NEC Express Server Express5800 Series EXPRESSSCOPE Engine 3 User’s Guide 1. Overview 2. Configuring the Host System 3. Configuring a Management PC 4. Networking 5. Using Remote Management 6. Command Line Interface 7. WS-Management (Web Service for Management) 8.
TRADEMARKS AND PATENTS EXPRESSSCOPE is registered trademarks of NEC Corporation. EXPRESSBUILDER and ESMPRO are registered trademarks of NEC Corporation. Microsoft, Windows and Windows Vista, Windows Media Player are registered trademarks of Microsoft Corporation in the United States and other countries. Firefox is registered trademarks of the Mozilla Foundation. Java is registered trademarks of Oracle and/or its affiliates.
Table of Contents Trademarks and Patents .............................................................................................................................. 2 Notes ........................................................................................................................................................... 2 About This User' s Guide ............................................................................................................................. 2 Symbols .................
Special Extended Commands .................................................................................................................... 66 State Acquisition ................................................................................................................................... 66 Power State acquisition .................................................................................................................... 66 Lamp State acquisition ..............................................
SYMBOLS The following symbols are used throughout this manual. Items to be observed or points to be noted when using this product. Notice Items to be checked when using this product or software. Information useful or convenient for you. Example of troubles occurred.
PREFACE The EXPRESSSCOPE Engine 3 enables you to monitor the operating status of the host system (power supplies, fans, temperature and so forth), to operate the host system’s keyboard, video, and mouse (KVM) from a remote console* and to access to CD-ROM/Floppy disk drives on a remote site*. The EXPRESSSCOPE Engine 3 is enabled by a system management LSI called “BMC (Baseboard Management Controller)” and thus referred to as the “BMC” hereinafter in this User’s Guide.
1. Overview The host system comes standard with the BMC (system management LSI) and a management LAN port dedicated to the BMC. By connecting the management LAN port to your network, you can monitor and control the host system from a remote site via a Web browser and SSH client.
2. Configuring the Host System This chapter describes the settings necessary to configure the BMC in the host system. DEFAULT NETWORK SETTINGS The BMC’s default network settings are as follows: IP Address: 192.168.1.1 User Name: Administrator Password: Administrator • Connect the management LAN port to the private network on which the default IP address “192.168.1.1”is reachable.
MANAGEMENT LAN SETTINGS You can configure basic setting of management LAN settings of BMC for remote management using Web server function and command line interface of BMC by using some tools • Web Browser Please refer to Chapter 5 for details. • Server Configuration Utility (Off-line) Press the F4 key during POST(Power on Self test) or displaying logo immediately after power on or reset the host system to enter the Server Configuration Utility. • Server Configuration Utility (On-line Windows/Linux).
Connection Type Select appropriate setting for link speed and duplex mode which you need. Following settings are available. (Default setting is [Auto Negotiation].) - Auto Negotiation - 100Mbps Full Duplex - 100Mbps Half Duplex - 10Mbps Full Duplex - 10Mbps Half Duplex Notice Select [Auto Negotiation] if the link speed and duplex mode (Connection Type) of the switch (such as HUB) connected to the Management LAN is [Auto Negotiation].
Command Line Interface: SSH Select [Enabled] to use the Command Line Interface using SSH. If not, select [Disabled]. (Default setting is [Enabled](*).) SSH Port Number Specify the BMC’s SSH port number. (Default setting is 22.) BMC Initialization The BMC Configuration will be cleared. Please use this function when you forgot your user name and password, etc. for remote management via a Web browser and command line interface.
3. Configuring a Management PC This chapter describes the settings necessary for the remote management PC that will be connected to the host system. SETTING YOUR BROWSER Configure the following settings: - Enable SSL. - Allow Java Script execution. - Allow Java execution. - Accept Cookies. - Allow Popup. - Enable Stylesheet. - Enable HTTP1.1. * If you use Microsoft Internet Explorer, the following configurations are required. - Add BMC’s address to Trusted Sites.
J2SE RUNTIME ENVIRONMENT The management PC requires Java2 Runtime Environment (JRE), Standard Edition 7.0. JRE is available free of charge from Oracle Corporation. For security reasons, you are recommended to use the latest JRE update. In addition, it is recommended to use the 32 bit JRE on the 64 bit Browser. It is necessary to set the following in the Java control panel. - Add BMC’s IP address (both HTTP/HTTPS) to [Exception Site List]-[Security].
4. Networking TCP/IP PORTS The BMC uses the TCP/IP ports listed below. If you use the BMC in a firewall environment, you need to allocate the port numbers (shown in the right column) to the individual non-block ports.
5. Using Remote Management OVERVIEW The BMC Web Server function allows you to control the host system’s power and KVM from a remote console via a Web browser. Part of the above function is implemented by Java Applet. CONNECTING TO THE WEB SERVER Access the following URL from the Web browser on the remote management PC: http://BMC_HostPort or https://BMC_HostPort The “BMC_HostPort” URL includes the BMC’s IP address or host name and a colon followed by a port number for HTTP or HTTPS connection: e.g. 192.
If you did not register the SSL server certificate, the following page is displayed and HTTPS connection is blocked. In this case, select "Continue to this website" to continue (The image if you are using Internet Explorer is as follows).
LOGIN AND LOGOUT Login When the login page appears, input the user name and password, and then click [Login]. 1. The display language can be selected to English or Japanese. 2. The online help is displayed. 3. Please input username and password. 4. Secure Mode(HTTPS) or Non Secure Mode(HTTP) can be selected. 5. Please push "Login" button. 6. Server Name (BMC’s IP address) is displayed (*). (*) Even if you use IPv6 address to login to BMC, BMC’s IP address is displayed as IPv4 address.
Logout Click “Logout” in the upper right corner of the window. When a confirmation dialog appears, click [OK] to log out. After you log out, you return to the login page. Besides, all the remote device windows that were opened during login will be closed. Notice Notice Notice Notice If the browser is slow during login procedure, please restart your brower or logout. BMC FW will be restarted very rare.
1. Login user name is displayed. 2. Login user’s privilege is displayed. 3. The environment of management PC is displayed, and set by clicking "Environment".. 4. License information is displayed. 5. The online help is displayed.
SERVER PANEL The server panel is displayed under a browser after log in. The server panel has following functions. 1. The virtual LCD that displays the state of the host system. 2. The Button to start RemoteKVM/Media 3. The button that minimizes the server panel. 4. The power switch and a lamp of the host system. The state of the power supply of the host system is shown. 5. The UID(Unit ID) switch and a lamp of the host system. 6. The status lamp and power capping lamp of the host system.
SYSTEM A. The system tab. BMC supported functions are displayed. B. The menu that can be selected in the system tab is displayed. C. Information selected by B is displayed. The screen of "Summary" is displayed in the above-mentioned example. Menu 1 Summary The state of information and BMC of the host system is displayed. 2 Component Only items supported with the host system are displayed for each item of composition information.
Login/Logout information and operation log are displayed. 5 Statistics Information The Power Graph which shows power consumption changes of latest 10 minutes or 24 hours are displayed. 6 Video Record Information(*) If the automatic video recording function is enabled from configuration tab, the video records which were recorded at the time of BIOS POST or OS stall are displayed. Also you can playback or download or delete them.
REMOTE ACCESS A. The remote access tab. BMC supported functions are displayed. B. The menu that can be selected in the remote access tab is displayed C. Information selected by B is displayed. The screen of "Power Control" is displayed in the above-mentioned example. Menu 1 Power Control Select Boot device of the host system, powering on/off, power cycle, reset the system, and shutdown the OS. 2 System Operation Start RemoteKVM/Media, turn on/off of UID lamp, press Dump switch and reset BMC.
Notice If you execute “power cycle” under the condition that the “Power Save” is enabled by BIOS Setup Utility, the powering on after the powering off will not work. In this case, please try to press power button of the host system. Notice Click “BMC Reset” only if a problem occurs in EXPRESSSCOPE Engine 3 (BMC). Do not click “BMC Reset” in usual operation. Do not shutdown the system, reboot the system, or perform any switch operation after clicking the “BMC Reset” for approximately 3 minutes.
VI. Users Display the user information that is using the Remote KVM/Media. Up to 2 users can use Remote KVM/Media simultaneously. VII. View Control the visibility of tool bar (control box area and hot key area). The ‘Request Full Control’ menu will be displayed for the Remote KVM/Media that is launched as view only mode and it is possible to request for permission to the Remote KVM/Media that is launched as full control mode. VIII. Info Display the version information.
Notice Notice If you change keyboard language after adding user defined macro on the Remote KVM/Media, the user defined macro that was created with the previous keyboard language might not work well because some keyboard key has different key code depending on the language. In this case, please create the macro again with the current keyboard language.
CONFIGURATION A. The configuration tab. BMC supported functions are displayed. B. The menu that can be selected in the configuration tab is displayed C. Information selected by B is displayed. The screen of "ECO" is displayed in the above-mentioned example. Menu 1 Network Set IP address and the service of the BMC and the SSL public key can be made. 2 User Management Maintain user and Active directory/LDAP setting, register the SSH public Key.
Set the behavior when the SEL repository is full, the access log setting, AC-LINK setting, PEF setting, management setting from the management software, and the automatic video recording setting. 6 ECO Power consumption and the throttling situation are displayed and the power capping can be set. 7 System BIOS Some functions of System BIOS can be set. 8 Battery Controller If the host system is equipped with a battery, various functions of Battery Controller can be set.
Domain Name Limitation Type IPv6 IPv6 Address Assignment Mode IPv6 Static Address IPv6 Prefix Length IPv6 Gateway Address User Management Alert HTTPS HTTPS Port HTTP HTTP Port SSH SSH Port Active Directory Authentication Authentication User Authentication Password User Domain Name Timeout Domain Controller Server Address1 Domain Controller Server Address2 Domain Controller Server Address3 Group Name Group Domain Privilege LDAP Authentication IP address Port Search Base Bind Domain Name Bind Password Grou
Subject Subject Option X-Priority Date Formats SMTP Server Port Authentication Authentication Type User Name Password Alert Level Blank Disable Enable MM/DD/YYYY 0.0.0.0 25 Disable All checked Blank Blank Error, Warning Blank Disable Enable MM/DD/YYYY 0.0.0.
10(*10) 10(*8) Disable(*10) Disable Disable(*10) Disable Performance Performance Performance Mode Optimized Optimized(*10) 0(*10) Disable CPU Cores 0 Behavior when SEL repository Overwrite oldest Overwrite oldest is full SEL SEL (*9) Access Log HTTP Disable Disable HTTPS Disable Disable SSH Disable Disable Operation Disable Disable Power Restore Delay AC-LINK Last state No change Miscellaneous Minimum Delay Time No change configurable time Platform Event Filtering Enable Disable ESMPRO Management no change
Power Save (*3) Serial Port A Enable/Disable Enable/Disable 2E8h 2F8h Serial A Base I/O Serial Port A 3E8h 3F8hBlank IRQ 3 Serial A Interrupt IRQ 4 Serial Port B Enable/Disable 2E8h 2F8h Serial B Base I/O Serial Port B 3E8h 3F8h IRQ 3 Serial B Interrupt IRQ 4 Disabled BIOS Redirection Port Serial Port A Serial Port B VT100+ Terminal Type VT-UTF8 PC-ANSI 9600 19200 Baud Rate 57600 115200 Console 7 Redirection Data Bits 8 None Parity Even Odd 1 Stop Bits 2 None Flow Control Hardware RTS/CTS Continue C.R.
Example of an E-mail alert: Following contents are sent as E-mail alert. Virtual LCD Message: System Rear FAN4 Lower Non-Critical Event Information: Record ID: 0AA0h Timestamp: 10/13/2011 17:59:23 Severity: Non-critical Description: Fan(Speed) - Error Lower Non-critical - going low Dump: A0 0A 02 FB 26 97 4E 20 00 04 04 43 01 57 FF B6 URL: http://192.168.1.11:80 https://192.168.1.11:443 BMC Network Information: BMC IP Address: 192.168.1.
UPDATE A. The update tab. BMC supported functions are displayed. B. The menu that can be selected in the update tab is displayed C. Information selected by B is displayed. The screen of "BMC Firmware" is displayed in the above-mentioned example. Menu 1 BMC Firmware Update the BMC firmware regardless of power-off/on of the host system. 2 System BIOS Update the System BIOS regardless of power-off/on of the host system.
6. Command Line Interface OVERVIEW With the BMC Command Line Interface, you can control the host system from a remote SSH client. The BMC supports SSH (Version 2) protocol. CONNECTING TO BMC Access the BMC IP address or DNS host name from SSH client on the remote management PC.
LOGIN AND LOGOUT Login Enter your user name and password at login prompt. A command prompt will be displayed after login. Also you can login by using public key authentication. The user account is common to the one for a remote management function via web browser. The number of users who can log in the system using the command line interface at the same time is four users or less.
BASIC COMMANDS This section describes basic commands to use them as the command line interface. These basic commands manage the host system by using the concept of command (verb) and target (Managed Element) proposed by DMTF (Distributed Management Task Force). Each basic command functions to a specified target. The target points the managed element by address path much like the path to a file in a file system.
help Syntax: help [] [] Description: A basic command, , can be specified for the . The help command displays the help string for specified basic command when argument is specified. reset Syntax: reset [] [] Description: The reset command performs a hardware reset on the . /admin1/system1 and /admin1/sp1 are available for the of the reset command. For /admin1/system1, the host system is reset.
The show command is used to display information about the target specified by the argument. The command displays the target specified by the as the first line of the information. It displays the current default target in the first line if is not specified. The default behavior of the command for the target specified by the is as follows. The command display targets which are contained by the specified target after the "Targets" string.
with no option as the performs a normal power off request (OS shutdown request) to the host system if /admin1/system1 is specified by the . The command with -f (or -force) as the performs a forced power off request to the host system if /admin1/system1 is specified by the . version Syntax: version [] Description: The version command is used to display the version of the command line protocol specification which is supported.
REMOTE CONTROL You can perform remote control of the host system at the command prompt. Notice Performing remote control when the operating system is running may cause the loss of data in the host system. The user must have an account as operator or administrator for remote control. Power ON Enter the following command at the command prompt. start /admin1/system1 Forced Power OFF Enter the following command at the command prompt.
Remote Console To start a character-based remote console, enter the following command at the command prompt. start /admin1/system1/textredirectsvc1 To return from the character-based remote console to the command interface session, enter the stop keys (key, key, key, key and key) during the character-based remote console. Notice The standard serial port B (COM B) on the host system cannot be used for connecting another device in this cases because the BMC occupies the serial port B.
To stop the character-based remote console using by other user forcibly, enter the following command at the command prompt. set /admin1/system1/textredirectsvc1/textredirectsap1 EnabledState=6 Please confirm in advance whether it is OK to stop the character-based remote console using by other user forcibly. The user must have an account as administrator for stopping the character-based remote console forcibly.
UID Switch Control You can turn on/off the UID (Unit ID) LED on the host system by the virtual UID switch through the command line interface. This function is available only in the host system with UID LED. Notice The user must have an account as administrator for UID Switch Control (turning on or turning off the UID LED) because of using the set command for the UID Switch Control. Turning on UID LED Enter the following command at the command prompt.
• The UID LED will blink (flash) when it is controlled by Chassis Identify function of management software such as NEC ESMPRO Manager. The UID LED will turn on when it is controlled by pushing the UID switch of the host system or using UID switch control function of BMC's web server or command line interface. For actual display state of the UID LED, blinking (flashing) the UID LED is higher priority than turning on it when it is controlled at a same time (blinking state AND turning on state).
SYSTEM EVENT LOG You can display system event log and modify setting of the system event log through the command line interface. Viewing system event log To move the current default target to /admin1/system1/log1, enter the following command at the command prompt. cd /admin1/system1/log1 Here, to confirm the total number of system event log records, enter the following command. The "Targets" section reported by the following command indicates the "record" target(s).
Setting of system event log To move the current default target to /admin1/system1/log1, enter the following command at the command prompt. cd /admin1/system1/log1 The "Properties" section reported by the following command indicates the current setting of system event log. show Enter the following command if you would like to modify a property of the setting of system event log .
ACCESS LOG You can display, clear, and set the access log for the management LAN. The user must have an account as administrator for clearing and setting the access log. The following are events supported by the Access Log function. • Login and logout events for HTTP, HTTPS, and SSH connections • System control (Power OFF/ON, system reset, etc…) via Web browser. • Modify the setting (Network setting, etc…) via Web browser.
You can display only access log that corresponded to the specified from following condition. • timestamp Specify the date by the following format: MM/DD/YYYY • user Specify the user name. • ipaddress Specify the IP address on the remote management PC by the following format: XXX.XXX.XXX.XXX • protocol Specify the following protocol: HTTP, HTTPS, SSH • event Specify the following event: normal, error “normal” means not error event. ”error” means error event.
Access log might not be correctly displayed with timestamp condition about the log of recorded from AC ON to DC ON on host system. Clearing access log To move the current default target to /admin1/sp1/log1/record1, enter the following command at the command prompt. cd /admin1/sp1/log1/record1 Enter the following command, if you would like to clear the access log. delete Setting access log To move the current default target to /admin1/sp1/log1, enter the following command at the command prompt.
means that the access log is disabled. This is the dynamic setting. • oemnec_httplog_enable This specifies whether access log for login/logout of HTTP is enabled. The valid values for this property are "2" and "3". "2" means that the access log is enabled. "3" means that the access log is disabled. This is the dynamic setting. For example, enter the following command when you would like to use the access log for login/logout of HTTPS.
USER SETTINGS This section describes how to confirm and modify the user account through the command line interface. To move the current default target to an user account target which you would like to confirm or (and) modify, enter the following command at the command prompt. means any value between 1 and 12: Therefore you can select a user account between account1 and account12.
NETWORK SETTINGS This section describes how to confirm and modify the network setting for management LAN through the command line interface. To move the current default target to /admin1/sp1/enetport1, enter the following command at the command prompt: cd /admin1/sp1/enetport1 Enter the following command, if you would like to confirm properties of the Ethernet port target which is /admin1/sp1/enetport1.
The properties which the access limitation target contains are as follows: • oemnec_allowedaccessips This specifies the IP addresses that permit access to the management LAN. Divide IP address by "," (ex. 192.168.1.2, 192.168.1.2, …) or use asterisk (ex. 192.168.1.*), if you would like to set multiple permit IP address. Set "0.0.0.0" or no (*) to this property, if you would like to clear the value of this property, It becomes effective at next login if you change it.
Followings describe how to confirm and modify the DHCP setting for management LAN through the command line interface. To move the current default target to /admin1/sp1/enetport1/lanendpt1/ipendpt1, enter the following command at the command prompt: cd /admin1/sp1/enetport1/lanendpt1/ipendpt1 Enter the following command, if you would like to confirm properties of the DHCP target which is /admin1/sp1/enetport1/lanendpt1/ipendpt1.
• AccessInfo This specifies the IP address of the default gateway for the management LAN. This property is read-only. Followings describe how to confirm and modify the network setting with disabling DHCP for management LAN through the command line interface.
set = The properties which the HTTP service target contains are as follows: • EnabledState This specifies whether HTTP port is enabled for the management LAN. The valid values for this property are "2" and "3". "2" means that the HTTP port is enabled. "3" means that the HTTP port is disabled. This is the dynamic setting. • oemnec_httpport This specifies the HTTP port for the management LAN. This is the dynamic setting.
Enter the following command if you would like to modify a property of the SSH service target. set = The properties which the SSH service target contains are as follows: • EnabledState This specifies whether SSH port is enabled for the management LAN. The valid values for this property are "2" and "3". "2" means that the SSH port is enabled. "3" means that the SSH port is disabled. This is the dynamic setting. • oemnec_sshport This specifies the SSH port for the management LAN.
POWER CONSUMPTION CONTROL You can control the power consumption of the host system through the command line interface. The user must have an account as administrator for controlling the power consumption. To move the current default target to /admin1/system1, enter the following command at the command prompt: cd /admin1/system1 State confirmation and modification of Power Consumption Control Enter the following command, if you would like to confirm properties related to the power consumption.
• oemnec_BootPerformanceOptimized This specifies whether Performance Optimized mode is enabled. This is the dynamic setting. This property is not displayed if oemnec_BootTimeConfig is disabled. • oemnec_BootTimeConfig This specifies whether BootingMode is enabled. This is the dynamic setting. Default value is “disabled”. This property supported by specific product.
This specifies the value of the power consumption starting he power consumption control. This is the dynamic setting. This property is not displayed if oemnec_AggressiveMode is disabled. • oemnec_AggressiveModeSetablePowerCapvalue (oemnec_setablePowerCapvalue) This specifies the value range of the settable oemnec_AggressiveModeCapvalue. This property is read-only. This property is not displayed if oemnec_AggressiveMode is disabled.
CONFIRMING SYSTEM INFORMATION This section describes how to confirm the system information (product, BIOS/BMC firmware revision, MAC address of System LAN, CPU, Memory) through the command line interface. The values of the properties for items not supported by the host system is not displayed for the system information.
Confirming System BIOS revision You can confirm the System BIOS revision through the command line interface by entering following the basic command at the command prompt. show /admin1/system1/swid1 In this case, the System BIOS revision is appeared at the right side of "VersionString=" string in the "Properties" section. Confirming BMC firmware revision You can confirm the BMC firmware revision through the command line interface by entering following the basic command at the command prompt.
For example, enter the following command when you would like to confirm the information of CPU1. show cpu1 The example of displaying information in this case is shown below.
Confirming Memory Information To move the current default target to /admin1/system1, enter the following command at the command prompt. cd /admin1/system1 Here, to confirm all the targets for memory (DIMM), enter the following command at the command prompt. All the memory (DIMM) targets are represented as memory strings at "Targets" section. means value of one-origin integer.
SPECIAL EXTENDED COMMANDS This section describes the special extended command which can do state acquisition (powerstate, lampstate) and interrupt generation for OS dump (nmidump). The special extended commands use the syntaxes different from the basic command's ones. State Acquisition You can acquire the state of the system at the command prompt: Commands to acquire the state are executable in all user levels.
Status LED state acquisition Enter the following command at the command prompt: lampstate -statuslamp One of the following responses is returned according to the STATUS LED state. off STATUS LED is turned off. green on STATUS LED lights in green. green blink STATUS LED is blinking in green. amber on STATUS LED lights in amber. amber blink STATUS LED is blinking in amber. red on STATUS LED lights in red. red blink STATUS LED is blinking in red.
Interrupt Generation for OS Dump You can execute OS dump by entering following command at the command prompt. nmidump /admin1/system1 Notice The user must have an account as operator or administrator for executing the nmidump command. The above command behavior is equivalent to pressing the DUMP switch on the host system.
7. WS-Management (Web Service for Management) OVERVIEW With the WS-Management Protocol, you can control the host system and check the sensor of host system. EXPRESSSCOPE Engine 3 implementation of WS-Management complies with the specification, DTMF Web Services for Management 1.0.0. EXPRESSSCOPE Engine 3 is confirmed the WS-Management operation with the following tools that support the WS-Management protocol. • Windows Remote Management (WinRM) 2.
Power ON Create the file input-RequestPowerStateChange2.xml and enter the following command, if you use WinRM. winrm invoke RequestPowerStateChange “http://schemas.dmtf.org/wbem/wscim/1/cim-schema/2/CIM_PowerManagementSer vice?__cimnamespace=root/cimv2+Name=Host Power Management Service+CreationClassName=CIM_PowerManagementService+SystemName=Unkn own.IPMI_BMC_DeviceID.
own.IPMI_BMC_DeviceID.136+SystemCreationClassName=CIM_HostComputerSyst em” -r:https://IP_ADDRESS/wsman -username:USERNAME -password:PASSWORD -auth:basic -encoding:utf-8 -format:xml -file:input-RequestPowerStateChange6.xml -skipCNcheck -skipCAcheck -skipRevocationcheck input-RequestPowerStateChange6.xml PAGE 72OS Shutdown Create the file input-RequestPowerStateChange8.xml and enter the following command, if you use WinRM. winrm invoke RequestPowerStateChange “http://schemas.dmtf.org/wbem/wscim/1/cim-schema/2/CIM_PowerManagementSer vice?__cimnamespace=root/cimv2+Name=Host Power Management Service+CreationClassName=CIM_PowerManagementService+SystemName=Unkn own.IPMI_BMC_DeviceID.
System Reset Create the file input-RequestPowerStateChange10.xml and enter the following command, if you use WinRM. winrm invoke RequestPowerStateChange “http://schemas.dmtf.org/wbem/wscim/1/cim-schema/2/CIM_PowerManagementServic e?__cimnamespace=root/cimv2+Name=Host Power Management Service+CreationClassName=CIM_PowerManagementService+SystemName=Unknown .IPMI_BMC_DeviceID.
Interrupt Generation for OS Dump Create the file input-RequestPowerStateChange11.xml and enter the following command, if you use WinRM. winrm invoke RequestPowerStateChange “http://schemas.dmtf.org/wbem/wscim/1/cim-schema/2/CIM_PowerManagementServic e?__cimnamespace=root/cimv2+Name=Host Power Management Service+CreationClassName=CIM_PowerManagementService+SystemName=Unknown .IPMI_BMCDeviceID.
- 75-
SENSOR INFORMATION You can get sensor information either by enumeration of all sensors or by retrieving specified sensor. Enumeration of All Sensors Enter the following command, if you enumerate numeric sensors (e.g.: temperature, voltage) with WinRM. winrm enumerate http://schemas.dmtf.
Change according to your environment. “IP_ADDRESS” : IP address of EXPRESSSCOPE Engine 3. “USERNAME/PASSWORD”: username/password of EXPRESSSCOPE Engine 3. Specify the “Device ID” returned in the response of enumerating all sensors.
8. Troubleshooting ERROR MESSAGES Abnormality occurs while using remote management, and the error dialog might be displayed in management PC. Please refer to the list of the message of the online help for the main message and the coping process. ABOUT ECO SETTING The electric power value may not be reached to Power Cap Value. The electric power value might not necessarily reach even the value of Power Cap value.
issue, please contact your service center.
License Notes This product includes open source software programs described below. GNU General Public License • • • • Busybox Linux Kernel U-Boot stunnel GNU GENERAL PUBLIC LICENSE Version 2, June 1991 Copyright (C) 1989, 1991 Free Software Foundation, Inc., 51 Franklin Street, Fifth Floor, Boston, MA 02110-1301 USA Everyone is permitted to copy and distribute verbatim copies of this license document, but changing it is not allowed.
software. If the software is modified by someone else and passed on, we want its recipients to know that what they have is not the original, so that any problems introduced by others will not reflect on the original authors' reputations. Finally, any free program is threatened constantly by software patents. We wish to avoid the danger that redistributors of a free program will individually obtain patent licenses, in effect making the program proprietary.
c) If the modified program normally reads commands interactively when run, you must cause it, when started running for such interactive use in the most ordinary way, to print or display an announcement including an appropriate copyright notice and a notice that there is no warranty (or else, saying that you provide a warranty) and that users may redistribute the program under these conditions, and telling the user how to view a copy of this License.
anything that is normally distributed (in either source or binary form) with the major components (compiler, kernel, and so on) of the operating system on which the executable runs, unless that component itself accompanies the executable.
implemented by public license practices. Many people have made generous contributions to the wide range of software distributed through that system in reliance on consistent application of that system; it is up to the author/donor to decide if he or she is willing to distribute software through any other system and a licensee cannot impose that choice. This section is intended to make thoroughly clear what is believed to be a consequence of the rest of this License. 8.
PROGRAMS), EVEN IF SUCH HOLDER OR OTHER PARTY HAS BEEN ADVISED OF THE POSSIBILITY OF SUCH DAMAGES. END OF TERMS AND CONDITIONS How to Apply These Terms to Your New Programs If you develop a new program, and you want it to be of the greatest possible use to the public, the best way to achieve this is to make it free software which everyone can redistribute and change under these terms. To do so, attach the following notices to the program.
This General Public License does not permit incorporating your program into proprietary programs. If your program is a subroutine library, you may consider it more useful to permit linking proprietary applications with the library. If this is what you want to do, use the GNU Lesser General Public License instead of this License. GNU Lesser General Public Licsense • glibc GNU LESSER GENERAL PUBLIC LICENSE Version 2.1, February 1999 Copyright (C) 1991, 1999 Free Software Foundation, Inc.
We protect your rights with a two-step method: (1) we copyright the library, and (2) we offer you this license, which gives you legal permission to copy, distribute and/or modify the library. To protect each distributor, we want to make it very clear that there is no warranty for the free library.
linked with the Library has the freedom and the wherewithal to run that program using a modified version of the Library. The precise terms and conditions for copying, distribution and modification follow. Pay close attention to the difference between a "work based on the library" and a "work that uses the library". The former contains code derived from the library, whereas the latter must be combined with the library in order to run.
distribute such modifications or work under the terms of Section 1 above, provided that you also meet all of these conditions: a) The modified work must itself be a software library. b) You must cause the files modified to carry prominent notices stating that you changed the files and the date of any change. c) You must cause the whole of the work to be licensed at no charge to all third parties under the terms of this License.
subsequent copies and derivative works made from that copy. This option is useful when you wish to copy part of the code of the Library into a program that is not a library. 4.
this License. You must supply a copy of this License. If the work during execution displays copyright notices, you must include the copyright notice for the Library among them, as well as a reference directing the user to the copy of this License.
permitted, and provided that you do these two things: a) Accompany the combined library with a copy of the same work based on the Library, uncombined with any other library facilities. This must be distributed under the terms of the Sections above. b) Give prominent notice with the combined library of the fact that part of it is a work based on the Library, and explaining where to find the accompanying uncombined form of the same work. 8.
generous contributions to the wide range of software distributed through that system in reliance on consistent application of that system; it is up to the author/donor to decide if he or she is willing to distribute software through any other system and a licensee cannot impose that choice. This section is intended to make thoroughly clear what is believed to be a consequence of the rest of this License. 12.
FAILURE OF THE LIBRARY TO OPERATE WITH ANY OTHER SOFTWARE), EVEN IF SUCH HOLDER OR OTHER PARTY HAS BEEN ADVISED OF THE POSSIBILITY OF SUCH DAMAGES. END OF TERMS AND CONDITIONS How to Apply These Terms to Your New Libraries If you develop a new library, and you want it to be of the greatest possible use to the public, we recommend making it free software that everyone can redistribute and change.
LICENSE ISSUES ============== The OpenSSL toolkit stays under a dual license, i.e. both the conditions of the OpenSSL License and the original SSLeay license apply to the toolkit. See below for the actual license texts. Actually both licenses are BSD-style Open Source licenses. In case of any license issues related to OpenSSL please contact openssl-core@openssl.org.
* OF THE POSSIBILITY OF SUCH DAMAGE. * ==================================================================== * * This product includes cryptographic software written by Eric Young * (eay@cryptsoft.com). This product includes software written by Tim * Hudson (tjh@cryptsoft.com). * */ Original SSLeay License ----------------------/* Copyright (C) 1995-1998 Eric Young (eay@cryptsoft.com) * All rights reserved. * * This package is an SSL implementation written * by Eric Young (eay@cryptsoft.com).
* HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT * LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY * OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF * SUCH DAMAGE. * * The licence and distribution terms for any publically available version or * derivative of this code cannot be changed. i.e. this code cannot simply be * copied and put under another distribution licence * [including the GNU Public Licence.
BSD License SHA2 /* * FIPS 180-2 SHA-224/256/384/512 implementation * Last update: 02/02/2007 * Issue date: 04/30/2005 * * Copyright (C) 2005, 2007 Olivier Gay * All rights reserved. * * Redistribution and use in source and binary forms, with or without * modification, are permitted provided that the following conditions * are met: * 1. Redistributions of source code must retain the above copyright * notice, this list of conditions and the following disclaimer. * 2.
* modification, are permitted provided that the following conditions * are met: * 1. Redistributions of source code must retain the above copyright * notice, this list of conditions and the following disclaimer. * 2. Redistributions in binary form must reproduce the above copyright * notice, this list of conditions and the following disclaimer in the * documentation and/or other materials provided with the distribution. * 3.
ARE DISCLAIMED.
* Redistributions of source code must retain the above copyright notice, this list of conditions and the following disclaimer. * Redistributions in binary form must reproduce the above copyright notice, this list of conditions and the following disclaimer in the documentation and/or other materials provided with the distribution.
BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE. ---- Part 4: Sun Microsystems, Inc. copyright notice (BSD) ----Copyright © 2003 Sun Microsystems, Inc., 4150 Network Circle, Santa Clara, California 95054, U.S.A. All rights reserved. Use is subject to license terms below.
modification, are permitted provided that the following conditions are met: * Redistributions of source code must retain the above copyright notice, this list of conditions and the following disclaimer. * Redistributions in binary form must reproduce the above copyright notice, this list of conditions and the following disclaimer in the documentation and/or other materials provided with the distribution.
CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.
disclaimer in the documentation and/or other materials provided with the distribution. 3. Neither the name of Apple Inc. ("Apple") nor the names of its contributors may be used to endorse or promote products derived from this software without specific prior written permission. THIS SOFTWARE IS PROVIDED BY APPLE AND ITS CONTRIBUTORS "AS IS" AND ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE ARE DISCLAIMED.
TCP Wrapper /************************************************************************ * Copyright 1995 by Wietse Venema. All rights reserved. Some individual * files may be covered by other copyrights. * * This material was originally written and compiled by Wietse Venema at * Eindhoven University of Technology, The Netherlands, in 1990, 1991, * 1992, 1993, 1994 and 1995.
- IDEA is no longer included, its use is deprecated DES is now external, in the OpenSSL library GMP is no longer used, and instead we call BN code from OpenSSL Zlib is now external, in a library The make-ssh-known-hosts script is no longer included TSS has been removed MD5 is now external, in the OpenSSL library RC4 support has been replaced with ARC4 support from OpenSSL Blowfish is now external, in the OpenSSL library [The licence continues] Note that any information and cryptographic algorithms used in
* permitted provided that due credit is given to the author and the * OpenBSD project by leaving this copyright notice intact. 4) The Rijndael implementation by Vincent Rijmen, Antoon Bosselaers and Paulo Barreto is in the public domain and distributed with the following license: * * * * * * * * * * * * * * * * * * * * * @version 3.0 (December 2000) Optimised ANSI C code for the Rijndael cipher (now AES) @author Vincent Rijmen @author Antoon Bosselaers
Wesley Griffin Per Allansson Nils Nordman Simon Wilkinson Portable OpenSSH additionally includes code from the following copyright holders, also under the 2-term BSD license: Ben Lindstrom Tim Rice Andre Lucas Chris Adams Corinna Vinschen Cray Inc. Denis Parker Gert Doering Jakob Schlyter Jason Downs Juha Yrjölä Michael Stone Networks Associates Technology, Inc. Solar Designer Todd C.
Todd C. Miller Theo de Raadt Damien Miller Eric P. Allman The Regents of the University of California Constantin S. Svintsoff * * * * * * * * * * * * * * * * * * * * * * * Redistribution and use in source and binary forms, with or without modification, are permitted provided that the following conditions are met: 1. Redistributions of source code must retain the above copyright notice, this list of conditions and the following disclaimer. 2.
* THE USE OR OTHER DEALINGS IN THE SOFTWARE. * * * * Except as contained in this notice, the name(s) of the above copyright * * holders shall not be used in advertising or otherwise to promote the * * sale, use or other dealings in this Software without prior written * * authorization.
Portions Copyright 1998-2008 Kurt D. Zeilenga. Portions Copyright 1998-2006 Net Boolean Incorporated. Portions Copyright 2001-2006 IBM Corporation. All rights reserved. Redistribution and use in source and binary forms, with or without modification, are permitted only as authorized by the OpenLDAP Public License. --Portions Copyright 1999-2008 Howard Y.H. Chu. Portions Copyright 1999-2008 Symas Corporation. Portions Copyright 1998-2003 Hallvard B. Furuseth. Portions Copyright 2008-2009 Gavin Henry.
/* /* /* /* */ /* /* /* /* */ OR IMPLIED, INCLUDING BUT NOT LIMITED TO THE WARRANTIES OF */ MERCHANTABILITY, FITNESS FOR A PARTICULAR PURPOSE AND NONINFRINGEMENT. */ IN NO EVENT SHALL THE AUTHORS OR COPYRIGHT HOLDERS BE LIABLE FOR ANY */ CLAIM, DAMAGES OR OTHER LIABILITY, WHETHER IN AN ACTION OF CONTRACT, TORT OR OTHERWISE, ARISING FROM, OUT OF OR IN CONNECTION WITH THE SOFTWARE OR */ THE USE OR OTHER DEALINGS IN THE SOFTWARE.
* documentation and/or other materials provided with the distribution. * 3. All advertising materials mentioning features or use of this software * must display the following acknowledgement: * "This product includes cryptographic software written by * Eric Young (eay@cryptsoft.com)" * The word 'cryptographic' can be left out if the rouines from the library * being used are not cryptographic related :-). * 4.
Version 2.0, January 2004 http://www.apache.org/licenses/ TERMS AND CONDITIONS FOR USE, REPRODUCTION, AND DISTRIBUTION 1. Definitions. "License" shall mean the terms and conditions for use, reproduction, and distribution as defined by Sections 1 through 9 of this document. "Licensor" shall mean the copyright owner or entity authorized by the copyright owner that is granting the License.
copyright license to reproduce, prepare Derivative Works of, publicly display, publicly perform, sublicense, and distribute the Work and such Derivative Works in Source or Object form. 3. Grant of Patent License.
the terms of any separate license agreement you may have executed with Licensor regarding such Contributions. 6. Trademarks. This License does not grant permission to use the trade names, trademarks, service marks, or product names of the Licensor, except as required for reasonable and customary use in describing the origin of the Work and reproducing the content of the NOTICE file. 7. Disclaimer of Warranty.
IPA Font License Agreement v1.0 The Licensor provides the Licensed Program (as defined in Article 1 below) under the terms of this license agreement (“Agreement”). Any use, reproduction or distribution of the Licensed Program, or any exercise of rights under this Agreement by a Recipient (as defined in Article 1 below) constitutes the Recipient’s acceptance of this Agreement. Article 1 (Definitions) 1. “Digital Font Program” shall mean a computer program containing, or used to render or display fonts. 2.
3. The Recipient may conduct Reproduction and Other Exploitation of the printed materials and Digital Content created in accordance with the preceding Paragraph, for commercial or non-commercial purposes and in any form of media including but not limited to broadcasting, communication and various recording media. 4. If any Recipient extracts Embedded Fonts from a Digital Document File to create a Derived Program, such Derived Program shall be subject to the terms of this agreement. 5.
* (3)The Recipient must attach a copy of this Agreement to the Licensed Program. 3. THIS LICENSED PROGRAM IS PROVIDED BY THE LICENSOR “AS IS” AND ANY EXPRESSED OR IMPLIED WARRANTY AS TO THE LICENSED PROGRAM OR ANY DERIVED PROGRAM, INCLUDING, BUT NOT LIMITED TO, WARRANTIES OF TITLE, NON-INFRINGEMENT, MERCHANTABILITY, OR FITNESS FOR A PARTICULAR PURPOSE, ARE DISCLAIMED.
IS" AND ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE ARE DISCLAIMED.
EXPRESSSCOPE Engine 3 User’s Guide ©NEC Corporation 2011-2014 - 122-