IBM 26K6477 User Guide - Page 137

Management

Page 137 highlights

Index A About SMASH 1 accessibility xi accessing the SMASH Proxy 47 addressing 4 Addressing associations 18 Addressing diagrams 19 Addressing managed elements 4 B Before you begin 35 Bladecenter 36 Bladecenter components 36 C chassis 103 chassis credentials 103 CIM 1 CIM property types 102 command authority 30 command history 30 command line 7 command line editing 29 Command options 9 Command options definitions 9 Command options list 9 command target properties 29 commands 7, 57 Common Information Model (CIM) 1 Configuring SNMP 39 configuring the credentials server 45 credentials 103 credentials server configuration 45 D disability xi display verb option 11 Distributed Management Task Force (DMTF) 1 DMTF 1 E editing commands 29 F functions 57 H handling chassis credentials 103 Handling UFcTs 71 © Copyright IBM Corp. 2006 I implementing redundant management modules 107 Installing SMASH 37 J job status 106 K keyboard xi L local access 47 logical targets 64 M managing multiple chassis 103 mapping Bladecenter 36 mapping Bladecenter components to CIM profiles 36 ME addressing 4 multiple chassis 103 N nonaddressing associations 64 O object properties 94 object property descriptions 94 OEM verbs 49 Options 9 Original Equipment Manufacturer (OEM) 49 output verb option 11 S shortcut keys xi SLP protocol configuration in the MM 44 SM ME address 4 SM ME Addresses 17 SM ME addressing 4 SMASH CLP architectural model 3 SMASH CLP architecture overview 3 SMASH CLP supported objects targets 17 SMASH CLP syntax 7 SMASH components 3 SMASH functionality 49 SMASH Proxy 31 SMASH Proxy architectural model 32 SMASH Proxy functions 57 SMASH Proxy implementation 31 SMASH Proxy overview 31 SMASH Proxy profiles 29 SMASH Proxy utilization 35 SMASH Proxy-related documentation 109 SMASH supported objects (by UFcT) and associated properties 72 SMASH supported physical and logical targets 64 SNMP 39 SNMPv3 configuration in the MM 40 SSH access 46 syntax 7 Systems Management Architecture for Server Hardware Command Line Protocol (SMASH) components 3 T Targets 17 Telnet access 47 text console 105 text console redirection 105 Turning on Debug for the SMASH Proxy debugging 107 P pass-thru utilities 107 physical targets 64 profiles 29 properties 29 R redundant management modules 107 remote access 45 reviewing job status 106 U UFcT 4, 18 UFcTs 71, 72 UFiP 4, 17, 18 UFiT 4, 18 UFsT 4 Uninstalling SMASH 48 User Friendly Class Tag 4, 18 User Friendly Instance Path 4, 18 User Friendly Instance Tag 4, 18 User Friendly Selection Tag 4 using pass-thru utilities 107 using SMASH CLP command line 7 Using the SMASH Proxy 35 utilizing SMASH 49 121

  • 1
  • 2
  • 3
  • 4
  • 5
  • 6
  • 7
  • 8
  • 9
  • 10
  • 11
  • 12
  • 13
  • 14
  • 15
  • 16
  • 17
  • 18
  • 19
  • 20
  • 21
  • 22
  • 23
  • 24
  • 25
  • 26
  • 27
  • 28
  • 29
  • 30
  • 31
  • 32
  • 33
  • 34
  • 35
  • 36
  • 37
  • 38
  • 39
  • 40
  • 41
  • 42
  • 43
  • 44
  • 45
  • 46
  • 47
  • 48
  • 49
  • 50
  • 51
  • 52
  • 53
  • 54
  • 55
  • 56
  • 57
  • 58
  • 59
  • 60
  • 61
  • 62
  • 63
  • 64
  • 65
  • 66
  • 67
  • 68
  • 69
  • 70
  • 71
  • 72
  • 73
  • 74
  • 75
  • 76
  • 77
  • 78
  • 79
  • 80
  • 81
  • 82
  • 83
  • 84
  • 85
  • 86
  • 87
  • 88
  • 89
  • 90
  • 91
  • 92
  • 93
  • 94
  • 95
  • 96
  • 97
  • 98
  • 99
  • 100
  • 101
  • 102
  • 103
  • 104
  • 105
  • 106
  • 107
  • 108
  • 109
  • 110
  • 111
  • 112
  • 113
  • 114
  • 115
  • 116
  • 117
  • 118
  • 119
  • 120
  • 121
  • 122
  • 123
  • 124
  • 125
  • 126
  • 127
  • 128
  • 129
  • 130
  • 131
  • 132
  • 133
  • 134
  • 135
  • 136
  • 137
  • 138
  • 139
  • 140

Index
A
About
SMASH
1
accessibility
xi
accessing
the
SMASH
Proxy
47
addressing
4
Addressing
associations
18
Addressing
diagrams
19
Addressing
managed
elements
4
B
Before
you
begin
35
Bladecenter
36
Bladecenter
components
36
C
chassis
103
chassis
credentials
103
CIM
1
CIM
property
types
102
command
authority
30
command
history
30
command
line
7
command
line
editing
29
Command
options
9
Command
options
definitions
9
Command
options
list
9
command
target
properties
29
commands
7,
57
Common
Information
Model
(CIM)
1
Configuring
SNMP
39
configuring
the
credentials
server
45
credentials
103
credentials
server
configuration
45
D
disability
xi
display
verb
option
11
Distributed
Management
Task
Force
(DMTF)
1
DMTF
1
E
editing
commands
29
F
functions
57
H
handling
chassis
credentials
103
Handling
UFcTs
71
I
implementing
redundant
management
modules
107
Installing
SMASH
37
J
job
status
106
K
keyboard
xi
L
local
access
47
logical
targets
64
M
managing
multiple
chassis
103
mapping
Bladecenter
36
mapping
Bladecenter
components
to
CIM
profiles
36
ME
addressing
4
multiple
chassis
103
N
nonaddressing
associations
64
O
object
properties
94
object
property
descriptions
94
OEM
verbs
49
Options
9
Original
Equipment
Manufacturer
(OEM)
49
output
verb
option
11
P
pass-thru
utilities
107
physical
targets
64
profiles
29
properties
29
R
redundant
management
modules
107
remote
access
45
reviewing
job
status
106
S
shortcut
keys
xi
SLP
protocol
configuration
in
the
MM
44
SM
ME
address
4
SM
ME
Addresses
17
SM
ME
addressing
4
SMASH
CLP
architectural
model
3
SMASH
CLP
architecture
overview
3
SMASH
CLP
supported
objects
targets
17
SMASH
CLP
syntax
7
SMASH
components
3
SMASH
functionality
49
SMASH
Proxy
31
SMASH
Proxy
architectural
model
32
SMASH
Proxy
functions
57
SMASH
Proxy
implementation
31
SMASH
Proxy
overview
31
SMASH
Proxy
profiles
29
SMASH
Proxy
utilization
35
SMASH
Proxy-related
documentation
109
SMASH
supported
objects
(by
UFcT)
and
associated
properties
72
SMASH
supported
physical
and
logical
targets
64
SNMP
39
SNMPv3
configuration
in
the
MM
40
SSH
access
46
syntax
7
Systems
Management
Architecture
for
Server
Hardware
Command
Line
Protocol
(SMASH)
components
3
T
Targets
17
Telnet
access
47
text
console
105
text
console
redirection
105
Turning
on
Debug
for
the
SMASH
Proxy
debugging
107
U
UFcT
4,
18
UFcTs
71,
72
UFiP
4,
17,
18
UFiT
4,
18
UFsT
4
Uninstalling
SMASH
48
User
Friendly
Class
Tag
4,
18
User
Friendly
Instance
Path
4,
18
User
Friendly
Instance
Tag
4,
18
User
Friendly
Selection
Tag
4
using
pass-thru
utilities
107
using
SMASH
CLP
command
line
7
Using
the
SMASH
Proxy
35
utilizing
SMASH
49
©
Copyright
IBM
Corp.
2006
121