method
- 35 Configuring the iLO 2 MP LAN Using DHCP and DNS
- 36 Configuring the iLO 2 MP LAN Using ARP Ping
- 37 Configuring the iLO 2 MP LAN Using the Console Serial Port
- 39 Server Blade Connection
- 39 Connecting to a Server Blade iLO 2 Using the Console Serial Port
- 40 Connecting the SUV Cable to the Server Blade
- 42 Connecting the Server Blade To iLO 2 Using the Onboard Administrator
- 43 Auto Login
- 44 Initiating an Auto Login Session
- 44 Terminating an Auto Login Session
- 44 User Account Cleanup During IPF Blade Initialization
- 44 Auto Login Troubleshooting
- 45 Additional Setup
- 45 Modifying User Accounts and Default Passwords
- 46 Setting Up Security
- 46 Setting Security Access
- 46 Setting iLO 2 MP LAN From EFI
- 47 Logging In to iLO 2 Using the Web GUI
- 47 Logging In to iLO 2 Using the Command Line Interface
- 47 Network Port Usage
- 49 Lights-Out Advanced KVM Card for sx2000 Servers
- 50 Lights-Out Advanced KVM card Requirements
- 52 Configuring the Lights-Out Advanced KVM Card
- 52 Lights-Out Advanced KVM Card IRC Feature
- 52 Lights-Out Advanced KVM Card vMedia Feature
- 53 Installing the Lights-Out Advanced KVM Card in a Server
- 55 Lights-Out Advanced KVM Card Quick Setup Steps
- 56 Using Lights-Out Advanced KVM Features
- 57 Mid Range PCI Backplane Power Behavior
- 57 Troubleshooting the Lights-Out Advanced KVM Card
- 58 Core I/O Card Configurations
- 59 Supported PCI-X Slots
- 59 Upgrading the Lights-Out Advanced KVM Card Firmware
- 61 Accessing a Text Host Console through iLO 2 Virtual Serial Console
- 62 Accessing Online Help
- 62 Accessing a Text Host Console Using the TUI
- 62 Help System
- 63 Accessing a Graphic Host Console Using the Integrated Remote Console
- 63 Accessing a Text Host Console Using SMASH SM CLP
- 64 Configuring DHCP
- 65 Configuring DNS
- 65 Configuring LDAP Extended Schema
- 66 Login Process Using Directory Services with Extended LDAP
- 67 Configuring Schema-Free LDAP
- 68 Setting Up Directory Security Groups
- 68 Login Process Using Directory Services Without Schema Extensions
- 69 LDAP and MP Login for Integrity Cell-Based Servers
- 69 User Accounts
- 69 Commands
- 71 Access Rights
- 73 Partition User Support Options
- 75 Text User Interface
- 75 MP Command Interfaces
- 76 MP Main Menu
- 76 MP Main Menu Commands
- 77 CO (Console): Leave the MP Main Menu and enter console mode
- 77 VFP (Virtual Front Panel): Simulate the display panel
- 77 CM (Command Mode): Enter command mode
- 77 SMCLP (Server Management Command Line Protocol): Switch to the SMASH SMCLP
- 77 CL (Console Log): View the history of the console output
- 77 SL (Show Logs): View events in the log history
- 79 SL Command for Integrity Cell-Based Servers
- 81 HE (Help): Display help for the menu or command in the MP Main Menu
- 81 X (Exit): Exit iLO 2
- 81 Command Menu
- 82 Command Line Interface Scripting
- 83 Expect Script Example
- 85 Command Menu Commands and Standard Command Line Scripting Syntax
- 85 BP: Reset BMC passwords
- 85 BLADE: Display BLADE parameters
- 86 CA: Configure asynchronous local serial port
- 87 DATE: Display date
- 87 DC (Default Configuration): Reset all parameters to default configurations
- 88 DF: Display FRU information
- 88 DI: Disconnect LAN, WEB, SSH, or Console
- 88 DNS: DNS settings
- 88 FW: Upgrade the MP firmware
- 89 HE: Display help for menu or command in command menu interface
- 89 ID: System information settings
- 89 IT: Inactivity timeout settings
- 90 LC: LAN configuration usage
- 91 LDAP: LDAP directory settings
- 92 LDAP: LDAP group administration
- 93 LDAP: Schema-Free LDAP
- 93 LM: License management
- 93 LOC: Locator UID LED configuration
- 93 LS: LAN status
- 93 PC: Power control access
- 94 PM: Power regulator mode
- 95 PR: Power restore policy configuration
- 95 PS: Power status
- 95 RB: Reset BMC
- 95 RS: Reset system through the RST signal
- 96 SA: Set access LAN/WEB/SSH/IPMI over LAN ports
- 96 SNMP: Configure SNMP parameters
- 97 SO: Security option help
- 97 SS: System Status
- 97 SYSREV: Firmware revisions
- 98 TC: System reset through INIT or TOC signal
- 98 TE: Send a message to other mirroring terminals
- 98 UC: User Configuration (users, passwords, and so on)
- 100 WHO: Display a list of iLO 2 connected users
- 100 XD: iLO 2 Diagnostics or reset
- 100 Web GUI
- 101 System Status
- 101 Status Summary > General
- 102 Status Summary > Active Users
- 103 Status Summary > FW Revisions
- 104 Server Status > General
- 104 Server Status > Identification
- 105 System Event Log
- 106 Events
- 107 Remote Serial Console
- 109 Virtual Serial Port
- 109 Integrated Remote Console
- 110 IRC Requirements and Usage
- 110 Limitations of the IRC Mouse and Keyboard
- 111 Browsers and Client Operating Systems that Support the IRC
- 111 IRC-Supported Resolutions and Browser Configurations
- 111 Microsoft Windows Server 2003 and HP-UX Graphics Resolution Settings for the IRC
- 111 Server Display Properties
- 111 Server Mouse Properties
- 111 Console Settings
- 112 Enabling X Windows on HP-UX
- 112 Accessing the IRC
- 114 Integrated Remote Console Fullscreen
- 115 Virtual Media
- 115 Using iLO 2 Virtual Media Devices
- 116 Virtual CD/DVD
- 118 Virtual Media CD/DVD Operating System
- 118 Creating the iLO 2 Disk Image Files
- 120 Virtual Floppy/USB Key
- 121 Virtual Media Applet Timeout
- 121 Supported Operating Systems and USB Support for vMedia
- 122 Java Plug-in Version
- 122 Client Operating System and Browser Support for vMedia
- 122 Power Management
- 122 Power & Reset
- 124 Power Meter Readings
- 125 Power Regulator
- 127 Administration
- 127 Firmware Upgrade
- 128 Licensing
- 129 User Administration > Local Accounts
- 130 Group Accounts
- 131 Access Settings
- 131 LAN
- 132 Serial Page
- 133 Login Options Page
- 134 Current LDAP Parameters
- 136 Network Settings
- 136 Network Settings > Standard
- 137 Domain Name Server
- 138 SNMP Settings
- 139 BL c-Class
- 140 Help
- 141 SMASH Server Management Command Line Protocol
- 141 SM CLP Features and Functionality Overview
- 142 SM CLP Session
- 142 Accessing the SM CLP Interface
- 142 Exiting the SM CLP Interface
- 142 Changing the iLO 2 Default Interface to SM CLP
- 143 Using the SM CLP Interface
- 144 SM CLP Syntax
- 144 Command Line Terms
- 144 Command Verbs
- 145 Command Targets
- 145 Command Target Properties
- 146 Command Options
- 146 Level Option
- 146 Display Option
- 147 Character Set, Delimiters, Special, and Reserved Characters
- 148 System1 Target
- 148 Target: SYSTEM1
- 148 System Reset Power Status and Power Control
- 148 Resetting the System
- 149 Displaying Power Status
- 149 Powering Off the System
- 149 Powering On the System
- 149 Map1 (iLO 2) Target
- 149 Target: map1
- 150 Map1 Example
- 150 Resetting iLO 2
- 150 Text Console Services
- 150 Opening the MP Main Menu from SM CLP
- 150 Target: map1/textredirectsap1
- 151 Opening the System Console Interface from SM CLP
- 151 Target: system1/consoles1/textredirectsap1
- 151 Switching Between the System Console and the SM CLP
- 152 Starting a System Console Session
- 152 Determining the Session Termination Character Sequence for the System Console
- 152 Exiting the System Console Session and Returning to SM CLP
- 152 Entering the MP Main Menu Interface From SM CLP
- 152 Exiting the MP Main Menu Session and Returning to SM CLP
- 152 Firmware Revision Display and Upgrade
- 152 SM CLP Firmware Targets
- 152 Target: map1/swinstallsvc1
- 153 Target: map1/swinventory1
- 153 Target: map1/swinventory1/swid#
- 153 Displaying Firmware Revisions
- 154 Firmware Upgrade
- 154 Remote Access Configuration
- 155 Telnet SM CLP Targets
- 155 Target: map1/telnetsvc1
- 155 Telnet Examples
- 155 SSH
- 155 Target: map1/sshsvc1
- 156 SSH Examples
- 156 Network Configuration
- 156 SM CLP Network Targets, Properties, and Verbs
- 156 Target: map1/enetport1
- 156 Target: map1/enetport1/lanendpt1
- 157 Target: map1/enetport1/lanendpt1/ipendpt1
- 157 Target: map1/dhcpendpt1
- 158 Target: map1/dnsendpt1
- 158 Target: map1/enetport1/lanendpt1/ipendpt1/gateway1
- 158 Target: map1/dnsserver1, map1/dnsserver2, map1/dnsserver3
- 159 Target: map1/settings1/dnssettings1
- 159 SM CLP Network Command Examples
- 160 vMedia
- 161 Setting Up IIS for Scripted vMedia
- 162 vMedia Functionality on Server Blades and Rack-Mounted Servers
- 162 Target: map1/oemhp_vm1/cddr1
- 162 Using Scriptable vMedia on Server Blades and Rack-Mounted Servers
- 163 Using Scriptable vMedia on Server Blades Only
- 166 User Accounts Configuration
- 166 Target: map1/group1
- 166 Target: map1/group1/account#
- 167 User Account Examples
- 167 LDAP Configuration
- 167 Target: map1/settings1/oemhp_ldapsettings1
- 168 LDAP Configuration Examples
- 169 Directory Services
- 169 Features Supported by Directory Integration
- 170 Directory Services Installation Prerequisites
- 170 Installing Directory Services
- 170 Schema Documentation
- 171 Directory Services Support
- 171 eDirectory Installation Prerequisites
- 172 Required Schema Software
- 172 Schema Installer
- 172 Schema Preview Screen
- 172 Setup Screen
- 173 Results Screen
- 174 Management Snap-In Installer
- 174 Directory Services for Active Directory
- 174 Active Directory Installation Prerequisites
- 175 Preparing Directory Services for Active Directory
- 176 Installing and Initializing Snap-Ins for Active Directory
- 176 Example: Creating and Configuring Directory Objects for Use with iLO 2 in Active Directory
- 179 Directory Services Objects
- 180 Active Directory Snap-Ins
- 180 Managing HP Devices In a Role
- 180 Managing Users In a Role
- 181 Setting Login Restrictions
- 182 Setting Time Restrictions
- 182 Defining Client IP Address or DNS Name Access
- 183 Setting User or Group Role Rights
- 184 Directory Services for eDirectory
- 184 Installing and Initializing Snap-In for eDirectory
- 185 Example: Creating and Configuring Directory Objects for Use with iLO 2 Devices in eDirectory
- 185 Creating Objects
- 186 Creating Roles
- 188 Directory Services Objects for eDirectory
- 188 Adding Role Managed Devices
- 188 Adding Members
- 189 Setting Role Restrictions
- 190 Setting Time Restrictions
- 190 Defining Client IP Address or DNS Name Access
- 191 Setting Lights-Out Management Device Rights
- 191 Installing Snap-Ins and Extending Schema for eDirectory on a Linux Platform
- 192 Installing the Java Runtime Environment
- 192 Installing Snap-Ins
- 192 Extending Schema
- 193 Verifying Snap-In Installation and Schema Extension
- 193 Using the LDAP Command to Configure Directory Settings in iLO 2
- 194 User Login Using Directory Services
- 195 Certificate Services
- 195 Installing Certificate Services
- 195 Verifying Directory Services
- 195 Configuring an Automatic Certificate Request
- 196 Directory-Enabled Remote Management
- 196 Using Existing Groups
- 196 Using Multiple Roles
- 197 Creating Roles that Follow Organizational Structure
- 197 Restricting Roles
- 198 Role Time Restrictions
- 198 IP Address Range Restrictions
- 198 IP Address and Subnet Mask Restrictions
- 198 DNS-Based Restrictions
- 198 Role Address Restrictions
- 199 Enforcing Directory Login Restrictions
- 199 Enforcing User Time Restrictions
- 200 User Address Restrictions
- 200 Creating Multiple Restrictions and Roles
- 201 Directory Services Schema (LDAP)
- 201 HP Management Core LDAP Object Identifier Classes and Attributes
- 202 Core Classes
- 202 Core Attributes
- 202 Core Class Definitions
- 202 hpqTarget
- 203 hpqRole
- 203 hpqPolicy
- 203 Core Attribute Definitions
- 203 hpqPolicyDN
- 203 hpqRoleMembership
- 204 hpqTargetMembership
- 204 hpqRoleIPRestrictionDefault
- 204 hpqRoleIPRestrictions
- 204 hpqRoleTimeRestriction
- 205 iLO 2-Specific LDAP OID Classes and Attributes
- 205 iLO 2 Classes
- 205 iLO 2 Attributes
- 205 iLO 2 Class Definitions
- 205 hpqLOMv100
- 206 iLO 2 Attribute Definitions
- 206 hpqLOMRightLogin
- 206 hpqLOMRightRemoteConsole
- 206 hpqLOMRightRemoteConsole
- 206 hpqLOMRightServerReset
- 207 hpqLOMRightLocalUserAdmin
- 207 hpqLOMRightConfigureSettings