HP Integrity rx2800 HP Integrity iLO 3 Operations Guide - Page 146

A number that specifies an individual Transmission Control Protocol/Internet Protocol TCP/IP

Page 146 highlights

port number POST properties protocol proxy R rackmount remote system S schema security serial console server blade SSH SSL subnet subnet mask System Event Log (SEL) T target address and Telnet uses port 23. A port enables a client program to specify a particular server program in a computer on a network. When a server program is started initially, it binds to its designated port number. Any client that wants to use that server must send a request to bind to the designated port number. A number that specifies an individual Transmission Control Protocol/Internet Protocol (TCP/IP) application on a host machine, providing a destination for transmitted data. Power-On Self-Test. The series of steps that the host system CPU performs following power-on. Steps include testing memory, initializing peripherals, and running option ROMs. Following POST, the host ROM passes control to the installed operating system. Properties are attributes that are relevant to a target that are passed as parameters to the command. Property keywords map to properties of CIM class. A set of rules that describes how systems or devices on a network exchange information. A mechanism whereby one system acts on behalf of another system in responding to protocol requests. Electronic equipment and devices designed to fit industry-standard-sized computer racks and cabinets (19" wide). Rackmount devices are also standard 1.75 inch units. A system other than the one on which the user is working. Definitions that describe what type of information can be stored as entries in the directory. When information that does not match the schema is stored in the directory, clients attempting to access the directory may be unable to display the proper results. Schemas come in many forms, such as a text file, information in a repository, or diagrams. Secure Socket Layer Secure Shell (SSH) version 2 (Password and certificate), SSL, and integration with enterprise directory services. A terminal connected to the serial port on the service processor. A serial console is used to configure the system to perform other administrative tasks. A single circuit board populated with components such as processors, memory, and network connections that are usually found on multiple boards. Secure Shell. A UNIX shell program and network protocol that enables secure and encrypted log in and running of commands on a remote system over an insecure network. Secure Sockets Layer. A protocol that enables client-to-server communication on a network to be encrypted for privacy. SSL uses a key exchange method to establish an environment in which all data exchanged is encrypted with a cipher and hashed to protect it from eavesdropping and alteration. SSL creates a secure connection between a web server and a web client. Hypertext Transfer Protocol Secure (HTTPS) uses SSL. A working scheme that divides a single logical network into smaller physical networks to simplify routing. The subnet is the portion of an Internet Protocol (IP) address that identifies a block of host IDs. A bit mask used to select bits from an Internet address for subnet addressing. The mask is 32 bits long, and selects the network portion of the Internet address and one or more bits of the local portion. Also called an address mask. A log that provides nonvolatile storage for system events that are logged autonomously by the service processor, or directly with event messages sent from the host. The target addressing scheme provides an easy-to-use method to accurately address CIM objects. The target address term of the CLP syntax in this architecture is extensible. The addressing scheme provides a unique target for CLP commands. The scheme is finite for parsing target names, and 146 Standard terms, abbreviations, and acronyms

  • 1
  • 2
  • 3
  • 4
  • 5
  • 6
  • 7
  • 8
  • 9
  • 10
  • 11
  • 12
  • 13
  • 14
  • 15
  • 16
  • 17
  • 18
  • 19
  • 20
  • 21
  • 22
  • 23
  • 24
  • 25
  • 26
  • 27
  • 28
  • 29
  • 30
  • 31
  • 32
  • 33
  • 34
  • 35
  • 36
  • 37
  • 38
  • 39
  • 40
  • 41
  • 42
  • 43
  • 44
  • 45
  • 46
  • 47
  • 48
  • 49
  • 50
  • 51
  • 52
  • 53
  • 54
  • 55
  • 56
  • 57
  • 58
  • 59
  • 60
  • 61
  • 62
  • 63
  • 64
  • 65
  • 66
  • 67
  • 68
  • 69
  • 70
  • 71
  • 72
  • 73
  • 74
  • 75
  • 76
  • 77
  • 78
  • 79
  • 80
  • 81
  • 82
  • 83
  • 84
  • 85
  • 86
  • 87
  • 88
  • 89
  • 90
  • 91
  • 92
  • 93
  • 94
  • 95
  • 96
  • 97
  • 98
  • 99
  • 100
  • 101
  • 102
  • 103
  • 104
  • 105
  • 106
  • 107
  • 108
  • 109
  • 110
  • 111
  • 112
  • 113
  • 114
  • 115
  • 116
  • 117
  • 118
  • 119
  • 120
  • 121
  • 122
  • 123
  • 124
  • 125
  • 126
  • 127
  • 128
  • 129
  • 130
  • 131
  • 132
  • 133
  • 134
  • 135
  • 136
  • 137
  • 138
  • 139
  • 140
  • 141
  • 142
  • 143
  • 144
  • 145
  • 146
  • 147
  • 148
  • 149
  • 150
  • 151
  • 152

and Telnet uses port 23. A port enables a client program to specify a particular server program
in a computer on a network. When a server program is started initially, it binds to its designated
port number. Any client that wants to use that server must send a request to bind to the designated
port number.
port number
A number that specifies an individual Transmission Control Protocol/Internet Protocol (TCP/IP)
application on a host machine, providing a destination for transmitted data.
POST
Power-On Self-Test. The series of steps that the host system CPU performs following power-on.
Steps include testing memory, initializing peripherals, and running option ROMs. Following POST,
the host ROM passes control to the installed operating system.
properties
Properties are attributes that are relevant to a target that are passed as parameters to the command.
Property keywords map to properties of CIM class.
protocol
A set of rules that describes how systems or devices on a network exchange information.
proxy
A mechanism whereby one system acts on behalf of another system in responding to protocol
requests.
R
rackmount
Electronic equipment and devices designed to fit industry-standard-sized computer racks and
cabinets (19" wide). Rackmount devices are also standard 1.75 inch units.
remote system
A system other than the one on which the user is working.
S
schema
Definitions that describe what type of information can be stored as entries in the directory. When
information that does not match the schema is stored in the directory, clients attempting to access
the directory may be unable to display the proper results. Schemas come in many forms, such
as a text file, information in a repository, or diagrams.
security
Secure Socket Layer Secure Shell (SSH) version 2 (Password and certificate), SSL, and integration
with enterprise directory services.
serial console
A terminal connected to the serial port on the service processor. A serial console is used to
configure the system to perform other administrative tasks.
server blade
A single circuit board populated with components such as processors, memory, and network
connections that are usually found on multiple boards.
SSH
Secure Shell. A UNIX shell program and network protocol that enables secure and encrypted log
in and running of commands on a remote system over an insecure network.
SSL
Secure Sockets Layer. A protocol that enables client-to-server communication on a network to be
encrypted for privacy. SSL uses a key exchange method to establish an environment in which all
data exchanged is encrypted with a cipher and hashed to protect it from eavesdropping and
alteration. SSL creates a secure connection between a web server and a web client. Hypertext
Transfer Protocol Secure (HTTPS) uses SSL.
subnet
A working scheme that divides a single logical network into smaller physical networks to simplify
routing. The subnet is the portion of an Internet Protocol (IP) address that identifies a block of host
IDs.
subnet mask
A bit mask used to select bits from an Internet address for subnet addressing. The mask is 32 bits
long, and selects the network portion of the Internet address and one or more bits of the local
portion. Also called an
address mask
.
System Event Log
(SEL)
A log that provides nonvolatile storage for system events that are logged autonomously by the
service processor, or directly with event messages sent from the host.
T
target address
The target addressing scheme provides an easy-to-use method to accurately address CIM objects.
The target address term of the CLP syntax in this architecture is extensible. The addressing scheme
provides a unique target for CLP commands. The scheme is finite for parsing target names, and
146
Standard terms, abbreviations, and acronyms