HP Insight Management WBEM Providers
on Integrity Servers
User's Guide
Abstract
This guide is intended for individuals who are familiar with the configuration and operation of Microsoft® Windows®, Windows
Server® 2008 R2, Windows Server® 2008 SP2, and Web-Based Enterprise Management Providers. Because of the risk of
data loss, only individuals experienced with using this software should implement the procedures in this guide.
HP Part Number: T2369-96024
Published: April 2011
Edition: 5
Confidential computer software. Valid license from HP required for possession, use or copying. Consistent with FAR 12.211 and 12.212, Commercial
Computer Software, Computer Software Documentation, and Technical Data for Commercial Items are licensed to the U.S. Government under
vendor's standard commercial license. The information contained herein is subject to change without notice. The only warranties for HP products
and services are set forth in the express warranty statements accompanying such products and services. Nothing herein should be construed as
constituting an additional warranty. HP shall not be liable for technical or editorial errors or omissions contained herein. UNIX is a registered
trademark of The Open Group.
Microsoft, Windows, Vista, and Windows Server are U.S. registered trademarks of Microsoft Corporation.
Contents
About This Document.....................................................................................4
HP Encourages Your Comments..................................................................................................4
This document applies to the HP Insight Management Web-Based Enterprise Management (WBEM)
Providers for Windows Server® 2008 R2 and Windows Server® 2008 SP2 on Integrity servers,
version 7.1.0.0 (Insight Providers).
This release of the Insight Providers supports Integrity servers running Windows Server® 2008 R2
and Windows Server® 2008 SP2. For information regarding supported servers, options, and
operating system versions, see Chapter 6 (page 21).
Overview
Many management products have been built on SNMP, a common network management
technology. However, SNMP-based management solutions have a simple structure and weak
security protocol relative to alternatives. These limitations prevent comprehensive, industry-standard,
and secure system management.
In place of SNMP, SMASH and SMI-S are secure, robust standards endorsed by the DMTF and
SNIA that are quickly gaining momentum. These standards provide the foundation for future server
management infrastructures.
The Insight Providers are based on SMASH and SMI-S. The Insight Providers employ the set of
base-level instrumentation provided by system management controllers and drivers, I/O controllers
and drivers, and system firmware interfaces. These components deliver in-depth hardware
management, including hardware inventory data, system state, and event notifications.
The data model implemented in the Insight Providers provides industry standard compliance by
conforming to DMTF, SMASH, and SMI-S profiles. The data model implemented in the Insight
Providers provides industry standard compliance by conforming to DMTF, SMASH, and SMI-S
profiles.
Windows Management Instrumentation
WMI is the Microsoft® implementation of WBEM, a set of industry-standard technologies for
accessing system information in a distributed management environment. WBEM and WMI use the
CIM standard to represent systems, networks, applications, devices, and other managed components
in an object-oriented manner. The WMI Providers extend CIM to make Integrity-specific management
data and events available to system administrators, enabling administrative tasks to be automated.
For more information on WBEM and WMI, see the following websites:
The WBEM Providers are installed by default when you install the Integrity Support Pack. For
information on configuring the WBEM Providers, see the Windows Server™ 2008 R2 on HP
Integrity Servers Installation Guide and Windows Server™ 2008 SP2 on HP Integrity Servers
Installation Guide.
Overview5
2 Security
Security is a major concern and one of the primary reasons to switch from SNMP Agent-based
server management to Insight Provider-based server management. The HP Insight Management
WBEM Providers for Windows use Windows-based authentication for local and remote access to
server management data.
Implementation
The Insight Providers for Windows are implemented as a set of Windows Management
Instrumentation (WMI) providers. The access control is in the form of standard Windows account
level access restrictions.
An administrator account has sufficient rights and security group memberships to access the Insight
Provider management information for both local and remote access.
For a standard user account, there are two considerations for configuring security in order to access
WMI information from the Insight Providers:
•WMI namespace security
•Distributed COM user group membership
A standard user account needs security configurations to remotely access the Insight Provider
management information on a remote server. For more information, see the Windows Server™
2008 R2 on HP Integrity Servers Installation Guide and Windows Server™ 2008 SP2 on HP
Integrity Servers Installation Guide.
WMI namespace security settings govern access to WMI information. Windows user accounts can
be allowed or denied specific privileges per WMI namespace.
For more information on namespace security, see Access to WMI Namespaces (http://
msdn2.microsoft.com/en-us/library/aa822575.aspx).
Only standard users who belong to the Distributed COM Users group can remotely connect to
WMI and access management information. Administrators are in this group by default.
Non-administrator users must be added to the Distributed COM Users group for remote WMI
connectivity. For more information on this topic, see Connecting to WMI on a Remote Computer
(http://msdn2.microsoft.com/enus/ library/aa389290.aspx).
Best Practices
According to the principle of least privilege, HP recommends you use a low rights user account
(nonadministrator) to perform most read-only management tasks. Use of certain Insight Provider
functionality always requires an administrator level account. An example of this is a method to
reboot the system. This user does not need to be an administrator of the managed system and does
not need logon rights. HP recommends that the domain administrator creates a special purpose
domain account.
Configuring Insight Provider Security for a User Account via the Windows®
Command Line
The following procedure provides access rights to allow a standard user account to view most
management information. However, you must use an administrator account to perform some
management tasks, such as rebooting a server.
To configure a domain user or local user (non-administrator) account for remote management:
1.Open a Command Prompt window.
2.Change to the \Program Files\HPWBEM\Tools folder of the system drive.
6Security
3.Invoke the EnableRWMI.exe program to configure the account security for remote WMI
access:
EnableRWMI –a:localuser
Or
EnableRWMI –a:domain\user
Configuring Insight Provider Security for a User Account via the Windows® Command Line7
3 Microsoft Windows Server™ 2008 Firewall configuration
This section describes a configuration method for enabling direct remote WMI access on a server
running the Microsoft Windows Server 2008 Firewall. These configuration steps were derived
from testing on RC1 of Microsoft Windows Server 2008, and so might not apply to the latest
version of Microsoft Windows Server 2008 Firewall.
There are many methods to establish remote communication with WMI. Locally privileged programs
can establish communication with WMI locally and serve up a private or standardized remote
management interface. The System Management Homepage (SMH) and Windows Remote
Management (an implementation of WS Management) are examples.
This documentation does not apply to these or other indirect methods of WMI related communication,
only to direct remote connections to WMI. Firewall configurations for indirect WMI communication
methods are independent of establishing a direct remote connection to WMI.
Apart from setting up the firewall, some user privileges are a consideration in allowing direct
remote WMI access. For example, when the user is not an Administrator, some privileges might
not exist by default.
For more information, see the Microsoft® Windows Server™ 2008 R2 on HP Integrity Servers
Installation Guide, Microsoft® Windows Server™ 2008 SP2 on HP Integrity Servers Installation
Guide, and the Securing a Remote WMI Connection MSDN article at http://msdn2.microsoft.com/
en-us/library/ aa393266.aspx.
Configuration
You can establish direct remote WMI access on a computer running the Windows Server 2008
Firewall, but the default configuration does not allow it. However, by using the built-in firewall
rules, you can enable remote WMI access in as little as two commands.
You execute the following commands locally on the Windows Server 2008 machine that is providing
WMI access (that is, on a computer running the Insight Providers on Windows Server™ 2008).
netsh advfirewall firewall set rule group=”Windows Management
Instrumentation (WMI)” new enable=yes
Output: Updated 4 rule(s).
Ok.
The command enables all firewall rules contained in the specified firewall group. If the command
output does not confirm that the rules were updated, check that the group name and each word
in the command are correct. The group name with spacing emphasized is below:
This first command is equivalent to selecting the Windows Management Instrumentation (WMI)
checkbox in the Control Panel→Windows Firewall→Settings→Exceptions tab.
An additional firewall rule is needed to allow a remote user to establish a WMI session. You can
enable it with the following command:
netsh advfirewall firewall set rule name=”Network Discovery (NB-Name-In)” new enable=yes
This command updates a portion of a rule group (a single rule). You can also be enable it in the
GUI, as follows:
1.Click Administrative Tools→Windows Firewall with Advanced Security→Inbound Rules.
2.Enable the “Network Discovery (NB-Name-In)” rule(s).
3.Select the rule, and click Action→Enable Rule.
This rule and an equivalent rule appear in the Network Discovery and the File andPrinter Sharing firewall rule groups, respectively.
8Microsoft Windows Server™ 2008 Firewall configuration
If the Windows Firewall has either of these already enabled, this latter command does not affect
a change, and only first command is necessary.
You can create similar rules that are more restrictive, but that allow remote WMI access in specific
circumstances (such as restricting which users, computers, and network addresses can remotely
access), depending on the details of your setup.
There can be additional configuration and connection requirements on the client-side depending
on the client OS and firewall used.
For more information, see Connecting to WMI Remotely Starting with Vista (http://
msdn2.microsoft.com/en-us/library/aa822854.aspx).
Configuration9
4 Insight Providers architecture
WMI
Browser
HP existing components
Microsoft WMI Framework
HP added components
Custom Scripting
(VBS, Powershell, etc.)
HPQ
namespaces
HP Insight Mana gement WBEM providers
(servers, storage, network, Blad e enclosures)
Insight providers
WebApp
SMH
Framework
WMI Proxy
WMI-W BEM
Mapper
HP SIM
Property pages
Data collection
Identification
Indications
Status polling
DCOM WMI client API
HTTP
WMI Reposi tory
Figure 1 shows an overview of Insight Provider components. The figure is color-coded to distinguish
between Microsoft-provided components, HP components, and Integrity WMI components.
Figure 1 Insight Providers Architecture
The Insight Providers extend the industry-standard CIM data model to support information that is
specific to Integrity platforms. The Insight Providers collect data from sources such as drivers and
system firmware to populate the data model.
By using scripting hosts or writing directly to the WMI COM-based client API, you can create
custom applications that can access the data model, providing automated administrative tasks.
The Insight Providers implement the following instrumentation:
•Server providers
Processor information and indications◦
◦Memory information and indications
◦PCI devices and system slots information
◦Sensor information and indications, including redundancy, fans, temperature sensors,
and power supplies
10Insight Providers architecture
◦Computer system information, including physical location, unit ID visual indicator, IPMI
System Event Log (SEL), system ROM, and aggregate computer system status (rollup of
connected components and devices)
◦Computer system indications, including ASR reboot, POST error, and thermal reboot
•Network providers
Network controller information and indications◦
◦10/100 Megabit Ethernet
◦Gigabit Ethernet
◦NIC teaming
•Storage providers
Storage controller information and indications◦
◦Ultra320 SCSI
◦SmartArray
◦SAS/SATA information
◦Fibre Channel HBA information
•Other Providers
C-Class blade enclosure provider—Enclosure information for c-Class blades◦
◦Management processor provider—Management processor information
◦Software inventory provider—Installed HP software and firmware information
◦Indications to event log provider—Insight Provider indications that are logged to the
Data model
Table 1 lists the set of DMTF profiles included in the data model implemented by this version of
Table 2 lists the set of SMI-S profiles, subprofiles, and packages included in the data model
implemented by this version of the Insight Providers.
Table 2 SMI-S profiles, subprofiles and packages included in the data model
VersionProfile/Subprofile Name
1.4.4Host Hardware RAID Controller Profile
1.4.4Array Profile
1.2.0Block Services Package
1.3.0Disk Drive Lite Subprofile
1.2.0Multiple Computer System Subprofile
1.3.0Disk Sparing Subprofile
1.3.0Physical Package
1.3.0Location Subprofile
1.3.0Extent Mapping Subprofile (deprecated)
1.2.0Direct Attach (DA) Ports Profile
1.2.0Parallel SCSI (SPI) Initiator Ports Profile
1.3.0Software Subprofile
12Insight Providers architecture
1.2.0FC HBA Profile
1.2.0Host Discovered Resources Profile
1.3.0Media Access Device Profile
Table 2 SMI-S profiles, subprofiles and packages included in the data model (continued)
VersionProfile/Subprofile Name
1.2.0SAS Target Port Subprofile
1.2.0SPI Target Port Subprofile
Table 3 lists the set of HP profile extensions included in the data model implemented by this version
of the Insight Providers.
Table 3 HP profile extensions included in the data model
File NameVersionProfile Name
P00100_-_HP_Profile_Registration Profile.pdf1.0.0P00100 – HP Profile Registration
Profile
P00101_-_HP_Mgmt_Proc_Lite_Profile.pdf2.0.1P00101 – HP Management Processor
Lite Profile
P00102_-_HP_Fan_Profile.pdf1.3.0P00102 – HP Fan Profile
P00103_-_HP_Power_Supply_Profile.pdf1.3.1P00103 – HP Power Supply Profile
P00104_-_HP_Sensors_Profile.pdf1.2.0P00104 – HP Sensor Profile
P00105_-_HP_Base_Server_Profile.pdf1.5.0P00105 – HP Base Server Profile
P00106_-_HP_CPU_Profile.pdf1.0.0P00106 – HP CPU Profile
Status Profile
Profile
Profile
Profile
Asset Profile
Profile
Asset Profile
Profile
P00107_-_HP_CPU_Consolidated_Status_Profile.pdf1.0.0P00107 – HP CPU Consolidated
P00108_-_HP_CPU_Physical_Asset_Profile.pdf1.0.0P00108 – HP CPU Physical Asset
P00109_-_HP_Record_Log_Profile.pdf1.1.0P00109 – HP Record Log Profile
P00110_-_HP_Memory_Profile.pdf1.0.0P00110 – HP Memory Profile
P00111_-_HP_Memory_Physical_Asset_Profile.pdf1.0.0P00111 – HP Memory Physical Asset
P00113_-_HP_Consolidated_Status_Profile.pdf1.0.1P00113 – HP Consolidated Status
P00114_-_HP_Base_Server_Physical_Asset_Profile.pdf1.4.0P00114 – HP Base Server Physical
P00115_-_HP_Fan_Physical_Asset_Profile.pdf1.1.0P00115 – HP Fan Physical Asset
P00116_-_HP_Power_Supply_Physical_Asset_ Profile.pdf1.0.2P00116 – HP Power Supply Physical
P00117_-_HP_Ethernet_Teaming Profile.pdf1.0.1P00117 – HP Ethernet Teaming Profile
P00119_-_HP_FC_HBA_profile.pdf1.0.4P00119 – HP FC HBA Profile
P00120_-_HP_Storage_Enclosure_Profile.pdf1.0.1P00120 – HP Storage Enclosure
P00121_-_HP_Smart_Array_Profile.pdf1.4.4P00121 – HP Smart Array Profile
P00122_-_HP_SAS_HBA_Profile.pdf1.0.1P00122 – HP SAS HBA Array Profile
P00123_-_HP_SCSI_HBA_Profile.pdf1.0.1P00123 – HP SCSI HBA Profile
P00124_-_HP_Location_Profile.pdf1.1.0P00124 – HP Location Profile
P00125_-_HP_Blade_System_Lite_Profile.pdf2.1.0P00125 – HP Blade System Lite Profile
Data model13
Table 3 HP profile extensions included in the data model (continued)
Profile
Profile
Insight Provider usage
You access data and events from the Insight Providers using the SMH supplied in the Integrity
Support Pack (ISP), HP SIM, other client application, or script that supports WMI and SMASH.
The SMH provides a web interface for accessing management data locally or remotely. SMH
support for the Insight Providers is composed of two parts:
•The HP System Management Homepage for Windows Smart Component that is included with
the Integrity Support Pack for Windows. This is the SMH framework.
•The web application plug-in that is installed with the Insight Providers. This provides the web
pages that show management data using the Insight Providers.
HP SIM 5.2 and later support the Insight Providers. For information on configuring HP SIM for use
with the Insight Providers, see Chapters 4 and 12 of the HP Systems Insight Manager 5.2 TechnicalReference Guide.
Any client application or script that supports WMI and SMASH can also be used to access data
and events from the Insight Providers. The Microsoft MSDN website provides information on building
WMI clients such as Visual Basic scripts or C++ and C# applications. For more information, see
the following WMI references on the MSDN website:
File NameVersionProfile Name
P00129_-_HP_Standalone_Tape_Drive_profile.pdf1.0.0P00129 – HP Standalone Tape Drive
P00130_-_HP_Host_Attached_SATA_profile.pdf1.0.0P00130 – HP Host Attached SATA
•Scripting Access to WMI (http://msdn2.microsoft.com/en-us/library/aa393256.aspx)
•Further Information (http://msdn2.microsoft.com/en-us/library/aa390436.aspx)
For sample scripts for use with the Insight Providers, see Chapter 5 (page 16).
Specific information about HP Integrity WBEM classes and properties for servers, storage controllers,
and network controllers can be found in the profiles, MOF files, and data sheet. (See “Additional
documentation” (page 15)).
HP Insight Management Services
The Integrity WBEM Providers Smart Component includes the following components:
Predictive Failure MonitorEnables a service that monitors failures in the system and
Event subsystem informationEnables a service that monitors events from the System Events
Automatic Server RecoveryEnables a service that verifies if the system is frozen and
that generates events when specific thresholds are reached.
Currently monitored failures include memory errors, internal
cache errors, external cache for MX2 processor errors,
fabric errors, Enhanced Thermal Management, Front Side
Bus, and Intel Cache Safe Performance Technology
performance errors.
Log (SEL), Forward Process Log (FPL), and management
Processor (MP).
reboots the system automatically (if frozen).
14Insight Providers architecture
Additional documentation
In addition to this User Guide, the following Insight Provider documentation is available at http://
www.hp.com/go/hpwbem:
•Profiles — A separate document exists for each HP profile extension.
•Provider Data Sheet, HP Insight Management WBEM Provider Data Sheet for
Integrity Servers.pdf —This document describes indication details and class
implementations not defined in an MOF or profile.
•MOFs — When the Insight Providers are installed, the MOF files are copied to the HP_Base,
Server, Storage, and Network folders in the C:\Program Files\HPWBEM\MOF directory.
MOF files are text files that contain definitions of classes and object instances using the MOF
language. The CIM data model is represented in MOF files, as are HP Integrity-specific
extensions.
•Event and Indication Reference, HP Management WBEM Events and Indications
Reference.pdf — This document lists all the events logged to the Windows System Log
and the indications generated by the Integrity WBEM providers.
Additional documentation15
5 Scripting examples
This section provides examples for accessing data exposed by the Insight Providers using scripting.
Microsoft Visual Basic Scripting Edition examples
You can write scripts to obtain data from the Insight Providers using Microsoft Visual Basic Scripting
Edition (VBScript) or any other scripting language that supports Microsoft ActiveX. This section
shows examples for accessing Insight Provider data using VBScript code.
16Scripting examples
Example 1 Displaying computer operational status information
strComputer = "."
strNamespace = "\root\hpq"
Set objWMIService = GetObject("winmgmts:\\" & strComputer & strNamespace)
Set colComputerSystem = objWMIService.ExecQuery("Select * from
HP_WinComputerSystem")
For Each objComputerSystem in colComputerSystem
WScript.Echo "Caption: " & objComputerSystem.Caption
For Each objStatusDescription in objComputerSystem.StatusDescriptions
WScript.Echo "Status description: " & objStatusDescription
Next
For Each objOperationalStatus in objComputerSystem.OperationalStatus
WScript.Echo "Operational status: " & objOperationalStatus
Next
Next
Example 2 Displaying the system firmware version
strComputer = "."
strNamespace = "\root\hpq"
Set objWMIService = GetObject("winmgmts:\\" & strComputer & strNamespace)
Set colSystemROMFirmware = objWMIService.ExecQuery("Select * from
HP_SystemROMFirmware")
For Each objSystemROMFirmware in colSystemROMFirmware
WScript.Echo "Caption: " & objSystemROMFirmware.Caption
WScript.Echo "Version: " & objSystemROMFirmware.VersionString
WScript.Echo
Next
Example 3 Displaying computer system chassis model name, serial number, and asset tag
strComputer = "."
strNamespace = "\root\hpq"
Set objWMIService = GetObject("winmgmts:\\" & strComputer & strNamespace)
Set colComputerSystemChassis = objWMIService.ExecQuery("Select * from
HP_ComputerSystemChassis")
For Each objComputerSystemChassis in colComputerSystemChassis
WScript.Echo "Model: " & objComputerSystemChassis.Model
WScript.Echo "Serial number: " &
objComputerSystemChassis.SerialNumber
WScript.Echo "Asset tag: " & objComputerSystemChassis.UserTracking
Next
Microsoft Visual Basic Scripting Edition examples17
Example 4 Listing system memory modules and their capacities
strComputer = "."
strNamespace = "\root\hpq"
Set objWMIService = GetObject("winmgmts:\\" & strComputer & strNamespace)
Set colMemoryModule = objWMIService.ExecQuery("Select * from
HP_MemoryModule")
For Each objMemoryModule in colMemoryModule
WScript.Echo "Caption: " & objMemoryModule.Caption
WScript.Echo "Capacity (bytes): " & objMemoryModule.Capacity
Wscript.Echo
Next
Example 5 Listing system processors, current clock speed, and the number of enabled cores
strComputer = "."
strNamespace = "\root\hpq"
Set objWMIService = GetObject("winmgmts:\\" & strComputer & strNamespace)
Set colProcessor = objWMIService.ExecQuery("Select * from HP_Processor")
For Each objProcessor in colProcessor
WScript.Echo "Caption: " & objProcessor.Caption
WScript.Echo "Description: " & objProcessor.Description
WScript.Echo "Current clock speed (MHz): " &
objProcessor.CurrentClockSpeed
WScript.Echo "Number of enabled cores: " &
objProcessor.NumberOfEnabledCores
Wscript.Echo
Next
Example 6 Listing fans and operational status information
strComputer = "."
strNamespace = "\root\hpq"
Set objWMIService = GetObject("winmgmts:\\" & strComputer & strNamespace)
Set colFan = objWMIService.ExecQuery("Select * from HP_WinFan")
For Each objFan in colFan
WScript.Echo "Caption: " & objFan.Caption
WScript.Echo "Description: " & objFan.Description
For Each objStatusDescription in objFan.StatusDescriptions
WScript.Echo "Status description: " & objStatusDescription
Next
For Each objOperationalStatus in objFan.OperationalStatus
WScript.Echo "Operational status: " & objOperationalStatus
Next
WScript.Echo
Next
18Scripting examples
Example 7 Clearing the record log
strComputer = "."
strNamespace = "\root\hpq"
Set objWMIService = GetObject("winmgmts:\\" & strComputer & strNamespace)
Set colCommonRecordLog = objWMIService.ExecQuery("Select * from
HPQ_CommonRecordLog")
Wscript.Echo “Clearing the record log…”
For Each objCommonRecordLog in colCommonRecordLog
objCommonRecordLog.ClearLog()
Next
Example 8 Receiving an alert indication
strComputer = "."
strNamespace = "\root\hpq"
Set objWMIService = GetObject("winmgmts:\\" & strComputer & strNamespace)
Set objIndication = objWMIService.ExecNotificationQuery("SELECT * FROM
HP_AlertIndication")
Wscript.Echo "Waiting for alert indication..."
Set objReceivedIndication = objIndication.NextEvent
You can also write scripts to obtain data from the Insight Providers using Microsoft Windows
Management Instrumentation Command-line (WMIC) and Microsoft Windows PowerShell.
The following command is used to display computer system status information using WMIC in
noninteractive mode:
wmic /namespace:\\root\hpq path hp_wincomputersystem get caption,OperationalStatus,StatusDescriptions
The following Windows PowerShell script code can be used to list fans in the system:
Table 4 lists the operating systems supported by version 7.1.0.0 of the Insight Providers. For
information about the operating system versions supported by each server platform, see the Windows
Server Operating System Support on HP Servers website at http://h10018.www1.hp.com/
wwsolutions/windows/index-all.html.
Table 4 Supported operating systems
Hardware support
The following HP Integrity servers are supported:
•rx2660
•rx2800 i2
•rx3600
CommentsOperating System
Supported with Service Pack 2 onlyMicrosoft Windows Server 2008 (English and Japanese)
Supported with and without Service Pack 1Microsoft Windows Server 2008 R2 (English and Japanese)
•rx6600
•rx7640
•rx8640
•HP Integrity BL860c
•HP Integrity BL870c
•HP Integrity BL860c i2
•HP Integrity BL870c i2
•HP Integrity BL890c i2
•HP Integrity Superdome Server sx2000
Contacting HP
For the name of the nearest HP authorized reseller:
In the United States, see the HP US service locator webpage at:
http://www.hp.com/service_locator
In other locations, see the Contact HP worldwide (in English) webpage at:
Call 1-800-HP-INVENT (1-800-474-6836). This service is available 24 hours a day, 7 days a
week. For continuous quality improvement, calls may be recorded or monitored.
Operating system support21
If you have purchased a Care Pack (service upgrade), call 1-800-633-3600. For more information
about Care Packs, see the HP website at http://www.hp.com.
In other locations, see the Contact HP worldwide (in English) webpage at:
HP welcomes your feedback. To make comments and suggestions about this document, send a
message to http://www.hp.com/bizsupport/feedback/ww/webfeedback.html.
Include the document title and manufacturing part number. All submmissions become the property
of HP.
Typographic conventions
Typographic Conventions
This document uses the following typographical conventions:
CommandA command name or qualified command phrase.
Computer outputText displayed by the computer.
Ctrl+xA key sequence. A sequence such as Ctrl+x indicates that you
ENVIRONMENT VARIABLEThe name of an environment variable, for example, PATH.
must hold down the key labeled Ctrl while you press another key
or mouse button.
ERROR NAMEThe name of an error, usually returned in the errno variable.
User inputCommands and other text that you type.
VariableThe name of a placeholder in a command, function, or other
syntax display that you replace with an actual value.
[]The contents are optional in syntax. If the contents are a list
separated by |, you must choose one of the items.
{}The contents are required in syntax. If the contents are a list
separated by |, you must choose one of the items.
|Separates items in a list of choices.
WARNINGA warning calls attention to important information that if not
understood or followed will result in personal injury or
nonrecoverable system problems.
CAUTIONA caution calls attention to important information that if not
understood or followed will result in data loss, data corruption,
or damage to hardware or software.
IMPORTANTThis alert provides essential information to explain a concept or
to complete a task
NOTEA note contains additional information to emphasize or supplement
important points of the main text.
22Support and other resources
Loading...
+ hidden pages
You need points to download manuals.
1 point = 1 manual.
You can buy points or you can get point for every manual you upload.