HP Integrity Superdome 2 16-socket HP Integrity Superdome 2 Onboard Administra - Page 63

Test Wsman, Remove Oa Dns, Remove Snmp Trapreceiver

Page 63 highlights

TEST WSMAN • Command: TEST WSMAN • Description: Sends a test WS-Management notification to subscribed clients. • Access level/Bay level: OA Administrator • Restrictions: You must be connected to the monarch OA to perform this command. REMOVE OA DNS • Command: REMOVE OA DNS [] • Description: ◦ Removes the IP address of a DNS server from the list for the specified Onboard Administrator. ◦ The DNS servers are used only if the system is configured to use a static IP address. ◦ If no bay number is provided, then the command default to the active Onboard Administrator. • Access level/Bay level: OA Administrator, OA Operator • Restrictions: The must be in the form where each ### ranges from 0 to 255. REMOVE SNMP TRAPRECEIVER • Command: REMOVE SNMP TRAPRECEIVER [] • Description: Removes an IP address from the list of systems that receive SNMP traps. If the same IP address is listed multiple times with different communities, then all instances of the IP address disappear unless specifies which one to remove. • Access level/Bay level: OA Administrator, OA Operator • Restrictions: The must be in the form where each ### ranges from 0 to 255. TEST WSMAN 63

  • 1
  • 2
  • 3
  • 4
  • 5
  • 6
  • 7
  • 8
  • 9
  • 10
  • 11
  • 12
  • 13
  • 14
  • 15
  • 16
  • 17
  • 18
  • 19
  • 20
  • 21
  • 22
  • 23
  • 24
  • 25
  • 26
  • 27
  • 28
  • 29
  • 30
  • 31
  • 32
  • 33
  • 34
  • 35
  • 36
  • 37
  • 38
  • 39
  • 40
  • 41
  • 42
  • 43
  • 44
  • 45
  • 46
  • 47
  • 48
  • 49
  • 50
  • 51
  • 52
  • 53
  • 54
  • 55
  • 56
  • 57
  • 58
  • 59
  • 60
  • 61
  • 62
  • 63
  • 64
  • 65
  • 66
  • 67
  • 68
  • 69
  • 70
  • 71
  • 72
  • 73
  • 74
  • 75
  • 76
  • 77
  • 78
  • 79
  • 80
  • 81
  • 82
  • 83
  • 84
  • 85
  • 86
  • 87
  • 88
  • 89
  • 90
  • 91
  • 92
  • 93
  • 94
  • 95
  • 96
  • 97
  • 98
  • 99
  • 100
  • 101
  • 102
  • 103
  • 104
  • 105
  • 106
  • 107
  • 108
  • 109
  • 110
  • 111
  • 112
  • 113
  • 114
  • 115
  • 116
  • 117
  • 118
  • 119
  • 120
  • 121
  • 122
  • 123
  • 124
  • 125
  • 126
  • 127
  • 128
  • 129
  • 130
  • 131
  • 132
  • 133
  • 134
  • 135
  • 136
  • 137
  • 138
  • 139
  • 140
  • 141
  • 142
  • 143
  • 144
  • 145
  • 146
  • 147
  • 148
  • 149
  • 150
  • 151
  • 152
  • 153
  • 154
  • 155
  • 156
  • 157
  • 158
  • 159
  • 160
  • 161
  • 162
  • 163
  • 164
  • 165
  • 166
  • 167
  • 168
  • 169
  • 170
  • 171
  • 172
  • 173
  • 174
  • 175
  • 176
  • 177
  • 178
  • 179
  • 180
  • 181
  • 182
  • 183
  • 184
  • 185
  • 186
  • 187
  • 188
  • 189
  • 190
  • 191
  • 192
  • 193
  • 194
  • 195
  • 196
  • 197
  • 198
  • 199
  • 200
  • 201
  • 202
  • 203
  • 204
  • 205
  • 206
  • 207
  • 208
  • 209
  • 210
  • 211
  • 212
  • 213
  • 214
  • 215
  • 216
  • 217

TEST WSMAN
Command:
TEST WSMAN
Description:
Sends a test WS-Management notification to subscribed clients.
Access level/Bay level:
OA Administrator
Restrictions:
You must be connected to the monarch OA to perform this command.
REMOVE OA DNS
Command:
REMOVE OA DNS [<
OA bay number
>] <
ip address
>
Description:
Removes the IP address of a DNS server from the list for the specified Onboard
Administrator.
The DNS servers are used only if the system is configured to use a static IP address.
If no bay number is provided, then the command default to the active Onboard
Administrator.
Access level/Bay level:
OA Administrator, OA Operator
Restrictions:
The <
ip address
> must be in the form ###.###.###.###, where each ### ranges from
0 to 255.
REMOVE SNMP TRAPRECEIVER
Command:
REMOVE SNMP TRAPRECEIVER <
ip address
> [<
community
>]
Description:
Removes an IP address from the list of systems that receive SNMP traps. If the same IP address
is listed multiple times with different communities, then all instances of the IP address disappear
unless <
community
> specifies which one to remove.
Access level/Bay level:
OA Administrator, OA Operator
Restrictions:
The <
ip address
> must be in the form ###.###.###.###, where each ### ranges from
0 to 255.
TEST WSMAN
63