HP Integrity BL870c HP Integrity iLO 2 Operations Guide, Eleventh Edition - Page 222
Proxy, Rackmount, Remote System, Schema, Serial Console, Server Blade, SM CLP, SMASH, Subnet
View all HP Integrity BL870c manuals
Add to My Manuals
Save this manual to your list of manuals |
Page 222 highlights
Proxy A mechanism whereby one system acts on behalf of another system in responding to protocol requests. R Rackmount Remote System Electronic equipment and devices designed to fit industry-standard-sized computer racks and cabinets (19" wide). Rackmount devices are also standard 1.75 inch units. A system other than the one on which the user is working. S Schema Serial Console Server Blade SM CLP SMASH SNMP SSH SSL Subnet Subnet Mask System Event Log (SEL) Definitions that describe what type of information can be stored as entries in the directory. When information that does not match the schema is stored in the directory, clients attempting to access the directory may be unable to display the proper results. Schemas come in many forms, such as a text file, information in a repository, or diagrams. A terminal connected to the serial port on the service processor. A serial console is used to configure the system to perform other administrative tasks. A single circuit board populated with components such as processors, memory, and network connections that are usually found on multiple boards. Server Management Command Line Protocol (SM CLP). SM CLP specification defines a user-friendly command line protocol to manipulate CIM instances defined by the SM profiles specification. System Management Architecture for Server Hardware (SMASH). An initiative by the Distributed Management Task Force (DMTF) that encompasses specifications (SM CLP, SM ME Addressing, SM Profiles) that address the interoperable manageability requirements of small-to large-scale heterogeneous computer environments. Simple Network Management Protocol. A set of protocols for managing complex networks. Secure Shell. A UNIX shell program and network protocol that enables secure and encrypted log in and execution of commands on a remote system over an insecure network. Secure Sockets Layer. A protocol that enables client-to-server communication on a network to be encrypted for privacy. SSL uses a key exchange method to establish an environment in which all data exchanged is encrypted with a cipher and hashed to protect it from eavesdropping and alteration. SSL creates a secure connection between a web server and a web client. Hypertext Transfer Protocol Secure (HTTPS) uses SSL. A working scheme that divides a single logical network into smaller physical networks to simplify routing. The subnet is the portion of an Internet Protocol (IP) address that identifies a block of host IDs. A bit mask used to select bits from an Internet address for subnet addressing. The mask is 32 bits long, and selects the network portion of the Internet address and one or more bits of the local portion. Also called an address mask. A log that provides nonvolatile storage for system events that are logged autonomously by the service processor, or directly with event messages sent from the host. T Target Target Address A target is the implicitly or explicitly identified managed element that a command is directed toward. Command targets specify managed elements in the system. Targets follow the SM addressing specification. The target addressing scheme provides an easy-to-use method to accurately address CIM objects. The target address term of the CLP syntax in this architecture is extensible. The addressing scheme provides a unique target for CLP commands. The scheme is finite for parsing target names, and unique for unambiguous access to associated instance information needed to support association traversal rooted at the MAP AdminDomain instance. 222 Glossary