IBM JS20 Hardware Maintenance Manual - Page 44
Selecting, command, target, Starting, command-line, interface
![]() |
UPC - 000435230263
View all IBM JS20 manuals
Add to My Manuals
Save this manual to your list of manuals |
Page 44 highlights
2. In the Learn section, click Online publications. 3. On the "Online publications" page, in the Brand field, select Servers. 4. In the Family field, select BladeCenter. 5. Click Continue. Detailed information about SOL setup instructions is available in the BladeCenter JS20 Installation and User's Guide on the IBM BladeCenter Documentation CD. Also, see the documentation for the operating system for information about commands that you can enter through an SOL connection. See the IBM Eserver BladeCenter and BladeCenter T Management Module Command Line Interface Reference Guide for information about: v Command-line interface guidelines v Command syntax and descriptions v Command-line interface error messages Selecting the command target You can use the command-line interface to target commands to the management module or to other devices installed in the BladeCenter unit. The command line prompt indicates the persistent command environment: the environment where commands are entered unless otherwise redirected. When a command-line interface session is started, the persistent command environment is "system"; this indicates that commands are being directed to the BladeCenter unit. See the IBM BladeCenter and BladeCenter T Management Module Command Line Eserver Interface Reference Guide for additional information. Starting the command-line interface Start the management-module command-line interface from a client computer by establishing a Telnet connection to the IP address of the management module or by establishing an SSH connection. You can establish up to 14 separate Telnet or SSH sessions to the BladeCenter management module. Although a remote network administrator can access the management-module command-line interface through Telnet, this method does not provide a secure connection. As a secure alternative to using Telnet to access the command-line interface, SSH ensures that all data that is sent over the network is encrypted and secure. The SSH clients listed below are available. Although some SSH clients have been tested, support or non-support of any particular SSH client is not implied. v The SSH clients distributed with operating systems such as Linux, AIX®, and UNIX® (see the operating-system documentation for information). The SSH client of Red Hat Linux 8.0 Professional was used to test the command-line interface. v The SSH client of cygwin (see http://www.cygwin.com for information) v Putty (see http://www.chiark.greenend.org.uk/~sgatham/putty for information) The following table shows the types of encryption algorithms that are supported, according to the client software version that is being used. 34 BladeCenter JS20 Type 8842: Hardware Maintenance Manual and Troubleshooting Guide
![](/manual_guide/products/ibm-js20-hardware-maintenance-manual-7a4946f/44.png)