IBM 86624RY Maintenance Manual - Page 162

IPSSEND and IPSMON programs, Background-server component name, resolution

Page 162 highlights

decrypts the user names and passwords to verify proper access to the ServeRAID adapter or controller. If the verification is successful, the adapter or controller accepts commands from the client. If no security file is present in the default directory, or the directory specified by the -s parameter, security is disabled. The server component then accepts commands from any client connection. The security file contains one user name and password combination per line. The strings are separated by a colon (:) and each string has a maximum of eight characters. Background-server component name resolution: The server component relies on name resolution to determine the host name from the client that is trying to connect. When a client is trying to access a remote server, the server tries to look up the name of the client connecting. The method used to look up the name is determined by the configuration of the server. Some possible methods for this are Domain Name Servers (DNS) or HOSTS files. With certain configurations, some timing delays might occur due to misconfiguration or inability to access the DNS. If problems persist, check the network configuration. IPSSEND and IPSMON programs IPSSEND and IPSMON are advanced command-line programs that you can use to manage the ServeRAID adapters and controllers. These utility programs are provided on the IBM ServeRAID Command Line Programs Diskette. This ServeRAID diskette is available from the ServerGuide Diskette Factory or from the following address on the World Wide Web: http://www.ibm.com/support/ See page 130 for the instructions needed to access the IBM support page. You can use the IPSSEND program to view the configuration of a ServeRAID adapter or controller, rebuild a defunct drive, initialize logical drives, synchronize logical drives, and perform other functions. You can use the IPSMON program to monitor a ServeRAID adapter or controller for defunct drives, predictive failure analysis (PFA) warnings, rebuild operations, synchronizations, and logical-drive migrations. This program can log a message to the monitor, to a file, or to both the monitor and a file whenever activities occur. You can use the IPSSEND and IPSMON programs with the following operating systems: IBM OS/2 Warp Server and OS/2 LAN Server Novell NetWare 3.12 and 4.1X 154 Netfinity Server HMM

  • 1
  • 2
  • 3
  • 4
  • 5
  • 6
  • 7
  • 8
  • 9
  • 10
  • 11
  • 12
  • 13
  • 14
  • 15
  • 16
  • 17
  • 18
  • 19
  • 20
  • 21
  • 22
  • 23
  • 24
  • 25
  • 26
  • 27
  • 28
  • 29
  • 30
  • 31
  • 32
  • 33
  • 34
  • 35
  • 36
  • 37
  • 38
  • 39
  • 40
  • 41
  • 42
  • 43
  • 44
  • 45
  • 46
  • 47
  • 48
  • 49
  • 50
  • 51
  • 52
  • 53
  • 54
  • 55
  • 56
  • 57
  • 58
  • 59
  • 60
  • 61
  • 62
  • 63
  • 64
  • 65
  • 66
  • 67
  • 68
  • 69
  • 70
  • 71
  • 72
  • 73
  • 74
  • 75
  • 76
  • 77
  • 78
  • 79
  • 80
  • 81
  • 82
  • 83
  • 84
  • 85
  • 86
  • 87
  • 88
  • 89
  • 90
  • 91
  • 92
  • 93
  • 94
  • 95
  • 96
  • 97
  • 98
  • 99
  • 100
  • 101
  • 102
  • 103
  • 104
  • 105
  • 106
  • 107
  • 108
  • 109
  • 110
  • 111
  • 112
  • 113
  • 114
  • 115
  • 116
  • 117
  • 118
  • 119
  • 120
  • 121
  • 122
  • 123
  • 124
  • 125
  • 126
  • 127
  • 128
  • 129
  • 130
  • 131
  • 132
  • 133
  • 134
  • 135
  • 136
  • 137
  • 138
  • 139
  • 140
  • 141
  • 142
  • 143
  • 144
  • 145
  • 146
  • 147
  • 148
  • 149
  • 150
  • 151
  • 152
  • 153
  • 154
  • 155
  • 156
  • 157
  • 158
  • 159
  • 160
  • 161
  • 162
  • 163
  • 164
  • 165
  • 166
  • 167
  • 168
  • 169
  • 170
  • 171
  • 172
  • 173
  • 174
  • 175
  • 176
  • 177
  • 178
  • 179
  • 180
  • 181
  • 182
  • 183
  • 184
  • 185
  • 186
  • 187
  • 188
  • 189
  • 190
  • 191
  • 192
  • 193
  • 194
  • 195
  • 196
  • 197
  • 198
  • 199
  • 200
  • 201
  • 202
  • 203
  • 204
  • 205
  • 206
  • 207
  • 208
  • 209
  • 210
  • 211
  • 212
  • 213
  • 214
  • 215
  • 216
  • 217
  • 218
  • 219
  • 220
  • 221
  • 222
  • 223
  • 224
  • 225
  • 226
  • 227
  • 228
  • 229
  • 230
  • 231
  • 232
  • 233
  • 234
  • 235
  • 236
  • 237
  • 238
  • 239
  • 240
  • 241
  • 242
  • 243
  • 244
  • 245
  • 246
  • 247
  • 248
  • 249
  • 250
  • 251
  • 252
  • 253
  • 254
  • 255
  • 256
  • 257
  • 258
  • 259
  • 260
  • 261
  • 262
  • 263
  • 264
  • 265
  • 266
  • 267
  • 268
  • 269
  • 270
  • 271
  • 272
  • 273
  • 274
  • 275
  • 276
  • 277
  • 278
  • 279
  • 280
  • 281
  • 282
  • 283
  • 284
  • 285
  • 286
  • 287
  • 288
  • 289
  • 290
  • 291
  • 292
  • 293
  • 294
  • 295
  • 296
  • 297
  • 298
  • 299
  • 300
  • 301
  • 302
  • 303
  • 304
  • 305
  • 306
  • 307
  • 308
  • 309
  • 310
  • 311
  • 312
  • 313
  • 314
  • 315
  • 316
  • 317
  • 318
  • 319
  • 320
  • 321
  • 322
  • 323
  • 324
  • 325
  • 326
  • 327
  • 328
  • 329
  • 330
  • 331
  • 332
  • 333
  • 334
  • 335
  • 336
  • 337
  • 338
  • 339
  • 340
  • 341
  • 342
  • 343
  • 344
  • 345
  • 346
  • 347
  • 348
  • 349
  • 350
  • 351
  • 352
  • 353
  • 354
  • 355
  • 356
  • 357
  • 358
  • 359
  • 360
  • 361
  • 362
  • 363
  • 364
  • 365
  • 366
  • 367
  • 368
  • 369
  • 370
  • 371
  • 372
  • 373
  • 374
  • 375
  • 376
  • 377
  • 378
  • 379
  • 380
  • 381
  • 382
  • 383
  • 384
  • 385
  • 386

decrypts the user names and passwords to verify proper
access to the ServeRAID adapter or controller.
If the
verification is successful, the adapter or controller accepts
commands from the client.
If no security file is present in
the default directory, or the directory specified by the -s
parameter, security is disabled.
The server component
then accepts commands from any client connection.
The security file contains one user name and password
combination per line.
The strings are separated by a colon
(:) and each string has a maximum of eight characters.
Background-server component name
resolution:
The server component relies on name resolution to
determine the host name from the client that is trying to
connect.
When a client is trying to access a remote
server, the server tries to look up the name of the client
connecting.
The method used to look up the name is
determined by the configuration of the server.
Some
possible methods for this are Domain Name Servers
(DNS) or HOSTS files.
With certain configurations, some
timing delays might occur due to misconfiguration or
inability to access the DNS.
If problems persist, check the
network configuration.
IPSSEND and IPSMON programs
IPSSEND and IPSMON are advanced command-line
programs that you can use to manage the ServeRAID
adapters and controllers.
These utility programs are
provided on the
IBM ServeRAID Command Line Programs
Diskette
.
This ServeRAID diskette is available from the
ServerGuide Diskette Factory or from the following address
on the World Wide Web:
See page 130 for the instructions needed to access the
IBM support page.
You can use the IPSSEND program to view the
configuration of a ServeRAID adapter or controller, rebuild
a defunct drive, initialize logical drives, synchronize logical
drives, and perform other functions.
You can use the IPSMON program to monitor a
ServeRAID adapter or controller for defunct drives,
predictive failure analysis (PFA) warnings, rebuild
operations, synchronizations, and logical-drive migrations.
This program can log a message to the monitor, to a file,
or to both the monitor and a file whenever activities occur.
You can use the IPSSEND and IPSMON programs with
the following operating systems:
±
IBM OS/2 Warp Server and OS/2 LAN Server
±
Novell NetWare 3.12 and 4.1X
154
Netfinity Server HMM