Integrated Lights Out Manager (ILOM) Administration Guide
Integrated Lights Out Manager (ILOM) Administration Guide
Integrated Lights Out Manager (ILOM) Administration Guide
Copyright 2007 Sun Microsystems, Inc., 4150 Network Circle, Santa Clara, Californie 95054, Etats-Unis. Tous droits réservés.
Sun Microsystems, Inc. a les droits de propriété intellectuels relatants à la technologie qui est décrit dans ce document. En particulier, et sans la
limitation, ces droits de propriété intellectuels peuvent inclure un ou plus des brevets américains énumérés à
http://www.sun.com/patents et un ou les brevets plus supplémentaires ou les applications de brevet en attente dans les Etats-Unis et
dans les autres pays.
Ce produit ou document est protégé par un copyright et distribué avec des licences qui en restreignent l’utilisation, la copie, la distribution, et la
décompilation. Aucune partie de ce produit ou document ne peut être reproduite sous aucune forme, par quelque moyen que ce soit, sans
l’autorisation préalable et écrite de Sun et de ses bailleurs de licence, s’il y en a.
Le logiciel détenu par des tiers, et qui comprend la technologie relative aux polices de caractères, est protégé par un copyright et licencié par des
fournisseurs de Sun.
Des parties de ce produit pourront être dérivées des systèmes Berkeley BSD licenciés par l’Université de Californie. UNIX est une marque
déposée aux Etats-Unis et dans d’autres pays et licenciée exclusivement par X/Open Company, Ltd.
Sun, Sun Microsystems, le logo Sun, Java, AnswerBook2, docs.sun.com, Sun Blade, et Solaris sont des marques de fabrique ou des marques
déposées de Sun Microsystems, Inc. aux Etats-Unis et dans d’autres pays.
Toutes les marques SPARC sont utilisées sous licence et sont des marques de fabrique ou des marques déposées de SPARC International, Inc.
aux Etats-Unis et dans d’autres pays. Les produits portant les marques SPARC sont basés sur une architecture développée par Sun
Microsystems, Inc.
L’interface d’utilisation graphique OPEN LOOK et Sun™ a été développée par Sun Microsystems, Inc. pour ses utilisateurs et licenciés. Sun
reconnaît les efforts de pionniers de Xerox pour la recherche et le développement du concept des interfaces d’utilisation visuelle ou graphique
pour l’industrie de l’informatique. Sun détient une license non exclusive de Xerox sur l’interface d’utilisation graphique Xerox, cette licence
couvrant également les licenciées de Sun qui mettent en place l’interface d ’utilisation graphique OPEN LOOK et qui en outre se conforment
aux licences écrites de Sun.
AMD Opteron est une marque de fabrique ou une marque deposee de Advanced Microdevices, Inc.
LA DOCUMENTATION EST FOURNIE "EN L’ÉTAT" ET TOUTES AUTRES CONDITIONS, DECLARATIONS ET GARANTIES EXPRESSES
OU TACITES SONT FORMELLEMENT EXCLUES, DANS LA MESURE AUTORISEE PAR LA LOI APPLICABLE, Y COMPRIS NOTAMMENT
TOUTE GARANTIE IMPLICITE RELATIVE A LA QUALITE MARCHANDE, A L’APTITUDE A UNE UTILISATION PARTICULIERE OU A
L’ABSENCE DE CONTREFAÇON.
LA DOCUMENTATION EST FOURNIE "EN L’ÉTAT" ET TOUTES AUTRES CONDITIONS, DÉCLARATIONS ET GARANTIES EXPRESSES
OU TACITES SONT FORMELLEMENT EXCLUES DANS LA LIMITE DE LA LOI APPLICABLE, Y COMPRIS NOTAMMENT TOUTE
GARANTIE IMPLICITE RELATIVE À LA QUALITÉ MARCHANDE, À L’APTITUDE À UNE UTILISATION PARTICULIÈRE OU À
L’ABSENCE DE CONTREFAÇON.
Please
Recycle
Contents
Preface xi
iii
3. Using the Command-Line Interface 3–1
3.1 Using CLI Commands 3–1
3.1.1 CLI Namespace 3–1
3.1.2 Privilege Levels 3–2
3.1.3 CLI Command Syntax 3–2
3.1.3.1 Command Verbs 3–3
3.1.3.2 Command Options 3–3
3.1.3.3 Command Targets 3–4
3.1.3.4 Command Properties 3–4
3.2 Command Syntax 3–4
iv Integrated Lights Out Manager (ILOM) Administration Guide for ILOM 1.1.1 • May 2007
5.3.1 Adding User Roles and Setting Privileges 5–4
5.3.2 Modifying User Accounts 5–7
5.3.3 Deleting User Accounts 5–9
Contents v
6.9.2 Displaying Available Targets 6–12
vi Integrated Lights Out Manager (ILOM) Administration Guide for ILOM 1.1.1 • May 2007
8.7 Sending Logs to Other Machines 8–10
Contents vii
12. Lightweight Directory Access Protocol (LDAP) 12–1
12.1 LDAP Servers Directory Organization 12–1
12.2 LDAP Clients and Servers 12–2
12.3 Configuring LDAP 12–3
12.3.1 Configuring the LDAP Server 12–4
12.3.2 Configuring the ILOM 12–4
12.3.2.1 Configuring the ILOM Using the CLI 12–5
12.3.2.2 Configuring the ILOM Using the WebGUI 12–5
viii Integrated Lights Out Manager (ILOM) Administration Guide for ILOM 1.1.1 • May 2007
14.5.3 Configuring Receipt of SNMP Traps 14–5
14.6 Managing SNMP Users With the CLI 14–5
14.6.1 Adding a User Account 14–5
14.6.2 Deleting a User Account 14–5
14.6.3 Configuring User Accounts 14–5
14.6.3.1 Syntax 14–6
14.6.3.2 Targets, Properties, and Values 14–6
14.6.3.3 Examples 14–6
14.7 Managing SNMP With the WebGUI 14–7
14.7.1 Configuring SNMP Settings 14–7
14.7.2 Adding or Editing SNMP Users 14–9
14.7.3 Deleting an SNMP user 14–11
14.7.4 Adding and Editing SNMP Communities 14–11
14.7.5 Deleting an SNMP community 14–12
Contents ix
A.2.12 Using the version Command A–20
Glossary Glossary–1
Index Index–1
x Integrated Lights Out Manager (ILOM) Administration Guide for ILOM 1.1.1 • May 2007
Preface
The Integrated Lights Out Manager (ILOM) Administration Guide for ILOM 1.1.1
provides instructions for managing Sun servers using the Integrated Lights Out
Manager.
ILOM is included on certain Sun servers. If you have one of these servers, it will
include an ILOM supplement, which contains platform-specific information, such as
sensors and thresholds, and details about the hardware.
Sun Blade™ 6000 products consist of a chassis containing multiple, replacable server
modules. On these products, the chassis is equipped with a separate service
processor that supports chassis-level functionality, such as fans and power supplies,
and that provides access to the service processors on the server modules. This
chassis-level service processor is called a Chassis Management Module (CMM).
■ This document covers the service processor(s) in the server modules.
■ Separate documents provide information about the CMM. See the documentation
provided with the chassis.
xi
Shell Prompts
Shell Prompt
C shell machine-name%
C shell superuser machine-name#
Bourne shell and Korn shell $
Bourne shell and Korn shell superuser #
Typographic Conventions
xii Integrated Lights Out Manager (ILOM) Administration Guide for ILOM 1.1.1 • May 2007
Documentation, Support, and Training
Sun Function URL
Documentation http://www.sun.com/documentation/
Support http://www.sun.com/support/
Training http://www.sun.com/training/
http://www.sun.com/hwdocs/feedback
Please include the title and part number of your document with your feedback:
Integrated Lights Out Manager (ILOM) Administration Guide for ILOM 1.1.1, part
number 820-0280-12
Preface xiii
xiv Integrated Lights Out Manager (ILOM) Administration Guide for ILOM 1.1.1 • May 2007
CHAPTER 1
1.1 Introduction
The ILOM is a dedicated system of hardware and supporting software that allows
you to manage your Sun server independently of the operating system.
1-1
■ Remote Console/Java™ Client – The Java Client supports the Remote Console
functionality, which allows you to access your server’s console remotely. It
redirects the keyboard, mouse, and video screen, and can redirect input and
output from the local machine’s CD and diskette drives.
For instructions on how to use the remote console, see Chapter 10.
You do not need to install additional hardware or software to begin managing your
server with ILOM.
Which interface you use depends on your overall system management plan and the
specific tasks that you wish to perform.
Web
Task IPMI Interface CLI SNMP
1-2 Integrated Lights Out Manager (ILOM) Administration Guide for ILOM 1.1.1 • May 2007
TABLE 1-1 Common Tasks (Continued)
Web
Task IPMI Interface CLI SNMP
On these systems, each server module is equipped with its own service processor.
Also, the chassis is equipped with a service processor that supports chassis-level
functionality, such as fans and power supplies, and that provides access to the
service processors on the server modules. This chassis-level service processor is
called a Chassis Management Module (CMM).
For more information on the CMM, see the corresponding documentation provided
with the chassis.
www.sun.com/software/solaris/index.jsp
You can also install it from the Sun N1 System Manager DVD shipped in your
system box. This software suite is installed on a dedicated server in your data center
and allows one or more remote management clients to perform the following tasks
on multiple managed servers:
■ Manage multiple servers – Configure, provision, deploy, manage, monitor, patch,
and update from one to thousands of Sun servers.
■ Monitor system information – System manufacturer, make, model, serial number,
management MAC addresses, disk information, expansion slot information, and
platform CPU and memory information.
■ Manage power remotely – Power off, power on, power reset, and power status.
■ Manage ILOMs and BIOS – Information about system ILOM firmware, version,
and status. You can also perform remote upgrades to firmware on ILOMs.
■ Manage system boot commands and options – Remote boot control via IPMI and
remote mapping of boot devices and boot options.
■ Manage remote system health checks – Information about the status of a server.
1-4 Integrated Lights Out Manager (ILOM) Administration Guide for ILOM 1.1.1 • May 2007
■ Manage operating systems – Deploy, monitor, and patch both Solaris and Linux
operating systems.
■ Perform bare-metal discovery.
To learn more about this suite of powerful data center management tools, go to:
http://www.sun.com/software/products/system_manager/
This chapter describes how to connect to the ILOM and how to do the initial setup.
It contains the following sections:
■ Section 2.1, “Connecting to the ILOM” on page 2-1
■ Section 2.2, “Configuring the ILOM IP Address” on page 2-7
TABLE 2-1 lists the different connection methods, and their relevance to rack-mounted
servers and server modules in a chassis:
Ethernet Yes Yes CLI and This is the normal method of connecting to the
WebGUI ILOM.
You must know the ILOM’s Ethernet address.
Note: This is the only method that supports
WebGUI access.
Serial, direct Yes No CLI only Connect directly to serial management port on
server.
Serial, through No Yes CLI only Connect a dongle cable directly to the server
dongle cable module.
Serial, through No Yes CLI only Log in to the CMM, navigate to server module,
chassis/CMM then execute command to start ILOM.
2-1
The following sections describe each method.
Note – Some server modules have different (non-ILOM) service processors. See the
documentation provided with the server module for more details.
To connect to the Ethernet, you must know the ILOM’s IP address. To discover, and
or to configure the ILOM IP address, see Section 2.2.1, “Viewing the ILOM IP
Address” on page 2-7 for more information.
Note – The ILOM supports a maximum of 10 active sessions, including serial, ssh,
and WebGUI sessions. You can view active sessions by entering the command show
/SP/sessions from the CLI.
2-2 Integrated Lights Out Manager (ILOM) Administration Guide for ILOM 1.1.1 • May 2007
Connecting to the WebGUI
For more detailed instructions, see Section 4.2, “Logging In to the WebGUI” on
page 4-4.
1. To log in to the WebGUI, type the IP address of the ILOM into your web
browser.
The login screen appears.
4. To log out of the WebGUI, click Log Out at the top right of the WebGUI.
The logout screen appears.
Caution – Do not use the Log Out button in your web browser to log out from the
WebGUI.
3. Unpack your server and connect the system power cable to a power source.
Refer to your platform-specific documentation for instructions on installing the
hardware, cabling, and powering on.
Note – If you connect a terminal or emulator to the serial port before it has been
powered on or during its power on sequence, you will see bootup messages.
When the server has booted, the ILOM displays its login prompt:
SUNSPnnnnnnnnnn login:
The first string in the prompt is the default host name. It consists of the prefix
SUNSP and the ILOM’s media access control (MAC) address. The MAC address
for each ILOM is unique.
2-4 Integrated Lights Out Manager (ILOM) Administration Guide for ILOM 1.1.1 • May 2007
7. When you are done, type exit to quit.
This section applies only to systems that meet the following requirements:
■ The server module must be installed in a chassis equipped with a Chassis
Management Module (CMM) ILOM.
See the chassis documentation for additional details.
■ The server module must be equipped with an ILOM. Some server modules have
different service processors.
See the server module documentation for additional details.
2. Configure that terminal device or the terminal emulation software to use the
following settings:
■ 8N1: eight data bits, no parity, one stop bit
■ 9600 baud (default, can be set to any standard rate up to 57600)
■ Disable software flow control (XON/XOFF)
3. Connect a serial cable from the serial port on the chassis to a terminal device.
Refer to the chassis documentation for the location of the serial port.
Note – The CMM ILOM logs on to the server module ILOM using the user name in
the user target under /CH/BLn/SP/cli (where n is the server module number).
See the chassis documentation for additional details.
2-6 Integrated Lights Out Manager (ILOM) Administration Guide for ILOM 1.1.1 • May 2007
The following display shows an example of the login screen:
-> cd /CH/BL2/SP/cli
/CH/BL2/SP/cli
-> start
Are you sure you want to start /CH/BL2/SP/cli (y/n)? y
Password: Type the password to the server module ILOM.
Version N.N
-> exit Type this command to exit the server module ILOM
and return to the CMM ILOM.
Connection to 10.6.122.33 closed.
1. Log in to the ILOM CLI using any of the methods described in Section 2.1,
“Connecting to the ILOM” on page 2-1.
To use the Ethernet ssh connection, you must already know the IP address.
If these conditions are present, when the ILOM is powered on or reset, DHCP
automatically assigns it an IP address.
Note – Some DHCP servers allow you to specify the IP address that it will assign to
the ILOM. In this case, the ILOM still must be configured for a “dynamic” IP
address, even though DHCP’s choice of addresses is “static.”
You can obtain the ILOM MAC address in one of the following ways:
■ Start the ILOM CLI and enter the command show /SP/network. The ILOM
displays its MAC address.
2-8 Integrated Lights Out Manager (ILOM) Administration Guide for ILOM 1.1.1 • May 2007
■ For rack-mounted servers, there is a label attached to the GRASP board. Open the
cover of the server to view this label.
■ Check the Customer Information Sheet shipped with your server.
■ The system BIOS setup screen. Choose Advanced - IPMI 2.0 Configuration - Set
LAN Configuration - MAC address.
Typically, DHCP log file entries are individual lines with the following comma-
separated fields:
Locate the MAC address of your ILOM in the MAC Address (seventh) field of the
correct DHCP file entry, and record the corresponding value of the IP address (fifth)
field. This is the IP address that you must use to access the WebGUI and the remote
console.
2. If you are going to use DHCP, verify that your DHCP server is configured to
accept new MAC addresses.
b. Watch the boot messages. You will see a line that says you can press F2 to
enter BIOS setup.
Caution – You must use Commit to save the changes on this page. Using F10 will
not save your changes.
1. Connect to the ILOM CLI using one of the methods described in Section 2.1,
“Connecting to the ILOM” on page 2-1.
2-10 Integrated Lights Out Manager (ILOM) Administration Guide for ILOM 1.1.1 • May 2007
set commitpending=true
where xxx.xxx.xx.xx, yyy.yyy.yyy.y and zzz.zzz.zz.zzz are the IP address,
netmask, and gateway for your ILOM and network configuration.
■ To configure a dynamic IP address, type:
set pendingipdiscovery=dhcp
set commitpending=true
If you configure the ILOM to use DHCP, your installation must meet the
conditions described in Section 2.2.2, “Using DHCP to Assign an IP Address” on
page 2-8.
3. Choose the Configuration tab and its Network tab to display information
about the current ILOM network configuration. See FIGURE 2-1.
ii. Enter the IP address, subnet mask, and gateway IP address in the
corresponding fields.
See FIGURE 2-1.
2-12 Integrated Lights Out Manager (ILOM) Administration Guide for ILOM 1.1.1 • May 2007
CHAPTER 3
This chapter describes how to use the ILOM’s command-line interface (CLI). The
sections include:
■ Section 3.1, “Using CLI Commands” on page 3-1
■ Section 3.2, “Command Syntax” on page 3-4
To connect to the CLI, see Section 2.1, “Connecting to the ILOM” on page 2-1
The ILOM includes two namespaces: the /SP namespace and the /SYS namespace.
■ The /SP namespace manages the ILOM. For example, you use this space to
manage users, clock settings, and other ILOM issues. FIGURE 3-1 shows the /SP
namespace.
■ The /SYS namespace manages the host system. For example, you can change the
host state, read sensor information, and access other information for managed
system hardware. Your /SYS namespace diagram is determined by the managed
hardware devices in your server.
3-1
You can view your /SYS namespace by typing the show /SYS command from the
command line. FIGURE 3-1 shows the /SP namespace. The /SYS namespace is unique
to each platform.
Note – The default user, root, has administrator privileges. To create a user account
with operator privileges, see Chapter 5.
3-2 Integrated Lights Out Manager (ILOM) Administration Guide for ILOM 1.1.1 • May 2007
3.1.3.1 Command Verbs
The CLI supports the following command verbs.
Command Description
3-4 Integrated Lights Out Manager (ILOM) Administration Guide for ILOM 1.1.1 • May 2007
2. To combine commands, use the form verb path/target=value.
For example:
set /SP/services/http port=80
The following display shows both methods:
->
One of the most powerful features of ILOM is the ability to redirect the server's
graphical console to a remote workstation or laptop system. When you redirect the
host console, you can configure the remote system's keyboard and mouse to act as
the server's mouse and keyboard. You can also configure the diskette drive or CD-
ROM drive on the remote system as a device virtually connected to the Sun server.
You can also redirect diskette images (.img) and CD-ROM images (.iso) for remote
access.
4-1
4.1.1 Browser and Software Requirements
The WebGUI has been tested successfully with recently released Mozilla™, Firefox,
and Internet Explorer web browsers, and may be compatible with other web
browsers.
The ILOM product comes preinstalled on the Sun server. However, you need Java™
software on the client to perform redirection, as described in Chapter 10.
ILOM user accounts include a role that defines what you can do. The roles are:
■ Administrator – Enables access to all ILOM features, functions, and commands.
■ Operator – Enables limited access to ILOM features, functions, and commands.
Operators cannot changed their assigned roles or privileges.
For more information on users, including how to manage user accounts using the
WebGUI, see Chapter 5.
4-2 Integrated Lights Out Manager (ILOM) Administration Guide for ILOM 1.1.1 • May 2007
4.1.4 WebGUI Features
FIGURE 4-1 shows a WebGUI page.
Masthead
Navigation Bar
Content
Each WebGUI page has three main sections: the masthead, the navigation bar, and
the content area.
The masthead provides the following buttons and fields on all pages of the WebGUI:
■ Refresh button – Click to refresh the information in the content area of the page.
The Refresh button does not save new data that you may have entered or selected
on the page. Use the Save button that is provided in the content area for a specific
WebGUI page.
Note – Do not use the Refresh button from your web browser when you are using
the WebGUI.
■ Log Out button – Click to end the current session of the WebGUI. You are directed
to the logout screen.
■ About button – Click to view copyright information.
■ User field – Displays the user name of the current user of the WebGUI.
■ Server field – Displays the name of the ILOM.
The navigation bar provides tabs that you can click to open a specific WebGUI page.
When you click a main tab, subcategories of tabs are displayed, providing you with
further options to choose. Select the tabs to open the appropriate WebGUI pages.
Note – The ILOM boots automatically when a Sun server is cabled appropriately
and plugged in to an AC supply, or when a server module is inserted into a powered
chassis. This usually happens within one minute. However, if the management
Ethernet is not connected or if the ILOM's Dynamic Host Configuration Protocol
(DHCP) process fails due to the absence of a DHCP server on the management
network, the ILOM might take a few minutes to boot.
Disabling the use of the browser proxy server (if one is used) for access to the
management network might make the WebGUI response time faster.
Note – Do not use the Refresh or Log Out buttons in your Internet web browser
when using the WebGUI. Instead, use only the Refresh and Log Out buttons
provided at the top right of the WebGUI window.
You need the IP address of the ILOM. For information on viewing and setting the IP
address, see Section 2.2, “Configuring the ILOM IP Address” on page 2-7.
1. To log in to the WebGUI, type the IP address of the ILOM into your web
browser.
The Login screen appears.
4-4 Integrated Lights Out Manager (ILOM) Administration Guide for ILOM 1.1.1 • May 2007
FIGURE 4-2 WebGUI Login Screen
4. To log out of the WebGUI, click Log Out at the top right of the WebGUI.
You are logged out and the Login screen appears.
Note – Do not use the Log Out button in your web browser to log out from the
WebGUI.
4-6 Integrated Lights Out Manager (ILOM) Administration Guide for ILOM 1.1.1 • May 2007
CHAPTER 5
This chapter describes how to manage user accounts using the CLI and the WebGUI.
It includes the following sections:
■ Section 5.1, “User Accounts Overview” on page 5-1
■ Section 5.2, “Managing User Accounts Using the CLI” on page 5-2
■ Section 5.3, “Managing User Accounts Using the WebGUI” on page 5-4
Caution – The ILOM includes a user account called sunservice, which shares the
ILOM root password. Normally, it is used exclusively by Sun Service personnel;
however, it can also be used to perform recovery procedures documented in the
product notes. Incorrect use of this account can corrupt the service processor image
or operations.
5-1
■ Add or remove users
■ Change network settings (view only)
■ Change Network Time Protocol (NTP) settings (view only)
■ Change SNMP settings (view only)
■ Change HTTP settings (view only)
Only accounts with administrator privileges are allowed to add, modify, or delete
user accounts. However, operators can modify their own password.
delete /SP/users/username
show /SP/users
5-2 Integrated Lights Out Manager (ILOM) Administration Guide for ILOM 1.1.1 • May 2007
5.2.4 Configuring User Accounts
Use the set command to change passwords and roles for configured user accounts.
5.2.4.1 Syntax
set target [propertyname=value]
TABLE 5-1 Valid Targets, Properties, and Values for Local User Accounts
Examples
When changing the role for user1 from administrator to operator type:
Note – The ILOM supports a maximum of nine user accounts. If all nine user
account slots are configured, you must delete an existing user account before you
can add a new user account. See Section 5.3.3, “Deleting User Accounts” on page 5-9.
5-4 Integrated Lights Out Manager (ILOM) Administration Guide for ILOM 1.1.1 • May 2007
FIGURE 5-1 User Accounts Page
3. Click Add.
The Add User dialog box appears.
e. When you are done entering the new user’s information, click Add.
The User Accounts page is redisplayed. The new user account and associated
information is listed on the User Accounts page.
5-6 Integrated Lights Out Manager (ILOM) Administration Guide for ILOM 1.1.1 • May 2007
5.3.2 Modifying User Accounts
This section describes how to modify an ILOM user account. Modifying a user
account can change the user’s password, and their network and serial privileges.
Note – Normally, only accounts with administrator privileges are allowed to add,
modify, or delete user accounts. However, operators can modify their own
password.
4. Click Edit.
The Edit User dialog box appears.
a. Select the Change check box if you want to change the user password. If
you do not want to change the password, deselect the check box.
7. After you have modified the account information, click Save for your changes
to take effect, or click Close to return to the previous settings.
The User Accounts page is redisplayed.
5-8 Integrated Lights Out Manager (ILOM) Administration Guide for ILOM 1.1.1 • May 2007
5.3.3 Deleting User Accounts
This section describes how to delete a user account.
3. Select the radio button next to the user account you want to delete.
You cannot delete the root account.
4. Click Delete.
The user accounts page appears with the user deleted.
This chapter describes how to use the ILOM’s Command-Line Interface (CLI). The
sections include:
■ Section 6.1, “Configuring the Serial Port” on page 6-1
■ Section 6.2, “Configuring ILOM Network Settings” on page 6-3
■ Section 6.3, “Setting the ILOM Clock” on page 6-5
■ Section 6.4, “Resetting the ILOM” on page 6-7
■ Section 6.5, “Resetting the ILOM and BIOS Passwords” on page 6-7
■ Section 6.6, “Updating the ILOM Firmware” on page 6-7
■ Section 6.7, “Enabling HTTP or HTTPS Web Access” on page 6-8
■ Section 6.8, “Viewing ssh Settings” on page 6-10
■ Section 6.9, “Displaying ILOM Information” on page 6-11
show /SP/serial/external
6-1
Type the following command to display settings for the host serial port:
show /SP/serial/host
6.1.2.1 Syntax
set target [propertyname=value]
TABLE 6-1 Valid Targets, Properties, and Values for ILOM Serial Ports
Example
To change the speed (baud rate) for the host serial port from 9600 to 57600, type:
6-2 Integrated Lights Out Manager (ILOM) Administration Guide for ILOM 1.1.1 • May 2007
Note – The speed of the host serial port must match the speed setting for serial port
0, COM1, or /dev/ttys0 on the host operating system for the ILOM to
communicate properly with the host.
show /SP/network
Network settings have two sets of properties: pending and active. The active settings
are the settings currently in use by the ILOM. These settings are read-only. If you
want to change settings, enter the updated settings as the pending settings
(pendingipaddress or pendingipgateway), then set the commitpending
property to true. This prevents accidental disconnections for both port and network
settings.
Note – Ensure that the same IP address is always assigned to an ILOM by either
assigning a static IP address to your ILOM after initial setup, or configuring your
DHCP server to always assign the same IP address to an ILOM. This enables the
ILOM to be easily located on the network.
6.2.2.1 Syntax
set target [propertyname=value]
Examples
To change the IP address for the ILOM, type:
Note – Changing the IP address disconnects your active session if you are
connected to the ILOM via a network.
To change the network settings from DHCP to static assigned settings, type:
6-4 Integrated Lights Out Manager (ILOM) Administration Guide for ILOM 1.1.1 • May 2007
6.3 Setting the ILOM Clock
You can display clock settings or configure your clock to synchronize with one or
two Network Time Protocol (NTP) servers. If you do not configure an NTP server,
the time is set by the system BIOS.
show /SP/clock
6.3.2.1 Syntax
set target [propertyname=value]
TABLE 6-3 Valid Targets, Properties, and Values for NTP Servers
Example
To configure your clock to synchronize with an NTP server, type:
Note – Once you enable the NTP service, it can take up to five minutes for the clock
to synchronize.
Note – Log event timestamps might appear different between host and client
systems because of time zone adjustment.
The timestamps on events reported in the server's system event log and IPMI logs
are always based on GMT/UTC. However, when you view system information from
a client system using the GUI or IPMItool, the timestamps displayed are adjusted
based on the time zone of the client system. Therefore, the same event can appear to
have two different timestamps when viewed directly from the host and from a client
system in a different time zone.
6-6 Integrated Lights Out Manager (ILOM) Administration Guide for ILOM 1.1.1 • May 2007
■ Continuously through NTP if NTP is enabled on the ILOM – NTP jumping is
enabled, to recover quickly from an erroneous update from the BIOS or user. NTP
servers provide UTC time. Therefore, if NTP is enabled on the ILOM, the ILOM
clock is in UTC.
■ Through the CLI, WebGUI, and IPMI
This procedure requires changing a hardware jumper in your server enclosure. See
your service manual for details.
Caution – Ensure that you have reliable power before upgrading your firmware. If
power to the system fails (for example, if the wall socket power fails or the system is
unplugged) during the firmware update procedure, the ILOM could be left in an
unbootable state.
Note – The upgrade takes about five minutes. During this time, no other tasks can
be performed in the ILOM.
Note – A network failure during the file upload results in a time-out. This causes
the ILOM to reboot with the prior version of the ILOM firmware.
Example:
6-8 Integrated Lights Out Manager (ILOM) Administration Guide for ILOM 1.1.1 • May 2007
Use the set command to change properties and values as follows:
TABLE 6-5 Valid Targets, Properties, and Values for HTTP and HTTPS
TABLE 6-6 shows the valid targets and properties for ssh values.
Target Property
/SP/services/ssh/keys/dsa fingerprint
length
publickey
/SP/services/ssh/keys/rsa fingerprint
length
publickey
6-10 Integrated Lights Out Manager (ILOM) Administration Guide for ILOM 1.1.1 • May 2007
Use the show command to enter dsa or rsa values.
Example:
/SP/services/ssh/keys/dsa
Targets:
Properties:
fingerprint =
f7:49:85:b0:e3:65:c0:d0:96:48:06:f5:8c:b7:9c:6b
length = 1024
publickey =
AAAAB3NzaC1kc3MAAACBAKh+LPnkehPiIou96JraqiZ7qjJ4KTc4DdNJ3ZkBZ94X
Krz2B5BNROCL7h4Gb7uAaMZEgtpPqefKy5awEvkA8jNyL5P=
Commands:
cd
show
->
version
For example:
-> version
SP firmware 1.1.1
SP firmware build number: r14021
SP firmware date: Fri Oct 13 21:18:44 PDT 2006
SP filesystem version: 0.1.14
->
help targets
6-12 Integrated Lights Out Manager (ILOM) Administration Guide for ILOM 1.1.1 • May 2007
CHAPTER 7
This chapter describes how to use the WebGUI to perform monitoring and
maintenance.
The serial port provides access to the WebGUI, the command-line interface (CLI),
and the system console stream using serial port redirection.
7-1
■ The internal serial port is the connection between the host server and the ILOM
that allows an ILOM user to access the host serial console. The ILOM internal
serial port speed must match the speed of the serial console port on the host
server, often referred to as serial port 0, COM1, or /dev/ttyS0.
Note – Normally, the console matches the ILOM’s default settings (9600 baud, 8N1
[eight data bits, no parity, one stop bit], no flow control).
■ The external serial port is the RJ-45 serial port on the ILOM. Typically the internal
and external serial port connections should run at the same speed to avoid flow
control issues when connecting to the host console from the ILOM external serial
port.
7-2 Integrated Lights Out Manager (ILOM) Administration Guide for ILOM 1.1.1 • May 2007
FIGURE 7-1 Serial Port Settings Page
3. Select the baud rate for the internal serial port from the Internal Serial Port
drop-down menu.
This setting must match the setting for serial port 0, COM1 or /dev/ttyS0 on the
host operating system.
The baud rate value must match the speed that was specified for the BIOS serial
redirection feature (default is 9600 baud) and the speed used for the boot loader
and operating system configuration.
To connect to the system console using the ILOM, the ILOM must be set to its
default settings (9600 baud, 8N1 [eight data bits, no parity, one stop bit], no flow
control).
4. Select the baud rate for the external serial port from the External Serial Port
drop-down menu.
This setting must match the baud rate on the RJ-45 serial port on the Sun server.
5. Click Save for your changes to take effect, or click Cancel to return to the
previous settings.
7-4 Integrated Lights Out Manager (ILOM) Administration Guide for ILOM 1.1.1 • May 2007
FIGURE 7-2 Network Settings Page
Item Description
MAC Address The ILOM’s MAC address is set at the factory. The MAC address is a
hardware address that is unique to each networked device. The
ILOM’s MAC address is provided on a label on the ILOM, on the
Customer Information Sheet included on the ship kit, and in the BIOS
Setup screen.
Configuration Select one of the following radio buttons to configure the ILOM’s IP
Method address either dynamically or statically.
• Obtain an IP Address Automatically (Use DHCP) – Enables a
DHCP server to configure the ILOM’s IP address dynamically.
• Use the Following IP Address – Enables you to configure the
ILOM’s IP address with a static IP. The IP Address, Subnet Mask,
and Default Gateway fields will become editable when you select
this option.
IP Address Type the ILOM’s IP address. The IP address is a unique name that
identifies the system on a TCP/IP network.
Subnet Mask Type the subnet mask of the network on which the ILOM resides.
Default Gateway Type the ILOM’s gateway access address.
Note – If you changed the network settings, you must log back in with a new
browser session.
The ILOM clock is described in Section 7.3.3, “Interpreting ILOM Clock Settings” on
page 7-7.
Before you begin, obtain IP addresses of the NTP servers you want to use.
7-6 Integrated Lights Out Manager (ILOM) Administration Guide for ILOM 1.1.1 • May 2007
FIGURE 7-3 Clock Settings Page
3. Select the Enable check box next to Synchronize Time Using NTP.
Note – Log event timestamps might appear different between host and client
systems because of time zone adjustment.
The timestamps on events reported in the server's system event log and IPMI logs
are always based on GMT/UTC. However, when you view system information from
a client system using the GUI or IPMItool, the timestamps displayed are adjusted
based on the time zone of the client system. Therefore, the same event can appear to
have two different timestamps when viewed directly from the host and from a client
system in a different time zone.
7-8 Integrated Lights Out Manager (ILOM) Administration Guide for ILOM 1.1.1 • May 2007
7.4 Resetting the ILOM
1. Log in to the ILOM as administrator or operator.
This procedure requires changing a hardware jumper in your server enclosure. See
your service manual for details.
Caution – Ensure that you have reliable power before upgrading your firmware. If
power to the system fails (for example, if the wall socket power fails or the system is
unplugged) during the firmware update procedure, the ILOM could be left in an
unbootable state.
Caution – Shut down your host operating system before proceeding. Otherwise the
ILOM will shut the host down ungracefully, which could cause file system
corruption.
Note – The upgrade takes about five minutes to complete. During this time, no
other tasks can be performed in the ILOM.
To observe the status of the upgrade while it’s happening, set the session timeout to
3 hours. See Section 7.9, “Setting the ILOM Session Timeout Period” on page 7-16 for
details.
2. Ensure that you can access the new flash image on the client machine that you
are using to update the ILOM.
7-10 Integrated Lights Out Manager (ILOM) Administration Guide for ILOM 1.1.1 • May 2007
Caution – Do not close the WebGUI using the Log Out button in the web browser
when the ILOM is in Upgrade mode. If you must close the WebGUI, use the
WebGUI’s Cancel button.
7. Type the path to the new ILOM flash image file in the Select Image File to
Upload field, or click Browse to locate and select the firmware update file
(*.ima).
8. Click Upload.
The Upgrade wizard copies the selected file into the ILOM's DRAM, and then
verifies that the copy procedure was successful. This takes about one minute with
a fast network connection.
The system displays a confirmation dialog box.
Note – A network failure during the file upload will result in a time out and the
ILOM will reboot with the prior version of the ILOM firmware.
9. Click OK.
The Verify Firmware Image page appears.
10. Select Preserve Configuration to keep your ILOM settings. Otherwise, they
will be overwritten.
■ Upgradable Modules – Select Service Processor Firmware to upgrade the
firmware image and BIOS.
■ Preserve Configuration – Select this to retain your original configuration settings.
Deselect it to overwrite them.
7-12 Integrated Lights Out Manager (ILOM) Administration Guide for ILOM 1.1.1 • May 2007
11. Click Start Upgrade, or click Cancel to stop the upgrade.
Note – If you choose to cancel the firmware upgrade operation, the ILOM will
reboot without the updated software. You must close the web browser and log back
in to the WebGUI before you can perform any other type of operation.
If you clicked Start Update, a progress screen indicates that the firmware image is
being upgraded. Once the upgrade progress reaches 100%, the firmware upgrade
is complete.
After the upgrade operation has completed successfully, the ILOM will
automatically reboot. This is done so that the image upgrade can take effect.
A screen prompt might ask you to repeat the upgrade. This is not due to any
problem. If this happens, repeat the procedure, starting at Step 1.
Note – You cannot perform any other operation within your current web browser
session.
Note – If the configuration is not preserved, enter BIOS setup and save the optimal
default settings.
ILOM provides the option to control access to the web interface. There are four
choices:
■ HTTP only
■ HTTPS only
■ HTTP and HTTPS
■ HTTPS and HTTP automatically redirected to HTTPS
Note – If you disable HTTP or select Redirect HTTP Connection to HTTPs, and then
disable HTTPS, you will be unable to access the WebGUI. To restore access, use the
CLI /SP/services/http or https commands, as described in Section 6.7, “Enabling
HTTP or HTTPS Web Access” on page 6-8.
7-14 Integrated Lights Out Manager (ILOM) Administration Guide for ILOM 1.1.1 • May 2007
7.8 Uploading a New SSL Certificate
This section describes how to upload a Secure Sockets Layer (SSL) certificate and
SSL private key to use when accessing the ILOM.
To establish a secure HTTPS connection to the ILOM, you must upload an SSL
certificate and a private key into the ILOM. These two together help provide a secure
connection to the correct server when using HTTPS. Ensure that the uploaded SSL
certificate and private key match. If they do not match, secure access may not work
properly.
3. Type the file name of the new SSL certificate, or click Browse to search for a
new SSL certificate.
The file name has a .pem file extension. The ILOM does not support pass-phrase
encrypted certificates.
7-16 Integrated Lights Out Manager (ILOM) Administration Guide for ILOM 1.1.1 • May 2007
FIGURE 7-10 Session Time-Out Page
3. From the Session Time-Out drop-down list, select the amount of time for the
session time-out period.
4. Click Apply.
A confirmation dialog box appears.
5. Click OK.
The session timeout period is set to the selected amount of time. If you exceed
the amount of time set for your session, you are automatically logged out of the
WebGUI.
7-18 Integrated Lights Out Manager (ILOM) Administration Guide for ILOM 1.1.1 • May 2007
CHAPTER 8
This chapter describes how to use the ILOM’s command-line interface (CLI) to
manage the host. The sections include:
■ Section 8.1, “Controlling Power to the Host Server” on page 8-1
■ Section 8.2, “Starting and Stopping the Host Console” on page 8-2
■ Section 8.3, “Viewing System Components, Indicators, and Sensors” on page 8-2
■ Section 8.4, “Setting the Locate LED” on page 8-6
■ Section 8.5, “Managing ILOM Alerts” on page 8-6
■ Section 8.6, “Viewing and Clearing Event Logs” on page 8-9
Note – Entering reset /SYS does not affect the power state of the host.
8-1
8.2 Starting and Stopping the Host Console
■ Type the start command to start a session to the server console:
start /SP/console
■ Type the stop command to terminate a server console session started by another
user:
stop /SP/console
Note – Before connecting to the console, the ILOM must be set to its default settings
(9600 baud, 8N1 [eight data bits, no parity, one stop bit], no flow control).
Note – When displayed on the WebGUI, the components, indicators, and sensors
are divided into separate screens. They are described in:
Section 9.2, “Viewing Replaceable Component Information” on page 9-2
Section 9.3, “Viewing Sensors” on page 9-5
Section 9.4, “Viewing Indicator LEDs and Controlling the Locate LED” on page 9-8.
8-2 Integrated Lights Out Manager (ILOM) Administration Guide for ILOM 1.1.1 • May 2007
Note – The displays in this section are examples. For exact sensor information, see
your platform supplement.
/SYS
Targets:
INTSW
BIOS
SP
REAR_SVC
TOP_SVC
TEMP_FAULT
POWER
LOCATE
SERVICE
V_+12V
V_+1V2
V_+3V3
V_+3V3STBY
V_+5V
FP
BP
FT0
FT1
FT2
FT3
PROC
IO
PS0
PS1
PS2
HD
Properties
(additional information appears here)
->
/SYS/SASBP
Targets:
ID0
ID1
T_AMB
HDD0
HDD1
HDD2
HDD3
Properties:
type = Disk Backplane
Commands:
cd
show
->
8-4 Integrated Lights Out Manager (ILOM) Administration Guide for ILOM 1.1.1 • May 2007
The following display shows a device (HDD0) and a temperature sensor (T_AMB).
/SYS/HD/HDD0
Targets:
STATE
FAIL
OK2RM
Properties:
type = Hard Disk FRU
product_name = (none)
product_manufacturer = HITACHI
product_version = V44OA94A
product_part_number = HDS7225SBSUN250G
product_serial_number = VDK41DT4EG9GNK
Commands:
cd
show
/SYS/HD/T_AMB
Targets:
Properties:
type = Temperature
class = Threshold Sensor
value = 25.000 degree C
upper_nonrecov_threshold = 43.00 degree C
upper_critical_threshold = 38.00 degree C
upper_noncritical_threshold = 33.00 degree C
lower_nonrecov_threshold = 0.00 degree C
lower_critical_threshold = 0.00 degree C
lower_noncritical_threshold = 0.00 degree C
Commands:
cd
show
->
The alert management view allows you to configure the system to send alerts to IP
addresses.
Caution – The ILOM tags all events or actions with LocalTime=GMT (or UDT).
Browser clients show these events in LocalTime. This can cause apparent
discrepancies in the event log. When an event occurs on the ILOM, the event log
shows it in UDT, but a client would show it in local time.
An alert is an IPMI Platform Event Trap (PET) generated when a sensor crosses the
specified threshold. For example, if you configure an alert for critical thresholds, the
ILOM sends an IPMI trap to the specified destination when any sensor crosses the
upper or lower critical (CT) threshold.
All alerts are IPMI PET traps, as defined in the Intelligent Platform Management
Interface (IPMI) v2.0.
A special criteria, informational, is reserved for system events that are not related to
sensors.
8-6 Integrated Lights Out Manager (ILOM) Administration Guide for ILOM 1.1.1 • May 2007
The mapping between alert levels and sensors is:
Alert Sensor
8.5.2.1 Syntax
set target [propertyname=value]
TABLE 8-2 Valid Targets, Properties, and Values for IPMI Pet Alerts
Name in Sensor
Alert Levels Readings View Description
informational N/A This level traps system events that are not related
to sensors, such as “The host has booted.”
warning NC The sensor is outside of its normal range but not
critical.
critical CT The sensor has crossed a critical threshold.
non-recoverable NR The sensor has reached a threshold beyond the
tolerance level of the corresponding component(s).
disable N/A Don’t send alerts at this level.
Examples
To configure an alert, type:
1. Navigate to /SP/alert/rules
8-8 Integrated Lights Out Manager (ILOM) Administration Guide for ILOM 1.1.1 • May 2007
8.6 Viewing and Clearing Event Logs
This section describes how to view and clear the system event log (SEL).
1. Navigate to /SP/logs/event.
-> cd /SP/logs/event
/SP/logs/event
/SP/logs/event/list
Targets:
Properties:
Commands:
show
->
Note – The SEL accumulates many types of events, including copies of entries that
IPMI posts to the IPMI log. Clearing the SEL clears all entries, including the copies
of the IPMI log entries. However, clearing the SEL does NOT clear the actual IPMI
log. You must use IPMI commands to view and clear the IPMI log.
1. Navigate to /SP/clients/syslog.
8-10 Integrated Lights Out Manager (ILOM) Administration Guide for ILOM 1.1.1 • May 2007
2. Enter the IP address of the receiving machine:
-> cd syslog
/SP/clients/syslog
-> show
/SP/clients/syslog
Targets:
Properties:
destination_ip1 = (none)
destination_ip2 = (none)
Commands:
cd
set
show
This chapter describes how to view the state of the host, and how to manage it using
the WebGUI.
9-1
FIGURE 9-1 Server Power Control Page
3. To change the power status of the server, select an action from the drop-down
list.
■ Reset – Select to reboot the server immediately.
■ Immediate Power Off – Select to power off the server.
■ Graceful Shutdown and Power Off – Select to gracefully shut down the system
operating system before the system is powered off.
■ Power On – Select to power on the server.
■ Power Cycle – Select to power off the server, wait, and then power on the server
again.
Some components are hot-swappable, meaning that you can remove them from the
system without warning or preparation.
9-2 Integrated Lights Out Manager (ILOM) Administration Guide for ILOM 1.1.1 • May 2007
Other components are hot-pluggable, meaning that they can be removed while the
system is running, but the system must be prepared first.
Some hot-pluggable components can be prepared for removal using the Components
Management page. Those components display a radio button in the left-hand
column of the Component Management page (FIGURE 9-2).
Still other components require the system to be shut down before they can be
removed.
Note – The data shown in FIGURE 9-2 and FIGURE 9-3 are examples only. The actual
data you see might be different on your platform. For details, see your platform
supplement.
9-4 Integrated Lights Out Manager (ILOM) Administration Guide for ILOM 1.1.1 • May 2007
FIGURE 9-3 Sample Component Details View
The system prepares the component for removal, then displays its status in the
Ready to Remove Status column.
For a detailed list of components, see your platform supplement.
The thresholds appear in the Sensor Readings view shown in FIGURE 9-4.
Caution – The ILOM tags all events or actions with LocalTime=GMT (or UDT).
Browser clients show these events in LocalTime. This can cause apparent
discrepancies in the event log. When an event occurs on the ILOM, the event log
shows it in UDT, but a client would show it as local time.
Note – The sensor displays in this section are examples. The sensor names, ranges,
and functions might be different on your system. For details, see your platform
supplement.
Note – If the server is powered off, many components will appear as “no reading.”
To power it on, see Section 9.1, “Controlling Power to the Host Server” on page 9-1.
9-6 Integrated Lights Out Manager (ILOM) Administration Guide for ILOM 1.1.1 • May 2007
FIGURE 9-4 Sample Sensor Readings Page
3. Scroll down the list to find the sensor you wish to view.
Note – The sensors shown in FIGURE 9-4 and FIGURE 9-5 are examples only. The
actual sensor names, ranges, and functions might be different on your platform. For
details, see your platform supplement.
9-8 Integrated Lights Out Manager (ILOM) Administration Guide for ILOM 1.1.1 • May 2007
FIGURE 9-6 Sample Indicators Page
Note – The sensors shown in FIGURE 9-6 are examples only. The actual sensor names,
ranges, and functions might be different on your platform. For details, see your
platform supplement.
c. Click OK.
The locate LED changes states, and the new state appears in the Status
column.
The alert management view allows you to map alert levels to destinations (IP
addresses). For example, you can configure it so that all critical alerts are sent to one
destination and all non-recoverable alerts are sent to another.
An alert is generated when a sensor crosses the specified threshold. For example, if
you configure an alert for critical thresholds, the ILOM sends an IPMI trap to the
specified destination when any sensor crosses the upper or lower critical (CT)
threshold. A special criteria, informational, is reserved for system events that are not
related to sensors.
Alert Sensor
All alerts are IPMI PET traps, as defined in the Intelligent Platform Management
Interface (IPMI) v2.0. A special criteria, informational, is reserved for system events
that are not related to sensors.
Each line in the alert management view is called a “rule”. Each rule identifies an
alert level and sends all alerts at that level to the specified IP address.
Note – Because there are four alert levels and 15 alert rules, you can configure the
system to send the same level of alert to multiple destinations.
9-10 Integrated Lights Out Manager (ILOM) Administration Guide for ILOM 1.1.1 • May 2007
1. Log in to the ILOM as administrator or operator
Name in Sensor
Alert Levels Readings View Description
Informational N/A This level traps system events that are not related
to sensors, such as “The host has booted.”
Warning NC The sensor is outside of its normal range, but not
critical.
Name in Sensor
Alert Levels Readings View Description
■ Alert Type – ipmipet, indicating that all alerts are sent as IPMI PET traps.
9-12 Integrated Lights Out Manager (ILOM) Administration Guide for ILOM 1.1.1 • May 2007
5. Click Save.
The modified alert appears in the Alert Destinations table.
The system event log accumulates various events, including administration changes
to the ILOM, software events, and warnings and alerts. It also accumulates events
from the IPMI log.
Caution – The ILOM tags all events or actions with LocalTime=GMT (or UDT).
Browser clients show these events in LocalTime. This can cause apparent
discrepancies in the event log. When an event occurs on the ILOM, the event log
shows it in UDT, but a client would show it as local time.
3. Use the Display drop-down menu to determine how many events to display.
Selecting a larger number might cause the WebGUI to respond more slowly.
The WebGUI displays the most recent events first. To see later events, select a
larger number.
9-14 Integrated Lights Out Manager (ILOM) Administration Guide for ILOM 1.1.1 • May 2007
The fields in the Event Log table are described in TABLE 9-3.
Field Description
Note – The SEL accumulates many types of events, including copies of entries that
IPMI posts the IPMI log. Clearing the SEL clears all entries, including the copies of
the IPMI log entries. However, clearing the SEL does NOT clear the actual IPMI log.
You must use IPMI commands to view and clear the IPMI log.
Note – Log event timestamps might appear different between host and client
systems because of time zone adjustment.
The timestamps on events reported in the server's system event log and IPMI logs
are always based on GMT/UTC. However, when you view system information from
a client system using the GUI or IPMItool, the timestamps displayed are adjusted
based on the time zone of the client system. Therefore, the same event can appear to
have two different timestamps when viewed directly from the host and from a client
system in a different time zone.
To set the ILOM clock, see Section 6.3, “Setting the ILOM Clock” on page 6-5.
9-16 Integrated Lights Out Manager (ILOM) Administration Guide for ILOM 1.1.1 • May 2007
9.7 Viewing ILOM Hardware, Firmware,
and IPMI Versions
This section describes how to view the ILOM hardware and firmware revisions, as
well as the Intelligent Platform Management Interface (IPMI) version.
10-1
10.1.1 Installation Requirements
You do not need to install software on the host system (server). The ILOM ships with
the remote console application installed.
A compatible web browser and JRE 1.5 are required to operate the remote console
application. See TABLE 10-1.
You do not need to install any OS-specific drivers or helper applications on client
systems to run the remote console application.
Microsoft Windows XP Pro JRE 1.5 (Java 5.0) Internet Explorer 6.0 and
later
Mozilla 1.7.5 or later
Mozilla Firefox 1.0
Red Hat Linux 3.0 and 4.0 Desktop JRE 1.5 (Java 5.0) Mozilla 1.7.5 or later
and Workstation Editions Mozilla Firefox 1.0
10-2 Integrated Lights Out Manager (ILOM) Administration Guide for ILOM 1.1.1 • May 2007
TABLE 10-2 Remote Console Ports and Interfaces (Continued)
Note – If the ILOM is configured to use HTTP, it uses TCP port 80.
TABLE 10-3 Remote Console Operation With DVD Drive and Diskette Drive
1 Remote console application not DVD device present. No medium Diskette device present. No
started, or Remote Console indication is sent to the host from medium indication is sent to the
started but DVD/diskette the ILOM whenever the hosts host from the ILOM whenever
redirection not started asks. the host asks.
2 Remote console application DVD device present. Whenever Diskette device present.
started with no medium present the host asks, which may be Whenever the host asks (for
in the drive automatic or when you access the example, you double-click on a
device on the host, the remote drive), the remote client sends a
client sends a status message. In status message. In this case since
this case, since there is no there is no medium, the status is
medium, the status is no no medium.
medium.
3 Remote console application DVD device present. Whenever Diskette device present.
started with no medium, then the hosts asks (automatic or Whenever the host asks
medium is inserted manual), the remote client sends (manual), the remote client sends
a status message as medium a status message as medium
present and also indicates the present and also indicates the
medium change. medium change.
4 Remote console application Same as 3. Same as 3.
started with medium inserted
5 Remote console application Next command from the host Next command from the host
started with medium present, will get a status message will get a status message
then medium is removed indicating medium not present. indicating medium not present.
6 Remote console application Same as 3. Same as 3.
started with image redirection
7 Remote console application Driver knows DVD redirection Driver knows DVD redirection
started with image, but stopped, so it sends a medium stopped so it sends a medium
redirection is stopped (which is absent status on the next host absent status on the next diskette
the only way to stop ISO query. query.
redirection)
8 Network failure The software has a keepalive The software has a keepalive
mechanism. The software will mechanism. The software will
detect keep-alive failure since detect unresponsive client and
there is no communication and close the socket, as well as
will close the socket, assuming indicate to the driver that the
the client is unresponsive. Driver remote connection went away.
will send a no medium status to Driver will send a no medium
the host. status to the host.
9 Client crashes Same as 8. Same as 8.
10-4 Integrated Lights Out Manager (ILOM) Administration Guide for ILOM 1.1.1 • May 2007
10.1.3 Remote Console Security
Only users with administrator privilege can use the remote console application.
■ When users with operator privilege select Remote Console => Redirection, a login
window prompts them for a user name and password. They must enter the user
name and password for an account with administrator privilege to proceed.
■ Normally, when users with administrator privilege click Remote Console =>
Redirection, the Launch Redirection page appears.
However, this can be configured. If /SP/services/sso is set to disabled, even
users with administrator privilege are prompted to login again. They can log in
using the same user name and password, or a different user name and password,
as long as it accesses a valid user account with administrator privilege.
2. Navigate to /SP/services.
3. If a login screen appears, enter the user name and password of an account that
has administrator privileges. See Section 10.1.3, “Remote Console Security” on
page 10-5 for details.
Caution – Do not change the mouse mode unless it is necessary, as it causes the
ILOM to reset itself.
b. Check to see if the mouse mode is set correctly and, if it is, proceed to
Step 5.
10-6 Integrated Lights Out Manager (ILOM) Administration Guide for ILOM 1.1.1 • May 2007
c. If the mouse mode is set incorrectly, select either Absolute or Relative
mouse mode from the drop-down menu.
A confirmation dialog box appears.
Note – Do not reboot the host while the ILOM is resetting itself, or the host might
become confused about the mouse mode. For best results, change the mouse mode
to the desired state prior to booting the host.
e. After the ILOM resets itself, repeat Step 1 and Step 2, then proceed to Step 5.
The new mouse mode is now in effect. The mouse mode setting is stored on
the ILOM. Therefore, subsequent connections to the WebGUI will use the new
mode.
Note – If you use Relative mouse mode, you might have difficulty getting a
redirected mouse out of the remote console window. To regain control of the cursor,
type ALT+m
7. When you see the Login dialog box, type the user name and password.
The default user name is root and the default password is changeme.
Note – Setting the bandwidth higher than what is actually available can degrade
performance. Sometimes you can improve performance by setting the bandwidth
lower.
10-8 Integrated Lights Out Manager (ILOM) Administration Guide for ILOM 1.1.1 • May 2007
When the login is successful, the Remote Console screen appears.
The Remote Console application starts with the video and keyboard enabled.
Note – You can open multiple Remote Console sessions and use the tabs to switch
between them.
You should now be able to use the Remote Console application to start your server’s
operating system.
Video and keyboard are enabled by default. In most cases, all you need to do is
enable the mouse redirection.
For detailed instructions on how to enable and disable I/O and storage devices (CD-
ROM and Diskette drives), see Section 10.3, “Redirecting Keyboard, Video, Mouse,
or Storage Devices” on page 10-10.
10-10 Integrated Lights Out Manager (ILOM) Administration Guide for ILOM 1.1.1 • May 2007
10.3.1 Redirecting Keyboard and Mouse Devices
Use the following procedure to redirect a server keyboard and mouse device to your
local workstation or laptop.
Note – For the mouse to work correctly, you might have to change the mouse mode
as well. This is described in Step 4 of the procedure Section 10.2, “Starting the
Remote Console Application From the WebGUI” on page 10-5.
1. Start the remote console application as described in Section 10.2, “Starting the
Remote Console Application From the WebGUI” on page 10-5.
The Remote Console screen appears.
4. Use the Keyboard menu to control keyboard attributes and to send special
characters that might not be available on the keyboard in remote console
mode.
10-12 Integrated Lights Out Manager (ILOM) Administration Guide for ILOM 1.1.1 • May 2007
10.3.2 Redirecting Storage Devices
This section describes how to enable a storage device attached to your local
workstation or laptop to serve as a storage device for a server. You can use this
option to install software from a local CD/DVD drive to multiple remote servers.
Note – You can also use this procedure to redirect a CD image file or a diskette
image file stored on your hard drive.
1. Start the remote console application as described in Section 10.2, “Starting the
Remote Console Application From the WebGUI” on page 10-5.
The Remote Console screen appears.
3. To start a CD image file or a diskette image file from your hard drive, select
CD-ROM Image or Floppy Image.
A browser appears.
Note – You cannot select two CD-ROM devices or two diskette devices. For
example, you cannot select CD-ROM and CD-ROM image.
4. Use the browser to navigate to the corresponding image file, then click OK.
5. To disconnect a device from the server, deselect the corresponding menu item.
This chapter describes the ILOM's Intelligent Platform Management Interface (IPMI)
functionality and lists the supported IPMI commands.
11-1
Note – VMware EFX Server does not virtualize the Baseboard Management
Controller (BMC) interface. That means that guest operating systems cannot load
their BMC interface drivers. Also, IPMI utilities cannot use the BMC interface to
interact with the Service Processor.
When run under a guest operating system, IPMI utilities must access the Service
Processor over the network instead of using the BMC interface. Error messages that
occur when the BMC interface driver fails to load can be safely ignored.
Your ILOM is IPMI v2.0 compliant. You can access IPMI functionality through the
command line with the IPMItool utility either in-band or out-of-band. Additionally,
you can generate an IPMI-specific trap from the web interface, or manage the
server's IPMI functions from any external management solution that is IPMI v1.5 or
v2.0 compliant. For more information about the IPMI v2.0 specification, go to:
http://www.intel.com/design/servers/ipmi/spec.htm#spec2.
Caution – Do not use any interface other than the ILOM CLI or WebGUI to alter the
state or configuration of any sensor or LED. Doing so could void your warranty.
11.1.1 IPMItool
IPMItool is a simple command-line interface that is useful for managing IPMI-
enabled devices. You can use this utility to perform IPMI functions with a kernel
device driver or over a LAN interface. IPMItool enables you to manage system field-
replaceable units (FRUs), monitor system health, and monitor and manage the
system environment, independent of the operating system.
man ipmitool
11-2 Integrated Lights Out Manager (ILOM) Administration Guide for ILOM 1.1.1 • May 2007
11.2 Supported IPMI 2.0 Commands
TABLE 11-1 lists the supported IPMI 2.0 commands.
Note – When a hard drive is unconfigured in the host OS, the command ipmitool
... sdr elist shows it as “Drive Present, Hot Spare.” This means it is inserted
but safe to remove.
http://www.intel.com/design/servers/ipmi/spec.htm
General Commands
Get Device ID
Cold Reset
Warm Reset
Get Self Test Results
Set/Get ACPI Power State
Reset/Set/Get Watchdog Timer
Set/Get BMC Global Enables
Clear/Get Message Flags
Enable Message Channel Receive
Get/Send Message
Read Event Message Buffer
Get Channel Authentication Capabilities
Get Session Challenge
Activate/Close Session
Set Session Privilege Level
Get Session Info
Set/Get Channel Access
11-4 Integrated Lights Out Manager (ILOM) Administration Guide for ILOM 1.1.1 • May 2007
TABLE 11-1 Supported IPMI 2.0 Commands (Continued)
Event Commands
Get Event Count
Set/Get Event Destination
Set/Get Event Reception State
Send ICMB Event Message
11-6 Integrated Lights Out Manager (ILOM) Administration Guide for ILOM 1.1.1 • May 2007
CHAPTER 12
The ILOM supports LDAP authentication for users, based on the OpenLDAP
software. LDAP is a general-purpose directory service. A directory service is a
centralized database for distributed applications, designed to manage the entries in a
directory. Thus, multiple applications can share a single user database. For more
detailed information on LDAP, go to http://www.openldap.org/.
LDAP is based on a client-server model. LDAP provides the directory, and the
clients use the directory service to access entries. The data stored in a directory can
be distributed among several LDAP servers.
12-1
dn: uid=jsmith, ou=people, dc=sun.com
Here, uid represents the user ID of the entry, ou represents the organizational unit
in which the entry belongs, and dc represents the larger organization in which the
entry belongs.
FIGURE 12-1 shows how distinguished names are used to identify entries uniquely in
the directory hierarchy.
12-2 Integrated Lights Out Manager (ILOM) Administration Guide for ILOM 1.1.1 • May 2007
■ Delete entries from the directory.
■ Rename entries in the directory.
For example, to update an entry in the directory, an LDAP client submits the
distinguished name of the entry with updated attribute information to the LDAP
server. The LDAP server uses the distinguished name to find the entry and performs
a modify operation to update the entry in the directory. The updated information is
immediately available to all the distributed applications using that LDAP server.
Your Sun server can be a client of an LDAP server. To use LDAP authentication, you
need to create a user on your LDAP server that your Sun server can authenticate, or
bind to, so that the client has permission to search the proper directory on the LDAP
server.
Note – This task is similar to configuring LDAP as a name service for Linux or the
Solaris operating system.
12-4 Integrated Lights Out Manager (ILOM) Administration Guide for ILOM 1.1.1 • May 2007
12.3.2.1 Configuring the ILOM Using the CLI
1. Enter the proxy user name and password. From the command line, type:
set /SP/clients/ldap binddn=cn=proxyuser, ou=sales, dc=sun, dc=com
bindpw=password
2. Enter the IP address of the LDAP server. From the command line, type:
set /SP/clients/ldap ipaddress=ldapipaddress
3. Assign the port used to communicate with the LDAP server; the default port is
389. From the command line, type:
set /SP/clients/ldap port=ldapport
Enter the distinguished name of the branch of your LDAP tree that contains
users and groups. From the command line, type:
set /SP/clients/ldap searchbase="ou=people, ou=sales, dc=sun, dc=com"
This is the location in your LDAP tree that you want to search for user
authentication.
4. Set the state of the LDAP service to enabled. From the command line, type:
set /SP/clients/ldap state=enabled
5. To verify that LDAP authentication works, log in to the ILOM using an LDAP
user name and password.
Note – The ILOM searches local users before it searches LDAP users. If an LDAP
user name exists as a local user, the ILOM uses the local account for authentication.
4. Click Save.
5. To verify that LDAP authentication works, log in to the ILOM using an LDAP
user name and password.
Note – The ILOM searches local users before LDAP users. If an LDAP user name
exists as a local user, the ILOM uses the local account for authentication.
12-6 Integrated Lights Out Manager (ILOM) Administration Guide for ILOM 1.1.1 • May 2007
CHAPTER 13
RADIUS
In the RADIUS client-server model, the client sends an Access-Request query to the
RADIUS server. When the server receives an Access-Request message from a client,
it searches the database for that user’s authentication information. If the user’s
information is not found, the server sends an Access-Reject message and the user is
denied access to the requested service. If the user’s information is found, the server
responds with an Access-Accept message. The Access-Accept message confirms the
user’s authentication data and grants the user access to the requested service.
13-1
All transactions between the RADIUS client and server are authenticated by the use
of a shared secret. The client and server must each know the secret because it is
never passed over the network. You must know the shared secret to configure
RADIUS authenticating for ILOM.
To use RADIUS configuration with ILOM, you must configure ILOM as a RADIUS
client. For more information, see Section 13.2, “Configuring RADIUS Settings” on
page 13-2.
Before completing this procedure, collect the appropriate information about your
RADIUS environment, as described in Section 13.1, “RADIUS Overview” on
page 13-1.
13-2 Integrated Lights Out Manager (ILOM) Administration Guide for ILOM 1.1.1 • May 2007
FIGURE 13-1 RADIUS Page
2. Navigate to /SP/clients/radius.
Default Role defaultrole Sets the default role for all RADIUS users:
administrator|operator administrator or operator
Purpose
Use this command to view the properties associated with RADIUS authentication.
Syntax
show /SP/clients/radius
Properties
defaultrole – This is the role assigned to all RADIUS users. It is either administrator
or operator.
port – The port number used to communicate with your RADIUS server. The default
port is 1812.
secret – Enter the shared secret used to gain access to your RADIUS server.
13-4 Integrated Lights Out Manager (ILOM) Administration Guide for ILOM 1.1.1 • May 2007
state – Choose enabled or disabled to allow or deny access to your RADIUS
users.
Example
/SP/clients/radius
Targets:
Properties:
defaultrole = Operator
ipaddress = 129.144.36.142
port = 1812
secret = (none)
state = enabled
Commands:
cd
set
show
->
Purpose
Use this command to configure the properties associated with RADIUS
authentication on a service processor.
Syntax
set /SP/clients/radius [defaultrole=[Administrator|Operator]
ipaddress=radiusserverIP port=port# secret=radiussecret state=
[enabled|disabled]]
Example
Purpose
Use this command to view clients that can receive data from a service processor,
including LDAP, NTP, RADIUS, and SYSLOG clients.
Syntax
show /SP/clients
13-6 Integrated Lights Out Manager (ILOM) Administration Guide for ILOM 1.1.1 • May 2007
Example
/SP/clients
Targets:
ldap
ntp
radius
syslog
Properties:
Commands:
cd
show
Note – Users with operator privileges can only view the ntp and syslog targets. The
radius and ldap targets remain hidden.
This chapter describes how to use SNMP. It includes the following sections:
■ Section 14.1, “About SNMP” on page 14-1
■ Section 14.2, “SNMP Management Information Base (MIB) Files” on page 14-2
■ Section 14.3, “MIBs Integration” on page 14-3
■ Section 14.4, “About SNMP Messages” on page 14-3
■ Section 14.5, “About ILOM and SNMP” on page 14-4
■ Section 14.6, “Managing SNMP Users With the CLI” on page 14-5
■ Section 14.7, “Managing SNMP With the WebGUI” on page 14-7
14-1
Managed nodes are any number of devices, including servers, routers, and hubs that
host SNMP management agents responsible for carrying out the requests from
management stations. The management station monitors nodes by polling
management agents for the appropriate information using queries. Managed nodes
can also provide unsolicited status information to a management station in the form
of a trap. SNMP is the protocol used to communicate management information
between the management stations and agents.
The SNMP agent is preinstalled and runs on the ILOM, so all SNMP management of
the server should occur through the ILOM. To utilize this feature, your operating
system must have an SNMP client application. See your operating system vendor for
more information.
The SNMP agent on your ILOM provides the following capabilities: inventory
management and sensor and system state monitoring.
Standard:
■ SNMP-FRAMEWORK-MIB
■ SNMP-USER-BASED-MIB
■ SNMP-MPD-MIB
■ ENTITY-MIB
Sun Specific:
■ SUN-PLATFORM-MIB
■ SUN-ILOM-CONTROL-MIB
■ SUN-ILOM-PET-MIB
Download and install the product-specific MIB files from your Tools and Drivers CD
for your platform.
14-2 Integrated Lights Out Manager (ILOM) Administration Guide for ILOM 1.1.1 • May 2007
14.3 MIBs Integration
Use the MIBs to integrate the management and monitoring of the server into SNMP
management consoles. The MIB branch is a private enterprise MIB, located at MIB
object iso(1)/org (3)/dod (6)/internet (1)/private (4)/enterprises (1)/sun
(42)/products (2). FIGURE 14-1 shows the arrangement. The standard SNMP port
(port 161) is used by the SNMP agent on the ILOM.
http://net-snmp.sourceforge.net/
By default, port 161 is used for SNMP messages and port 162 is used to listen for
SNMP traps.
To use this feature, you must (1) integrate the platform-specific MIBs into your
SNMP environment, (2) tell your management station about your server, and (3)
configure the specific traps.
14-4 Integrated Lights Out Manager (ILOM) Administration Guide for ILOM 1.1.1 • May 2007
14.5.3 Configuring Receipt of SNMP Traps
To configure a trap in your ILOM, see Section 8.5, “Managing ILOM Alerts” on
page 8-6 for CLI instructions, and Section 9.5, “Managing Alerts” on page 9-10 for
WebGUI instructions.
To do this on the WebGUI, see Section 14.7, “Managing SNMP With the WebGUI” on
page 14-7.
create /SP/services/snmp/communities/communityname
delete /SP/services/snmp/users/username
delete /SP/services/snmp/communities/communityname
14.6.3.3 Examples
When changing the parameters of SNMP users, you must set values for all the
properties, even if you are not changing all the values. For example, to change user
jeff’s privacyprotocol to DES you must type:
14-6 Integrated Lights Out Manager (ILOM) Administration Guide for ILOM 1.1.1 • May 2007
Note – You can change SNMP user permissions without resetting the privacy and
authentication properties.
For more information about SNMP and the classes of MIB files that the Sun server
supports, see Section 14.1, “About SNMP” on page 14-1.
4. Enable or disable Set Requests by selecting or clearing the Set Requests check
box.
If Set Requests is disabled, all SNMP objects are read-only.
7. At the bottom of the page, you can also add, edit, or delete SNMP
communities, as well as SNMP users. See FIGURE 14-3.
14-8 Integrated Lights Out Manager (ILOM) Administration Guide for ILOM 1.1.1 • May 2007
FIGURE 14-3 SNMP Communities and Users
4. Click Save.
14-10 Integrated Lights Out Manager (ILOM) Administration Guide for ILOM 1.1.1 • May 2007
14.7.3 Deleting an SNMP user
1. Click the Users link, or scroll down to the SNMP Users list.
2. Click the Add button or the Edit under the SNMP Communities list.
The Add or Edit dialog box appears. See FIGURE 14-5.
5. Click Save.
14-12 Integrated Lights Out Manager (ILOM) Administration Guide for ILOM 1.1.1 • May 2007
APPENDIX A
Your input Fixed-width Text that you type. Type it exactly as shown.
bold
Onscreen output Fixed-width Text that the computer displays.
regular
Variable Italic Replace these with a name or value you
choose.
Square brackets [ ] Text in square brackets is optional.
Vertical bars | Text separated by a vertical bar represents
the only available values. Select one.
A-1
TABLE A-2 General Commands
Description Command
Description Command
A-2 Integrated Lights Out Manager (ILOM) Administration Guide for ILOM 1.1.1 • May 2007
TABLE A-4 Network and Serial Port Setting Commands
Description Command
Description Command
Description Command
Description Command
A-4 Integrated Lights Out Manager (ILOM) Administration Guide for ILOM 1.1.1 • May 2007
TABLE A-7 SNMP Commands (Continued)
Description Command
Description Command
Description Command
Syntax
cd target
Options
[-d|default] [-h|help]
Examples
To create a user named sally, cd to /SP/users, then execute the create
command with /SP/users as the default target.
-> cd /SP/users
-> cd /SP/users
A-6 Integrated Lights Out Manager (ILOM) Administration Guide for ILOM 1.1.1 • May 2007
A.2.2 Using the create Command
Use the create command to set up an object in the namespace. Unless you specify
properties with the create command, they are empty.
Syntax
create [options] target [propertyname=value]
Options
[-d|default] [-h|help]
TABLE A-10 Targets, Properties, and Values for the create Command
Example
-> create /SP/users/susan role=administrator
Options
[-f|force] [-h|help] [-script]
Targets
Valid Targets
/SP/users/username
/SP/services/snmp/community/communityname
/SP/services/snmp/user/username
Examples
-> delete /SP/users/susan
Syntax
exit [options]
Options
[-h|help]
A-8 Integrated Lights Out Manager (ILOM) Administration Guide for ILOM 1.1.1 • May 2007
A.2.5 Using the help Command
Use the help command to display Help information about commands and targets.
Using the -output terse option displays usage information only. The -output
verbose option displays usage, description, and additional information including
examples of command usage. If you do not use the -output option, usage
information and a brief description of the command are displayed.
Specifying command targets displays a complete list of valid targets for that
command from the fixed targets in /SP and /SYS. Fixed targets are targets that
cannot be created by a user.
Syntax
help [options] command [targets]
Options
[-h|help] [-output terse|verbose]
Commands
cd, create, delete, exit, help, load, reset, set, show, start,
stop, version
Examples
-> help load
Examples:
-> reset /SYS
-> reset
Note – Use this command to update your ILOM firmware and BIOS.
Syntax
load -source URL
Options
[-h|help] [-source]
Examples
-> load -source tftp://archive/newmainimage
A-10 Integrated Lights Out Manager (ILOM) Administration Guide for ILOM 1.1.1 • May 2007
Note – A firmware upgrade will cause the server and ILOM to be reset. It is
recommended that a clean shutdown of the server be done prior to the upgrade
procedure. An upgrade takes about five minutes to complete. ILOM enters a special
mode to load new firmware. No other tasks can be performed in ILOM until the
firmware upgrade is complete and ILOM is reset.
Note – The reset command does not affect the power state of hardware devices.
Syntax
reset [options] target
Options
[-h|help] [-script]
Valid Targets
/SP
/SYS
Examples
-> reset /SP
Syntax
set [options] [-default] target [propertyname=value]
Options
[-x examine] [-h help]
TABLE A-13 Targets, Properties, and Values for the set Command
A-12 Integrated Lights Out Manager (ILOM) Administration Guide for ILOM 1.1.1 • May 2007
TABLE A-13 Targets, Properties, and Values for the set Command (Continued)
Examples
-> set /SP/users/susan role=administrator
Using the -display option determines the type of information shown. If you
specify -display targets, then all targets in the namespace below the current
target are shown. If you specify -display properties, all property names and values
for the target are shown. With this option you can specify certain property names,
and only those values are shown. If you specify -display all, all targets in the
namespace below the current target are shown, and the properties of the specified
target are shown. If you do not specify a -display option, the show command acts
as if -display all was specified.
The -level option controls the depth of the show command and it applies to all
modes of the -display option. Specifying -level 1 displays the level of the
namespace where the object exists. Values greater than 1 return information for the
target's current level in the namespace and the <specified value> levels below. If the
argument is -level all, it applies to the current level in the namespace and
everything below.
A-14 Integrated Lights Out Manager (ILOM) Administration Guide for ILOM 1.1.1 • May 2007
Syntax
show [options] [-display targets|properties|all] [-level
value|all] target [propertyname]
Options
[-d|-display] [-e|examine] [-l|level]
/SYS
/SP
/SP/alert
/SP/alert/rules/alertrulename type
level
destination
/SP/clients/ldap binddn
bindpw
defaultrole
ipaddress
port
searchbase
state
/SP/clients/radius defaultrole
ipaddress
port
secret
state
/SP/clients/ntp
/SP/clients/ntp/server
/SP/clients/ntp/server/[1|2]
/SP/clock datetime
usentpserver
/SP/logs
/SP/logs/event clear
/SP/logs/event/list
/SP/network commitpending
ipaddress
ipdiscovery
ipgateway
ipnetmask
linkstatus
macaddress
pendingipaddress
pendingdiscovery
pendingipgateway
pendingipnetmask
/SP/serial
/SP/serial/external commitpending
flowcontrol
pendingspeed
speed
/SP/serial/host commitpending
pendingspeed
speed
/SP/services
/SP/services/http port
secureredirect
servicestate
/SP/services/https port
servicestate
/SP/services/snmp ngineid
port
sets
traps
v1
v2c
v3
/SP/services/snmp/communities/
/SP/services/snmp/communities/private permissions
A-16 Integrated Lights Out Manager (ILOM) Administration Guide for ILOM 1.1.1 • May 2007
TABLE A-14 Targets for the show Command (Continued)
/SP/services/snmp/communities/public permissions
/SP/services/snmp/users
/SP/services/ssh
/SP/services/ssh/keys
/SP/services/ssh/keys/dsa fingerprint
length
publickey
/SP/services/ssh/keys/rsa fingerprint
length
publickey
/SP/sessions
/SP/sessions/sessionid starttime
source
type
user
/SP/users
/SP/users/username role
Examples
-> show -display properties /SP/users/susan
/SP/users/susan
Properties:
role = Administrator
TABLE A-15
Commands:
cd
show
/SP/clients/ldap
Targets:
Properties:
binddn = cn=Manager,dc=sun,dc=com
bindpw = secret
defaultrole = Operator
ipaddress = 129.144.97.180
port = 389
searchbase = ou=people,dc=sun,dc=
com
state = disabled
Commands:
cd
show
/SP/clients/ntp
Targets:
server
Properties:
Commands:
cd
show
Syntax
start [options] target
A-18 Integrated Lights Out Manager (ILOM) Administration Guide for ILOM 1.1.1 • May 2007
Options
[-h|help] [-state]
Targets
Examples
-> start /SP/console
Syntax
stop [options] [-script] target
Options
[-f|force] [-h|help]
Examples
-> stop /SP/console
Syntax
version
Options
[-h|help]
Example
-> version
version SP firmware version: 1.0.0
SP firmware build number: 4415
SP firmware date: Mon Mar 28 10:39:46 EST 2005
A-20 Integrated Lights Out Manager (ILOM) Administration Guide for ILOM 1.1.1 • May 2007
APPENDIX B
ILOM Ports
When configuring firewall access to the ILOM, you must allow access to all relevant
ports.
B-1
B-2 Integrated Lights Out Manager (ILOM) Administration Guide for ILOM 1.1.1 • May 2007
Glossary
The following terms are used within the Sun server documentation.
A
access control list
(ACL) A software authorization mechanism that enables you to control which users
have access to a server. Users can define ACL rules that are specific to a
particular file or directory, granting or denying access to one or more users or
groups.
address In networking, a unique code that identifies a node in the network. Names
such as “host1.sun.com” are translated to dotted-quad addresses, such as
“168.124.3.4” by the Domain Name Service (DNS).
address resolution A means for mapping Internet addresses into physical media access control
(MAC) addresses or domain addresses.
Address Resolution
Protocol (ARP) A protocol used to associate an Internet Protocol (IP) address with a network
hardware address (MAC address).
Administrator The person with full access (root) privileges to the managed host system.
Advanced
Configuration and
Power Interface
(ACPI) An open-industry specification that provides power management capabilities
to a system that enable the operating system to determine when peripheral
devices are idle and to utilize ACPI-defined mechanisms for putting the
devices into low power modes. The ACPI specification also describes a large
number of power states for CPUs, devices, and systems as a whole. One
feature of the ACPI enables the OS to modify the voltage and frequency of a
Glossary-1
CPU in response to system load, thus enabling the system’s main power-
consuming element (the CPU) to vary its power consumption based on system
load.
Advanced
Programmable
Interrupt Controller
(APIC) A device that manages interrupt requests for multiple central processing units
(CPUs). The APIC decides which request has the highest priority and sends an
interrupt to the processor for that request.
Advanced Technology
Attachment (ATA) A specification that describes the physical, transport, electrical, and command
protocols used to attach storage devices to host systems.
Advanced Technology
Attachment Packet
Interface (ATAPI) An extension to the Advanced Technology Attachment (ATA) standard for
connecting removable media storage devices in host systems, including
CD/DVD drives, tape drives, and high-capacity diskette drives. Also called
“ATA-2” or “ATA/ATAPI.”
alert A message or log generated by the collection and analysis of error events. An
alert indicates that there is a need to perform some hardware or software
corrective action.
authentication The process that verifies the identity of a user in a communication session, or a
device or other entity in a computer system, before that user, device, or other
entity can access system resources. Session authentication can work in two
directions. A server authenticates a client to make access-control decisions. The
client can authenticate the server as well. With Secure Sockets Layer (SSL), the
client always authenticates the server.
AutoYaST An installation program for SUSE Linux that automates the process of
configuring one or more servers.
Glossary-2 Integrated Lights Out Manager (ILOM) Administration Guide for ILOM 1.1.1 • May 2007
B
bandwidth A measure of the volume of information that can be transmitted over a
communication link. Often used to describe the number of bits per second a
network can deliver.
baseboard management
controller (BMC) A device used to manage chassis environmental, configuration, and service
functions, and receive event data from other parts of the system. It receives
data through sensor interfaces and interprets this data by using the sensor data
record (SDR) to which it provides an interface. The BMC provides another
interface to the system event log (SEL). Typical functions of the BMC are to
measure processor temperature, power supply values, and cooling fan status.
The BMC can take autonomous action to preserve system integrity.
baud rate The rate at which information is transmitted between devices, for example,
between a terminal and a server.
bind In the Lightweight Directory Access Protocol (LDAP), this refers to the
authentication process that LDAP requires when users access the LDAP
directory. Authentication occurs when the LDAP client binds to the LDAP
server.
BIOS (Basic
Input/Output System) System software that controls the loading of the operating system and testing
of hardware at system power on. BIOS is stored in read-only memory (ROM).
bits per second (bps) The unit of measurement for data transmission speed.
boot loader A program contained in read-only memory (ROM) that automatically runs at
system power-on to control the first stage of system initialization and
hardware tests. The boot loader then transfers control to a more complex
program that loads the operating system.
C
cache A copy of original data that is stored locally, often with instructions or the
most frequently accessed information. Cached data does not have to be
retrieved from a remote server again when requested. A cache increases
effective memory transfer rates and processor speed.
certificate Public key data assigned by a trusted Certificate Authority (CA) to provide
verification of an entity’s identity. This is a digitally signed document. Both
clients and servers can have certificates. Also called a “public key certificate.”
Glossary-3
Certificate Authority
(CA) A trusted organization that issues public key certificates and provides
identification to the owner of the certificate. A public key Certificate Authority
issues certificates that state a relationship between an entity named in the
certificate, and a public key that belongs to that entity, which is also present in
the certificate.
command-line interface
(CLI) A text-based interface that enables users to type executable instructions at a
command prompt.
Common Information
Model (CIM) An open systems information model published by the Distributed
Management Task Force (DMTF) that enables a common application to manage
disparate resources, such as printers, disk drives, or CPUs.
Coordinated Universal
Time (UTC) The international standard for time. UTC was formerly called Greenwich
Meridian Time (GMT). UTC is used by Network Time Protocol (NTP) servers
to synchronize systems and devices on a network.
core file A file created by the Solaris or Linux operating system when a program
malfunctions and terminates. The core file holds a snapshot of memory, taken
at the time the fault occurred. Also called a “crash dump file.”
critical event A system event that seriously impairs service and requires immediate
attention.
custom JumpStart A type of installation in which the Solaris software is automatically installed
on a system that is based on a user-defined profile.
customer-replaceable
unit (CRU) A system component that the user can replace without special training or tools.
D
Data Encryption
Standard (DES) A common algorithm for encrypting and decrypting data.
Glossary-4 Integrated Lights Out Manager (ILOM) Administration Guide for ILOM 1.1.1 • May 2007
Desktop Management
Interface (DMI) A specification that sets standards for accessing technical support information
about computer hardware and software. DMI is hardware and operating
system (OS) independent, and can manage workstations, servers, or other
computing systems. DMI is defined by the Distributed Management Task Force
(DMTF).
digital signature A certification of the source of digital data. A digital signature is a number
derived from a public key cryptographic process. If the data is modified after
the signature was created, the signature becomes invalid. For this reason, a
digital signature can ensure data integrity and detection of data modification.
Digital Signature
Algorithm (DSA) A cryptographic algorithm specified by the Digital Signature Standard (DSS).
DSA is a standard algorithm used to create digital signatures.
directory server In the Lightweight Directory Access Protocol (LDAP), a server which stores
and provides information about people and resources within an organization
from a logically centralized location.
disk partition A logical section of a physical hard disk drive reserved for a specific file system
and function.
Distinguished Name
(DN) In the Lightweight Directory Access Protocol (LDAP), a unique text string that
identifies an entry’s name and location within the directory. A DN can be a
fully qualified domain name (FQDN) that includes the complete path from the
root of the tree.
Distributed
Management Task Force
(DMTF) A consortium of over 200 companies that authors and promotes standards for
the purpose of furthering the ability to remotely manage computer systems.
Specifications from the DTMF include the Desktop Management Interface
(DMI), the Common Information Model (CIM), and the Alert Standard Format
(ASF).
domain A grouping of hosts that is identified by a name. The hosts usually belong to
the same Internet Protocol (IP) network address. The domain also refers to the
last part of a fully qualified domain name (FQDN) that identifies the company
or organization that owns the domain. For example, “sun.com” identifies Sun
Microsystems as the owner of the domain in the FQDN “docs.sun.com.”
Glossary-5
domain name The unique name assigned to a system or group of systems on the Internet. The
host names of all the systems in the group have the same domain name suffix,
such as “sun.com.” Domain names are interpreted from right to left. For
example, “sun.com” is both the domain name of Sun Microsystems, and a
subdomain of the top-level “.com” domain.
Dynamic Host
Configuration Protocol
(DHCP) A protocol that enables a DHCP server to assign Internet Protocol (IP)
addresses dynamically to systems on a Transmission Control Protocol/Internet
Protocol (TCP/IP) network.
dynamic random-access
memory (DRAM) A type of random-access memory (RAM) that stores information in integrated
circuits that contain capacitors. Because capacitors lose their charge over time,
DRAM must be periodically recharged.
E
electrically erasable
programmable
read-only memory
(EEPROM) A type of nonvolatile programmable read-only memory (PROM) that can be
erased by exposing it to an electrical charge.
electrostatic discharge
(ESD) The sudden dissipation of static electrical charge. ESD can easily destroy
semiconductor components.
Glossary-6 Integrated Lights Out Manager (ILOM) Administration Guide for ILOM 1.1.1 • May 2007
enhanced parallel port
(EPP) A hardware and software standard that enables systems to transmit data at
twice the speed of standard parallel ports.
erasable programmable
read-only memory
(EPROM) A nonvolatile programmable read-only memory (PROM) that can be written to
as well as read from.
Ethernet An industry-standard type of local area network (LAN) that enables real-time
communication between systems connected directly through cables. Ethernet
uses a Carrier Sense Multiple Access/Collision Detection (CSMA/CD)
algorithm as its access method, wherein all nodes listen for, and any node can
begin transmitting data. If multiple nodes attempt to transmit at the same time
(a collision), the transmitting nodes wait for a random time before attempting
to transmit again.
event A change in the state of a managed object. The event-handling subsystem can
provide a notification to which a software system must respond when it
occurs, but which the software did not solicit or control.
externally initiated
reset (XIR) A signal that sends a “soft” reset to the processor in a domain. XIR does not
reboot the domain. An XIR is generally used to escape from a hung system in
order to reach the console prompt. A user can then generate a core dump file,
which can be useful in diagnosing the cause of the hung system.
F
failover The automatic transfer of a computer service from one system, or more often a
subsystem, to another to provide redundant capability.
Fast Ethernet Ethernet technology that transfers data up to 100M bits per second. Fast
Ethernet is backward-compatible with 10M-bit per second Ethernet
installations.
fdisk partition A logical partition of a physical disk drive that is dedicated to a particular
operating system on an x86-based system.
Fibre Channel (FC) A connector that provides high bandwidth, increased distance, and additional
connectivity from hosts to peripherals.
Glossary-7
Fibre Channel-
Arbitrated Loop (FC-
AL) A 100-Mbyte per second loop topology used with Fibre Channel that enables
connection of multiple devices such as disk drives and controllers. An
arbitrated loop connects two or more ports, but allows only two ports to
communicate at a given time.
field-replaceable unit
(FRU) A system component that is replaceable at the customer site.
file system A consistent method by which information is organized and stored on physical
media. Different operating systems typically have different file systems. File
systems are often a tree-structured network of files and directories, with a root
directory at the top and parent and child directories below root.
firewall A network configuration, usually both hardware and software, that protects
networked computers within an organization from outside access. A firewall
can monitor or prohibit connections to and from specified services or hosts.
firmware Software that is typically used to help with the initial booting stage of a system
and with system management. Firmware is embedded in read-only memory
(ROM) or programmable ROM (PROM).
flash PROM A programmable read-only memory (PROM) that can be reprogrammed while
installed within the system, from software on a disk, by a voltage pulse, or by
a flash of light.
G
gateway A computer or program that interconnects two networks and then passes data
packets between the networks. A gateway has more than one network
interface.
Gigabit Ethernet Ethernet technology that transfers data up to 1000M bits per second.
Glossary-8 Integrated Lights Out Manager (ILOM) Administration Guide for ILOM 1.1.1 • May 2007
Grand Unified
Bootloader (GRUB) A boot loader that can install two or more operating systems (OS) onto a single
system and that can manage which OS to boot at power-on.
H
heatsink A structure, attached to or part of a semiconductor device, that can dissipate
heat to the surrounding environment.
host A system, such as a backend server, with an assigned Internet Protocol (IP)
address and host name. The host is accessed by other remote systems on the
network.
host ID Part of the 32-bit Internet Protocol (IP) address used to identify a host on a
network.
host name The name of a particular machine within a domain. Host names always map to
a specific Internet Protocol (IP) address.
hot plug Describes a component that is safe to remove or add while the system is
running. Typically, the system must be rebooted before the hot-plug
component is configured into the system.
hot swap Describes a component that can be installed or removed by simply pulling the
component out and putting a new component into a running system. The
system either automatically recognizes the component change and configures it
or requires user interaction to configure the system. However, in neither case is
a reboot required. All hot-swappable components are hot pluggable, but not all
hot-pluggable components are hot swappable.
Hypertext Transfer
Protocol (HTTP) The Internet protocol that retrieves hypertext objects from remote hosts. HTTP
messages consist of requests from client to server and responses from server to
client. HTTP is based on Transmission Control Protocol/Internet Protocol
(TCP/IP).
Hypertext Transfer
Protocol Secure
(HTTPS) An extension of HTTP that uses Secure Sockets Layer (SSL) to enable secure
transmissions over a Transmission Control Protocol/Internet Protocol
(TCP/IP) network.
Glossary-9
I
in-band system
management Server management capability that is enabled only when the operating system
is initialized and the server is functioning properly.
install server A server that provides the Solaris software DVD or CD images from which
other systems on a network can install the Solaris software.
Intelligent Platform
Management Interface
(IPMI) A hardware-level interface specification that was designed primarily for out-
of-band management of server systems over a number of different physical
interconnects. The IPMI specification describes extensive abstractions
regarding sensors. This enables a management application running on the
operating system (OS) or in a remote system to comprehend the environmental
makeup of the system and to register with the system’s IPMI subsystem to
receive events. IPMI is compatible with management software from
heterogeneous vendors. IPMI functionality includes Field Replacable Unit
(FRU) inventory reporting, system monitoring, logging, system recovery
(including local and remote system resets and power on and off capabilities),
and alerting.
Internet Control
Message Protocol
(ICMP) An extension to the Internet Protocol (IP) that provides for routing, reliability,
flow control, and sequencing of data. ICMP specifies error and control
messages used with the IP.
Internet Protocol (IP) The basic network layer protocol of the Internet. IP enables the unreliable
delivery of individual packets from one host to another. IP does not guarantee
that the packet will be delivered, how long it will take, or if multiple packets
will be delivered in the order they were sent. Protocols layered on top of IP
add connection reliability.
interrupt request
(IRQ) A signal that a device requires attention from the processor.
Glossary-10 Integrated Lights Out Manager (ILOM) Administration Guide for ILOM 1.1.1 • May 2007
IPMItool A utility used to manage IPMI-enabled devices. IPMItool can manage IPMI
functions of either the local system or a remote system. Functions include
managing field-replaceable unit (FRU) information, local area network (LAN)
configurations, sensor readings, and remote system power control.
J
Java(TM) Web Start
application A web application launcher. With Java Web Start, applications are launched by
clicking on the web link. If the application is not present on your system, Java
Web Start downloads it and caches it onto your system. Once an application is
downloaded to its cache, it can be launched from a desktop icon or browser
link. The most current version of the application is always presented.
JumpStart
installation A type of installation in which the Solaris software is automatically installed
on a system by using the factory-installed JumpStart software.
K
kernel The core of the operating system (OS) that manages the hardware and provides
fundamental services, such as filing and resource allocation, that the hardware
does not provide.
Keyboard Controller
Style (KCS) interface A type of interface implemented in legacy personal computer (PC) keyboard
controllers. Data is transferred across the KCS interface using a per-byte
handshake.
keyboard, video,
mouse, storage
(KVMS) A series of interfaces that enables a system to respond to keyboard, video,
mouse, and storage events.
Glossary-11
L
lights out management
(LOM) Technology that provides the capability for out-of-band communication with
the server even if the operating system is not running. This enables the system
administrator to switch the server on and off; view system temperatures, fan
speeds, and so forth; and restart the system from a remote location.
Lightweight Directory
Access Protocol
(LDAP) A directory service protocol used for the storage, retrieval, and distribution of
information, including user profiles, distribution lists, and configuration data.
LDAP runs over Transmission Control Protocol/Internet Protocol (TCP/IP)
and across multiple platforms.
Lightweight Directory
Access Protocol (LDAP)
server A software server that maintains an LDAP directory and service queries to the
directory. The Sun Directory Services and the Netscape Directory Services are
implementations of an LDAP server.
M
major event A system event that impairs service, but not seriously.
Management
Information Base
(MIB) A tree-like, hierarchical system for classifying information about resources in a
network. The MIB defines the variables that the master Simple Network
Management Protocol (SNMP) agent can access. The MIB provides access to
the server’s network configuration, status, and statistics. Using SNMP, you can
view this information from a network management station (NMS). By industry
agreement, individual developers are assigned portions of the tree structure to
which they may attach descriptions that are specific to their own devices.
Glossary-12 Integrated Lights Out Manager (ILOM) Administration Guide for ILOM 1.1.1 • May 2007
media access control
(MAC) address Worldwide unique, 48-bit, hardware address number that is programmed in to
each local area network interface card (NIC) at the time of manufacture.
Message Digest 5
(MD5) A secure hashing function that converts an arbitrarily long data string into a
short digest of data that is unique and of fixed size.
minor event A system event that does not currently impair service, but which needs
correction before it becomes more severe.
N
namespace In the tree structure of a Lightweight Directory Access Protocol (LDAP)
directory, a set of unique names from which an object name is derived and
understood. For example, files are named within the file namespace and
printers are named within the printer namespace.
Network Information
Service (NIS) A system of programs and data files that UNIX systems use to collect, collate,
and share specific information about machines, users, file systems, and
network parameters throughout a network of computer systems.
network management
station (NMS) A powerful workstation with one or more network management applications
installed. The NMS is used to remotely manage a network.
network mask A number used by software to separate the local subnet address from the rest
of a given Internet Protocol (IP) address.
nonmaskable interrupt
(NMI) A system interrupt that is not invalidated by another interrupt.
Glossary-13
nonvolatile memory A type of memory that ensures that data is not lost when system power is off.
nonvolatile random-
access memory
(NVRAM) A type of random-access memory (RAM) that retains information when system
power is off.
O
object identifier
(OID) A number that identifies an object’s position in a global object registration tree.
Each node of the tree is assigned a number, so that an OID is a sequence of
numbers. In Internet usage the OID numbers are delimited by dots, for
example, “0.128.45.12.” In the Lightweight Directory Access Protocol (LDAP),
OIDs are used to uniquely identify schema elements, including object classes
and attribute types.
OpenBoot(TM) PROM A layer of software that takes control of an initialized system after the power-
on self-test (POST) successfully tests components. OpenBoot PROM builds
data structures in memory and boots the operating system.
out-of-band (OOB)
system management Server management capability that is enabled when the operating system
network drivers or the server are not functioning properly.
P
parity A method used by a computer for checking that data received matches data
sent. Also refers to information stored with data on a disk that enables the
controller to rebuild data after a drive failure.
Peripheral Component
Interconnect (PCI) A local bus standard used to connect peripherals to 32-bit or 64-bit systems.
Peripheral Interface
Controller (PIC) An integrated circuit that controls peripherals in an interrupt request (IRQ)-
driven system, taking away that load from the central processing unit (CPU).
Glossary-14 Integrated Lights Out Manager (ILOM) Administration Guide for ILOM 1.1.1 • May 2007
permissions A set of privileges granted or denied to a user or group that specify read,
write, or execution access to a file or directory. For access control, permissions
state whether access to the directory information is granted or denied, and the
level of access that is granted or denied.
physical address An actual hardware address that matches a memory location. Programs that
refer to virtual addresses are subsequently mapped to physical addresses.
power cycling The process of turning the power to a system off then on again.
power-on self-test
(POST) A program that takes uninitialized system hardware and probes and tests its
components at system startup. POST configures useful components into a
coherent, initialized system and hands it over to the OpenBoot PROM. POST
passes to OpenBoot PROM a list of only those components that have been
successfully tested.
Preboot Execution
Environment (PXE) An industry-standard client/server interface that enables a server to boot an
operating system (OS) over a Transmission Control Protocol/Internet Protocol
(TCP/IP) network using Dynamic Host Configuration Protocol (DHCP). The
PXE specification describes how the network adapter card and BIOS work
together to provide basic networking capabilities for the primary bootstrap
program, enabling it to perform a secondary bootstrap over the network, such
Glossary-15
as a TFTP load of an OS image. Thus, the primary bootstrap program, if coded
to PXE standards, does not need knowledge of the system’s networking
hardware.
programmable
read-only memory
(PROM) A memory chip on which data can be programmed only once and which
retains the program forever. PROMs retain data even when power is off.
protocol A set of rules that describes how systems or devices on a network exchange
information.
public key encryption A cryptographic method that uses a two-part key (code) that is made up of
public and private components. To encrypt messages, the published public
keys of the recipients are used. To decrypt messages, the recipients use their
unpublished private keys, which are known only to them. Knowing the public
key does not enable users to deduce the corresponding private key.
R
rack unit (U) A measure of vertical rack space equal to 1.75 inches (4.45 cm).
random-access memory
(RAM) Volatile, semiconductor-based memory in which any byte of memory can be
accessed without touching the preceding bytes.
read-only memory
(ROM) A nonvolatile memory chip on which data has been prerecorded. Once written
onto a ROM chip, data cannot be removed and can only be read.
real-time clock (RTC) A battery-backed component that maintains the time and date for a system,
even when the system is powered off.
Glossary-16 Integrated Lights Out Manager (ILOM) Administration Guide for ILOM 1.1.1 • May 2007
Red Hat Package
Manager (RPM) A collection of tools developed by Red Hat, Inc. for Red Hat Linux that can
automate the install, uninstall, update, verify, and query software processes on
a computer. RPM is now commonly used by multiple Linux vendors.
redirection The channeling of input or output to a file or device rather than to the standard
input or output of a system. The result of redirection sends input or output
that a system would normally display to the display of another system.
redundant array of
independent disks
(RAID) RAID enables a set of disk drives to appear as a single logical disk drive to an
application such as a database or file system. Different RAID levels provide
different capacity, performance, high availability, and cost characteristics.
Remote Management
and Control Protocol
(RMCP) A networking protocol that enables an administrator to respond to an alert
remotely by powering the system on or off or forcing a reboot.
remote system A system other than the one on which the user is working.
root In UNIX operating systems, the name of the superuser (root). The root user has
permissions to access any file and carry out other operations not permitted to
ordinary users. Roughly equivalent to the administrator user name on
Windows Server operating systems.
root directory The base directory from which all other directories stem, either directly or
indirectly.
router A system that assigns a path over which to send network packets or other
Internet traffic. Although both hosts and gateways do routing, the term
“router” commonly refers to a device that connects two networks.
RSA algorithm A cryptographic algorithm developed by RSA Data Security, Inc. It can be used
for both encryption and digital signatures.
schema Definitions that describe what type of information can be stored as entries in
the directory. When information that does not match the schema is stored in
the directory, clients attempting to access the directory might be unable to
display the proper results.
Glossary-17
S
Secure Shell (ssh) A UNIX shell program and network protocol that enables secure and
encrypted log in and execution of commands on a remote system over an
insecure network.
serial console A terminal or a tip line connected to the serial port on the service processor. A
serial console is used to configure the system to perform other administrative
tasks.
server certificate A certificate used with Hypertext Transfer Protocol Secure (HTTPS) to
authenticate web applications. The certificate can be self-signed or issued by a
Certificate Authority (CA).
service processor (SP) A device used to manage chassis environmental, configuration, and service
functions, and receive event data from other parts of the system. It receives
data through sensor interfaces and interprets this data by using the sensor data
record (SDR) to which it provides an interface. The SP provides another
Glossary-18 Integrated Lights Out Manager (ILOM) Administration Guide for ILOM 1.1.1 • May 2007
interface to the system event log (SEL). Typical functions of the SP are to
measure processor temperature, power supply values, and cooling fan status.
The SP can take autonomous action to preserve system integrity.
session time-out A specified duration after which a server can invalidate a user session.
Simple Network
Management Protocol
(SNMP) A simple protocol used to exchange data about network activity. With SNMP,
data travels between a managed device and a network management station
(NMS). A managed device can be any device that runs SNMP, such as hosts,
routers, web servers, or other servers on the network.
Small Computer
System Interface
(SCSI) An ANSI standard for controlling peripheral devices by one or more host
computers. SCSI defines a standard I/O bus-level interface and a set of high-
level I/O commands.
subnet A working scheme that divides a single logical network into smaller physical
networks to simplify routing. The subnet is the portion of an Internet Protocol
(IP) address that identifies a block of host IDs.
subnet mask A bit mask used to select bits from an Internet address for subnet addressing.
The mask is 32 bits long and selects the network portion of the Internet address
and one or more bits of the local portion. Also called an “address mask.”
superuser A special user who has privileges to perform all administrative functions on a
UNIX system. Also called “root.”
Glossary-19
T
Telnet The virtual terminal program that enables the user of one host to log in to a
remote host. A Telnet user of one host who is logged in to a remote host can
interact as a normal terminal user of the remote host.
threshold Minimum and maximum values within a range that sensors use when
monitoring temperature, voltage, current, and fan speed.
time-out A specified time after which the server should stop trying to finish a service
routine that appears to be hung.
transmission control
block (TCB) Part of the Transmission Control Protocol/Internet Protocol (TCP/IP) that
records and maintains information about the state of a connection.
Transmission Control
Protocol/Internet
Protocol (TCP/IP) An Internet protocol that provides for the reliable delivery of data streams
from one host to another. TCP/IP transfers data between different types of
networked systems, such as systems running Solaris, Microsoft Windows, or
Linux software. TCP guarantees delivery of data and that packets will be
delivered in the same sequence in which they were sent.
U
uninterruptible power
supply (UPS) An auxiliary or backup power supply that provides electrical service over
extended system power outages. A UPS for a LAN or computer system
provides continuous power in the event of a power failure.
Glossary-20 Integrated Lights Out Manager (ILOM) Administration Guide for ILOM 1.1.1 • May 2007
unshielded twisted
pair/shielded twisted
pair (UTP/STP) A type of Ethernet cable.
user account A record of essential user information that is stored on the system. Each user
who accesses a system has a user account.
user identification
(userid) A unique string identifying a user to a system.
user identification
number (UID
number) The number assigned to each user accessing a UNIX system. The system uses
UID numbers to identify, by number, the owners of files and directories.
user name A combination of letters, and possibly numbers, that identifies a user to the
system.
V
voltage regulator
module (VRM) An electronic device that regulates a system’s microprocessor voltage
requirements in order to maintain the correct voltage.
volume One or more disk drives that can be grouped into a unit for data storage.
volume manager Software that organizes data blocks on physical disk drives into logical
volumes, which makes the disk data independent of the physical path name of
the disk drives. Volume manager software provides data reliability through
disk striping, concatenation, mirroring, and dynamic growth of metadevices or
volumes.
W
W3C Refers to the World Wide Web Consortium. W3C is an international
organization that governs Internet standards.
Glossary-21
web server Software that provides services to access the Internet or an intranet. A web
server hosts web sites, provides support for HTTP/HTTPS and other protocols,
and executes server-side programs.
X
X.509 certificate The most common certificate standard. X.509 certificates are documents
containing a public key and associated identity information, digitally signed by
a Certificate Authority (CA).
X Window System A common UNIX window system that enables a workstation or terminal to
control multiple sessions simultaneously.
Glossary-22 Integrated Lights Out Manager (ILOM) Administration Guide for ILOM 1.1.1 • May 2007
Index
Index-1
FRUs, 9-2 log in
WebGUI, 4-4
H log out
hardware WebGUI, 4-4
power and WebGUI, 9-1
redirecting M
keyboard and mouse, 10-11 MAC address, 1-4, 2-4, 2-5, 2-8
storage devices, 10-13 Management Information Base (MIB)
replaceable components, 9-2 description of, 14-2
viewing revisions, 9-17
host serial console, 7-2 N
HTTPS N1, 1-4
enabling, 7-13 NTP, configuring, 6-5
I P
ILOM PET alerts, 8-7
alerts and CLI, 8-6
ports, B-1
and LDAP, 12-1 to 12-5, ?? to 12-6
clock, 7-6
configuring alerts, 9-10 R
default settings, 1-3 remote client, redirecting hardware to, 10-3
Ethernet connection, 2-2 remote console
managing network settings, 6-3 overview, 1-2, 10-1
managing serial port settings, 6-1 redirecting
managing user accounts, 5-2, 5-4 keyboard and mouse, 10-11
namespaces, 3-1 storage devices, 10-13
power and WebGUI, 9-1 sending a break to host, 10-12
redirecting keyboard and mouse, 10-11 starting, 10-5
resetting password, 6-7, 7-9 replaceable components, 9-2
serial connection, 2-3
serial port, configuring, 7-1 S
tasks and management interfaces, 1-2 sending a break to host, 8-1, 10-12
time-out, 7-16 sensor thresholds, 9-7
upgrading firmware, 7-10
sensors
ILOM ports, B-1 fan sensors, temperature, 9-5
internal serial port, 7-2 voltage, 9-5
IPMI, 4-2, 8-7 server module ILOM
alerts and traps, 8-6 connecting through chassis serial connector, 2-5
IPMItool, 11-2 SNMP, 14-1 to 14-7
overview, 1-2, 11-1 and MIB, 14-2
sensors, 11-2 management software, 14-3
overview, 1-2, 14-1
J Port, Standard (161), 14-3
Java Client, remote console, 1-2 user accounts
adding, 14-5
L configuring, 14-5
locate LED, 9-9 deleting, 14-5
Index-2 Integrated Lights Out Manager (ILOM) Administration Guide for ILOM 1.1.1 • May 2007
properties, 14-6
v1, v2c, v3, 14-6
SP
overview, 1-1
software, see ILOM
specifications, system, B-1
system management using N1, 1-4
system specifications, B-1
T
temperature sensors, 9-5
thresholds
sensors, 9-7
time stamp, 9-15
U
user privilege levels, 3-2
V
viewing
event log, 8-9, 9-13
replaceable components, 9-2
voltage sensors, 9-5
W
WebGUI
configuring serial port, 7-1
controlling power, 9-1
log in, 4-4
log out, 4-4
overview, 1-1
remote console, 10-1
setting clock, 7-6
time-out, 7-16
Index-3
Index-4 Integrated Lights Out Manager (ILOM) Administration Guide for ILOM 1.1.1 • May 2007