HP Integrated Lights-Out 2 Management Processor Scripting and Command Line Resource Guide
The keys do not work before authentication. The power control requests are correctly ignored when
you do not have the correct power control privileges.
Telnet security
Telnet is an unsecured network protocol. To reduce any security risks:
• Use SSH instead of Telnet. SSH is essentially secure or encrypted Telnet. CLI is supported
through Telnet as well as SSH.
• Use a segregated management network. Preventing unauthorized access to the network
segment prevents unauthorized activity.
Supported key sequences
iLO 2 supports the VT100+ protocol. The following tables define the supported key sequences.
iLO 2 VT100+ key map
The following are VT100+ key sequences.
• Many terminal programs send CR-LF when they mean Enter.
Sequence "\r\n" = '\r'
• Some terminals send ASCII 127 (DEL) when they mean backspace. The Delete key never
sends DEL. It sends "\e[3~".
• Some programs use the following mapping for HOME and END:
sequence "\e[H" = HOME_KEY
sequence "\e[F" = END_KEY
• ALT_CAPITAL_O and ALT_LEFT_SQBRACKET are ambiguous.
• Terminate longer sequences that start with \eO and \e[), with \?.
SequenceKeySequenceKey
\e&ALT_AMPER\177\010
\e'ALT_APOS\e[AUP_KEY
\e(ALT_OPAREN\e[BDOWN_KEY
\e)ALT_CPAREN\e[CRIGHT_KEY
\e*ALT_STAR\e[DLEFT_KEY
\e+ALT_PLUS\eAALT_A
\e,ALT_COMMA\eBALT_B
\e-ALT_MINUS\eCALT_C
\e.ALT_PERIOD\eDALT_D
\e/ALT_SLASH\eEALT_E
\e:ALT_COLON\eFALT_F
\e;ALT_SEMICO\eGALT_G
\e<ALT_LESS\eHALT_H
\e=ALT_EQUAL\eIALT_I
\e>ALT_MORE\eJALT_J
\e?ALT_QUES\eKALT_K
38 Telnet










