Installation guide
68 AlterPath OnBoard Installation Guide
IPDU (intelligent power distribution unit)
A device with multiple power inlets into which IIT assets can be plugged for
remote power management. Cyclades supports a family of AlterPath PM
IPDUs that can be remotely managed when they are connected to AlterPath
devices, such as the AlterPath KVM/net or AlterPath OnBoard.
IPMI (Intelligent Platform Management Interface)
An open standards vendor-independent service processor currently adopted by
many major server platform vendors. Its main benefit over other service
processor types is that it is installed on servers from many vendors, providing
one interface and protocol for all servers. Its main disadvantage is that it does
not always provide as much functionality as the proprietary service
processors. For this reason, IBM’s series e325 and e326 servers use IPMI to
manage their BMCs but the top-of-the-line xSeries servers use RSA II. IPMI
works by interacting with the BMC, and since it usually has standby power, it
can function even if the operating system is unavailable or if the system is
powered down. The OnBoard supports IPMI version 1.5. OnBoard
administrators can create custom Expect scripts to support IPMI 2.0.
ipmitool
A command line utility that interfaces with any BMC that supports
either IPMI 1.5 or 2.0 specifications. Reads the sensor data repository
(SDR) and prints sensor values, displays the contents of the System
Event Log (SEL), prints Field Replaceable Unit (FRU) inventory
information, reads and sets LAN configuration parameters, and
performs remote chassis power control. Described at SourceForge at:
http://ipmitool.sourceforge.net. The command options are
described on the
ipmitool(1) man page at SourceForge: http://
ipmitool.sourceforge.net/manpage.html
. ipmitool
commands can be added to customized scripts on the OnBoard to
access unsupported features on a connected service processor.
IPSec (Internet protocol security)
A suite of protocols used for establishing private, secure, connections over IP
networks. Only the sending and receiving computers need to be running
IPSec. Each computer handles security at its end and assumes that the
intermediary nodes between the source and destination computers are not