EXPRESSSCOPE Engine 3 User's Guide 1st Edition May, 2011
free software. For example, permission to use the GNU C Library in non-free programs enables many more people to use the whole GNU operating system
- 100- 8. Troubleshooting ERROR MESSAGES Abnormality occurs while using remote management, and the error dialog might be displayed in management P
EXPRESSSCOPE Engine 3 User’s Guide ©NEC Corporation 2011 - 101-
You may charge a fee for the physical act of transferring a copy, and you may at your option offer warranty protection in exchange for a fee.
instead of to this License. (If a newer version than version 2 of the ordinary GNU General Public License has appeared, then you can specify that v
work containing portions of the Library, and distribute that work under terms of your choice, provided that the terms permit modification of the work
distribute. 7. You may place library facilities that are a work based on the Library side-by-side in a single library together with other library
and the section as a whole is intended to apply in other circumstances. It is not the purpose of this section to induce you to infringe any patents o
16. IN NO EVENT UNLESS REQUIRED BY APPLICABLE LAW OR AGREED TO IN WRITING WILL ANY COPYRIGHT HOLDER, OR ANY OTHER PARTY WHO MAY MODIFY AND/OR REDI
OpenSSL Toolkit This product includes software developed by the OpenSSL Project for use in the OpenSSL Toolkit (http://www.openssl.org/). This produ
* PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE OpenSSL PROJECT OR * ITS CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, * SPECI
* * THIS SOFTWARE IS PROVIDED BY ERIC YOUNG ``AS IS'' AND * ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE * I
TRADEMARKS AND PATENTS Microsoft, Windows and Windows Vista are registered trademarks of Microsoft Corporation in the United States and other countri
Other open source software programs OpenSSH 1) * Copyright (c) 1995 Tatu Ylonen <[email protected]>, Espoo, Finland *
YOU OR THIRD PARTIES OR A FAILURE OF THE PROGRAM TO OPERATE WITH ANY OTHER PROGRAMS), EVEN IF SUCH HOLDER OR OTHER PARTY HAS BEEN ADVISED OF T
* notice, this list of conditions and the following disclaimer. * 2. Redistributions in binary form must reproduce the above copyright
* IN NO EVENT SHALL THE AUTHOR BE LIABLE FOR ANY DIRECT, INDIRECT, * INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BU
* copyright notice and this permission notice appear in all copies. * * THE SOFTWARE IS PROVIDED "AS IS" AND TODD C. MILLER DISCLAIMS A
OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT (INC
* Copyright 1995 by Wietse Venema. All rights reserved. Some individual * files may be covered by other copyrights. * * This material was originally
/* IN NO EVENT SHALL THE AUTHORS OR COPYRIGHT HOLDERS BE LIABLE FOR ANY */ /* CLAIM, DAMAGES OR OTHER LIABILITY, WHETHER IN AN ACTION OF CONTRACT
* must display the following acknowledgement: * "This product includes cryptographic software written by * Eric Young ([email protected])" *
* * Redistribution and use in source and binary forms, with or without * modification, are permitted provided that the following conditions * are
We protect your rights with two steps: (1) copyright the software, and (2) offer you this license which gives you legal permission to copy, distr
Version 2.0, January 2004 http://www.apache.org/licenses/ TERMS AND CONDITIONS FOR USE, REPROD
copyright license to reproduce, prepare Derivative Works of, publicly display, publicly perform, sublicense, and distribute the Work
the terms of any separate license agreement you may have executed with Licensor regarding such Contributions. 6. Trademarks. This Li
IPA Font License Agreement v1.0 The Licensor provides the Licensed Program (as defined in Article 1 below) under the terms of this license agreement (
but not limited to broadcasting, communication and various recording media. 4. If any Recipient extracts Embedded Fonts from a Digital Document Fil
OR IMPLIED WARRANTY AS TO THE LICENSED PROGRAM OR ANY DERIVED PROGRAM, INCLUDING, BUT NOT LIMITED TO, WARRANTIES OF TITLE, NON-INFRINGEMENT, MERCHANTA
EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUS
Table of Contents Trademarks and Patents...
Power ON ...
SYMBOLS The following symbols are used throughout this manual. Notice Items to be observed or points to be noted when using this product. Items to
stating that you changed the files and the date of any change. b) You must cause any work that you distribute or publish, that in
PREFACE The EXPRESSSCOPE Engine 3 enables you to monitor the operating status of the host system (power supplies, fans, temperature and so forth), to
1. Overview The host system comes standard with the BMC (system management LSI) and a management LAN port dedicated to the BMC. By connecting the ma
2. Configuring the Host System This chapter describes the settings necessary to configure the BMC in the host system. DEFAULT NETWORK SETTINGS The B
MANAGEMENT LAN SETTINGS You can configure basic setting of management LAN settings of BMC for remote management using Web server function and command
(Default setting is 192.168.1.1.) Subnet Mask If DHCP is not used to automatically obtain a subnet mask IP address, enter the subnet mask of your man
- 45- The Clear BMC Configuration also deletes the settings for ESMPRO ServerManager(a software application bundled for remote management). Be sur
3. Configuring a Management PC This chapter describes the settings necessary for the remote management PC that will be connected to the host system.
- 47- 4. Networking TCP/IP PORTS The BMC uses the TCP/IP ports listed below. If you use the BMC in a firewall environment, you need to allocate the
5. Using Remote Management OVERVIEW The BMC Web Server function allows you to control the host system’s power and KVM from a remote console via a Web
If you use Internet Explorer 7(or 8), the following page is displayed and HTTPS connection is blocked. In this case, select "Continue to this
The source code for a work means the preferred form of the work for making modifications to it. For an executable work, complete source code means
LOGIN AND LOGOUT Login When the login page appears, input the user name and password, and then click [Login]. 1. The display language can b
- 51- Logout Click “Logout” in the upper right corner of the window. When a confirmation dialog appears, click [OK] to log out. After you log ou
SERVER PANEL The server panel is displayed under a browser after log in. The server panel has following functions. 2 1 3 5 6 7 4 1. The virt
SYSTEM A 4 3 1 2 C B A. The system tab. BMC supported functions are displayed. B. The menu that can be selected in the system tab is displa
- 54- Login/Logout information and operation log are displayed.
REMOTE ACCESS A. The remote access tab. BMC supported functions are displayed. B. The menu that can be selected in the remote access tab is displaye
- 56- according to the kind of the floppy disk drive of management PC. Notice When the operation into which the resolution on the host system sid
CONFIGURATION B A 5 8 7 6 4 3 2 1 C A. The configuration tab. BMC supported functions are displayed. B. The menu that can be selected in th
- 58- 5 ECO Power consumption and the throttling situation are displayed. Set to manage the electric power control. 6 Miscellaneous Set to manage
UPDATE 1 2 B A C A. The update tab. BMC supported functions are displayed. B. The menu that can be selected in the update tab is displayed C. In
apply and the section as a whole is intended to apply in other circumstances. It is not the purpose of this section to induce you to infringe any pat
6. Command Line Interface OVERVIEW With the BMC Command Line Interface, you can control the host system from a remote SSH client. The BMC supports
LOGIN AND LOGOUT Login Enter your user name and password at login prompt. A command prompt will be displayed after login. Also you can login by using
BASIC COMMANDS This section describes basic commands to use them as the command line interface. These basic commands manage the host system by using
help Syntax: help [<options>] [<help topics>] Description: A basic command, <command>, can be specified for the <help topics>
The show command is used to display information about the target specified by the <target> argument. The command displays the target specified
- 65- version Syntax: version [<options>] Description: The version command is used to display the version of the command line protocol specifi
REMOTE CONTROL You can perform remote control of the host system at the command prompt. Notice Performing remote control when the operating system i
Remote Console To start a character-based remote console, enter the following command at the command prompt. start /admin1/system1/textredirectsvc1
- 68- To stop the character-based remote console using by other user forcibly, enter the following command at the command prompt. set /admin1/system
UID Switch Control You can turn on/off the UID (Unit ID) LED on the host system by the virtual UID switch through the command line interface. This f
12. IN NO EVENT UNLESS REQUIRED BY APPLICABLE LAW OR AGREED TO IN WRITING WILL ANY COPYRIGHT HOLDER, OR ANY OTHER PARTY WHO MAY MODIFY AND/OR REDI
• The UID LED will blink (flash) when it is controlled by Chassis Identify function of management software such as ESMPRO ServerManager. The UID L
SYSTEM EVENT LOG You can display system event log and modify setting of the system event log through the command line interface. Viewing system even
Setting of system event log To move the current default target to /admin1/system1/log1, enter the following command at the command prompt. cd /admin1
ACCESS LOG You can display, clear, and set the access log for the management LAN. The user must have an account as administrator for clearing and s
You can display only access log that corresponded to the specified from following condition. • timestamp Specify the date by the following format: M
Access log might not be correctly displayed with timestamp condition about the log of recorded from AC ON to DC ON on host system. Clearing acc
- 76- means that the access log is disabled. This is the dynamic setting. • oemnec_httplog_enable This specifies whether access log for login/logou
USER SETTINGS This section describes how to confirm and modify the user account through the command line interface. To move the current default targe
NETWORK SETTINGS This section describes how to confirm and modify the network setting for management LAN through the command line interface. To move
The properties which the access limitation target contains are as follows: • oemnec_allowedaccessips This specifies the IP addresses that permit ac
Yoyodyne, Inc., hereby disclaims all copyright interest in the program `Gnomovision' (which makes passes at compilers) written by James
Followings describe how to confirm and modify the DHCP setting for management LAN through the command line interface. To move the current default tar
• AccessInfo This specifies the IP address of the default gateway for the management LAN. This property is read-only. Followings describe how to c
set <Property>=<New value> The properties which the HTTP service target contains are as follows: • EnabledState This specifies whether
- 83- Enter the following command if you would like to modify a property of the SSH service target. set <Property>=<New value> The prop
POWER CONSUMPTION CONTROL You can control the power consumption of the host system through the command line interface. The user must have an account
- 85- • oemnec_PowerCapvalue This specifies the value of the power consumption starting he power consumption control. This is the dynamic setting.
CONFIRMING SYSTEM INFORMATION This section describes how to confirm the system information (product, BIOS/BMC firmware revision, MAC address of Syste
Confirming System BIOS revision You can confirm the System BIOS revision through the command line interface by entering following the basic command a
For example, enter the following command when you would like to confirm the information of CPU1. show cpu1 The example of displaying information in
Confirming Memory Information To move the current default target to /admin1/system1, enter the following command at the command prompt. cd /admin1/sy
or for a fee, you must give the recipients all the rights that we gave you. You must make sure that they, too, receive or can get the source code.
SPECIAL EXTENDED COMMANDS This section describes the special extended command which can do state acquisition (powerstate, lampstate) and interrupt ge
- 91- Status LED state acquisition Enter the following command at the command prompt: lampstate -statuslamp One of the following responses is retur
Interrupt Generation for OS Dump You can execute OS dump by entering following command at the command prompt. nmidump /admin1/system1 Notice The use
7. WS-Management (Web Service for Management) OVERVIEW With the WS-Management Protocol, you can control the host system and check the sensor of hos
Power ON Create the file input-RequestPowerStateChange2.xml and enter the following command, if you use WinRM. winrm invoke RequestPowerStateChange h
- 95- D.32+SystemCreationClassName=Host_ComputerSystem -r:https://IP_ADDRESS/wsman -username:USERNAME -password:PASSWORD -auth:basic -encoding:utf-8
OS Shutdown Create the file input-RequestPowerStateChange8.xml and enter the following command, if you use WinRM. winrm invoke RequestPowerStateChang
- 97- System Reset Create the file input-RequestPowerStateChange10.xml and enter the following command, if you use WinRM. winrm invoke RequestPowerS
Interrupt Generation for OS Dump Create the file input-RequestPowerStateChange11.xml and enter the following command, if you use WinRM. winrm invoke
SENSOR INFORMATION You can get sensor information either by enumeration of all sensors or by retrieving specified sensor. Enumeration of All Sensor
Comentários a estes Manuais