Users Guide
Table Of Contents
- User’s Guide
- Introduction
- What’s New for Version 6.1
- Setup and Administration
- Using Server Administrator
- Server Administrator Services
- Working With Remote Access Controller
- Overview
- Viewing Basic Information
- Configuring the Remote Access Device to use a LAN Connection
- Configuring the Remote Access Device to use a Serial Port Connection
- Configuring the Remote Access Device to use a Serial Over LAN Connection
- Additional Configuration for iDRAC
- Configuring Remote Access Device Users
- Setting Platform Event Filter Alerts
- Server Administrator Logs
- Setting Alert Actions
- Troubleshooting
- Frequently Asked Questions
- Glossary
- Index

126 Glossary
ROM
Acronym for read-only memory. Your system contains some programs essential
to its operation in ROM code. Unlike RAM, a ROM chip retains its contents even
after you turn off your system. Examples of code in ROM include the program
that initiates your system's boot routine and the POST.
RPM
Abbreviation for Red Hat
®
Package Manager.
SAS
Acronym for Secure Authentication Services or Serial-attached SCSI. When referring
to security protocols or authentication, SAS is Secure Authentication Services.
When referring to computer peripheral devices that employ a serial (one bit at a time)
means of digital data transfer over thin cables, SAS is Serial-attached SCSI.
SCSI
Acronym for small computer system interface. An I/O bus interface with faster
data transmission rates than standard ports. You can connect up to seven devices
(15 for some newer SCSI types) to one SCSI interface.
SEL
Acronym for system event log.
serial port
An I/O port used most often to connect a modem to your system. You can usually
identify a serial port on your system by its 9-pin connector.
settings
Settings are conditions of a manageable object help to determine what happens
when a certain value is detected in a component. For example, a user can set the
upper critical threshold of a temperature probe to 75 degrees Celsius. If the probe
reaches that temperature, the setting results in an alert being sent to the
management system so that user intervention can be taken. Some settings, when
reached, can trigger a system shutdown or other response that can prevent damage
to the system.
book.book Page 126 Monday, June 22, 2009 11:05 AM