IBM JS20 Hardware Maintenance Manual - Page 44

Selecting, command, target, Starting, command-line, interface

Page 44 highlights

2. In the Learn section, click Online publications. 3. On the "Online publications" page, in the Brand field, select Servers. 4. In the Family field, select BladeCenter. 5. Click Continue. Detailed information about SOL setup instructions is available in the BladeCenter JS20 Installation and User's Guide on the IBM BladeCenter Documentation CD. Also, see the documentation for the operating system for information about commands that you can enter through an SOL connection. See the IBM Eserver BladeCenter and BladeCenter T Management Module Command Line Interface Reference Guide for information about: v Command-line interface guidelines v Command syntax and descriptions v Command-line interface error messages Selecting the command target You can use the command-line interface to target commands to the management module or to other devices installed in the BladeCenter unit. The command line prompt indicates the persistent command environment: the environment where commands are entered unless otherwise redirected. When a command-line interface session is started, the persistent command environment is "system"; this indicates that commands are being directed to the BladeCenter unit. See the IBM BladeCenter and BladeCenter T Management Module Command Line Eserver Interface Reference Guide for additional information. Starting the command-line interface Start the management-module command-line interface from a client computer by establishing a Telnet connection to the IP address of the management module or by establishing an SSH connection. You can establish up to 14 separate Telnet or SSH sessions to the BladeCenter management module. Although a remote network administrator can access the management-module command-line interface through Telnet, this method does not provide a secure connection. As a secure alternative to using Telnet to access the command-line interface, SSH ensures that all data that is sent over the network is encrypted and secure. The SSH clients listed below are available. Although some SSH clients have been tested, support or non-support of any particular SSH client is not implied. v The SSH clients distributed with operating systems such as Linux, AIX®, and UNIX® (see the operating-system documentation for information). The SSH client of Red Hat Linux 8.0 Professional was used to test the command-line interface. v The SSH client of cygwin (see http://www.cygwin.com for information) v Putty (see http://www.chiark.greenend.org.uk/~sgatham/putty for information) The following table shows the types of encryption algorithms that are supported, according to the client software version that is being used. 34 BladeCenter JS20 Type 8842: Hardware Maintenance Manual and Troubleshooting Guide

  • 1
  • 2
  • 3
  • 4
  • 5
  • 6
  • 7
  • 8
  • 9
  • 10
  • 11
  • 12
  • 13
  • 14
  • 15
  • 16
  • 17
  • 18
  • 19
  • 20
  • 21
  • 22
  • 23
  • 24
  • 25
  • 26
  • 27
  • 28
  • 29
  • 30
  • 31
  • 32
  • 33
  • 34
  • 35
  • 36
  • 37
  • 38
  • 39
  • 40
  • 41
  • 42
  • 43
  • 44
  • 45
  • 46
  • 47
  • 48
  • 49
  • 50
  • 51
  • 52
  • 53
  • 54
  • 55
  • 56
  • 57
  • 58
  • 59
  • 60
  • 61
  • 62
  • 63
  • 64
  • 65
  • 66
  • 67
  • 68
  • 69
  • 70
  • 71
  • 72
  • 73
  • 74
  • 75
  • 76
  • 77
  • 78
  • 79
  • 80
  • 81
  • 82
  • 83
  • 84
  • 85
  • 86
  • 87
  • 88
  • 89
  • 90
  • 91
  • 92
  • 93
  • 94
  • 95
  • 96
  • 97
  • 98
  • 99
  • 100
  • 101
  • 102
  • 103
  • 104
  • 105
  • 106
  • 107
  • 108
  • 109
  • 110
  • 111
  • 112
  • 113
  • 114
  • 115
  • 116
  • 117
  • 118
  • 119
  • 120
  • 121
  • 122
  • 123
  • 124
  • 125
  • 126
  • 127
  • 128
  • 129
  • 130
  • 131
  • 132
  • 133
  • 134
  • 135
  • 136
  • 137
  • 138
  • 139
  • 140
  • 141
  • 142
  • 143
  • 144
  • 145
  • 146
  • 147
  • 148
  • 149
  • 150
  • 151
  • 152
  • 153
  • 154
  • 155
  • 156
  • 157
  • 158
  • 159
  • 160
  • 161
  • 162
  • 163
  • 164
  • 165
  • 166
  • 167
  • 168
  • 169
  • 170
  • 171
  • 172
  • 173
  • 174
  • 175
  • 176
  • 177
  • 178
  • 179
  • 180
  • 181
  • 182
  • 183
  • 184
  • 185
  • 186
  • 187
  • 188
  • 189
  • 190
  • 191
  • 192
  • 193
  • 194
  • 195
  • 196
  • 197
  • 198
  • 199
  • 200
  • 201
  • 202
  • 203
  • 204
  • 205
  • 206
  • 207
  • 208
  • 209
  • 210
  • 211
  • 212
  • 213
  • 214
  • 215
  • 216
  • 217
  • 218

2.
In
the
Learn
section,
click
Online
publications
.
3.
On
the
“Online
publications”
page,
in
the
Brand
field,
select
Servers
.
4.
In
the
Family
field,
select
BladeCenter
.
5.
Click
Continue
.
Detailed
information
about
SOL
setup
instructions
is
available
in
the
BladeCenter
JS20
Installation
and
User’s
Guide
on
the
IBM
BladeCenter
Documentation
CD.
Also,
see
the
documentation
for
the
operating
system
for
information
about
commands
that
you
can
enter
through
an
SOL
connection.
See
the
IBM
Eserver
BladeCenter
and
BladeCenter
T
Management
Module
Command
Line
Interface
Reference
Guide
for
information
about:
v
Command-line
interface
guidelines
v
Command
syntax
and
descriptions
v
Command-line
interface
error
messages
Selecting
the
command
target
You
can
use
the
command-line
interface
to
target
commands
to
the
management
module
or
to
other
devices
installed
in
the
BladeCenter
unit.
The
command
line
prompt
indicates
the
persistent
command
environment:
the
environment
where
commands
are
entered
unless
otherwise
redirected.
When
a
command-line
interface
session
is
started,
the
persistent
command
environment
is
“system”;
this
indicates
that
commands
are
being
directed
to
the
BladeCenter
unit.
See
the
IBM
Eserver
BladeCenter
and
BladeCenter
T
Management
Module
Command
Line
Interface
Reference
Guide
for
additional
information.
Starting
the
command-line
interface
Start
the
management-module
command-line
interface
from
a
client
computer
by
establishing
a
Telnet
connection
to
the
IP
address
of
the
management
module
or
by
establishing
an
SSH
connection.
You
can
establish
up
to
14
separate
Telnet
or
SSH
sessions
to
the
BladeCenter
management
module.
Although
a
remote
network
administrator
can
access
the
management-module
command-line
interface
through
Telnet,
this
method
does
not
provide
a
secure
connection.
As
a
secure
alternative
to
using
Telnet
to
access
the
command-line
interface,
SSH
ensures
that
all
data
that
is
sent
over
the
network
is
encrypted
and
secure.
The
SSH
clients
listed
below
are
available.
Although
some
SSH
clients
have
been
tested,
support
or
non-support
of
any
particular
SSH
client
is
not
implied.
v
The
SSH
clients
distributed
with
operating
systems
such
as
Linux,
AIX
®
,
and
UNIX
®
(see
the
operating-system
documentation
for
information).
The
SSH
client
of
Red
Hat
Linux
8.0
Professional
was
used
to
test
the
command-line
interface.
v
The
SSH
client
of
cygwin
(see
for
information)
v
Putty
(see
for
information)
The
following
table
shows
the
types
of
encryption
algorithms
that
are
supported,
according
to
the
client
software
version
that
is
being
used.
34
BladeCenter
JS20
Type
8842:
Hardware
Maintenance
Manual
and
Troubleshooting
Guide