HP Integrity BL870c HP Integrity iLO 2 Operations Guide, Eleventh Edition - Page 223
class Tag UFcT, User Friendly Tag
![]() |
View all HP Integrity BL870c manuals
Add to My Manuals
Save this manual to your list of manuals |
Page 223 highlights
Target Address Scheme Resolution Service Telnet This entity is responsible for discovering and enumerating the managed elements within the local domain, for maintaining the addressing and naming structure of the local domain, and coordinating this information with the operation invocation engine. A telecommunications protocol providing specifications for emulating a remote computer terminal so that one can access a distant computer and function online using an interface that appears to be part of the user's local system. U Universal Serial Bus (USB) User User Account User Friendly class Tag (UFcT) User Friendly instance Path (UFiP) User Friendly instance Tag (UFiT) User Friendly Tag (UFT) User Name UTF-8 An external bus standard that supports data transfer rates of 450 Mb/s (USB 2.0). A USB port connects devices such as mouse pointers, keyboards, and printers, to the computer system. The CLP User represents an instance of a client which transmits and receives CLP-compliant messages. The CLP is part of the SM CLP architecture. It is intended to either be a person or a script interacting with a terminal service such as Telnet or SSHv2. A record of essential user information that is stored on the system. Each user who accesses a system has a user account. A short, user-friendly synonym for a CIM class name. It has the same properties and methods as the CIM class it represents. A unique path to an instance formed by concatenating the UFiTs of each instance from the root instance to the terminating instance. The intervening '/' between each UFiT represents an address association. A unique instance tag within the scope of the target instance's containment class. A UFiT is created by adding an nonzero positive-integer suffix to the target instance's UFcT. A short, user-friendly tag for a CIM class name or instance. There are two types of UFTs; UFcT and UFiT. A combination of letters, and possibly numbers, that identifies a user to the system. Unicode Transformation Format (8-bit). A variable-length character encoding for Unicode. V Verb vKVM VPN Used with SMASH SM CLP. The verb selects a management action for a target. Virtual keyboard, video, mouse. The iLO 2 graphical IRC provides virtual keyboard, video (monitor), and mouse (vKVM) capabilities with KVM-over-IP performance. Virtual private network. A network that is constructed using public wires (the Internet) to connect nodes. These systems use encryption and other security mechanisms to ensure only authorized users can access the network and that the data cannot be intercepted. 223
![](/manual_guide/products/hewlettpackard-integrity-bl870c-hp-integrity-ilo-2-operations-guide-eleventh-edition-30e0a7d/223.png)