HP rp3440 HP Integrity and HP 9000 iLO MP Operations Guide, Fifth Edition - Page 135
Subnet Mask, System Event Log, Telnet, Universal Serial, Bus USB, User Account, User Name
View all HP rp3440 manuals
Add to My Manuals
Save this manual to your list of manuals |
Page 135 highlights
Subnet Mask System Event Log (SEL) A bit mask used to select bits from an Internet address for subnet addressing. The mask is 32 bits long, and selects the network portion of the Internet address and one or more bits of the local portion. Also called an address mask. A log that provides nonvolatile storage for system events that are logged autonomously by the service processor, or directly with event messages sent from the host. T Telnet A telecommunications protocol providing specifications for emulating a remote computer terminal so that one can access a distant computer and function online using an interface that appears to be part of the user's local system. U Universal Serial Bus (USB) User Account User Name User-Friendly instance Path (UFiP) User-Friendly instance Tag (UFiT) An external bus standard that supports data transfer rates of 450 Mb/s (USB 2.0). A USB port connects devices, such as mouse pointers, keyboards, modems, and printers, to the computer system. A record of essential user information that is stored on the system. Each user who accesses a system has a user account. A combination of letters, and possibly numbers, that identifies a user to the system. A unique path to an instance formed by concatenating the UFiTs of each instance from the root instance to the terminating instance. The intervening '/' between each UFiT represents an address association. A unique instance tag within the scope of the target instance's containment class. A UFiT is created by adding a non-zero positive-integer suffix to the target instance's UFcT. V VPN Virtual private network. A network that is constructed using public wires (the Internet) to connect nodes. These systems use encryption and other security mechanisms to ensure only authorized users can access the network and that the data cannot be intercepted. 135