IBM 26K6477 User Guide - Page 5

Contents - jobs

Page 5 highlights

Contents Figures v Tables vii Preface ix About this guide xi Accessibility xi Accessibility features for the SMASH Proxy . . . xi Who should read this guide . . . . . xiii Chapter 1. Introduction 1 Chapter 2. SMASH: An overview . . . . 3 SMASH CLP architecture overview 3 SMASH CLP architectural model 3 Addressing managed elements 4 Chapter 3. Using the SMASH CLP command line 7 SMASH CLP syntax 7 SMASH CLP verbs and OEM verb extensions . . . 7 SMASH CLP supported verbs and descriptions . . 8 SMASH CLP verb options 9 SMASH CLP supported verb options and descriptions 9 SMASH CLP supported targets 17 Physical and logical target addressing . . . . 18 Addressing associations 18 SMASH CLP profiles 29 SMASH CLP supported command target properties 29 Command line editing 29 Command history 30 Command authority 30 Chapter 4. The SMASH Proxy: An overview 31 The SMASH Proxy architectural model . . . . . 32 Chapter 5. Using the SMASH Proxy . . 35 Before you begin 35 SMASH Proxy supported BladeCenter components 36 Installing the SMASH Proxy 37 Configuring SNMPv3 in the SMASH Proxy. . . . 39 SNMPv3 configuration in the MM 40 SLP configuration in the MM 44 Configuring the credentials server 45 Accessing the SMASH Proxy: Remote user access . 45 SSH access 46 Telnet access 47 Accessing the SMASH Proxy: Local user access . . 47 Uninstalling the SMASH Proxy 48 Chapter 6. Using SMASH Proxy functionality 49 OEM verbs 49 SMASH Proxy functions 57 SMASH Proxy nonaddressing associations and supported physical and logical targets . . . . . 64 Handling general UFcTs compared to specific UFcTs 71 SMASH Proxy supported targets (by UFcT) and associated command target properties . . . . . 72 SMASH Proxy command target property descriptions 94 CIM property types 102 Managing multiple chassis 103 Handling chassis credentials 103 Administering text console redirection . . . . . 105 Reviewing job status 106 Using pass-thru modules 107 Implementing redundant MMs 107 Turning on debug for the SMASH Proxy . . . . 107 Chapter 7. SMASH-related documentation 109 Chapter 8. Printable PDF 111 Appendix. Notices 113 Trademarks 115 Glossary 117 Terms 117 Index 121 © Copyright IBM Corp. 2006 iii

  • 1
  • 2
  • 3
  • 4
  • 5
  • 6
  • 7
  • 8
  • 9
  • 10
  • 11
  • 12
  • 13
  • 14
  • 15
  • 16
  • 17
  • 18
  • 19
  • 20
  • 21
  • 22
  • 23
  • 24
  • 25
  • 26
  • 27
  • 28
  • 29
  • 30
  • 31
  • 32
  • 33
  • 34
  • 35
  • 36
  • 37
  • 38
  • 39
  • 40
  • 41
  • 42
  • 43
  • 44
  • 45
  • 46
  • 47
  • 48
  • 49
  • 50
  • 51
  • 52
  • 53
  • 54
  • 55
  • 56
  • 57
  • 58
  • 59
  • 60
  • 61
  • 62
  • 63
  • 64
  • 65
  • 66
  • 67
  • 68
  • 69
  • 70
  • 71
  • 72
  • 73
  • 74
  • 75
  • 76
  • 77
  • 78
  • 79
  • 80
  • 81
  • 82
  • 83
  • 84
  • 85
  • 86
  • 87
  • 88
  • 89
  • 90
  • 91
  • 92
  • 93
  • 94
  • 95
  • 96
  • 97
  • 98
  • 99
  • 100
  • 101
  • 102
  • 103
  • 104
  • 105
  • 106
  • 107
  • 108
  • 109
  • 110
  • 111
  • 112
  • 113
  • 114
  • 115
  • 116
  • 117
  • 118
  • 119
  • 120
  • 121
  • 122
  • 123
  • 124
  • 125
  • 126
  • 127
  • 128
  • 129
  • 130
  • 131
  • 132
  • 133
  • 134
  • 135
  • 136
  • 137
  • 138
  • 139
  • 140

Contents
Figures
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.v
Tables
.
.
.
.
.
.
.
.
.
.
.
.
.
.
. vii
Preface
.
.
.
.
.
.
.
.
.
.
.
.
.
.
. ix
About
this
guide
.
.
.
.
.
.
.
.
.
.
. xi
Accessibility
.
.
.
.
.
.
.
.
.
.
.
.
.
. xi
Accessibility
features
for
the
SMASH
Proxy
.
.
. xi
Who
should
read
this
guide
.
.
.
.
. xiii
Chapter
1.
Introduction
.
.
.
.
.
.
.
.1
Chapter
2.
SMASH:
An
overview
.
.
.
.3
SMASH
CLP
architecture
overview
.
.
.
.
.
.
.3
SMASH
CLP
architectural
model
.
.
.
.
.
.3
Addressing
managed
elements
.
.
.
.
.
.
.4
Chapter
3.
Using
the
SMASH
CLP
command
line
.
.
.
.
.
.
.
.
.
.
.
.7
SMASH
CLP
syntax
.
.
.
.
.
.
.
.
.
.
.
.7
SMASH
CLP
verbs
and
OEM
verb
extensions
.
.
.7
SMASH
CLP
supported
verbs
and
descriptions
.
.8
SMASH
CLP
verb
options
.
.
.
.
.
.
.
.
.
.9
SMASH
CLP
supported
verb
options
and
descriptions
.
.
.
.
.
.
.
.
.
.
.
.
.
.9
SMASH
CLP
supported
targets
.
.
.
.
.
.
.
. 17
Physical
and
logical
target
addressing
.
.
.
. 18
Addressing
associations
.
.
.
.
.
.
.
.
. 18
SMASH
CLP
profiles
.
.
.
.
.
.
.
.
.
. 29
SMASH
CLP
supported
command
target
properties
29
Command
line
editing
.
.
.
.
.
.
.
.
.
.
. 29
Command
history
.
.
.
.
.
.
.
.
.
.
.
. 30
Command
authority
.
.
.
.
.
.
.
.
.
.
. 30
Chapter
4.
The
SMASH
Proxy:
An
overview
.
.
.
.
.
.
.
.
.
.
.
.
.
. 31
The
SMASH
Proxy
architectural
model
.
.
.
.
. 32
Chapter
5.
Using
the
SMASH
Proxy
.
. 35
Before
you
begin
.
.
.
.
.
.
.
.
.
.
.
. 35
SMASH
Proxy
supported
BladeCenter
components
.
.
.
.
.
.
.
.
.
.
.
.
. 36
Installing
the
SMASH
Proxy
.
.
.
.
.
.
.
.
. 37
Configuring
SNMPv3
in
the
SMASH
Proxy
.
.
.
. 39
SNMPv3
configuration
in
the
MM
.
.
.
.
.
.
. 40
SLP
configuration
in
the
MM
.
.
.
.
.
.
.
. 44
Configuring
the
credentials
server
.
.
.
.
.
.
. 45
Accessing
the
SMASH
Proxy:
Remote
user
access
. 45
SSH
access
.
.
.
.
.
.
.
.
.
.
.
.
. 46
Telnet
access
.
.
.
.
.
.
.
.
.
.
.
.
. 47
Accessing
the
SMASH
Proxy:
Local
user
access
.
. 47
Uninstalling
the
SMASH
Proxy
.
.
.
.
.
.
.
. 48
Chapter
6.
Using
SMASH
Proxy
functionality
.
.
.
.
.
.
.
.
.
.
.
. 49
OEM
verbs
.
.
.
.
.
.
.
.
.
.
.
.
.
. 49
SMASH
Proxy
functions
.
.
.
.
.
.
.
.
.
. 57
SMASH
Proxy
nonaddressing
associations
and
supported
physical
and
logical
targets
.
.
.
.
. 64
Handling
general
UFcTs
compared
to
specific
UFcTs
71
SMASH
Proxy
supported
targets
(by
UFcT)
and
associated
command
target
properties
.
.
.
.
. 72
SMASH
Proxy
command
target
property
descriptions
.
.
.
.
.
.
.
.
.
.
.
.
.
. 94
CIM
property
types
.
.
.
.
.
.
.
.
.
.
. 102
Managing
multiple
chassis
.
.
.
.
.
.
.
.
. 103
Handling
chassis
credentials
.
.
.
.
.
.
. 103
Administering
text
console
redirection
.
.
.
.
. 105
Reviewing
job
status
.
.
.
.
.
.
.
.
.
.
. 106
Using
pass-thru
modules
.
.
.
.
.
.
.
.
. 107
Implementing
redundant
MMs
.
.
.
.
.
.
. 107
Turning
on
debug
for
the
SMASH
Proxy
.
.
.
. 107
Chapter
7.
SMASH-related
documentation
.
.
.
.
.
.
.
.
.
.
. 109
Chapter
8.
Printable
PDF
.
.
.
.
.
. 111
Appendix.
Notices
.
.
.
.
.
.
.
.
. 113
Trademarks
.
.
.
.
.
.
.
.
.
.
.
.
.
. 115
Glossary
.
.
.
.
.
.
.
.
.
.
.
.
. 117
Terms
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
. 117
Index
.
.
.
.
.
.
.
.
.
.
.
.
.
.
. 121
©
Copyright
IBM
Corp.
2006
iii