The information contained herein is subject to change without notice. The only warranties for HP products and services are set forth in the express
warranty statements accompanying such products and services. Nothing herein should be construed as constituting an additional warranty. HP
shall not be liable for technical or editorial errors or omissions contained herein.
Confidential computer software. Valid license from HP required for possession, use or copying. Consistent with FAR 12.211 and 12.212,
Commercial Computer Software, Computer Software Documentation, and Technical Data for Commercial Items are licensed to the U.S.
Government under vendor’s standard commercial license.
Intended audience
This document is for the person who installs, administers, and troubleshoots servers and storage systems. HP assumes you are qualified in the
servicing of computer equipment and trained in recognizing hazards in products with hazardous energy levels.
Page 3
Contents
Accessing the command line interface ........................................................................................... 10
Remote access to the Onboard Administrator ................................................................................................ 10
Local access to the Onboard Administrator ................................................................................................... 10
Command line ............................................................................................................................ 12
Command line overview ............................................................................................................................. 12
Command line conventions ......................................................................................................................... 12
HP Integrity server blade restrictions ............................................................................................................. 13
Access level and privileges.......................................................................................................................... 13
HELP ......................................................................................................................................................... 17
SET RACK NAME ....................................................................................................................................... 19
SHOW RACK NAME ................................................................................................................................. 19
SHOW TOPOLOGY ................................................................................................................................... 19
User account commands .............................................................................................................. 21
ADD USER ................................................................................................................................................. 21
ASSIGN OA .............................................................................................................................................. 22
DISABLE USER ........................................................................................................................................... 22
ENABLE USER ............................................................................................................................................ 23
HISTORY ................................................................................................................................................... 23
REMOVE USER .......................................................................................................................................... 23
SET MINIMUM PASSWORD LENGTH .......................................................................................................... 24
SET PASSWORD ........................................................................................................................................ 24
SET SESSION TIMEOUT ............................................................................................................................. 24
SET USER ACCESS ..................................................................................................................................... 25
SET USER CONTACT ................................................................................................................................. 25
SET USER FULLNAME ................................................................................................................................. 25
SET USER PASSWORD ............................................................................................................................... 26
SHOW PASSWORD SETTINGS .................................................................................................................. 26
SHOW SESSION TIMEOUT ........................................................................................................................ 27
SHOW USER ............................................................................................................................................. 27
ASSIGN for LDAP ...................................................................................................................................... 32
ASSIGN OA LDAP GROUP ......................................................................................................................... 33
REMOVE LDAP GROUP .............................................................................................................................. 34
SET LDAP GROUP ACCESS ......................................................................................................................... 35
SET LDAP GROUP DESCRIPTION ................................................................................................................. 35
SET LDAP NAME MAP ................................................................................................................................ 35
SET LDAP PORT .......................................................................................................................................... 36
SET LDAP SEARCH ..................................................................................................................................... 36
SET LDAP SERVER ...................................................................................................................................... 36
SHOW LDAP CERTIFICATE ......................................................................................................................... 36
SHOW LDAP GROUP ................................................................................................................................. 37
SHOW LDAP INFO .................................................................................................................................... 37
TEST LDAP ................................................................................................................................................. 38
UNASSIGN for LDAP ................................................................................................................................. 38
UNASSIGN OA LDAP GROUP .................................................................................................................... 38
HP SIM commands ...................................................................................................................... 40
SET HPSIM TRUST MODE ........................................................................................................................... 41
SHOW HPSIM INFO .................................................................................................................................. 41
General management commands ................................................................................................. 42
DOWNLOAD OA CERTIFICATE .................................................................................................................. 42
FORCE TAKEOVER ..................................................................................................................................... 42
SET DEVICE SERIAL_NUMBER BLADE ........................................................................................................... 45
SET FACTORY ........................................................................................................................................... 45
SET SCRIPT MODE ..................................................................................................................................... 45
SHOW ALL ................................................................................................................................................ 46
SHOW DEVICE SERIAL_NUMBER BLADE ..................................................................................................... 72
SHOW INTERCONNECT SESSIONS ........................................................................................................... 72
SET EBIPA ................................................................................................................................................. 75
SET EBIPA SERVER ........................................................................................................................... 76
SET EBIPA INTERCONNECT ............................................................................................................. 76
SHOW EBIPA ............................................................................................................................................ 76
ADD OA ADDRESS IPV6 ............................................................................................................................ 79
ADD OA DNS ........................................................................................................................................... 79
ADD OA DNS IPV6 .................................................................................................................................... 79
SET ALERTMAIL MAILBOX ........................................................................................................................... 92
SET ALERTMAIL SENDERDOMAIN ............................................................................................................... 92
SET ALERTMAIL SMTPSERVER ...................................................................................................................... 92
SET ENCRYPTION ...................................................................................................................................... 93
SET OA GATEWAY ................................................................................................................................... 93
Page 6
SET OA NAME .......................................................................................................................................... 93
SET OA UID .............................................................................................................................................. 94
SET IPCONFIG .......................................................................................................................................... 94
SET NTP POLL ............................................................................................................................................ 94
SET NTP PRIMARY ...................................................................................................................................... 95
SET NTP SECONDARY ............................................................................................................................... 95
SET SNMP CONTACT ................................................................................................................................ 95
SET SNMP COMMUNITY ........................................................................................................................... 96
SET SNMP LOCATION ............................................................................................................................... 96
SHOW ENCRYPTION ................................................................................................................................ 96
SHOW NETWORK .................................................................................................................................... 97
SHOW SNMP ........................................................................................................................................... 98
SHOW SSHFINGERPRINT .......................................................................................................................... 99
SHOW SSHKEY ......................................................................................................................................... 99
TEST ALERTMAIL ........................................................................................................................................ 99
TEST SNMP ............................................................................................................................................. 100
RESTART OA ........................................................................................................................................... 102
SET DATE ................................................................................................................................................ 102
SET DISPLAY EVENTS ............................................................................................................................... 103
SET ENCLOSURE ASSET ........................................................................................................................... 103
SET ENCLOSURE NAME .......................................................................................................................... 104
SET ENCLOSURE PART_ NUMBER ............................................................................................................. 104
SET ENCLOSURE PDU_TYPE ..................................................................................................................... 104
SET ENCLOSURE SERIAL_NUMBER ........................................................................................................... 105
SET ENCLOSURE UID ............................................................................................................................... 105
SET LLF INTERVAL..................................................................................................................................... 105
SET OA USB ............................................................................................................................................ 106
SET POWER MODE ................................................................................................................................. 106
SET POWER LIMIT .................................................................................................................................... 106
SET POWER SAVINGS ............................................................................................................................. 107
SET TIMEZONE........................................................................................................................................ 107
SHOW CONFIG ..................................................................................................................................... 107
SHOW DATE........................................................................................................................................... 108
SHOW DISPLAY EVENTS .......................................................................................................................... 109
SHOW ENCLOSURE FAN ........................................................................................................................ 109
SHOW ENCLOSURE INFO ....................................................................................................................... 110
SHOW ENCLOSURE LCD
SHOW ENCLOSURE POWER_SUMMARY ................................................................................................. 111
SHOW ENCLOSURE POWERSUPPLY ........................................................................................................ 112
SHOW ENCLOSURE STATUS ................................................................................................................... 113
SHOW ENCLOSURE TEMP ....................................................................................................................... 113
SHOW FRU ............................................................................................................................................. 114
SHOW OA ............................................................................................................................................. 116
SHOW OA CERTIFICATE .......................................................................................................................... 116
SHOW OA INFO .................................................................................................................................... 117
SHOW OA NETWORK ............................................................................................................................ 117
SHOW OA STATUS ................................................................................................................................. 118
POWEROFF SERVER ................................................................................................................................ 126
POWERON SERVER ................................................................................................................................. 127
REBOOT SERVER ..................................................................................................................................... 127
SET NIC .................................................................................................................................................. 128
SET SERVER BOOT ................................................................................................................................... 128
SET SERVER BOOT ONCE ........................................................................................................................ 128
SET SERVER POWERDELAY ....................................................................................................................... 129
SET SERVER UID ....................................................................................................................................... 129
SET URB .................................................................................................................................................. 129
SHOW SERVER BOOT ............................................................................................................................. 130
SHOW SERVER INFO .............................................................................................................................. 131
SHOW SERVER LIST ................................................................................................................................. 132
SHOW SERVER NAMES ........................................................................................................................... 132
SHOW SERVER PORT MAP ....................................................................................................................... 133
SHOW SERVER POWERDELAY ................................................................................................................. 134
SHOW SERVER STATUS ........................................................................................................................... 135
SHOW SERVER TEMP .............................................................................................................................. 137
SHOW SYSLOG SERVER .......................................................................................................................... 138
UNASSIGN SERVER ................................................................................................................................. 139
SHOW URB ............................................................................................................................................ 140
TEST URB ................................................................................................................................................ 141
SET SERVER DVD ..................................................................................................................................... 148
SHOW SERVER DVD ................................................................................................................................ 148
SET REMOTE SYSLOG PORT ..................................................................................................................... 150
SET REMOTE SYSLOG SERVER .................................................................................................................. 151
SHOW SYSLOG SETTINGS ...................................................................................................................... 151
TEST SYSLOG .......................................................................................................................................... 151
Remote syslog example ............................................................................................................................. 152
USB support commands ............................................................................................................. 153
DOWNLOAD CONFIG using USB key ...................................................................................................... 153
SET SERVER DVD for USB key ................................................................................................................... 153
SHOW USBKEY ....................................................................................................................................... 153
UPDATE IMAGE using USB key ................................................................................................................. 154
UPLOAD CONFIG using USB key .............................................................................................................. 155
SAVE VLAN ............................................................................................................................................. 157
SET VLAN DEFAULT .................................................................................................................................. 157
SET VLAN FACTORY ................................................................................................................................ 158
SET VLAN INTERCONNECT ..................................................................................................................... 158
SET VLAN IPCONFIG ............................................................................................................................... 158
SET VLAN IPCONFIG DHCP ..................................................................................................................... 159
SET VLAN IPCONFIG SAVE ...................................................................................................................... 159
SET VLAN IPCONFIG STATIC .................................................................................................................... 159
SET VLAN OA ......................................................................................................................................... 160
SET VLAN REVERT .................................................................................................................................... 160
SET VLAN SERVER ................................................................................................................................... 160
SHOW VLAN .......................................................................................................................................... 161
Enclosure Dynamic Power Cap commands .................................................................................. 162
SET ENCLOSURE POWER_CAP ................................................................................................................. 162
SET ENCLOSURE POWER_CAP_BAYS_TO_EXCLUDE .................................................................................. 162
SHOW ENCLOSURE POWER_CAP ........................................................................................................... 163
SHOW ENCLOSURE POWER_CAP_BAYS_TO_EXCLUDE ............................................................................ 163
Command line event notifications............................................................................................................... 165
Technical support ...................................................................................................................... 168
Before you contact HP .............................................................................................................................. 168
HP contact information .............................................................................................................................. 168
Time zone settings .................................................................................................................... 169
Universal time zone settings ...................................................................................................................... 169
Africa time zone settings ........................................................................................................................... 169
Americas time zone settings ...................................................................................................................... 170
Page 9
Asia time zone settings ............................................................................................................................. 171
Oceanic time zone settings ....................................................................................................................... 172
Europe time zone settings .......................................................................................................................... 173
Polar time zone settings ............................................................................................................................ 173
Acronyms and abbreviations ...................................................................................................... 174
Index ....................................................................................................................................... 177
Page 10
Accessing the command line interface
Remote access to the Onboard Administrator
The Onboard Administrator CLI can be accessed remotely through any Telnet or SSH session.
Telnet session
1. Open a command-line window from a network-connected client.
2. At the prompt, telnet to the IP address of the Onboard Administrator and press Enter.
For example, telnet 192.168.100.130, where the IP address is the address of your Onboard
Administrator.
3. Enter a valid user name and press Enter.
4. Enter a valid password and press Enter. The CLI command prompt displays.
5. Enter commands for the Onboard Administrator.
6. To terminate the remote access telnet session, enter Exit, Logout, or Quit at the CLI command
prompt.
SSH session
1. Start a SSH session to the Onboard Administrator using any SSH client application.
2. When prompted, enter the assigned IP address or DNS name of the Onboard Administrator and
press Enter.
3. Enter a valid user name and press Enter.
4. Enter a valid password and press Enter. The CLI command prompt displays.
5. Enter commands for the Onboard Administrator.
6. To terminate the remote access SSH session, close the communication software or enter Exit,
Logout, or Quit at the CLI command prompt.
Local access to the Onboard Administrator
The Onboard Administrator can be accessed locally through a serial port connector on the rear of the
Onboard Administrator module. Use a laptop or another computer as a serial console to communicate
with the Onboard Administrator. A laptop or PC connected to the Onboard Administrator serial port
requires a null-modem cable. The minimum connection to an external console is pins 2, 3, and 5.
1. Connect a serial cable between the serial port on the computer and the corresponding serial port on
the Onboard Administrator module. The following table is for the DB9 serial (RS232) port and shows
the pinout and signals for the RS232 connector. The signal direction is DTE (computer) relative to the
DCE (modem).
Pin Name Signal direction Description
1 CD <<-- Carrier detect
2 RXD <<-- Receive data
Accessing the command line interface 10
Page 11
Pin Name Signal direction Description
3 TXD -->> Transmit data
4 DTR -->> Data terminal ready
5 GND
System ground
6 DSR <<-- Data set ready
7 RTS -->> Request to send
8 CTS <<-- Clear to send
9 RI <<-- Ring indicator
2. Use any standard communication software to launch a terminal emulation session with the following
parameters:
Parameter Value
Transmission rate 9600 bps
Data bits 8
Parity None
Stop bits 1
Protocol None
3. When prompted, enter a valid user name, and then press Enter.
4. Enter a valid password, and press Enter. The CLI command prompt appears.
5. Enter commands for the Onboard Administrator.
6. To terminate the terminal session, enter Exit at the prompt.
Accessing the command line interface 11
Page 12
Command line
•
•
SET ENCLOSURE UID OFF
Command line overview
The CLI can be used as an alternative method for managing the Onboard Administrator. Using the CLI
can be useful in the following scenarios:
• HP Management Applications (for example: Systems Insight Manager, Insight Control tools, and so
on) can query the Onboard Administrator for information these tools need to present a complete
management view of HP BladeSystem enclosures and the devices contained within. This interface is
also used by the Management tools to execute provisioning and configuration tasks to devices within
the enclosure.
• Users can develop tools that utilize Onboard Administrator functions for data collection and for
executing provisioning and configuration tasks.
• When no browser is available or you prefer to use a Linux command line interface to access
management data and perform configuration tasks.
Command line conventions
CLI input is case-insensitive except when otherwise noted. Commands are organized into a tree, with
approximately 30 base commands. Each of these commands can have any number of subcommands.
Subcommands can also have further subcommands.
Each command used in this guide follows the conventions listed in the following table.
Symbol Description
<lower case> Denotes the variable within the symbols that must be substituted with a value, such
as a user name. Symbols must be removed.
UPPER CASE
|
{ }
[ ]
" "
Denotes input to be entered as shown.
Unless noted, symbol is not case-sensitive.
Used to separate input options.
Denotes a list of mandatory choices that must be made.
For example, SET ENCLOSURE UID {ON | OFF} must be in the form of either
of the following:
SET ENCLOSURE UID ON
Denotes an optional argument or set of characters.
Used to enclose command arguments that contain spaces.
Command line 12
Page 13
HP Integrity server blade restrictions
HP Integrity server blades do not support all commands. See specific commands for restrictions on HP
Integrity server blades.
The following commands are not applicable to HP Integrity server blades
• Hponcfg
• Set Server Boot
• Set Server Boot Once
• Show Server Boot
• Show Syslog Server
• Update iLO
Access level and privileges
Onboard Administrator accounts and privileges
Onboard Administrator accounts are created with a username, password, privilege level, and permissions
to Device bays and Interconnect bays on the Onboard Administrator. You cannot delete or modify the
privileges of the default Administrator account, on the Onboard Administrator. You can only change the
password for the Administrator account. The following table indicates the capabilities of the user based
on their privileges and permitted bays.
Command line 13
Page 14
•
•
•
•
•
•
•
Account classification Capabilities
Administrator
All commands Local account, not
LDAP
Account name /
Privilege level
Administrator /
administrator
Bays selected for this
account
All
Only account
remaining after a
reset Onboard
Administrator to
factory defaults
(account retains
configured
Administrator
password)
Administrator
account password
can be reset to
factory default
through the
Onboard
Administrator serial
port using "L" lost
password recovery
option
Can download,
add, and clear
SSHKey. This key
only works with the
Administrator
account.
OA administrator
All commands Allows access to all
aspects of the HP
BladeSystem
Enclosure and
Onboard
Administrator
including
configuration,
firmware updates,
user management,
and resetting
default settings.
username /
administrator
OA bays (all bays
automatically selected)
Command line 14
Page 15
•
•
•
•
•
•
•
•
•
•
•
•
•
Account classification Capabilities
administrator
Can perform all
operations to
permitted device
bays and
interconnect bays
including virtual
power and console
access
Account name /
Privilege level
username /
administrator
Bays selected for this
account
No OA bays and only
selected device bays and
interconnect bays
administrator
permission on
device iLO2
OA operator
Set rack name EBIPA
enable/disable
permitted bays
Change OA
network settings
username / operator
OA bays and can have
other bays selected, but the
capabilities for the other
bays are defined in
operator
Perform enclosure
management
commands
operator
Can perform all
operations to
permitted device
bays and
interconnect bays
including virtual
power and console
access
username / operator
Selected device bays and
interconnect bays
operator
permission on
device iLO2
user
Can view status
and information of
selected bays
username / user
No OA bays and some
device bays and
interconnect bays
Can view CLI
history
Can set password
for own account
Can set user
contact information
for own account
Can 'show' CLI
commands
Account authentication
Local users
Command line 15
Page 16
• This is the default setting. Local user accounts are directly authenticated against a password for each
account stored on the active Onboard Administrator.
• Account modifications are automatically synchronized between both Onboard Administrator
modules if two are present.
• Local users may be disabled if LDAP is enabled, leaving the Administrator account as the only local
account that cannot be disabled.
LDAP users
• The Enable/Disable LDAP is an optional setting. LDAP enabled can be used with local users enabled
or disabled.
• The Onboard Administrator will use configured LDAP server and search context to request account
authentication.
• Configuration of the LDAP group will determine the privileges instead of the username.
• If a user is configured for multiple groups with different privileges and bay permissions, then the user
will have the highest privileges and the combination of all permitted bays.
• In version 2.10 or higher, if the user logged into the Onboard Administrator is an LDAP user then the
Onboard Administrator enforces the iLO license and requires that the iLO have a Select license
before allowing the AutoLogin to iLO.
AutoLogin to iLO 2
The following table indicates Onboard Administrator account privileges mapped to iLO privileges when
using Onboard Administrator AutoLogin.
iLO privileges administrator operator user
Administer user accounts X
Remote console access X X
Virtual power and reset X X
Virtual media X X
Configure iLO settings X
Login to iLO X X X
Command line 16
Page 17
General commands
CLEAR SCREEN
•Command:
CLEAR SCREEN
•Description:
Clears the terminal screen
•Access level:
EXIT
• Command:
• Description:
• Access level:
HELP
• Command:
• Description:
Administrator, Operator, User
EXIT
Exits the command line interpreter
Administrator, Operator, User
HELP <command>
If you supply a command, the usage and help text for the command appears. If no argument is
given, all base commands appear.
•Access level:
Administrator, Operator, User
Example
OA-0018FE27577F> HELP
ADD | ASSIGN | CLEAR | CONNECT | DISABLE | DISCOVER | DOWNLOAD | EDIT | ENABLE | EXIT | FORCE
| GENERATE | HELP | HISTORY | HPONCFG | LOGOUT | PING | POWEROFF | POWERON | QUIT | REBOOT |
REMOVE | RESET | RESTART | SAVE | SET | SHOW | SLEEP | TEST | UNASSIGN | UPDATE | UPLOAD
LOGOUT
•Command:
General commands 17
Page 18
LOGOUT
•Description:
Exits the command line interpreter
•Access level:
QUIT
• Command:
• Description:
• Access level:
Administrator, Operator, User
QUIT
Exits the command line interpreter
Administrator, Operator, User
General commands 18
Page 19
Rack commands
SET RACK NAME
•Command:
SET RACK NAME <rack name>
•Description:
Sets the rack name
•Access level/Bay level:
OA administrator, OA operator
•Restrictions:
The <rack name> must be a maximum of 32 characters long and includes all alphanumeric, the
dash, and the underscore characters.
UnnamedRack is the default rack name.
SHOW RACK NAME
•Command:
SHOW RACK NAME
•Description:
Displays the user defined rack name setting for the enclosure
•Access level/Bay level:
All
•Restrictions:
None
•Example:
OA-0018FE27577F> SHOW RACK NAME
Rack Name: UnnamedRack
SHOW TOPOLOGY
•Command:
SHOW TOPOLOGY
•Description:
o Displays the enclosures connected by the enclosure link
o Displays a table with the enclosure name, overall health of the enclosure, and the IP address
•Access level/Bay level
Rack commands 19
Page 20
All
•Restrictions:
None
Example
SHOW TOPOLOGY
Detecting linked enclosures ....
Rack Topology (top-down)
Rack UUID: 090987654321
Rack Name: UnnamedRack
Enclosure Name Status Local IP Address UUID
-------------------------------- -------- ----- --------------- ------------Shorty OK Yes 16.84.190.253 090987654321
OA-0018FE2F998B OK No 172.16.211.101 09USE644285C
Rack commands 20
Page 21
User account commands
ADD USER
•Command:
ADD USER "<user name>" ["<password>"]
•Description:
Adds a user to the system. If you do not provide a password, you are prompted for one. If SCRIPT
MODE is enabled and the password is not provided, the password is assigned an unmatched string.
This unmatched string requires an enclosure administrator to change the password to allow the new
user to access the system.
•Access level/Bay level:
OA administrator
•Restrictions:
o You can add a maximum of 30 users, including the reserved accounts.
o The <user name> is case sensitive and must be unique to all other user names and group names.
o The <user name> must begin with a letter.
o The <password> must be three to eight characters long for firmware 1.00 through 1.30 and 3 to
o Reserved user names are: ALL (case insensitive) ADMINISTRATOR (case insensitive), switch1,
ASSIGN
•Command:
ASSIGN {SERVER | INTERCONNECT} {<bay number> | ALL | <bay number>-<bay
number>} {"<user name>" | LDAP GROUP "<LDAP group name>"}
•Description:
Assigns one or more bays to a user or group
•Access level/Bay level:
The <user name> must be 1 to 40 characters long and can include all alphanumeric characters,
the dash, and the underscore.
40 characters long for firmware 2.00 and later. The character set includes all printable
characters. If you do not enter a password, you are prompted to enter one.
switch2, switch3, switch4, switch5, switch6, switch7, switch8, ldapuser, nobody, vcmuser, and
root (for firmware 1.00 through 1.30).
OA administrator
•Restrictions:
The <user name> is case sensitive. If a bay is presently assigned to a user, you must unassign the
bay first.
User account commands 21
Page 22
ASSIGN OA
•Command:
ASSIGN OA {"<user name>" | LDAP GROUP "<LDAP group name>"}
•Description:
Assigns the Onboard Administrators specified to an existing user or group
•Access level/Bay level:
OA administrator
•Restrictions:
The <user name> is case sensitive.
DISABLE USER
•Command:
DISABLE USER "<user name>"
•Description:
Disables a user account. The system immediately logs out the user and prevents the user from
logging in until the account is enabled. CLI sessions are terminated and all future SOAP web
accesses fail.
•Access level/Bay level:
OA administrator
•Restrictions:
o The <user name> is case sensitive.
o You cannot disable the built-in Administrator account
DISABLE STRONG PASSWORDS
•Command:
DISABLE STRONG PASSWORDS
•Description:
Removes strong password requirements for user passwords
•Access level/Bay level:
OA administrator
•Restrictions:
Only Administrators with Onboard Administrator permission are allowed to manage strong
passwords.
ENABLE STRONG PASSWORDS
• Command:
User account commands 22
Page 23
ENABLE STRONG PASSWORDS
•Description:
When enabled, this command requires that a user's password contain at least one character from
three of the four categories.
The four categories include:
o Uppercase
o Lowercase
o Numeric
o Nonalphanumeric
•Access level/Bay level:
OA administrator
•Restrictions:
Only Administrators with Onboard Administrator permission are allowed to manage strong
passwords
ENABLE USER
•Command:
ENABLE USER "<user name>"
•Description:
Enables a user account that was previously disabled by the DISABLE USER command
•Access level/Bay level:
OA administrator
•Restrictions:
The <user name> is case sensitive.
HISTORY
•Command:
HISTORY
•Description:
Shows the history of commands for the current session
•Access level/Bay level:
All
•Restrictions:
None
REMOVE USER
•Command:
User account commands 23
Page 24
REMOVE USER {ALL | "<user name>" | CERTIFICATE "<user name>"}
•Description:
Removes a user from the system and/or any certificate mapped to the user. If you specify ALL, then
the command is run for all users except the default system accounts.
•Access level/Bay level:
OA administrator
•Restrictions:
o The <user name> is case sensitive.
o You cannot remove the Administrator account.
SET MINIMUM PASSWORD LENGTH
•Command:
SET MINIMUM PASSWORD LENGTH <length>
•Description:
Sets a minimum length for passwords. When set, a user's password must contain at least the number
of characters specified.
•Access level/Bay level:
OA administrator
•Restrictions:
The minimum password length can be set between 3 and 40 characters.
SET PASSWORD
•Command:
SET PASSWORD ["<password>"]
•Description:
Sets the password of the user that executed the command. If you do not provide a password on the
command line, you are prompted for one.
•Access level/Bay level:
All
•Restrictions:
The <password> must be three to eight characters long for firmware 1.00 through 1.30 and 3 to 40
characters long for firmware 2.00 and later. The character set includes all printable characters.
SET SESSION TIMEOUT
•Command:
SET SESSION TIMEOUT <timeout>
•Description:
Sets the number of minutes before inactive sessions are removed. The default setting is 1440.
User account commands 24
Page 25
•Access level/ Bay level:
OA administrator
•Restriction:
Valid session timeout values range from 10 to 1440 minutes (24 hours).
SET USER ACCESS
•Command:
SET USER ACCESS "<user name>" {ADMINISTRATOR | OPERATOR | USER}
•Description:
Sets the user access level. Additionally, use the ASSIGN command to give the user access rights to
the Onboard Administrator, server bays, and interconnect bays.
•Access level/Bay level:
OA administrator
•Restrictions:
None
SET USER CONTACT
•Command:
SET USER CONTACT ["<user name>"] "<contact info>"
•Description:
Sets the contact information field for the user. If there is no <user name>, the command modifies the
contact information of the user who executed the command.
•Access level/Bay level:
o All users can modify their own contact information.
o The OA administrator can modify all users.
•Restrictions:
o The <user name> is case sensitive. The <contact info> must be a maximum of 20 characters long
and includes all alphanumeric characters, the dash, the underscore, and spaces.
o The default contact information is blank.
o You must use double quotes if the contact information contains any spaces.
SET USER FULLNAME
•Command:
SET USER FULLNAME ["<user name>"] "<full name>"
•Description:
Sets a user's full name. If you do not specify a <user name>, the command modifies the full name of
the user who is currently logged in.
•Access level/Bay level:
User account commands 25
Page 26
o
OA administrator, OA operator
o All users can modify their own full name.
•Restrictions:
o The <user name> is case sensitive. The <full name> must be a maximum of 20 characters long
and includes all alphanumeric, the dash, the underscore, and the space characters.
o The default full name is blank.
SET USER PASSWORD
•Command:
SET USER PASSWORD "<user name>" ["<new password>"]
•Description:
Sets a user's password. If you do not supply a password on the command line, you are prompted for
one.
•Access level/Bay level
OA administrator
OA operator and User access level users can change their own passwords.
•Restrictions:
o Only OA administrators can modify another user's password. Only the Administrator account
can modify the password of the Administrator account.
o The <user name> is case sensitive.
o The <new password> must be three to eight characters long for firmware 1.00 through 1.30 and
3 to 40 characters long for firmware 2.00 and higher.
o The character set includes all printable characters.
SHOW PASSWORD SETTINGS
•Command:
SHOW PASSWORD SETTINGS
•Description:
Displays the current minimum password length and strong password settings
Displays the user's full name, contact information, whether the user has administrator rights, whether
the account is enabled, the access level, whether the user has access to the Onboard Administrator,
and the bays the user can access.
If you enter LIST and you are an OA administrator, the information for every user is listed. An
asterisk before a user name denotes the current user.
•Access level/Bay level:
All
•Restrictions:
o The <user name> is case sensitive.
o Users who do not have OA administrator access levels can only view their user information.
Example
OA-0018FE27577F> SHOW USER
Local User "Administrator" Information:
Full name: System Administrator
Contact Info:
User Rights: Admin
Account Status: Enabled
Server Bay Access List: 1 1A 1B 2 2A 2B 3 3A 3B 4 4A 4B 5 5A 5B 6 6A 6B
7 7A 7B 8 8A 8B
Interconnect Bay Access List: 1 2 3 4
OA Access: Yes
User account commands 27
Page 28
SLEEP
• Command:
• Description:
• Access level/Bay level:
• Restrictions:
SLEEP <seconds>
Pauses the sessions for a fixed period of time. This command is useful for adding delays to scripts.
After the pause has started, you cannot continue the session before time runs out. However, you can
terminate the session and start another session.
All
The <seconds> field must be a whole number from 1 to 86400.
UNASSIGN
•Command:
UNASSIGN {SERVER | INTERCONNECT} {<bay number> | ALL | <bay number>-<bay
number>} {"<user name>" | LDAP GROUP "<LDAP group name>"}
•Description:
Removes a bay from the user
•Access level/Bay level:
OA administrator
•Restrictions:
The <user name> is case sensitive.
UNASSIGN OA
•Command:
UNASSIGN OA {"<user name>" | LDAP GROUP "<LDAP group name>"}
•Description:
Removes the Onboard Administrator from the control of the user that it is currently assigned
•Access level/Bay level:
OA administrator
•Restrictions:
The <user name> is case sensitive.
User account commands 28
Page 29
Two-Factor Authentication commands
DISABLE CRL
•Command:
DISABLE CRL
•Description:
Disables certificate revocation checks
•Access level/Bay level:
OA administrator
•Restrictions:
None
DISABLE TWOFACTOR
•Command:
DISABLE TWOFACTOR
•Description:
Disables Two-Factor Authentication
•Access level/Bay level:
OA administrator
•Restrictions:
None
DOWNLOAD CA CERTIFICATE
•Command:
DOWNLOAD CA CERTIFICATE "<url>"
•Description:
Downloads a CA certificate to act as the trusted certification authority to validate user certificates
when using Two-Factor Authentication.
•Access level/Bay level:
OA administrator
•Restrictions:
Allows the download of up to five different certificates
Two-Factor Authentication commands 29
Page 30
DOWNLOAD USER CERTIFICATE
•Command:
DOWNLOAD USER CERTIFICATE "<user name>" <url>
•Description:
o Downloads an x.509 certificate for the user from <url>. The file at <url> must be a Base64 PEM
encoded file.
o Downloads a CA certificate used in Two-Factor Authentication
•Access level/Bay level:
OA administrator
•Restrictions:
None
REMOVE CA CERTIFICATE
•Command:
REMOVE CA CERTIFICATE "<certificate name>"
• Description:
• Removes the trust certificate corresponding to the SHA1 <certificate name>. Any users having their
certificates issued by this CA can no longer login if Two-Factor Authentication is enabled.
•Access level/Bay level:
OA administrator
•Restrictions:
None
REMOVE USER CERTIFICATE
•Command:
REMOVE USER CERTIFICATE "<user name>"
•Description:
Removes the user certificate. If Two-Factor Authentication is enabled, this user no longer has access
through HTTPS.
•Access level/Bay level:
OA administrator
•Restrictions:
None
SHOW CA CERTIFICATES
•Command:
Two-Factor Authentication commands 30
Page 31
SHOW CA CERTIFICATES
•Description:
Displays a list of installed CA certificates
•Access level/Bay level:
OA Administrator
•Restrictions:
None
Example
OA-0016355E560A> SHOW CA CERTIFICATE
Details for ca certificate 1
certificateVersion = 3
issuerOrganization = ca.com
issuerOrganizationalUnit = IT Infrastructure
issuerCommonName = Hewlett-Packard Primary Class 2 Certification Authority
subjectOrganization = hp.com
subjectOrganizationalUnit = IT Infrastructure
subjectCommonName = Hewlett-Packard Primary Class 2 Certification Authority
validFrom = 1997-12-30T00:00:00Z
validTo = 2012-12-29T23:59:59Z
serialNumber =83:B7:1B:E9:27:AB:5C:61:F8:8F:90:30:E:0D:17:DE:C6
extensionCount = 7
md5Fingerprint = B6:22:5B:B8:43:CD:1A:66:64:19:33:B:3:C1:80:BF:B6
sha1Fingerprint = CF:5C:89:7B:84:7B:73:C4:C5:3E:3F:E:7:93:09:53:EB:C4:28:BE:CF
SHOW TWOFACTOR INFO
•Command:
SHOW TWOFACTOR INFO
•Description:
Displays the configuration details for Two-Factor Authentication
•Access level/Bay level:
All
•Restrictions:
None
Example
OA-0018FE27577F> SHOW TWOFACTOR INFO
Two Factor Authentication:
Enabled : Disabled
Certificate Revocation : Disabled
Certificate Owner Field : Subject
Adds an LDAP certificate on the command line. To add the certificate:
1. Start with a string that does not appear within the certificate (the end marker)
2. Paste in the certificate
3. Terminate the command with the end marker
•Access level/Bay level:
OA administrator
•Restrictions:
The certificate text cannot exceed 3071 characters.
ADD LDAP GROUP
•Command:
ADD LDAP GROUP "<group name>"
•Description:
Adds an LDAP group to the group. This group must match a group in the directory server.
•Access level/Bay level:
OA administrator
•Restrictions:
o The maximum number of LDAP groups is 30.
o Group name must be 1 to 255 characters in length.
o Character set includes all printable characters, except quotation marks and new lines.
o The group name must start with an alpha character.
ASSIGN for LDAP
•Command:
ASSIGN {SERVER | INTERCONNECT} {<bay number> | ALL | <bay number>-<bay
number>} {"<user name>" | LDAP GROUP "<LDAP group name>"}
• Description:
Directory commands 32
Page 33
Assigns the bay to a specified LDAP group, providing access to the bay at the access level of the
group
•Access level/Bay level:
OA administrator
•Restrictions:
None
ASSIGN OA LDAP GROUP
•Command:
ASSIGN OA {"<user name>" | LDAP GROUP "<LDAP group name>"}
•Description:
Assigns access to the Onboard Administrator to the specified group
•Access level/Bay level:
OA administrator
•Restrictions:
None
DISABLE LDAP
NOTE: If LDAP is enabled, local accounts are disabled, and the LDAP server becomes
unavailable, you can recover by booting into Lost Password mode.
When booting in Lost Password mode, the local Administrator password will be reset, LDAP is
•Command:
disabled, and Local Logins are re-enabled
DISABLE LDAP
• Description:
• Disables directory authentication
• Access level/Bay level:
OA administrator
•Restrictions:
None
DOWNLOAD LDAP CERTIFICATE
•Command:
DOWNLOAD LDAP CERTIFICATE "<url>"
•Description:
Downloads an LDAP certificate to establish a trusted relationship with the LDAP server. Specify the
<url> where the certificate is located.
Directory commands 33
Page 34
•Access level/Bay level:
OA administrator
•Restrictions:
None
ENABLE LDAP
NOTE: If LDAP is enabled, local accounts are disabled, and the LDAP server becomes
unavailable, you can recover by booting into Lost Password mode.
When booting in Lost Password mode, the local Administrator password will be reset, LDAP is
disabled, and Local Logins are re-enabled
•Command:
ENABLE LDAP [NOLOCAL]
•Description:
Enables directory authentication. If you use the NOLOCAL option, local users are not enabled.
•Access level/Bay level:
OA administrator
•Restrictions:
Before you can enable LDAP, configuration must be complete.
REMOVE LDAP CERTIFICATE
•Command:
REMOVE LDAP CERTIFICATE "<certificate name>"
•Description:
o Removes the trust certificate corresponding to the MD5 <certificate name>.
o This command revokes trust in the LDAP server associated with the certificate.
•Access level/Bay level:
OA administrator
•Restrictions:
None
REMOVE LDAP GROUP
•Command:
REMOVE LDAP GROUP {ALL | "<group name>"}
•Description:
Removes the LDAP group from the system. If you specify ALL, then all LDAP groups are removed
from the system.
•Access level/Bay level:
Directory commands 34
Page 35
OA administrator
•Restrictions:
Before you can enable the LDAP group, configuration must be complete.
SET LDAP GROUP ACCESS
•Command
SET LDAP GROUP ACCESS "<group name>" {ADMINISTRATOR | OPERATOR | USER}
•Description:
o Sets the LDAP group access level.
o Additionally, use the ASSIGN OA command to give a user or group rights to the Onboard
Administrator.
•Access level/Bay level:
OA administrator
•Restrictions:
None
SET LDAP GROUP DESCRIPTION
•Command:
SET LDAP GROUP DESCRIPTION "<group name>" "<description>"
•Description:
Sets the LDAP group description field
•Access level/Bay level:
OA administrator
•Restrictions:
o Must be 0 to 58 characters in length.
o Valid characters are all alphanumeric, the underscore (_), the dash (-), and spaces.
o If the group name or description field contains spaces or zero characters, use double quotes.
SET LDAP NAME MAP
•Command:
SET LDAP NAME MAP {ON|OFF}
•Description:
Turns on NT name mapping to enable the user to enter their NT domain\username
•Access level/Bay level:
OA administrator
•Restrictions:
None
Directory commands 35
Page 36
SET LDAP PORT
•Command:
SET LDAP PORT <port number>
•Description:
Sets the TCP port number of the LDAP SSL service. Port 636 is the standard value.
•Access level/Bay level:
OA administrator
•Restrictions:
The valid port number range is 1 to 65535
SET LDAP SEARCH
•Command:
SET LDAP SEARCH {1-6 } "<search content>"
•Description:
Sets up to six search contexts in priority order
•Access level/Bay level:
OA administrator
•Restrictions:
None
SET LDAP SERVER
•Command:
SET LDAP SERVER {<ip address> | <dns name>}
•Description:
Sets the <ip address> or the <dns name> of the directory server
•Access level/Bay level:
OA administrator
•Restrictions:
The <ip address> is in the form ###.###.###.###, where each ### is in the range 0 to 255.
SHOW LDAP CERTIFICATE
•Command:
SHOW LDAP CERTIFICATE
•Description:
Displays all LDAP certificates that are in effect on the Onboard Administrator
•Access level/Bay level:
Directory commands 36
Page 37
OA administrator
•Restrictions:
None
Example
OA-0016355E560A> SHOW LDAP CERTIFICATE
1 Certificate name: 17D6A5ECBF51A1A47D44C1CDD29D19EE.pem
1. Start with a string that does not appear within the certificate (the end marker).
2. Paste in the certificate.
3. Terminate the command with the end marker.
•Access level/Bay level:
OA administrator
•Restrictions:
o This command is only available in script mode.
o The certificate text cannot exceed 3071 characters.
DOWNLOAD HPSIM CERTIFICATE
•Command:
DOWNLOAD HPSIM CERTIFICATE { <host> }
•Description:
Downloads an HP SIM certificate from the specified IP address or fully-qualified DNS system name,
such as HP-SIM system. The <host> value can be an IPv4 address, an IPv6 address, or a DNS name.
•Access level/Bay level:
OA administrator
•Restrictions:
o The <IP address> must be in the form ###.###.###.###, where each ### ranges from 0 to
255.
o For IPv6 the <ip address> must be in the form ####:####:####:####:####:####:####:####
where each #### ranges from 0 to FFFF.
o IPv6 addresses must be informed without the network prefix length.
REMOVE HPSIM CERTIFICATE
•Command:
REMOVE HPSIM CERTIFICATE "<certificate name>"
HP SIM commands 40
Page 41
•Description:
Removes the trust certificate corresponding to the <certificate name>. Disables HP SIM SSO through
the application (for example HP SIM) that provided the certificate without disabling other HP SIM
applications.
The <certificate name> can be obtained using the SHOW HPSIM INFO command.
•Access level/Bay level:
OA administrator
•Restrictions:
None
SET HPSIM TRUST MODE
•Command:
SET HPSIM TRUST MODE {CERTIFICATE [ON] | DISABLED [OFF]}
•Description:
Enables or disables the HP SIM SSO mode. When enabled, the trusted applications can access the
Onboard Administrator GUI data without requiring additional authentication.
•Access level/Bay level:
OA administrator
•Restrictions:
The CERTIFICATE (On) mode trusts only applications with certificates that have been uploaded to the
Onboard Administrator.
SHOW HPSIM INFO
•Command:
SHOW HPSIM INFO
•Description:
Displays the current HP SIM SSO configuration for the Onboard Administrator.
The data includes the current HP SIM SSO Trust Mode (see SET HPSIM TRUST MODE) and a list of
names that the Onboard Administrator is configured to trust using a trust certificate.
•Access level/Bay level:
OA administrator, OA operator
•Restrictions:
None
Example
OA-0018FE27577F> SHOW HPSIM INFO
HPSIM Trust Mode: Disabled
Trusted Server Certificates
No certificates were found.
HP SIM commands 41
Page 42
General management commands
DOWNLOAD OA CERTIFICATE
•Command:
DOWNLOAD OA CERTIFICATE [<bay number> | ACTIVE | STANDBY] <url>
•Description:
Downloads a CA supplied pkcs#7 file to replace the current security certificate on the system.
Supported protocols are HTTP, FTP, and TFTP. Format the URL as protocol://host/path/file. The URL
syntax for IPv6 addresses is protocol://[<ipv6 address>]/path/file.
•Access level/Bay level:
OA administrator
•Restrictions:
You must format the URL as protocol://host/path/file. If your FTP server does not support
anonymous connections, then you can specify a user name and password by replacing host in the
previous format with username:password@host.
FORCE TAKEOVER
•Command:
FORCE TAKEOVER
•Description:
Forces the redundant Onboard Administrator to become the active Onboard Administrator. The
active becomes the standby and the standby becomes the active.
•Access level/Bay level:
OA administrator
•Restrictions:
None
GENERATE CERTIFICATE
•Command:
GENERATE CERTIFICATE [REQUEST | SELFSIGNED]
•Description:
Generates a pkcs#10 certificate request or a self-signed certificate. You are prompted for the
following fields to generate a certificate:
o OA Host Name (CN)
o Organization Name (O)
General management commands 42
Page 43
o
City or Locality (L)
o State or Province (ST)
o Country (C)
o Organizational Unit
o Contact Person
o Email Address
o Surname
o Given Name
o Initials
o DN Qualifier
o Challenge Password
o Unstructured Name
•Access level/Bay level:
OA administrator
•Restrictions:
This command is not valid in SCRIPT MODE
Generate certificate prompts
Prompt Description Restrictions
OA Host Name (CN)
Organization Name (O)
City or Locality (L)
This is the most important
field. This is the Onboard
Administrator name that
appears in the browser web
address field. This certificate
attribute is generally referred
to as the common name.
The company or
organization that owns this
Onboard Administrator.
When this information is
used to generate a certificate
signing request, the issuing
certificate authority can verify
that the organization
requesting the certificate is
legally entitled to claim
ownership of the given
company name or
organization name.
The city or locality where the
Onboard Administrator is
located.
Must be 1 to 60 characters long. To prevent
security alerts, the value of this field must
match the host name exactly as it is known
by the web browser. The browser compares
the host name in the resolved web address to
the name that appears in the certificate. For
example, if the web address in the address
field is https://oa-001635.xyz.com, then the
value must be oa-001635.xyz.com
Must be 1 to 60 characters long
Must be 1 to 50 characters long
General management commands 43
Page 44
Prompt Description Restrictions
State or Province (ST)
Country (C)
Organizational Unit
Contact Person
Email Address
Surname
Given Name
Initials
DN Qualifier
Challenge Password
Unstructured Name
The state or province where
the Onboard Administrator is
located.
The two-character country
code that identifies the
country where the Onboard
Administrator is located.
The unit within the company
or organization that owns the
Onboard Administrator.
The person responsible for
the Onboard Administrator.
The email address of the
contact person responsible
for the Onboard
Administrator.
The surname of the person
responsible for the Onboard
Administrator.
The given name of the
person responsible for the
Onboard Administrator.
The initials of the person
responsible for the Onboard
Administrator.
The distinguished name
qualifier of the Onboard
Administrator.
The password to the
certificate-signing request.
This is for additional
information, for example, an
unstructured name that is
assigned to the Onboard
Administrator.
Sends ICMP echo messages to a remote IP[v6] device. If <number> is omitted or between 9999 and
99999, then only four packets are sent. Packets are sent out at one-second intervals to prevent strain
on the network.
•Access level/Bay level:
All
General management commands 44
Page 45
•Restrictions:
o The <number> value cannot be greater than 99999 or negative.
o The <ip address> value must be in the form ###.###.###.###, where each ### ranges from 0
to 255.
o For IPv6 the <ip address> must be in the form ####:####:####:####:####:####:####:####
where each #### ranges from 0 to FFFF.
SET DEVICE SERIAL_NUMBER BLADE
•Command:
SET DEVICE SERIAL_NUMBER BLADE <bay number> "<serial number>"
•Description:
Sets the serial number of the specified Storage, Tape, or I/O expansion blade.
•Access level/Bay level:
OA administrator
•Restrictions:
o Length must be 10 characters. All printable characters are allowed.
o This operation cannot be performed on server blades.
SET FACTORY
•Command:
SET FACTORY
•Description:
o Restores the Onboard Administrator to its factory defaults. The Administrator account password
does not change.
o The Onboard Administrator restarts after all changes are made.
o All existing settings will be lost when this operation is run.
•Access level/Bay level:
OA administrator
•Restrictions:
None
SET SCRIPT MODE
•Command:
SET SCRIPT [MODE] {ON | OFF}
•Description:
o Ceases all prompting and verifying of entries when SCRIPT MODE is on.
o The ADD USER command must have a password argument if executed in SCRIPT MODE.
General management commands 45
Page 46
o
Default values are used for any parameters that would normally require user interaction.
•Access level/Bay level:
All
•Restrictions:
None
SHOW ALL
•Command:
SHOW ALL
•Description:
Executes all SHOW commands in succession
•Access level/Bay level:
All
•Restrictions:
o This command only displays the bays for which you have privileges.
o To save the output, you must configure your Telnet software to log the session to a file or increase
the history buffer size so that the output can be copied and pasted into another file.
Examples
OA-0018FE27577F> show all
>SHOW CONFIG
#Script Generated by Administrator
#Generated on: Wed Nov 11 06:22:18 2009
#Set Enclosure Time
SET TIMEZONE CST6CDT
#SET DATE MMDDhhmm{{CC}YY}
#Set Enclosure Information
SET ENCLOSURE ASSET TAG ""
SET ENCLOSURE NAME "OA-0018FE27577F"
SET RACK NAME "UnnamedRack"
SET POWER MODE REDUNDANT
SET POWER SAVINGS ON
#Power limit must be within the range of 950-8750
SET POWER LIMIT OFF
#Enclosure Dynamic Power Cap must be within the range of 1508-1508
#Derated Circuit Capacity must be within the range of 1508-1508
#Rated Circuit Capacity must be within the range of 1508-1508
SET ENCLOSURE POWER_CAP OFF
SET ENCLOSURE POWER_CAP_BAYS_TO_EXCLUDE None
#Set PowerDelay Information
SET INTERCONNECT POWERDELAY 1 0
SET INTERCONNECT POWERDELAY 2 0
SET INTERCONNECT POWERDELAY 3 0
SET INTERCONNECT POWERDELAY 4 0
SET SERVER POWERDELAY 1 0
SET SERVER POWERDELAY 2 0
General management commands 46
Page 47
SET SERVER POWERDELAY 3 0
SET SERVER POWERDELAY 4 0
SET SERVER POWERDELAY 5 0
SET SERVER POWERDELAY 6 0
SET SERVER POWERDELAY 7 0
SET SERVER POWERDELAY 8 0
SET SERVER POWERDELAY 1A 0
SET SERVER POWERDELAY 2A 0
SET SERVER POWERDELAY 3A 0
SET SERVER POWERDELAY 4A 0
SET SERVER POWERDELAY 5A 0
SET SERVER POWERDELAY 6A 0
SET SERVER POWERDELAY 7A 0
SET SERVER POWERDELAY 8A 0
SET SERVER POWERDELAY 1B 0
SET SERVER POWERDELAY 2B 0
SET SERVER POWERDELAY 3B 0
SET SERVER POWERDELAY 4B 0
SET SERVER POWERDELAY 5B 0
SET SERVER POWERDELAY 6B 0
SET SERVER POWERDELAY 7B 0
SET SERVER POWERDELAY 8B 0
# Set ENCRYPTION security mode to STRONG or NORMAL.
SET ENCRYPTION NORMAL
#Configure Alertmail
SET ALERTMAIL SMTPSERVER
DISABLE ALERTMAIL
#Configure Trusted Hosts
#REMOVE TRUSTED HOST ALL
DISABLE TRUSTED HOST
#Configure NTP
SET NTP PRIMARY
SET NTP SECONDARY
SET NTP POLL 720
DISABLE NTP
#Set SNMP Information
SET SNMP CONTACT ""
SET SNMP LOCATION ""
SET SNMP COMMUNITY READ "public"
SET SNMP COMMUNITY WRITE ""
ENABLE SNMP
#Set Remote Syslog Information
SET REMOTE SYSLOG SERVER ""
SET REMOTE SYSLOG PORT 514
DISABLE SYSLOG REMOTE
#Set Enclosure Bay IP Addressing (EBIPA) Information
SET EBIPA SERVER NONE 1
SET EBIPA SERVER NONE 2
SET EBIPA SERVER NONE 3
SET EBIPA SERVER NONE 4
General management commands 47
Page 48
SET EBIPA SERVER NONE 5
SET EBIPA SERVER NONE 6
SET EBIPA SERVER NONE 7
SET EBIPA SERVER NONE 8
SET EBIPA SERVER NONE 1A
SET EBIPA SERVER NONE 2A
SET EBIPA SERVER NONE 3A
SET EBIPA SERVER NONE 4A
SET EBIPA SERVER NONE 5A
SET EBIPA SERVER NONE 6A
SET EBIPA SERVER NONE 7A
SET EBIPA SERVER NONE 8A
SET EBIPA SERVER NONE 1B
SET EBIPA SERVER NONE 2B
SET EBIPA SERVER NONE 3B
SET EBIPA SERVER NONE 4B
SET EBIPA SERVER NONE 5B
SET EBIPA SERVER NONE 6B
SET EBIPA SERVER NONE 7B
SET EBIPA SERVER NONE 8B
SET EBIPA SERVER NETMASK 0.0.0.0
SET EBIPA SERVER GATEWAY 0.0.0.0
SET EBIPA SERVER DOMAIN ""
DISABLE EBIPA SERVER 1,2,3,4,5,6,7,8,1A,2A,3A,4A,5A,6A,7A,8A,1B,2B,3B,4B,5B,6B,7B,8B
SET EBIPA INTERCONNECT NONE 1
SET EBIPA INTERCONNECT NONE 2
SET EBIPA INTERCONNECT NONE 3
SET EBIPA INTERCONNECT NONE 4
SET EBIPA INTERCONNECT NETMASK 0.0.0.0
SET EBIPA INTERCONNECT GATEWAY 0.0.0.0
SET EBIPA INTERCONNECT DOMAIN ""
SET EBIPA INTERCONNECT NTP PRIMARY 0.0.0.0
SET EBIPA INTERCONNECT NTP SECONDARY 0.0.0.0
DISABLE EBIPA INTERCONNECT 1,2,3,4
#Uncomment following line to remove all user accounts currently in the system
#REMOVE USERS ALL
#Create Users
ADD USER "Administrator"
SET USER CONTACT "Administrator" ""
SET USER FULLNAME "Administrator" "System Administrator"
SET USER ACCESS "Administrator" ADMINISTRATOR
ASSIGN SERVER 1,2,3,4,5,6,7,8,1A,2A,3A,4A,5A,6A,7A,8A,1B,2B,3B,4B,5B,6B,7B,8B "Administrator"
ASSIGN INTERCONNECT 1,2,3,4 "Administrator"
ASSIGN OA "Administrator"
ENABLE USER "Administrator"
ADD USER "Test"
SET USER CONTACT "Test" ""
SET USER FULLNAME "Test" ""
SET USER ACCESS "Test" USER
ASSIGN SERVER 1,2,1A,2A,1B,2B "Test"
ASSIGN OA "Test"
ENABLE USER "Test"
#Password Settings
DISABLE STRONG PASSWORDS
SET MINIMUM PASSWORD LENGTH 3
#Session Timeout Settings
SET SESSION TIMEOUT 1440
#Set LDAP Information
SET LDAP SERVER ""
SET LDAP PORT 0
General management commands 48
Page 49
SET LDAP NAME MAP OFF
SET LDAP SEARCH 1 ""
SET LDAP SEARCH 2 ""
SET LDAP SEARCH 3 ""
SET LDAP SEARCH 4 ""
SET LDAP SEARCH 5 ""
SET LDAP SEARCH 6 ""
#Uncomment following line to remove all LDAP accounts currently in the system
#REMOVE LDAP GROUP ALL
DISABLE LDAP
#Set SSO TRUST MODE
SET SSO TRUST Disabled
#Set Network Information
#NOTE: Setting your network information through a script while
# remotely accessing the server could drop your connection.
# If your connection is dropped this script may not execute to conclusion.
SET OA NAME 1 OA-0018FE27577F
SET IPCONFIG DHCP 1 DYNAMICDNS
SET NIC AUTO 1
#Set VLAN Information
SET VLAN FACTORY
SET VLAN DEFAULT 1
EDIT VLAN 1 "Default"
SET VLAN SERVER 1 1
SET VLAN SERVER 1 2
SET VLAN SERVER 1 3
SET VLAN SERVER 1 4
SET VLAN SERVER 1 5
SET VLAN SERVER 1 6
SET VLAN SERVER 1 7
SET VLAN SERVER 1 8
SET VLAN INTERCONNECT 1 1
SET VLAN INTERCONNECT 1 2
SET VLAN INTERCONNECT 1 3
SET VLAN INTERCONNECT 1 4
SET VLAN OA 1
DISABLE VLAN
SAVE VLAN
>SHOW DATE
Date: 2009-11-11T06:22:18-06:00
Time Zone: CST6CDT
>SHOW DISPLAY EVENT
Bay Enabled EBIPA Address Current Address Device Type
--- ------- --------------- --------------- ----------- 1 No 16.84.190.209 Server Blade
1A No N/A [Absent]
1B No N/A [Absent]
General management commands 49
Page 50
2 No 16.84.190.217 Server Blade
2A No N/A [Absent]
2B No N/A [Absent]
3 No N/A [Absent]
3A No N/A [Absent]
3B No N/A [Absent]
4 No 16.84.190.215 Server Blade
4A No N/A [Absent]
4B No N/A [Absent]
5 No N/A [Subsumed]
5A No N/A [Absent]
5B No N/A [Absent]
6 No N/A [Subsumed]
6A No N/A [Absent]
6B No N/A [Absent]
7 No N/A [Absent]
7A No N/A [Absent]
7B No N/A [Absent]
8 No N/A [Absent]
8A No N/A [Absent]
8B No N/A [Absent]
Bay Enabled EBIPA Address Current Address Module Type
--- ------- --------------- --------------- ----------- 1 No 16.84.189.106 Ethernet
2 No 16.84.189.148 Ethernet
3 No N/A [Absent]
4 No N/A [Absent]
>SHOW ENCLOSURE FAN ALL
Fan #1 information:
Status: OK
Speed: 55 percent of Maximum speed
Maximum speed: 18000
Minimum speed: 10
Power consumed: 27
Product Name: Active Cool 200 Fan
Part Number: 412140-B21
Spare Part Number: 413996-001
Version: 2.7
Diagnostic Status:
Internal Data OK
Location OK
Device Failure OK
Device Degraded OK
Missing Device OK
Fan #2 information:
Status: OK
Speed: 43 percent of Maximum speed
Maximum speed: 18000
Minimum speed: 10
Power consumed: 20
Product Name: Active Cool 200 Fan
Part Number: 412140-B21
Spare Part Number: 413996-001
Version: 2.7
General management commands 50
Page 51
Diagnostic Status:
Internal Data OK
Location OK
Device Failure OK
Device Degraded OK
Missing Device OK
Fan #3 information:
Status: OK
Speed: 55 percent of Maximum speed
Maximum speed: 18000
Minimum speed: 10
Power consumed: 28
Product Name: Active Cool 200 Fan
Part Number: 412140-B21
Spare Part Number: 413996-001
Version: 2.7
Diagnostic Status:
Internal Data OK
Location OK
Device Failure OK
Device Degraded OK
Missing Device OK
Fan #4 information:
Status: OK
Speed: 55 percent of Maximum speed
Maximum speed: 18000
Minimum speed: 10
Power consumed: 28
Product Name: Active Cool 200 Fan
Part Number: 412140-B21
Spare Part Number: 413996-001
Version: 2.7
Diagnostic Status:
Internal Data OK
Location OK
Device Failure OK
Device Degraded OK
Missing Device OK
Fan #5 information:
Status: OK
Speed: 43 percent of Maximum speed
Maximum speed: 18000
Minimum speed: 10
Power consumed: 22
Product Name: Active Cool 200 Fan
Part Number: 412140-B21
Spare Part Number: 413996-001
Version: 2.7
Diagnostic Status:
Internal Data OK
Location OK
Device Failure OK
Device Degraded OK
Missing Device OK
Fan #6 information:
Status: OK
Speed: 55 percent of Maximum speed
Maximum speed: 18000
Minimum speed: 10
Power consumed: 28
Product Name: Active Cool 200 Fan
Part Number: 412140-B21
Spare Part Number: 413996-001
Version: 2.7
Diagnostic Status:
General management commands 51
Page 52
Internal Data OK
Location OK
Device Failure OK
Device Degraded OK
Missing Device OK
>SHOW ENCLOSURE INFO
Enclosure Information:
Enclosure Name: OA-0018FE27577F
Enclosure Type: BladeSystem c3000 Enclosure
Part Number: 437506-B21
Serial Number: 0987654321
UUID: 090987654321
Asset Tag:
Midplane Spare Part Number: 441829-001
Power Distribution Unit:
[No PDU is present on c3000 enclosures]
Onboard Administrator Tray Information:
[No Tray Information is present on c3000 enclosures]
>SHOW ENCLOSURE LCD
Status : OK
Display : Blinking
Name : BladeSystem c3000 Insight Display
Spare Part# : 441831-001
Manufacturer: HP
Fw Version : 2.2.2
Diagnostic Status:
Internal Data OK
>SHOW ENCLOSURE POWER_CAP
Enclosure Dynamic Power Cap: Disabled
Derated Circuit Capacity: Disabled
Rated Circuit Capacity: Disabled
Allowable Enclosure Dynamic Power Cap: 1508 - 1508 Watts AC
Allowable Derated Circuit Capacity: 1508 - 1508 Watts AC
Allowable Rated Circuit Capacity: 1508 - 1508 Watts AC
>SHOW ENCLOSURE POWER_CAP_BAYS_TO_EXCLUDE
Bays opted out: None
>SHOW ENCLOSURE POWERSUPPLY ALL
Power Supply #1 Information:
Status: OK
AC Input Status: OK
Capacity: 1200 Watts
Current Power Output: 632 Watts
Serial Number: 531300ALL00233
Product Name: HP PROLIANT SERVER PS
Part Number: 438203-001
Spare Part Number: XXXXXX-001
Product Ver:
Diagnostic Status:
Internal Data OK
Device Failure OK
Power Cord OK
Power Supply #2 Information:
Status: OK
AC Input Status: OK
Capacity: 1200 Watts
General management commands 52
Page 53
Current Power Output: 8 Watts
Serial Number: 531300ALL00014
Product Name: HP PROLIANT SERVER PS
Part Number: 438203-001
Spare Part Number: XXXXXX-001
Product Ver:
Diagnostic Status:
Internal Data OK
Device Failure OK
Power Cord OK
Power Supply #3 Information:
Status: OK
AC Input Status: OK
Capacity: 1200 Watts
Current Power Output: 8 Watts
Serial Number: 531300ALL00399
Product Name: HP PROLIANT SERVER PS
Part Number: 438203-001
Spare Part Number: XXXXXX-001
Product Ver:
Diagnostic Status:
Internal Data OK
Device Failure OK
Power Cord OK
Power Supply #4 Information:
Status: Power Supply Bay Empty
Power Supply #5 Information:
Status: Power Supply Bay Empty
Power Supply #6 Information:
Status: Power Supply Bay Empty
>SHOW ENCLOSURE POWER_SUMMARY
Enclosure Bay Output Allocation:
Bay Power Allocated (Watts DC)
Part Number : 448589-B21
Spare Part No.: 441832-001
Serial Number : P30590A9VUQ04B
UUID : 18P30590A9VUQ04B
Manufacturer : HP
Firmware Ver. : 3.00 Nov 11 2009
Hw Board Type : 1
Hw Version : A0
Subject:
Common Name (CN): OA-0018FE27577F
Country (C):
State or Province (ST):
City or Locality (L):
Organization Name (0): Hewlett-Packard
Organizational Unit: Onboard Administrator
General management commands 55
Page 56
>SHOW SYSLOG OA 1
bps - Full Duplex
Nov 9 10:21:11 OA: Time zone changed to CST+6
Nov 9 10:21:13 OA: LCD Status is: OK.
Nov 9 10:21:17 Enclosure-Link: Service started
Nov 9 10:21:20 OA: Onboard Administrator booted successfully
Nov 9 10:21:21 netreg: DDNS: Update refused by DNS server
Nov 9 10:21:24 OA: PS Subsystem N + N Redundancy - FAILED. Allocated Power: 480W DC,
Present Power: 662W AC.
Nov 9 10:21:24 OA: Enclosure Status changed from OK to Degraded.
Nov 9 10:21:26 OA: /dev/spi is busy
Nov 9 10:21:26 Enclosure-Link: Initial topology scan completed successfully
Nov 9 10:21:28 OA: /dev/spi is busy
Nov 9 10:21:29 OA: /dev/spi is busy
Nov 9 10:21:30 OA: /dev/spi is busy
Nov 9 10:21:30 OA: /dev/spi is busy
Nov 9 10:21:32 OA: /dev/spi is busy
Nov 9 10:21:35 OA: /dev/spi is busy
Nov 9 10:21:41 OA: /dev/spi is busy
Nov 9 10:21:43 OA: IO module in slot 2 temperature is normal
Nov 9 10:21:44 OA: Blade 1 is reporting nominal health status.
Nov 9 10:21:44 OA: Blade in bay #1 status changed to OK
Nov 9 10:21:45 OA: Blade in bay #1 status changed to OK
Nov 9 10:21:46 OA: Blade 2 is reporting nominal health status.
Nov 9 10:21:46 OA: Blade in bay #2 status changed to OK
Nov 9 10:21:47 OA: Blade in bay #2 status changed to OK
Nov 9 10:21:48 OA: Blade 4 is reporting nominal health status.
Nov 9 10:21:49 OA: Blade in bay #4 status changed to OK
Nov 9 10:21:49 OA: Blade in bay #4 status changed to OK
Nov 9 10:21:57 OA: VLAN is disabled
AlertMail: Disabled
Mailbox: Not Set
SMTP Server: Not Set
Sender Domain: Not Set
XML Reply: Enabled
NTP: Disabled
Primary NTP server: Not Set
Secondary NTP server: Not Set
Server Poll-Interval: 720 seconds
Link Loss Failover: Not Supported
Link Loss Interval: Not Supported
Enclosure IP Mode: Not Supported
GUI Login Detail: Enabled
VLAN: Disabled
>SHOW POWER
Power Mode: Redundant
Dynamic Power: Enabled
Set Power Limit: Not Set
Power Capacity: 1321 Watts DC
Power Available: 0 Watts DC
Power Allocated: 1321 Watts DC
Present Power: 716 Watts AC
Power Limit: 1606 Watts AC
>SHOW RACK NAME
Rack Name: UnnamedRack
>SHOW SNMP
SNMP Configuration:
Status: Enabled
System Name: OA-0018FE27577F
System Location:
System Contact:
Read Community Name: public
Write Community Name:
No trap receivers specified.
HPSIM Trust Mode: Disabled
Trusted Server Certificates
No certificates were found.
>SHOW INTERCONNECT INFO ALL
1. Ethernet
Product Name: GbE2c Ethernet Blade Switch
Width: Single
URL to Management interface:
In-Band IPv4 Address: 16.84.189.106
User Assigned Name:
Part Number: 410917-B21
Spare Part Number: 414037-001
General management commands 57
Page 58
Serial Number: MY36290EMT
Temperature Sensor: Present
JS2 Connector: Absent
Internal Ethernet Interface to OA: Present
Internal Ethernet Route to OA: Enabled
Internal Serial Interface to OA: Absent
Internal Serial Route to OA: Disabled
External Serial Port Interface: Present
External Ethernet Interface: Present
2. Ethernet
Product Name: Cisco Catalyst Blade Switch 3120X for HP w/ IP Base
Width: Single
URL to Management interface: http://16.84.189.148
In-Band IPv4 Address: 16.84.189.148
User Assigned Name: Switch
Part Number: WS-CBS3120X-S
Spare Part Number: 451357-001
Serial Number: FOC1129T0XE
Temperature Sensor: Absent
JS2 Connector: Absent
Internal Ethernet Interface to OA: Present
Internal Ethernet Route to OA: Enabled
Internal Serial Interface to OA: Absent
Internal Serial Route to OA: Disabled
External Serial Port Interface: Present
External Ethernet Interface: Absent
3. <absent>
4. <absent>
>SHOW INTERCONNECT LIST
Bay Interconnect Type Manufacturer Power Health UID Management IP
--- ----------------- -------------------- ------- --------- --- -------------- 1 Ethernet HP On OK Off 16.84.189.106
2 Ethernet Cisco Systems, Inc. On OK Off 16.84.189.148
3 [Absent]
4 [Absent]
Totals: 2 interconnect modules installed, 2 powered on.
>SHOW INTERCONNECT SESSION
Interconnect Bay User
------------------ --------------
No Interconnect remote console sessions were detected.
>SHOW INTERCONNECT STATUS ALL
Interconnect Module #1 Status:
Status : OK
Thermal: OK
CPU Fault: OK
Health LED: OK
UID: Off
Powered: On
Diagnostic Status:
Internal Data OK
Management Processor OK
Thermal Warning OK
Thermal Danger OK
I/O Configuration OK
Power OK
Device Failure OK
Device Degraded OK
General management commands 58
Page 59
Interconnect Module #2 Status:
Status : OK
Thermal: OK
CPU Fault: OK
Health LED: OK
UID: Off
Powered: On
Diagnostic Status:
Internal Data OK
Management Processor OK
Thermal Warning OK
Thermal Danger OK
Power OK
Device Failure OK
Device Degraded OK
1: GbE2c Ethernet Blade Switch
Type: Ethernet
Width: Single
Status: OK
Port 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16
Status OK OK OK OK OK OK OK OK OK OK
Blade 1 2 4 1 2 1 2 4 1 2
Mezz/Nic NI NI NI NI NI NI NI NI NI NI
Port 3 3 1 1 1 4 4 2 2 2
2: Cisco Catalyst Blade Switch 3120X for HP w/ IP Base
Type: Ethernet
Width: Single
Status: No Connection
Bay iLO Name iLO IP Address Status Power UID Partner
--- ----------------------------- --------------- -------- ------- --- ------ 1 ILOUSM64204B1 16.84.190.209 OK On Off
2 ILOUSM65103VJ 16.84.190.217 OK On Off
3 [Absent]
4 ILOUSM62401EP 16.84.190.215 OK On Off
General management commands 59
Page 60
5 [Subsumed]
6 [Subsumed]
7 [Absent]
8 [Absent]
Totals: 3 server blades installed, 3 powered on.
>SHOW SERVER NAMES
Bay Server Name Serial Number Status Power UID Partner
--- ----------------------------- --------------- -------- ------- --- ------ 1 RonChangedHostNameInILO USM64204B1 OK On Off
2 test45667 USM65103VJ OK On Off
3 [Absent]
4 YOUR-EYZCGYAYBB USM62401EP OK On Off
5 [Subsumed]
6 [Subsumed]
7 [Absent]
8 [Absent]
Totals: 3 server blades installed, 3 powered on.
>SHOW FRU
Enclosure
Model: BladeSystem c3000 Enclosure
Manufacturer: HP
Serial Number: 0987654321
Part Number: 437506-B21
Enclosure Midplane
Manufacturer: HP
Spare Part Number: 441829-001
Onboard Administrator 1
Model: BladeSystem c3000 Onboard Administrator
Manufacturer: HP
Serial Number: P30590A9VUQ04B
Part Number: 448589-B21
Spare Part Number: 441832-001
Firmware Version: 3.00
HwVersion: A0
Blade 1
Model: ProLiant BL480c G1
Manufacturer: HP
Serial Number: USM64204B1
Part Number: 416667-B21
Spare Part Number: 410293-001
Blade 2
Model: ProLiant BL480c G1
Manufacturer: HP
Serial Number: USM65103VJ
Part Number: 435460-B21
Spare Part Number: 438453-001
Blade 4
Model: ProLiant BL460c G1
Manufacturer: HP
Serial Number: USM62401EP
Part Number: 404664-B21
Spare Part Number: 410299-001
Interconnect 1
Model: GbE2c Ethernet Blade Switch
Manufacturer: HP
Serial Number: MY36290EMT
General management commands 60
Page 61
Part Number: 410917-B21
Spare Part Number: 414037-001
Interconnect 2
Model: Cisco Catalyst Blade Switch 3120X for HP w/ IP Base
Manufacturer: Cisco Systems, Inc.
Serial Number: FOC1129T0XE
Part Number: WS-CBS3120X-S
Spare Part Number: 451357-001
Fan 1
Model: Active Cool 200 Fan
Part Number: 412140-B21
Spare Part Number: 413996-001
Fan 2
Model: Active Cool 200 Fan
Part Number: 412140-B21
Spare Part Number: 413996-001
Fan 3
Model: Active Cool 200 Fan
Part Number: 412140-B21
Spare Part Number: 413996-001
Fan 4
Model: Active Cool 200 Fan
Part Number: 412140-B21
Spare Part Number: 413996-001
Fan 5
Model: Active Cool 200 Fan
Part Number: 412140-B21
Spare Part Number: 413996-001
Fan 6
Model: Active Cool 200 Fan
Part Number: 412140-B21
Spare Part Number: 413996-001
Power Supply 1
Model: HP PROLIANT SERVER PS
Serial Number: 531300ALL00233
Part Number: 438203-001
Spare Part Number: XXXXXX-001
Power Supply 2
Model: HP PROLIANT SERVER PS
Serial Number: 531300ALL00014
Part Number: 438203-001
Spare Part Number: XXXXXX-001
Power Supply 3
Model: HP PROLIANT SERVER PS
Serial Number: 531300ALL00399
Part Number: 438203-001
Spare Part Number: XXXXXX-001
Insight Display
Model: BladeSystem c3000 Insight Display
Manufacturer: HP
Spare Part Number: 441831-001
Firmware Version: 2.2.2
General management commands 61
Page 62
>SHOW SERVER INFO ALL
Server Blade #1 Information:
Type: Server Blade
Manufacturer: HP
Product Name: ProLiant BL480c G1
Part Number: 416667-B21
System Board Spare Part Number: 410293-001
Serial Number: USM64204B1
UUID: 36363134-3736-5355-4D36-343230344231
Server Name: RonChangedHostNameInILO
Asset Tag: [Unknown]
ROM Version: I14 06/21/2006
CPU 1: Dual-Core Intel Xeon 2333 MHz
CPU 2: Not present
Memory: 2048 MB
Embedded Ethernet
NIC 1 MAC Address: 00:18:FE:35:21:E0
NIC 2 MAC Address: 00:18:FE:35:21:DE
NIC 3 MAC Address: 00:18:FE:34:DB:9F
NIC 4 MAC Address: 00:18:FE:34:DB:A0
iSCSI 1 MAC Address: 00:18:FE:35:21:E1
iSCSI 2 MAC Address: 00:18:FE:35:21:DF
Management Processor Information:
Type: iLO2
Name: ILOUSM64204B1
Firmware Version: 2.00 Oct 13 2009
IP Address: 16.84.190.209
MAC Address: 00:18:FE:35:61:62
Power Management Controller Version: 0.5
Server Blade #2 Information:
Type: Server Blade
Manufacturer: HP
Product Name: ProLiant BL480c G1
Part Number: 435460-B21
System Board Spare Part Number: 438453-001
Serial Number: USM65103VJ
UUID: 34353334-3036-5355-4D36-35313033564A
Server Name: test45667
Asset Tag: [Unknown]
ROM Version: I14 11/03/2008
CPU 1: Quad-Core Intel Xeon 2666 MHz
CPU 2: Quad-Core Intel Xeon 2666 MHz
Memory: 2048 MB
Embedded Ethernet
NIC 1 MAC Address: 00:19:BB:34:A1:5A
NIC 2 MAC Address: 00:19:BB:34:91:FE
NIC 3 MAC Address: 00:19:BB:29:91:33
NIC 4 MAC Address: 00:19:BB:29:91:34
iSCSI 1 MAC Address: 00:19:BB:34:A1:5B
iSCSI 2 MAC Address: 00:19:BB:34:91:FF
Management Processor Information:
Type: iLO2
Name: ILOUSM65103VJ
Firmware Version: 2.00 Oct 13 2009
IP Address: 16.84.190.217
General management commands 62
Page 63
MAC Address: 00:19:BB:35:F6:42
Power Management Controller Version: 0.5
Server Blade #3 Information:
Server Blade Type: No Server Blade Installed
Server Blade #4 Information:
Type: Server Blade
Manufacturer: HP
Product Name: ProLiant BL460c G1
Part Number: 404664-B21
System Board Spare Part Number: 410299-001
Serial Number: USM62401EP
UUID: 36343034-3436-5355-4D36-323430314550
Server Name: YOUR-EYZCGYAYBB
Asset Tag: [Unknown]
ROM Version: I15 10/18/2007
CPU 1: Dual-Core Intel Xeon 2333 MHz
CPU 2: Not present
Memory: 2048 MB
Embedded Ethernet
NIC 1 MAC Address: 00:16:35:C5:EF:26
NIC 2 MAC Address: 00:16:35:C5:EF:3A
iSCSI 1 MAC Address: 00:16:35:C5:EF:27
iSCSI 2 MAC Address: 00:16:35:C5:EF:3B
Management Processor Information:
Type: iLO2
Name: ILOUSM62401EP
Firmware Version: 2.00 Oct 13 2009
IP Address: 16.84.190.215
MAC Address: 00:14:38:51:8E:26
Power Management Controller Version: 0.5
Server Blade #5 Information:
Server Blade Type: Bay Subsumed
Server Blade #6 Information:
Server Blade Type: Bay Subsumed
Server Blade #7 Information:
Server Blade Type: No Server Blade Installed
Server Blade #8 Information:
Server Blade Type: No Server Blade Installed
>SHOW SERVER PORT MAP ALL
Mezz
Mezz Mezz Device Port Interconnect Interconnect
Slot Device Port Status Bay Bay Port Device ID
------------------------------- Blade 001 ------------------------------ 1 Not Present
2 Not Present
3 Not Present
Embedded Ethernet
Port 1 OK Bay 1 Port 5 00:18:FE:35:21:E0
iSCSI 1 OK Bay 1 Port 5 00:18:FE:35:21:E1
Port 2 OK Bay 1 Port 13 00:18:FE:35:21:DE
General management commands 63
Page 64
iSCSI 2 OK Bay 1 Port 13 00:18:FE:35:21:DF
Port 3 OK Bay 1 Port 1 00:18:FE:34:DB:9F
Port 4 OK Bay 1 Port 9 00:18:FE:34:DB:A0
------------------------------- Blade 002 ------------------------------ 1 Not Present
2 Not Present
3 Not Present
Embedded Ethernet
Port 1 OK Bay 1 Port 6 00:19:BB:34:A1:5A
iSCSI 1 OK Bay 1 Port 6 00:19:BB:34:A1:5B
Port 2 OK Bay 1 Port 14 00:19:BB:34:91:FE
iSCSI 2 OK Bay 1 Port 14 00:19:BB:34:91:FF
Port 3 OK Bay 1 Port 2 00:19:BB:29:91:33
Port 4 OK Bay 1 Port 10 00:19:BB:29:91:34
------------------------------- Blade 004 ------------------------------ 1 Not Present
2 Not Present
Embedded Ethernet
Port 1 OK Bay 1 Port 4 00:16:35:C5:EF:26
iSCSI 1 OK Bay 1 Port 4 00:16:35:C5:EF:27
Port 2 OK Bay 1 Port 12 00:16:35:C5:EF:3A
iSCSI 2 OK Bay 1 Port 12 00:16:35:C5:EF:3B
>SHOW SERVER STATUS ALL
Blade #1 Status:
Power: On
Current Wattage used: 212
Health: OK
Unit Identification LED: Off
Diagnostic Status:
Internal Data OK
Management Processor OK
I/O Configuration OK
Power OK
Cooling OK
Location OK
Device Failure OK
Device Degraded OK
iLO Network OK
Blade #2 Status:
Power: On
Current Wattage used: 412
Health: OK
Unit Identification LED: Off
Diagnostic Status:
Internal Data OK
Management Processor OK
General management commands 64
Page 65
I/O Configuration OK
Power OK
Cooling OK
Location OK
Device Failure OK
Device Degraded OK
iLO Network OK
Blade #3 Status:
Power: No Server Blade Installed
Blade #4 Status:
Power: On
Current Wattage used: 152
Health: OK
Unit Identification LED: Off
Diagnostic Status:
Internal Data OK
Management Processor OK
I/O Configuration OK
Power OK
Cooling OK
Location OK
Device Failure OK
Device Degraded OK
iLO Network OK
Blade #5 Status:
Server Blade Type: Bay Subsumed
Blade #6 Status:
Server Blade Type: Bay Subsumed
Blade #7 Status:
Power: No Server Blade Installed
Blade #8 Status:
Power: No Server Blade Installed
>SHOW SERVER TEMP ALL
Device Bay #1 Temperature Information
Locale Status Temp Caution Critical
----------------------------------- ------ -------- ------- -------Memory Zone OK 36C/ 96F 81C 86C
CPU Zone OK 29C/ 84F 70C 75C
CPU 1 OK 30C/ 86F 127C 127C
CPU 1 OK 30C/ 86F 127C 127C
Ambient Zone OK 20C/ 68F 38C 43C
CPU 2 OK N/A
CPU 2 OK N/A
Device Bay #2 Temperature Information
Locale Status Temp Caution Critical
----------------------------------- ------ -------- ------- -------Memory Zone OK 43C/109F 81C 86C
CPU Zone OK 38C/100F 70C 75C
CPU 1 OK 57C/ 0F 95C 100C
CPU 1 OK 57C/ 0F 95C 100C
System Zone OK 24C/ 75F 40C 45C
CPU 2 OK 57C/ 0F 95C 100C
CPU 2 OK 57C/ 0F 95C 100C
Ambient Zone OK 24C/ 75F 40C 45C
Device Bay #3 Temperature Information
No Server Blade Installed
Device Bay #4 Temperature Information
Locale Status Temp Caution Critical
----------------------------------- ------ -------- ------- -------System Zone OK 38C/100F 80C 85C
General management commands 65
Page 66
CPU Zone OK 34C/ 93F 65C 70C
CPU 1 OK 52C/125F 95C 100C
CPU 1 OK 52C/125F 95C 100C
CPU Zone OK 33C/ 91F 70C 75C
CPU 2 OK N/A
CPU 2 OK N/A
Memory Zone OK 55C/ 0F 85C 100C
Ambient Zone OK 21C/ 69F 38C 43C
Device Bay #5 Temperature Information
Server Blade Type: Bay Subsumed
Device Bay #6 Temperature Information
Server Blade Type: Bay Subsumed
Device Bay #7 Temperature Information
No Server Blade Installed
Device Bay #8 Temperature Information
No Server Blade Installed
>SHOW SERVER DVD ALL
DVD Drive: Present
DVD Media: Absent
Server DVD connections:
Bay Connected Device or image URL
--- --------- ------------------------------------ 1 No
2 No
3 - [Bay empty]
4 No
5 - [Bay subsumed]
6 - [Bay subsumed]
7 - [Bay empty]
8 - [Bay empty]
Sets EBIPA settings for device (server) bays. If the bay number parameter is not specified, the settings
will be applied to all device bays. The NONE keyword may be used to clear the IP address and
netmask values.
•Access level/Bay level:
Administrator, Operator
•Restrictions:
o The <IP address> and <netmask> must be in the form ###.###.###.###, where each ###
ranges from 0 to 255.
o The <domain name> is a string containing letters (a–z, A–Z), digits (0–9), or a dash (-).
Sets EBIPA settings for interconnect bays. If the bay number parameter is not specified, the settings
are applied to all interconnect bays. The NONE keyword can be used to clear the IP address and
netmask values.
•Access level/Bay level:
Administrator, Operator
•Restrictions:
o The <IP address> and <netmask> must be in the form ###.###.###.###, where each ###
ranges from 0 to 255.
o The <domain name> is a string containing letters (a–z, A–Z), digits (0–9), or a dash (-).
SHOW EBIPA
•Command:
SHOW EBIPA
•Description:
Enclosure Bay IP Addressing commands 76
Page 77
Displays EBIPA information
•Access level/Bay level:
Administrator, Operator, user
•Restrictions:
None
Example
OA-0018FE27577F> SHOW EBIPA
EBIPA Device Server Settings
Bay Enabled EBIPA/Current Netmask Gateway DNS Domain
ADD OA ADDRESS IPV6 {<bay number>} <ipv6 address/prefix length>
•Description:
Adds an IPv6 static address for the Onboard Administrator. If IPv6 is enabled, this setting takes
effect immediately. If no Onboard Administrator number is provided, the command defaults to the
active Onboard Administrator.
•Access level/Bay level:
OA administrator, OA operator
•Restrictions:
o The prefix length is mandatory.
o The <ip address> must be in the form ####:####:####:####:####:####:####:####/###,
where each #### ranges from 0 to FFFF and the prefix /### ranges from 0 to 128.
ADD OA DNS
•Command:
ADD OA DNS [<bay number>] <ip address>
•Description:
Adds an IP address of a DNS server to the list. DNS servers are used if the system is configured to
use a static IP address.
If a bay number is not specified, the command defaults to the active Onboard Administrator.
•Access level/Bay level:
OA administrator, OA operator
•Restrictions:
A maximum of two DNS servers can be added.
The <ip address> must be in the form ###.###.###.###, where each ### ranges from 0 to 255.
ADD OA DNS IPV6
•Command:
ADD OA DNS IPV6 {<bay number>} <ipv6 address{/prefix length}>
•Description:
Adds an IPv6 address to the list of DNS servers. If a bay number is not specified, then the command
defaults to the active Onboard Administrator. The network prefix length is optional.
Enclosure network configuration commands 79
Page 80
•Access level/Bay level:
OA administrator, OA operator
•Restrictions:
o A maximum of two DNS servers can be added.
o The <ip address> must be in the form ####:####:####:####:####:####:####:#### or
####:####:####:####:####:####:####:####/### (with a prefix), where each ####
ranges from 0 to FFFF and the prefix /### ranges from 0 to 128.
ADD SNMP TRAPRECEIVER
•Command:
ADD SNMP TRAPRECEIVER <host> ["<community name>"]
•Description:
Adds a new trap receiver address to the SNMP configuration. Defaults for the traps are version v1
and port 162. The SNMP Trap community string is set to public or the optional "<community
name>". The "<community name>" string, if specified, must be 1 to 20 characters in length.
Acceptable characters include any printable character excluding quotes and newlines.
•Access level/Bay level:
OA administrator, OA operator
•Restrictions:
o A maximum of eight IP addresses can be added to receive SNMP traps.
o Only v1 traps are supported.
o The <host> value can be an IPv4 address, an IPv6 address, or a DNS name (maximum of 64
characters).
o IPv6 addresses must be typed without the network prefix length.
Adds an SSH key or keys to the Administrator local account. Multiple SSHKEYs can be concatenated
in the string.
a. Locate a string that does not appear in the key, to use as the end marker.
b. Paste in the SSHKEY string.
c. Finish the command with the end marker.
Failure to give a proper end marker before and after the certificate might cause the interface to wait
for the appropriate end marker indefinitely.
•Access level/Bay level:
Administrator
•Restrictions:
Enclosure network configuration commands 80
Page 81
o
SSHKEY is only available for the Administrator local account
o SSHKEY works only in script mode
o SSHKEY string is limited to 4KB on Onboard Administrator versions prior to 2.30
o SSHKEY string is limited to 8KB on Onboard Administrator version 2.30 and later
o This command is only valid in script mode.
ADD TRUSTED HOST
•Command:
ADD TRUSTED HOST <ip address>
•Description:
Adds a new IPv4 or IPv6 address to the list of addresses being handled by the IP Security feature.
•Access level /Bay level:
OA administrator, OA operator
•Restrictions:
You can add a maximum of five IP addresses to the IP Manager.
CLEAR NTP
•Command:
CLEAR NTP {PRIMARY | SECONDARY}
•Description:
Disables access to the Primary or Secondary NTP server
•Access level/Bay level:
OA administrator, OA operator
•Restrictions:
Clearing the Primary NTP server disables NTP.
CLEAR SSHKEY
•Command:
CLEAR SSHKEY
•Description:
Removes the authorized key file used for SSH login
•Access level/Bay level:
Administrator
•Restrictions:
None
Enclosure network configuration commands 81
Page 82
CLEAR VCMODE
•Command:
CLEAR VCMODE
•Description:
Clears Virtual Connect Mode settings.
•Access level/Bay level:
OA Administrator
OA Bays
•Restrictions:
o All servers in the enclosure should be powered off before clearing the VCMODE.
o The enclosure will no longer be managed by Virtual Connect, and servers will revert to default
Ethernet MAC and Fibre Channel WWN assignments. Virtual Connect might disconnect the
servers from Ethernet networks and Fibre Channel fabrics.
DISABLE ALERTMAIL
•Command:
DISABLE ALERTMAIL
•Description:
Disables the sending of emails when events occur
•Access level/Bay level:
OA administrator, OA operator
•Restrictions:
None
DISABLE DHCPV6
•Command:
DISABLE DHCPV6 {<bay number>}
•Description:
Disable DHCPv6 mode of the OA external interface. With DHCPv6 disabled, the IPv6 and DNS
addresses are not obtained from the DHCPv6 Server. This setting takes effect immediately.
•Access level/Bay level:
OA administrator, OA operator
•Restrictions:
None
Enclosure network configuration commands 82
Page 83
DISABLE ENCLOSURE_IP_MODE
•Command:
DISABLE ENCLOSURE_IP_MODE
•Description:
Disables Enclosure IP Mode.
Active and Standby Onboard Administrators retain their current IP addresses.
After disabling Enclosure IP Mode and a takeover occurs, there will no longer be a single IP address
for the enclosure.
•Access level/Bay level:
OA administrator, Operator
•Restrictions:
None
DISABLE HTTPS
•Command:
DISABLE HTTPS
•Description:
Disables HTTPS access to the Onboard Administrator, which prevents access to the web-based user
interface
•Access level/Bay level:
OA administrator, OA operator
•Restrictions:
None
DISABLE IPV6
•Command:
DISABLE IPV6 {<bay number>}
•Description:
Disables IPv6 protocol of the Onboard Administrator external interface. If a bay number is not
specified, then the command defaults to the active Onboard Administrator.
•Access level/Bay level:
OA administrator, OA operator
•Restrictions:
None
Enclosure network configuration commands 83
Page 84
DISABLE NTP
•Command:
DISABLE NTP
•Description:
Disables the synchronizing of time and date with a remote server using the NTP protocol. Does not
clear any NTP servers that have been configured.
•Access level/Bay level:
OA administrator, OA operator
•Restrictions:
None
DISABLE ROUTER ADVERTISEMENTS
•Command:
DISABLE ROUTER ADVERTISEMENTS {<bay number>}
•Description:
Disables auto-configuration of IPv6 addresses from Router Advertisement messages. If a bay number
is not specified, then the command defaults to the active Onboard Administrator.
•Access level/Bay level:
OA administrator, OA operator
•Restrictions:
None
DISABLE SECURESH
•Command:
DISABLE SECURESH
•Description:
Disables SSH access to the Onboard Administrator.
Disabling SSH prevents access to the web-based user interface and the SSH terminal interface until a
terminal session re-enables the SSH protocol.
•Access level/Bay level:
OA administrator, OA operator
•Restrictions:
None
DISABLE SNMP
•Command:
Enclosure network configuration commands 84
Page 85
DISABLE SNMP
•Description:
Disables SNMP support for the Onboard Administrator.
Does not clear the SNMP trap receivers that have been configured.
SNMP trap receivers can still be added and removed.
If you disable SNMP, then Insight Manager Agents do not work properly.
•Access level/Bay level:
OA administrator, OA operator
•Restrictions:
None
DISABLE TELNET
•Command:
DISABLE TELNET
•Description:
Disables telnet access to the Onboard Administrator
•Access level/Bay level:
OA administrator, OA operator
•Restrictions:
None
DISABLE TRUSTED HOST
•Command:
DISABLE TRUSTED HOST
•Description:
Disables the host-based access to the Onboard Administrator. Disabling TRUSTED HOSTS allows all
hosts to connect to the Onboard Administrator.
•Access level/Bay level:
OA administrator, Operator
•Restrictions:
None
DISABLE XMLREPLY
•Command:
DISABLE XMLREPLY
•Description:
Disables XML reply data return over the HTTP port
Enclosure network configuration commands 85
Page 86
•Access level/Bay level:
OA administrator, OA operator
•Restrictions:
None
DOWNLOAD CONFIG
•Command:
DOWNLOAD CONFIG <url>
•Description:
Downloads a previously saved configuration script file from a specific IP host, and then executes it.
Supported protocols are HTTP, FTP, TFTP, and USB. Format the <URL> as protocol://host/path/file.
The URL syntax for IPv6 addresses is protocol://[<ipv6_address>]/path/file. If your FTP server does
not support anonymous connections, then specify a user name and password by replacing the host
part in the above format with username:password@host.
•Access level/Bay level:
OA administrator
•Restrictions:
o The file cannot change the Administrator account password.
o The user password is not saved or restored by the DOWNLOAD CONFIG command.
DOWNLOAD SSHKEY
•Command:
DOWNLOAD SSHKEY <url>
•Description:
Downloads an authorized key file to use for SSH logins. The file contains the public keys for users.
Supported protocols are HTTP, FTP, and TFTP.
Format the <url> as protocol://host/path/file.
•Access level/Bay level:
Administrator
•Restrictions:
None
ENABLE ALERTMAIL
•Command:
ENABLE ALERTMAIL
•Description:
Enables the sending of alert emails when an event occurs
•Access level/Bay level:
Enclosure network configuration commands 86
Page 87
OA administrator, OA operator
•Restrictions:
You can only issue this command if the configuration has been set up.
ENABLE DHCPV6
•Command:
ENABLE DHCPV6 {<bay number>}
•Description:
Enables DHCPv6 mode to the Onboard Administrator. In DHCPv6 mode, IPv6 and DNS addresses
are obtained from the DHCPv6 Server. This setting takes effect immediately.
•Access level/Bay level:
OA administrator, OA operator
•Restrictions:
None
ENABLE ENCLOSURE_IP_MODE
•Command:
ENABLE ENCLOSURE_IP_MODE
•Description:
Enables Enclosure IP Mode
•Access level/Bay level:
OA administrator, Operator
•Restrictions:
When using enclosure IP mode only replace the standby OA module while the enclosure is powered
on to ensure persistence of Enclosure IP Mode settings.
ENABLE HTTPS
•Command:
ENABLE HTTPS
•Description:
Enables HTTPS access to the Onboard Administrator
•Access level/Bay level:
OA administrator, OA operator
•Restrictions:
None
Enclosure network configuration commands 87
Page 88
ENABLE IPV6
•Command:
ENABLE IPV6 {<bay number>}
•Description:
Enables IPv6 protocol for the Onboard Administrator external interface. If bay number is not
specified, then the command defaults to the active Onboard Administrator.
•Access level/Bay level:
OA administrator, OA operator
•Restrictions:
None
ENABLE NTP
•Command:
ENABLE NTP
•Description:
Enables NTP support for the Onboard Administrator
•Access level/Bay level:
OA administrator, OA operator
•Restrictions:
None
ENABLE ROUTER ADVERTISEMENTS
•Command:
ENABLE ROUTER ADVERTISEMENTS {<bay number>}
•Description:
Enables auto-configuration of IPv6 addresses from Router Advertisement messages. If a bay number
is not specified, then the command defaults to the active Onboard Administrator.
•Access level/Bay level:
OA administrator, OA operator
•Restrictions:
None
ENABLE SECURESH
•Command:
ENABLE SECURESH
•Description:
Enclosure network configuration commands 88
Page 89
Enables SSH support for the Onboard Administrator
•Access level/Bay level:
OA administrator, OA operator
•Restrictions:
None
ENABLE SNMP
•Command:
ENABLE SNMP
•Description:
Enables SNMP Trap support for the Onboard Administrator
•Access level/Bay level:
OA administrator, OA operator
•Restrictions:
None
ENABLE TELNET
•Command:
ENABLE TELNET
•Description:
Enables telnet access to the Onboard Administrator
•Access level/Bay level:
OA administrator, OA operator
•Restrictions:
None
ENABLE TRUSTED HOST
•Command:
ENABLE TRUSTED HOST
•Description:
Enables IP security for the Onboard Administrator
•Access level/Bay level:
OA administrator
•Restrictions:
None
Enclosure network configuration commands 89
Page 90
ENABLE XMLREPLY
•Command:
ENABLE XMLREPLY
•Description:
Enables XML reply data over an HTTP connection
•Access Level/Bay Level:
OA administrator, OA operator
•Restrictions:
None
REMOVE OA ADDRESS IPV6
•Command:
REMOVE OA ADDRESS IPV6 {<bay number>} <ipv6 address/prefix length>
•Description:
Removes the IPv6 static address for the Onboard Administrator. If IPv6 is enabled, then this
command takes effect immediately. If no Onboard Administrator number is provided, the command
defaults to the active Onboard Administrator.
•Access level/Bay level:
OA administrator, OA operator
•Restrictions:
o The prefix length is mandatory.
o The <ip address> value must be in the form
####:####:####:####:####:####:####:####/###, where each #### ranges from 0 to
FFFF and the prefix /### ranges from 0 to 128.
REMOVE OA DNS
•Command:
REMOVE OA DNS [<OA bay number>] <ip address>
•Description:
Removes the IP address of a DNS server from the list for the specified Onboard Administrator.
The DNS servers are used only if the system is configured to use a static IP address.
If no bay number is provided, the command default to the active Onboard Administrator.
•Access level/Bay level:
OA administrator, OA operator
•Restrictions:
The <ip address> must be in the form ###.###.###.###, where each ### ranges from 0 to 255.
Enclosure network configuration commands 90
Page 91
REMOVE OA DNS IPV6
•Command:
REMOVE OA DNS IPV6 {<OA bay number>} <ipv6 address{/prefix length}>
•Description:
Removes the specified DNS IPv6 address from the list of DNS addresses for the specified Onboard
Administrator. If a bay number is not specified, then the command defaults to the active Onboard
Administrator.
•Access level/Bay level:
OA administrator, OA operator
•Restrictions:
o A maximum of two DNS servers can be added.
o The <ip address> must be in the form ####:####:####:####:####:####:####:#### or
####:####:####:####:####:####:####:####/### (with a prefix), where each ####
ranges from 0 to FFFF and the prefix /### ranges from 0 to 128.
o Removes an IP address from the list of systems that receive SNMP traps. If the same IP address is
listed multiple times with different communities, all instances of the IP address disappear unless
<community> specifies which one is to be removed.
o Removes an existing trap receiver from the SNMP configuration. If the same <host> is listed
multiple times with different communities, all instances of the <host> disappears unless
<community name> specifies which one is to be removed.
o The <host> value can be either an IPv4 address, an IPv6 address, or a DNS name.
•Access level/Bay level:
OA administrator, OA operator
•Restrictions:
IPv6 addresses cannot specify the network prefix length.
REMOVE TRUSTED HOST
•Command:
REMOVE TRUSTED HOST <ip address>
•Description:
Removes an IPv4 or IPv6 address from the list of addresses being handled by the IP Security feature.
•Access level/Bay level:
OA administrator, OA operator
Enclosure network configuration commands 91
Page 92
•Restrictions:
None
SET ALERTMAIL MAILBOX
•Command:
SET ALERTMAIL MAILBOX "<email address>"
•Description:
Sets the email address where events are sent
•Access level/Bay level:
OA administrator, OA operator
•Restrictions:
None
SET ALERTMAIL SENDERDOMAIN
•Command:
SET ALERTMAIL SENDERDOMAIN "<domain>"
•Description:
Sets the AlertMail domain. This is the DNS domain where the Onboard Administrator is located (for
example, AB.com).
•Access level/Bay level:
OA administrator, OA operator
•Restrictions:
None
SET ALERTMAIL SMTPSERVER
•Command:
SET ALERTMAIL SMTPSERVER [ <host> ]
•Description:
Sets the SMTP server. This is the mail server where the Onboard Administrator delivers its e-mail
based events.
The <host> value can be either an IPv4 address, an IPv6 address, or a DNS name.
•Access level/Bay level
Administrator, OA operator
•Restrictions:
IPv6 addresses cannot specify the network prefix length.
Enclosure network configuration commands 92
Page 93
SET ENCRYPTION
•Command:
SET ENCRYPTION { NORMAL | STRONG }
•Description:
Using STRONG encryption enforces use of only FIPS 140-2 approved algorithms including AES,
3DES, and SHA. Setting this option to NORMAL also enables other SSLv3 algorithms such as RSA,
RC4, and MD5.
•Access level/Bay level:
OA administrator
•Restrictions:
None
SET OA GATEWAY
•Command:
SET OA GATEWAY [<bay number>] <ip address>
•Description:
o Sets the network default gateway.
o This command is used if the system is configured to use a static IP address.
o If you do not specify a bay number, the command defaults to the active Onboard Administrator.
•Access level/Bay level:
OA administrator, OA operator
•Restrictions:
The <ip address> must be in the form ###.###.###.###, where each ### ranges from 0 to 255.
SET OA NAME
•Command:
SET OA NAME [<bay number>] "<OA name>"
•Description:
Sets the Onboard Administrator name. If a bay number is not specified, the command defaults to the
active Onboard Administrator.
•Access level/Bay level:
OA administrator, OA operator
•Restrictions:
The Onboard Administrator name is 1 to 32 characters long including all alphanumeric characters
and the dash (-).
Enclosure network configuration commands 93
Page 94
SET OA UID
•Command:
SET OA UID [<bay number>] {ON | OFF}
•Description:
Sets the Onboard Administrator UID on or off.
If you do not specify a bay number, the command defaults to the active Onboard Administrator.
•Access level/Bay level:
All
•Restrictions:
None
SET IPCONFIG
•Command:
SET IPCONFIG {DHCP | STATIC} [<OA bay number>] [DYNAMICDNS] <ip address>
<netmask> [<gateway> [<DNS1address> [<DNS2 address>]]]
•Description:
o Configures IP settings for the Onboard Administrator to DHCP mode or static mode.
o In STATIC mode, the IP address and Netmask are set to <ip address> and <netmask>
respectively. These settings take affect immediately. If the Gateway address and/or DNS
addresses are cleared, they are omitted. The Gateway and DNS address can also be set by
using the SET OA GATEWAY and ADD OA DNS commands.
o SET IPCONFIG STATIC [<OA bay number>] <ip address> <netmask>
[<gateway> [<DNS1 address> [<DNS2 address>]]]
o In DHCP mode, the IP address, Netmask, Gateway address, and DNS addresses are obtained
from the DHCP. This setting immediately takes affect. If DYNAMICDNS is specified, then the
DNS server is notified of the new IP address of the system when it is received from the DHCP
server.
o SET IPCONFIG DHCP [<OA bay number>] [DYNAMICDNS]
•Access level/Bay level:
OA administrator, OA operator
•Restrictions:
None
SET NTP POLL
•Command:
SET NTP POLL <seconds>
•Description:
Sets the polling interval of the NTP servers
Enclosure network configuration commands 94
Page 95
•Access level/Bay level:
OA administrator, OA operator
•Restrictions:
Poll time should be between 60 and 86,400 seconds.
SET NTP PRIMARY
•Command:
SET NTP PRIMARY <host>
•Description:
Sets the primary server used for synchronizing time and date using the NTP. The <host> value can
be an IPv4 address, an IPv6 address, or a DNS name.
•Access level/Bay level:
OA administrator, OA operator
•Restrictions:
IPv6 addresses cannot specify the network prefix length.
SET NTP SECONDARY
•Command:
SET NTP SECONDARY <host>
•Description:
Sets the secondary server used for synchronizing time and date using the NTP. The <host> value can
be either an IPv4 address, an IPv6 address, or a DNS name.
•Access level/Bay level:
OA administrator, OA operator
•Restrictions:
IPv6 addresses cannot specify the network prefix length.
SET SNMP CONTACT
•Command:
SET SNMP CONTACT "<contact>"
•Description:
Configures the name of the system contact. The default contact is blank.
•Access level/Bay level:
OA administrator, OA operator
•Restrictions:
The <contact> must be no more than 20 characters long. Valid characters are all alphanumeric, the
underscore (_), the dash (-), and spaces.
Enclosure network configuration commands 95
Page 96
SET SNMP COMMUNITY
•Command:
SET SNMP COMMUNITY {READ | WRITE} "<community name>"
•Description:
Sets the community name for the read or write SNMP community. If a blank write community name is
given, then SNMP set commands are disabled until a non-empty community name is given.
•Access level/Bay level:
OA administrator, OA operator
•Restrictions:
o The write <community name> must be no more than 20 characters long, and the read
<community name> must be 1 to 20 characters long.
o All printable characters are valid.
o The default read community name is public.
o The default write community name is public.
SET SNMP LOCATION
•Command:
SET SNMP LOCATION "<location>"
•Description:
Configures the SNMP location of the enclosure. The default location is blank.
•Access level/Bay level:
OA administrator, OA operator
•Restrictions:
The <location> must be no more than 20 characters long. Valid characters are all alphanumeric, the
underscore (_), the dash (-), and spaces.
SHOW ENCRYPTION
•Command:
SHOW ENCRYPTION
•Description:
Displays the ENCRYPTION setting.
•Access level/Bay level:
OA administrator, OA user
•Restrictions:
In STRONG mode, only FIPS 140-2 approved algorithms including AES, 3DES, and SHA are
permitted.
Enclosure network configuration commands 96
Page 97
SHOW NETWORK
•Command:
SHOW NETWORK
•Description:
Displays:
o Enclosure
o IPv4 information
o IPv6 information
o DHCP state
o Dynamic DNS state
o IP address subnet mask
o Gateway address
o Primary and secondary DNS addresses
o MAC address
o HTTP and HTTPS server status
o SNMP status
o SSH status
o Telnet status
o NTP status
o Trusted Host status
•Access level/Bay level:
All
•Restrictions:
VLAN ID information displays only when VLAN is enabled.
Example
OA-0018FE27577F> show network
Onboard Administrator Network Settings:
- - - - - General Information - - - - Primary DNS: 16.110.135.51
Secondary DNS: 16.110.135.52
Tertiary DNS: Not Set
VLAN ID: 1
MAC Address: 00:18:FE:27:57:7F
Network Link Settings: Link Auto-negotiation
Enclosure network configuration commands 97
Page 98
Onboard Administrator Protocol Status:
Web (HTTP/HTTPS): Enabled
SNMP: Disabled
SecureSH: Enabled
Encryption Mode: Normal
Trusted Hosts: Disabled
HPSIM Trust Mode: Disabled
Telnet: Enabled
AlertMail: Disabled
Mailbox: michael.slama@hp.com
SMTP Server: 16.84.189.199
Sender Domain: Not Set
XML Reply: Enabled
NTP: Enabled
Primary NTP server: 2001::11
Secondary NTP server: 16.84.190.248
Server Poll-Interval: 60 seconds
Last Update: 13 Jun 04:52:23 from 16.84.190.248
Link Loss Failover: Not Supported
Link Loss Interval: Not Supported
Enclosure IP Mode: Not Supported
GUI Login Detail: Enabled
VLAN: Enabled
SHOW SNMP
•Command:
SHOW SNMP
•Description:
Displays:
o SNMP system name
o Location
o Contact
o Read community name
o Write community name
o List of the trap destinations
•Access level/Bay level:
OA administrator, OA operator
•Restrictions:
None
Example
OA-0018FE27577F> SHOW SNMP
SNMP Configuration:
Status: Disabled
System Name: Shorty
System Location:
System Contact:
Read Community Name: public
Write Community Name:
No trap receivers specified.
Enclosure network configuration commands 98
Page 99
SHOW SSHFINGERPRINT
•Command:
SHOW SSHFINGERPRINT
•Description:
Displays the key fingerprint of the Onboard Administrator host public key
•Access level/Bay level:
OA administrator, OA operator, user
•Restrictions:
None
Example
OA-0018FE27577F> SHOW SSHFINGERPRINT
1024 3f:5c:33:0a:a1:2e:9b:2c:da:eb:fe:90:87:34:13:b7 /etc/ssh/id_dsa.pub
SHOW SSHKEY
•Command:
SHOW SSHKEY
•Description:
Displays the contents of the existing SSH authorized key files
•Access level/Bay level:
Administrator
•Restrictions:
None
Example
Firmware Version: 2.20
Built: 04/14/2008 @ 14:04
OA Bay Number: 1
OA Role: Active
Authenticating with public key "rsa-key-123456789"
TEST ALERTMAIL
•Command:
TEST ALERTMAIL
•Description:
Sends a test AlertMail message to the configured email address
•Access level/Bay level:
Administrator, operator
Restrictions:
Enclosure network configuration commands 99
Page 100
You must have OA permission to perform this command.
TEST SNMP
•Command:
TEST SNMP
•Description:
Sends a test SNMP trap to all of the configured trap destinations
•Access level/Bay level:
OA administrator
•Restrictions:
You must enable SNMP to use this function
Enclosure network configuration commands 100
Loading...
+ hidden pages
You need points to download manuals.
1 point = 1 manual.
You can buy points or you can get point for every manual you upload.