EXPRESSSCOPE Engine 3 User's Guide 1st Edition May, 2011
TRADEMARKS AND PATENTS Microsoft, Windows and Windows Vista are registered trademarks of Microsoft Corporation in the United States and other countries. Firefox is registered trademarks of the Mozilla Foundation. Java is registered trademarks of Sun Microsystems, Inc. in the United States and other countries. LICENSE NOTE This product includes open source software programs described below.
We protect your rights with two steps: (1) copyright the software, and (2) offer you this license which gives you legal permission to copy, distribute and/or modify the software. Also, for each author's protection and ours, we want to make certain that everyone understands that there is no warranty for this free software.
stating that you changed the files and the date of any change. b) You must cause any work that you distribute or publish, that in whole or in part contains or is derived from the Program or any part thereof, to be licensed as a whole at no charge to all third parties under the terms of this License.
The source code for a work means the preferred form of the work for making modifications to it. For an executable work, complete source code means all the source code for all modules it contains, plus any associated interface definition files, plus the scripts used to control compilation and installation of the executable.
apply and the section as a whole is intended to apply in other circumstances. It is not the purpose of this section to induce you to infringe any patents or other property right claims or to contest validity of any such claims; this section has the sole purpose of protecting the integrity of the free software distribution system, which is implemented by public license practices.
12.
Yoyodyne, Inc., hereby disclaims all copyright interest in the program `Gnomovision' (which makes passes at compilers) written by James Hacker. , 1 April 1989 Ty Coon, President of Vice This General Public License does not permit incorporating your program into proprietary programs. If your program is a subroutine library, you may consider it more useful to permit linking proprietary applications with the library.
or for a fee, you must give the recipients all the rights that we gave you. You must make sure that they, too, receive or can get the source code. If you link other code with the library, you must provide complete object files to the recipients, so that they can relink them with the library after making changes to the library and recompiling it. And you must show them these terms so they know their rights.
free software. For example, permission to use the GNU C Library in non-free programs enables many more people to use the whole GNU operating system, as well as its variant, the GNU/Linux operating system. Although the Lesser General Public License is Less protective of the users' freedom, it does ensure that the user of a program that is linked with the Library has the freedom and the wherewithal to run that program using a modified version of the Library.
You may charge a fee for the physical act of transferring a copy, and you may at your option offer warranty protection in exchange for a fee. 2. You may modify your copy or copies of the Library or any portion of it, thus forming a work based on the Library, and copy and distribute such modifications or work under the terms of Section 1 above, provided that you also meet all of these conditions: a) The modified work must itself be a software library.
instead of to this License. (If a newer version than version 2 of the ordinary GNU General Public License has appeared, then you can specify that version instead if you wish.) Do not make any other change in these notices. Once this change is made in a given copy, it is irreversible for that copy, so the ordinary GNU General Public License applies to all subsequent copies and derivative works made from that copy.
work containing portions of the Library, and distribute that work under terms of your choice, provided that the terms permit modification of the work for the customer's own use and reverse engineering for debugging such modifications. You must give prominent notice with each copy of the work that the Library is used in it and that the Library and its use are covered by this License. You must supply a copy of this License.
distribute. 7.
and the section as a whole is intended to apply in other circumstances. It is not the purpose of this section to induce you to infringe any patents or other property right claims or to contest validity of any such claims; this section has the sole purpose of protecting the integrity of the free software distribution system which is implemented by public license practices.
. IN NO EVENT UNLESS REQUIRED BY APPLICABLE LAW OR AGREED TO IN WRITING WILL ANY COPYRIGHT HOLDER, OR ANY OTHER PARTY WHO MAY MODIFY AND/OR REDISTRIBUTE THE LIBRARY AS PERMITTED ABOVE, BE LIABLE TO YOU FOR DAMAGES, INCLUDING ANY GENERAL, SPECIAL, INCIDENTAL OR CONSEQUENTIAL DAMAGES ARISING OUT OF THE USE OR INABILITY TO USE THE LIBRARY (INCLUDING BUT NOT LIMITED TO LOSS OF DATA OR DATA BEING RENDERED INACCURATE OR LOSSES SUSTAINED BY YOU OR THIRD PARTIES OR A FAILURE OF THE LIBRARY TO OPERATE WITH ANY OTH
OpenSSL Toolkit This product includes software developed by the OpenSSL Project for use in the OpenSSL Toolkit (http://www.openssl.org/). This product includes cryptographic software written by Eric Young (eay@cryptsoft.com). LICENSE ISSUES ============== The OpenSSL toolkit stays under a dual license, i.e. both the conditions of the OpenSSL License and the original SSLeay license apply to the toolkit. See below for the actual license texts. Actually both licenses are BSD-style Open Source licenses.
* PURPOSE ARE DISCLAIMED.
* * THIS SOFTWARE IS PROVIDED BY ERIC YOUNG ``AS IS'' AND * ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE * IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE * ARE DISCLAIMED.
Other open source software programs OpenSSH 1) * * * * * * * * Copyright (c) 1995 Tatu Ylonen , Espoo, Finland All rights reserved As far as I am concerned, the code I have written for this software can be used freely for any purpose. Any derived versions of this software must be clearly marked as such, and if the derived work is incompatible with the protocol description in the RFC file, it must be called by a name other than "ssh" or "Secure Shell".
YOU OR THIRD PARTIES OR A FAILURE OF THE PROGRAM TO OPERATE WITH ANY OTHER PROGRAMS), EVEN IF SUCH HOLDER OR OTHER PARTY HAS BEEN ADVISED OF THE POSSIBILITY OF SUCH DAMAGES. 2) The 32-bit CRC compensation attack detector in deattack.c was contributed by CORE SDI S.A. under a BSD-style license. * * * * * * * * * * * * * * * * Cryptographic attack detector for ssh - source code Copyright (c) 1998 CORE SDI S.A., Buenos Aires, Argentina. All rights reserved.
* * * * * * * * * * * * * * * * * * * notice, this list of conditions and the following disclaimer. 2. Redistributions in binary form must reproduce the above copyright notice, this list of conditions and the following disclaimer in the documentation and/or other materials provided with the distribution. 3. Neither the name of the University nor the names of its contributors may be used to endorse or promote products derived from this software without specific prior written permission.
* * * * * * * IN NO EVENT SHALL THE AUTHOR BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.
* * * * * * * * * copyright notice and this permission notice appear in all copies. THE SOFTWARE IS PROVIDED "AS IS" AND TODD C. MILLER DISCLAIMS ALL WARRANTIES WITH REGARD TO THIS SOFTWARE INCLUDING ALL IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS. IN NO EVENT SHALL TODD C.
OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE. OpenLDAP Copyright 1998-2009 The OpenLDAP Foundation All rights reserved. Redistribution and use in source and binary forms, with or without modification, are permitted only as authorized by the OpenLDAP Public License.
* Copyright 1995 by Wietse Venema. All rights reserved. Some individual * files may be covered by other copyrights. * * This material was originally written and compiled by Wietse Venema at * Eindhoven University of Technology, The Netherlands, in 1990, 1991, * 1992, 1993, 1994 and 1995. * * Redistribution and use in source and binary forms are permitted * provided that this entire copyright notice is duplicated in all such * copies.
/* /* */ /* /* /* /* */ IN NO EVENT SHALL THE AUTHORS OR COPYRIGHT HOLDERS BE LIABLE FOR ANY */ CLAIM, DAMAGES OR OTHER LIABILITY, WHETHER IN AN ACTION OF CONTRACT, TORT OR OTHERWISE, ARISING FROM, OUT OF OR IN CONNECTION WITH THE SOFTWARE OR */ THE USE OR OTHER DEALINGS IN THE SOFTWARE. */ */ ------------------------------------------------------------------------- SQLite SQLite is in the Public Domain All of the deliverable code in SQLite has been dedicated to the public domain by the authors.
* must display the following acknowledgement: * "This product includes cryptographic software written by * Eric Young (eay@cryptsoft.com)" * The word 'cryptographic' can be left out if the rouines from the library * being used are not cryptographic related :-). * 4. If you include any Windows specific code (or a derivative thereof) from * the apps directory (application code) you must include an acknowledgement: * "This product includes software written by Tim Hudson (tjh@cryptsoft.
* * Redistribution and use in source and binary forms, with or without * modification, are permitted provided that the following conditions * are met: * 1. Redistributions of source code must retain the above copyright * notice, this list of conditions and the following disclaimer. * 2. Redistributions in binary form must reproduce the above copyright * notice, this list of conditions and the following disclaimer in the * documentation and/or other materials provided with the distribution. * 3.
Version 2.0, January 2004 http://www.apache.org/licenses/ TERMS AND CONDITIONS FOR USE, REPRODUCTION, AND DISTRIBUTION 1. Definitions. "License" shall mean the terms and conditions for use, reproduction, and distribution as defined by Sections 1 through 9 of this document. "Licensor" shall mean the copyright owner or entity authorized by the copyright owner that is granting the License.
copyright license to reproduce, prepare Derivative Works of, publicly display, publicly perform, sublicense, and distribute the Work and such Derivative Works in Source or Object form. 3. Grant of Patent License.
the terms of any separate license agreement you may have executed with Licensor regarding such Contributions. 6. Trademarks. This License does not grant permission to use the trade names, trademarks, service marks, or product names of the Licensor, except as required for reasonable and customary use in describing the origin of the Work and reproducing the content of the NOTICE file. 7. Disclaimer of Warranty.
IPA Font License Agreement v1.0 The Licensor provides the Licensed Program (as defined in Article 1 below) under the terms of this license agreement (“Agreement”). Any use, reproduction or distribution of the Licensed Program, or any exercise of rights under this Agreement by a Recipient (as defined in Article 1 below) constitutes the Recipient’s acceptance of this Agreement. Article 1 (Definitions) 1. “Digital Font Program” shall mean a computer program containing, or used to render or display fonts. 2.
but not limited to broadcasting, communication and various recording media. 4. If any Recipient extracts Embedded Fonts from a Digital Document File to create a Derived Program, such Derived Program shall be subject to the terms of this agreement. 5.
OR IMPLIED WARRANTY AS TO THE LICENSED PROGRAM OR ANY DERIVED PROGRAM, INCLUDING, BUT NOT LIMITED TO, WARRANTIES OF TITLE, NON-INFRINGEMENT, MERCHANTABILITY, OR FITNESS FOR A PARTICULAR PURPOSE, ARE DISCLAIMED.
EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.
Table of Contents Trademarks and Patents..............................................................................................................................2 License Note ................................................................................................................................................2 GNU General Public License ..................................................................................................................2 GNU Lesser General Public Licsense .......
Power ON .............................................................................................................................................66 Forced Power OFF ...............................................................................................................................66 OS Shutdown........................................................................................................................................66 System Reset .................................................
SYMBOLS The following symbols are used throughout this manual. Items to be observed or points to be noted when using this product. Notice Items to be checked when using this product or software. Information useful or convenient for you. Example of troubles occurred.
PREFACE The EXPRESSSCOPE Engine 3 enables you to monitor the operating status of the host system (power supplies, fans, temperature and so forth), to operate the host system’s keyboard, video, and mouse (KVM) from a remote console* and to access to CD-ROM/Floppy disk drives on a remote site*. The EXPRESSSCOPE Engine 3 is enabled by a system management LSI called “BMC (Baseboard Management Controller)” and thus referred to as the “BMC” hereinafter in this User’s Guide.
1. Overview The host system comes standard with the BMC (system management LSI) and a management LAN port dedicated to the BMC. By connecting the management LAN port to your network, you can monitor and control the host system from a remote site via a Web browser and SSH client. With the optional N8115-04 Remote KVM and Media License, you can operate the host system’s KVM (keyboard, video, and mouse) from a remote console and access CD-ROM/DVD-ROM/floppy disk drives and USB memory in a remote site.
2. Configuring the Host System This chapter describes the settings necessary to configure the BMC in the host system. DEFAULT NETWORK SETTINGS The BMC’s default network settings are as follows: IP Address: 192.168.1.1 User Name: Administrator Password: Administrator • Connect the management LAN port to the private network on which the default IP address “192.168.1.1”is reachable.
MANAGEMENT LAN SETTINGS You can configure basic setting of management LAN settings of BMC for remote management using Web server function and command line interface of BMC by using some tools • Web Browser Please refer to Chapter 5 for details. • BMC Configuration (Off-line) Press the F4 key during POST(Power on Self test) or displaying logo immediately after power on or reset the host system to enter the BMC Configuration. • BMC Configuration (On-line Windows/Linux).
(Default setting is 192.168.1.1.) Subnet Mask If DHCP is not used to automatically obtain a subnet mask IP address, enter the subnet mask of your management LAN. If DHCP has been used, an automatically obtained subnet mask IP address will appear. (Default setting is 255.255.255.0.) Default Gateway If DHCP is not used to automatically obtain a default gateway IP address, enter the default gateway of your management LAN. If DHCP has been used, an automatically obtained default gateway will appear.
The Clear BMC Configuration also deletes the settings for ESMPRO ServerManager(a software application bundled for remote management). Be sure to perform a backup for the ESMPRO ServerManager settings before you change the BMC settings. * In some systems, the default settings are different for DCHP, HTTP, HTTPS, and/or SSH.
3. Configuring a Management PC This chapter describes the settings necessary for the remote management PC that will be connected to the host system. SETTING YOUR BROWSER Configure the following settings: - Enable SSL. - Allow Java Script execution. - Allow Java execution. - Accept Cookies. - Allow Popup. - Enable Stylesheet.
4. Networking TCP/IP PORTS The BMC uses the TCP/IP ports listed below. If you use the BMC in a firewall environment, you need to allocate the port numbers (shown in the right column) to the individual non-block ports.
5. Using Remote Management OVERVIEW The BMC Web Server function allows you to control the host system’s power and KVM from a remote console via a Web browser. Part of the above function is implemented by Java Applet. CONNECTING TO THE WEB SERVER Access the following URL from the Web browser on the remote management PC: http://BMC_HostPort or https://BMC_HostPort The “BMC_HostPort” URL includes the BMC’s IP address or host name and a colon followed by a port number for HTTP or HTTPS connection: e.g. 192.
If you use Internet Explorer 7(or 8), the following page is displayed and HTTPS connection is blocked. In this case, select "Continue to this website" to continue.
LOGIN AND LOGOUT Login When the login page appears, input the user name and password, and then click [Login]. 1 1 2 2 3 4 5 1. The display language can be selected to English or Japanese. 2. The online help is displayed. 3. Please input username and password. 4. Secure Mode(HTTPS) or Non Secure Mode(HTTP) can be selected. 5. Please push "Login" button. Notice You can select the display language only in the login page.
Logout Click “Logout” in the upper right corner of the window. When a confirmation dialog appears, click [OK] to log out. After you log out, you return to the login page. Besides, all the remote device windows that were opened during login will be closed. HEADER MENU 2 1 4 3 5 1. Login user name is displayed. 2. Login user’s privilege is displayed. 3. The environment of management PC is displayed, and set by clicking "Environment".. 4. License information is displayed. 5.
SERVER PANEL The server panel is displayed under a browser after log in. The server panel has following functions. 2 1 4 5 6 3 7 1. The virtual LCD that displays the state of the host system. 2. The Button to start RemoteKVM/Media 3. The button that minimizes the server panel. 4. The power switch and a lamp of the host system. The state of the power supply of the host system is shown. 5. The UID(Unit ID) switch and a lamp of the host system. 6. The status lamp of the host system.
SYSTEM A B C 1 2 3 4 A. The system tab. BMC supported functions are displayed. B. The menu that can be selected in the system tab is displayed. C. Information selected by B is displayed. The screen of "Summary" is displayed in the above-mentioned example. Menu 1 Summary The state of information and BMC of the host system is displayed. 2 Component Only items supported with the host system are displayed for each item of composition information.
Login/Logout information and operation log are displayed.
REMOTE ACCESS B C A 1 2 3 4 A. The remote access tab. BMC supported functions are displayed. B. The menu that can be selected in the remote access tab is displayed C. Information selected by B is displayed. The screen of "Power Control" is displayed in the above-mentioned example. Menu 1 Power Control Select Boot device of the host system, powering on/off and reset the system, shutdown the OS. 2 System Operation Start RemoteKVM/Media, turn on/off of UID lamp, press Dump switch and reset BMC.
according to the kind of the floppy disk drive of management PC. Notice When the operation into which the resolution on the host system side frequently changes after remote KVM is started, the remote KVM connection might be disconnect. In that case, please start remote KVM again.
CONFIGURATION B C A 1 2 3 4 5 6 7 8 A. The configuration tab. BMC supported functions are displayed. B. The menu that can be selected in the configuration tab is displayed C. Information selected by B is displayed. The screen of "ECO" is displayed in the above-mentioned example. Menu 1 Network Set IP address and the service of the BMC and the SSL public key can be made. 2 User Management Maintain user and Active directory/LDAP setting, register the SSH public Key.
5 ECO Power consumption and the throttling situation are displayed. Set to manage the electric power control. 6 Miscellaneous Set to manage from SEL, the access log, AC-LINK, PEF, and the management software. 7 Backup/Restore Restored as the backup of the set each item. 8 System BIOS Some functions of System BIOS can be set.
UPDATE B A C 1 2 A. The update tab. BMC supported functions are displayed. B. The menu that can be selected in the update tab is displayed C. Information selected by B is displayed. The screen of "BMC Firmware" is displayed in the above-mentioned example. Menu 1 BMC Firmware Update the BMC firmware regardless of power-off/on of the host system. 2 System BIOS Update the System BIOS regardless of power-off/on of the host system.
6. Command Line Interface OVERVIEW With the BMC Command Line Interface, you can control the host system from a remote SSH client. The BMC supports SSH (Version 2) protocol. CONNECTING TO BMC Access the BMC IP address or DNS host name from SSH client on the remote management PC.
LOGIN AND LOGOUT Login Enter your user name and password at login prompt. A command prompt will be displayed after login. Also you can login by using public key authentication. The user account is common to the one for a remote management function via web browser. The number of users who can log in the system using the command line interface at the same time is three users or less.
BASIC COMMANDS This section describes basic commands to use them as the command line interface. These basic commands manage the host system by using the concept of command (verb) and target (Managed Element) proposed by DMTF (Distributed Management Task Force). Each basic command functions to a specified target. The target points the managed element by address path much like the path to a file in a file system.
help Syntax: help [] [] Description: A basic command, , can be specified for the . The help command displays the help string for specified basic command when argument is specified. reset Syntax: reset [] [] Description: The reset command performs a hardware reset on the . /admin1/system1 and /admin1/sp1 are available for the of the reset command. For /admin1/system1, the host system is reset.
The show command is used to display information about the target specified by the argument. The command displays the target specified by the as the first line of the information. It displays the current default target in the first line if is not specified. The default behavior of the command for the target specified by the is as follows. The command display targets which are contained by the specified target after the "Targets" string.
version Syntax: version [] Description: The version command is used to display the version of the command line protocol specification which is supported.
REMOTE CONTROL You can perform remote control of the host system at the command prompt. Notice Performing remote control when the operating system is running may cause the loss of data in the host system. The user must have an account as operator or administrator for remote control. Power ON Enter the following command at the command prompt. start /admin1/system1 Forced Power OFF Enter the following command at the command prompt.
Remote Console To start a character-based remote console, enter the following command at the command prompt. start /admin1/system1/textredirectsvc1 To return from the character-based remote console to the command interface session, enter the stop keys (key, key, key, key and key) during the character-based remote console. Notice The standard serial port B (COM B) on the host system cannot be used for connecting another device in this cases because the BMC occupies the serial port B.
To stop the character-based remote console using by other user forcibly, enter the following command at the command prompt. set /admin1/system1/textredirectsvc1/textredirectsap1 EnabledState=6 Please confirm in advance whether it is OK to stop the character-based remote console using by other user forcibly. The user must have an account as administrator for stopping the character-based remote console forcibly.
UID Switch Control You can turn on/off the UID (Unit ID) LED on the host system by the virtual UID switch through the command line interface. This function is available only in the host system with UID LED. Notice The user must have an account as administrator for UID Switch Control (turning on or turning off the UID LED) because of using the set command for the UID Switch Control. Turning on UID LED Enter the following command at the command prompt.
• The UID LED will blink (flash) when it is controlled by Chassis Identify function of management software such as ESMPRO ServerManager. The UID LED will turn on when it is controlled by pushing the UID switch of the host system or using UID switch control function of BMC's web server or command line interface. For actual display state of the UID LED, blinking (flashing) the UID LED is higher priority than turning on it when it is controlled at a same time (blinking state AND turning on state).
SYSTEM EVENT LOG You can display system event log and modify setting of the system event log through the command line interface. Viewing system event log To move the current default target to /admin1/system1/log1, enter the following command at the command prompt. cd /admin1/system1/log1 Here, to confirm the total number of system event log records, enter the following command. The "Targets" section reported by the following command indicates the "record" target(s).
Setting of system event log To move the current default target to /admin1/system1/log1, enter the following command at the command prompt. cd /admin1/system1/log1 The "Properties" section reported by the following command indicates the current setting of system event log. show Enter the following command if you would like to modify a property of the setting of system event log .
ACCESS LOG You can display, clear, and set the access log for the management LAN. The user must have an account as administrator for clearing and setting the access log. The following are events supported by the Access Log function. • Login and logout events for HTTP, HTTPS, and SSH connections • System control (Power OFF/ON, system reset, etc…) via Web browser. • Modify the setting (Network setting, etc…) via Web browser.
You can display only access log that corresponded to the specified from following condition. • timestamp Specify the date by the following format: MM/DD/YYYY • user Specify the user name. • ipaddress Specify the IP address on the remote management PC by the following format: XXX.XXX.XXX.XXX • protocol Specify the following protocol: http, https, ssh • event Specify the following event: normal, error “normal” means not error event. ”error” means error event.
Access log might not be correctly displayed with timestamp condition about the log of recorded from AC ON to DC ON on host system. Clearing access log To move the current default target to /admin1/sp1/log1/record1, enter the following command at the command prompt. cd /admin1/sp1/log1/record1 Enter the following command, if you would like to clear the access log. delete Setting access log To move the current default target to /admin1/sp1/log1, enter the following command at the command prompt.
means that the access log is disabled. This is the dynamic setting. • oemnec_httplog_enable This specifies whether access log for login/logout of HTTP is enabled. The valid values for this property are "2" and "3". "2" means that the access log is enabled. "3" means that the access log is disabled. This is the dynamic setting. For example, enter the following command when you would like to use the access log for login/logout of HTTPS.
USER SETTINGS This section describes how to confirm and modify the user account through the command line interface. To move the current default target to an user account target which you would like to confirm or (and) modify, enter the following command at the command prompt. means any value between 1 and 12: Therefore you can select a user account between account1 and account12.
NETWORK SETTINGS This section describes how to confirm and modify the network setting for management LAN through the command line interface. To move the current default target to /admin1/sp1/enetport1, enter the following command at the command prompt: cd /admin1/sp1/enetport1 Enter the following command, if you would like to confirm properties of the Ethernet port target which is /admin1/sp1/enetport1.
The properties which the access limitation target contains are as follows: • oemnec_allowedaccessips This specifies the IP addresses that permit access to the management LAN. Divide IP address by "," (ex. 192.168.1.2, 192.168.1.2, …) or use asterisk (ex. 192.168.1.*), if you would like to set multiple permit IP address. Set "0.0.0.0" or no (*) to this property, if you would like to clear the value of this property, It becomes effective at next login if you change it.
Followings describe how to confirm and modify the DHCP setting for management LAN through the command line interface. To move the current default target to /admin1/sp1/enetport1/lanendpt1/ipendpt1, enter the following command at the command prompt: cd /admin1/sp1/enetport1/lanendpt1/ipendpt1 Enter the following command, if you would like to confirm properties of the DHCP target which is /admin1/sp1/enetport1/lanendpt1/ipendpt1.
• AccessInfo This specifies the IP address of the default gateway for the management LAN. This property is read-only. Followings describe how to confirm and modify the network setting with disabling DHCP for management LAN through the command line interface.
set = The properties which the HTTP service target contains are as follows: • EnabledState This specifies whether HTTP port is enabled for the management LAN. The valid values for this property are "2" and "3". "2" means that the HTTP port is enabled. "3" means that the HTTP port is disabled. This is the dynamic setting. • oemnec_httpport This specifies the HTTP port for the management LAN. This is the dynamic setting.
Enter the following command if you would like to modify a property of the SSH service target. set = The properties which the SSH service target contains are as follows: • EnabledState This specifies whether SSH port is enabled for the management LAN. The valid values for this property are "2" and "3". "2" means that the SSH port is enabled. "3" means that the SSH port is disabled. This is the dynamic setting. • oemnec_sshport This specifies the SSH port for the management LAN.
POWER CONSUMPTION CONTROL You can control the power consumption of the host system through the command line interface. The user must have an account as administrator for controlling the power consumption. To move the current default target to /admin1/system1, enter the following command at the command prompt: cd /admin1/system1 State confirmation and modification of Power Consumption Control Enter the following command, if you would like to confirm properties related to the power consumption.
• oemnec_PowerCapvalue This specifies the value of the power consumption starting he power consumption control. This is the dynamic setting. This property is not displayed if oemnec_CriticalPowerCapSensor is disabled. • oemnec_setablePowerCapvalue This specifies the value range of the settable oemnec_PowerCapvalue. This property is read-only. This property is not displayed if oemnec_CriticalPowerCapSensor is disabled.
CONFIRMING SYSTEM INFORMATION This section describes how to confirm the system information (product, BIOS/BMC firmware revision, MAC address of System LAN, CPU, Memory) through the command line interface. The values of the properties for items not supported by the host system is not displayed for the system information.
Confirming System BIOS revision You can confirm the System BIOS revision through the command line interface by entering following the basic command at the command prompt. show /admin1/system1/swid1 In this case, the System BIOS revision is appeared at the right side of "VersionString=" string in the "Properties" section. Confirming BMC firmware revision You can confirm the BMC firmware revision through the command line interface by entering following the basic command at the command prompt.
For example, enter the following command when you would like to confirm the information of CPU1. show cpu1 The example of displaying information in this case is shown below.
Confirming Memory Information To move the current default target to /admin1/system1, enter the following command at the command prompt. cd /admin1/system1 Here, to confirm all the targets for memory (DIMM), enter the following command at the command prompt. All the memory (DIMM) targets are represented as memory strings at "Targets" section. means value of one-origin integer.
SPECIAL EXTENDED COMMANDS This section describes the special extended command which can do state acquisition (powerstate, lampstate) and interrupt generation for OS dump (nmidump). The special extended commands use the syntaxes different from the basic command's ones. State Acquisition You can acquire the state of the system at the command prompt: Commands to acquire the state are executable in all user levels.
Status LED state acquisition Enter the following command at the command prompt: lampstate -statuslamp One of the following responses is returned according to the STATUS LED state. off STATUS LED is turned off. green on STATUS LED lights in green. green blink STATUS LED is blinking in green. amber on STATUS LED lights in amber. amber blink STATUS LED is blinking in amber. red on STATUS LED lights in red. red blink STATUS LED is blinking in red.
Interrupt Generation for OS Dump You can execute OS dump by entering following command at the command prompt. nmidump /admin1/system1 Notice The user must have an account as administrator for executing the nmidump command. The above command behavior is equivalent to pressing the DUMP switch on the host system.
7. WS-Management (Web Service for Management) OVERVIEW With the WS-Management Protocol, you can control the host system and check the sensor of host system. EXPRESSSCOPE Engine 3 implementation of WS-Management complies with the specification, DTMF Web Services for Management 1.0.0. EXPRESSSCOPE Engine 3 is confirmed the WS-Management operation with the following tools that support the WS-Management protocol. • Windows Remote Management (WinRM) 2.
Power ON Create the file input-RequestPowerStateChange2.xml and enter the following command, if you use WinRM. winrm invoke RequestPowerStateChange http://schemas.dmtf.org/wbem/wscim/1/cim-schema/2/CIM_PowerManagementServ ice?__cimnamespace=root/cimv2+Name=IPMI¥_Power¥_Service+CreationClassNa me=CIM_PowerManagementService+SystemName=Unknown.IPMI¥_BMC¥_DeviceI D.
D.32+SystemCreationClassName=Host_ComputerSystem -r:https://IP_ADDRESS/wsman -username:USERNAME -password:PASSWORD -auth:basic -encoding:utf-8 -format:xml -file:input-RequestPowerStateChange6.xml -skipCNcheck -skipCAcheck -skipRevocationcheck input-RequestPowerStateChange6.xml PAGE 96OS Shutdown Create the file input-RequestPowerStateChange8.xml and enter the following command, if you use WinRM. winrm invoke RequestPowerStateChange http://schemas.dmtf.org/wbem/wscim/1/cim-schema/2/CIM_PowerManagementServ ice?__cimnamespace=root/cimv2+Name=IPMI¥_Power¥_Service+CreationClassNa me=CIM_PowerManagementService+SystemName=Unknown.IPMI¥_BMC¥_DeviceI D.
System Reset Create the file input-RequestPowerStateChange10.xml and enter the following command, if you use WinRM. winrm invoke RequestPowerStateChange http://schemas.dmtf.org/wbem/wscim/1/cim-schema/2/CIM_PowerManagementServ ice?__cimnamespace=root/cimv2+Name=IPMI¥_Power¥_Service+CreationClassNa me=CIM_PowerManagementService+SystemName=Unknown.IPMI¥_BMC¥_DeviceI D.
Interrupt Generation for OS Dump Create the file input-RequestPowerStateChange11.xml and enter the following command, if you use WinRM. winrm invoke RequestPowerStateChange http://schemas.dmtf.org/wbem/wscim/1/cim-schema/2/CIM_PowerManagementServ ice?__cimnamespace=root/cimv2+Name=IPMI¥_Power¥_Service+CreationClassNa me=CIM_PowerManagementService+SystemName=Unknown.IPMI¥_BMC¥_DeviceI D.
SENSOR INFORMATION You can get sensor information either by enumeration of all sensors or by retrieving specified sensor. Enumeration of All Sensors Enter the following command, if you enumerate numeric sensors (e.g.: temperature, voltage) with WinRM. winrm enumerate http://schemas.dmtf.
8. Troubleshooting ERROR MESSAGES Abnormality occurs while using remote management, and the error dialog might be displayed in management PC. Please refer to the list of the message of the online help for the main message and the coping process. ABOUT ECO SETTING The electric power value might not necessarily reach even the value of Power Cap value. The electric power control lowers the power consumption of the system by lowering the frequency of CPU/Memory.
EXPRESSSCOPE Engine 3 User’s Guide ©NEC Corporation 2011 - 101-