HP Integrity Superdome 2 16-socket User Manual
HP Integrity Superdome 2 16-socket User Manual

HP Integrity Superdome 2 16-socket User Manual

Onboard administrator command line interface user guide
Hide thumbs Also See for Integrity Superdome 2 16-socket:
Table of Contents
HP Integrity Superdome 2 Onboard
Administrator Command Line Interface User
Guide
Abstract
This document contains specific information that is intended for users of this HP product.
HP Part Number: AH337-9002H
Published: August 2013
Edition: 8
Table of Contents
loading

Summary of Contents for HP Integrity Superdome 2 16-socket

  • Page 1 HP Integrity Superdome 2 Onboard Administrator Command Line Interface User Guide Abstract This document contains specific information that is intended for users of this HP product. HP Part Number: AH337-9002H Published: August 2013 Edition: 8...
  • Page 2 © Copyright 201 1 – 2013 Hewlett-Packard Development Company, L.P. Notices The information contained herein is subject to change without notice. The only warranties for HP products and services are set forth in the express warranty statements accompanying such products and services. Nothing herein should be construed as constituting an additional warranty. HP shall not be liable for technical or editorial errors or omissions contained herein.
  • Page 3: Table Of Contents

    Contents 1 Accessing the CLI..................11 Remotely accessing the Onboard Administrator................11 Locally accessing the Onboard Administrator................11 2 Command line..................13 Command line overview......................13 HP Integrity Superdome 2 Server Blade and Integrity server blade restrictions.........13 Access level and privileges......................13 Account authentication.......................15 3 General commands .................17 CLEAR SCREEN ........................17 EXIT............................17 HELP.............................17...
  • Page 4 REMOVE CA CERTIFICATE......................32 REMOVE USER CERTIFICATE....................32 SHOW CA CERTIFICATE......................32 SHOW TWOFACTOR INFO....................33 7 Directory commands.................34 ADD LDAP CERTIFICATE......................34 ADD LDAP GROUP.........................34 ASSIGN for LDAP........................34 ASSIGN OA LDAP GROUP......................35 DISABLE LDAP........................35 DOWNLOAD LDAP CERTIFICATE.....................35 ENABLE LDAP........................36 REMOVE LDAP CERTIFICATE....................36 REMOVE LDAP GROUP......................36 SET LDAP GROUP ACCESS......................37 SET LDAP GROUP DESCRIPTION....................37 SET LDAP NAME MAP......................37...
  • Page 5 1 1 Enclosure network configuration commands..........55 ADD OA DNS........................55 ADD SNMP TRAPRECEIVER.....................55 ADD SSHKEY.........................55 ADD TRUSTED HOST......................56 CLEAR SSHKEY........................56 CLEAR VCMODE........................56 DISABLE ALERTMAIL.......................57 DISABLE ENCLOSURE_IP_MODE....................57 DISABLE HTTPS........................57 DISABLE SECURESH........................58 DISABLE SNMP........................58 DISABLE TELNET........................58 DISABLE TRUSTED HOST......................59 DISABLE XMLREPLY.........................59 DISABLE WSMANAGEMENT....................59 DOWNLOAD CONFIG......................59 DOWNLOAD SSHKEY......................60 ENABLE ALERTMAIL........................60...
  • Page 6 POWERON XFABRIC......................72 RESTART OA .........................73 SET DISPLAY EVENTS......................73 SET ENCLOSURE ASSET......................73 SET ENCLOSURE NAME......................74 SET ENCLOSURE PART_NUMBER.....................74 SET ENCLOSURE PDU_TYPE....................74 SET ENCLOSURE SERIAL_NUMBER..................75 SET ENCLOSURE UID......................75 SET IOX UID..........................75 SET LLF INTERVAL........................75 SET POWER MODE........................76 SET POWER LIMIT........................76 SET POWER SAVINGS......................76 SET TIMEZONE........................77 SHOW CONFIG........................77 SHOW DATE.........................78...
  • Page 7 SHOW BLADE POWERDELAY....................101 SHOW BLADE STATUS......................102 SHOW BLADE TEMP......................103 15 IOX enclosure management commands...........104 SHOW IOX INFO........................104 SHOW IOX LIST........................105 SHOW IOX POWER......................105 SHOW IOX STATUS......................106 16 Interconnect management commands............108 ASSIGN INTERCONNECT ....................108 CLEAR INTERCONNECT SESSION..................108 CONNECT INTERCONNECT....................108 POWEROFF INTERCONNECT....................109 POWERON INTERCONNECT....................109 RESTART INTERCONNECT.....................109 SET INTERCONNECT POWERDELAY..................110...
  • Page 8 PARCREATE.........................129 PARMODIFY........................132 PARREMOVE........................135 PARSTATUS..........................135 POWEROFF PARTITION......................139 POWERON PARTITION......................139 REBOOT PARTITION......................140 SET PARTITION DVD......................140 SHOW PARTITION DVD......................141 SHOW PARTITION INFO......................142 TOC PARTITION........................143 PARDEFAULT........................143 PARPERM..........................144 VPARCREATE........................145 VPARBOOT..........................146 VPARMODIFY........................147 VPARRESET..........................148 VPARREMOVE........................149 VPARSTATUS........................150 22 Log viewer commands................152 CLEAR FPL...........................152 CLEAR SEL...........................152 CLEAR PARTITION CONSOLELOG..................152 CONNECT PARTITION......................153 SHOW FPL..........................153 SHOW LIVELOGS........................153...
  • Page 9 SHOW INFO........................172 UPDATE FIRMWARE ......................172 CLI UPDATE NPARTITION .....................174 Effects messages........................175 28 Updating Firmware................176 Introduction..........................176 Offline partition update......................176 Single partition update.....................176 All partitions update......................177 Blade update........................177 Warnings during update....................177 Errors during update......................177 Online complex firmware update on Superdome 2..............177 Introduction........................177 Services unavailable......................178 Management Processor access..................178 IPMI..........................178...
  • Page 10 RS............................190 SEL.............................190 TC............................191 31 Event notifications.................192 Enclosure event notifications....................192 Command line event notifications....................192 32 Support and other resources..............194 Before you contact HP......................194 HP contact information......................194 Subscription service......................194 Documentation feedback.......................194 Installing HP Insight Remote Support Software................194 New and changed information in this edition................195 Related information.......................195 Typographic conventions.......................195 A Using event logs..................197...
  • Page 11: Accessing The Cli

    1 Accessing the CLI Remotely accessing the Onboard Administrator The Onboard Administrator CLI can be accessed remotely through any Telnet or Secure Shell session. Telnet session From a network-connected client, open a command-line window At the prompt, open a Telnet session to the IP address of the Onboard Administrator, and then press Enter.
  • Page 12 Connect a serial cable between the serial port on the computer and the corresponding serial port on the Onboard Administrator module. The following table is for the DB9 serial (RS232) port and shows the pinout and signals for the RS232 connector. The signal direction is DTE (computer) relative to the DCE (modem).
  • Page 13: Command Line

    2 Command line Command line overview You can also use the CLI to manage the Onboard Administrator. The following are some reasons to use the CLI: HP Management Applications (for example, Systems Insight Manager, Insight Control tools, and so on) can query the Onboard Administrator for information that these tools must present for a complete management view of HP Integrity Superdome 2 enclosures and the devices contained within and connected IOX enclosures.
  • Page 14 the Onboard Administrator. You can only change the password for the Administrator account. The following table indicates the capabilities of the user based on their privileges and permitted bays. Account classification Capabilities Account name/privilege Bays selected for level this account Administrator Administrator/administrator All commands...
  • Page 15: Account Authentication

    Account classification Capabilities Account name/privilege Bays selected for level this account own account Can 'show' CLI commands Partition management capabilities User access to commands for managing the partition configuration and the partitions themselves can be controlled through the Parcon_Admin access right and partition access assignments using the ASSIGN PARCON_ADMIN and ASSIGN PARTITION commands.
  • Page 16 LDAP users The Enable/Disable LDAP is an optional setting. LDAP enabled can be used with local users enabled or disabled. The Onboard Administrator uses configured LDAP server and search context to request account authentication. Configuration of the LDAP group determines the privileges instead of the user name. If a user is configured for multiple groups with different privileges and bay permissions, then the user has the highest privileges and the combination of all permitted bays.
  • Page 17: General Commands

    3 General commands CLEAR SCREEN Command: CLEAR SCREEN NOTE: CLS is also a valid command. Description: Clears the terminal screen Access level: EXIT Command: EXIT Description: Exits the CLI Access level: HELP Command: HELP Description: If you supply a command, the usage and help text for the command appears. If no argument is given, all base commands appear.
  • Page 18: Logout

    LOGOUT Command: LOGOUT Description: Exits the command line interface Access level: QUIT Command: QUIT Description: Exits the command line interface Access level: General commands...
  • Page 19: Rack Commands

    4 Rack commands SET RACK NAME Command: SET RACK NAME Description: Sets the rack name Access level/Bay level: OA Administrator, OA Operator Restrictions: The must be a maximum of 32 characters long and includes all alphanumeric, the dash, and the underscore characters.
  • Page 20: Connect Enclosure

    Restrictions: You must be logged on to the monarch OA to perform this command. Example: The output for this command will depend on how the enclosures are linked. SHOW TOPOLOGY Detecting linked enclosures .. Complex Topology Complex UUID: 09USE7332000 Complex Name: ComplexOne Rack Name: MyRack Enc# Enclosure Name Status...
  • Page 21: Upload Debug

    UPLOAD DEBUG Command: UPLOAD DEBUG { | ARCHIVE <"directory"> | USB <"directory"> } Description: This command collects relevant system logs and files from the Complex and uploads them to a URL, a USB connected to the enclosure, or Archive Storage. Access level/Bay level: Monarch OA Restrictions:...
  • Page 22: User Account Commands

    5 User account commands ADD USER Command: ADD USER "" [""] Description: Adds a user to the system. If you do not provide a password, you are prompted for one. If SCRIPT MODE is enabled and the password is not provided, the password is assigned an unmatched string.
  • Page 23: Assign Oa

    ASSIGN OA Command: ASSIGN OA {"" | LDAP GROUP ""} Description: Assigns the Onboard Administrators specified to an existing user or group Access level/Bay level: OA Administrator Restrictions: The is case-sensitive. DISABLE USER Command: DISABLE USER "" Description: Disables a user account.
  • Page 24: Enable Strong Passwords

    ENABLE STRONG PASSWORDS Command: ENABLE STRONG PASSWORDS Description: When enabled, this command requires that a user's password contain at least one character from three of the four categories: ◦ Uppercase ◦ Lowercase ◦ Numeric ◦ Nonalphanumeric Access level/Bay level: OA Administrator Restrictions: Only Administrators with Onboard Administrator permission are permitted to manage strong passwords.
  • Page 25: Remove User

    REMOVE USER Command: REMOVE USER {ALL | "" | CERTIFICATE ""} Description: Removes a user from the system or any certificate mapped to the user or both. If you specify ALL, then the command is run for all users except the default system accounts. Access level/Bay level: OA Administrator Restrictions:...
  • Page 26: Set Session Timeout

    SET SESSION TIMEOUT IMPORTANT: On Superdome 2 systems, the following long-running commands are not immediately subject to the session timeout defined by the SET SESSION TIMEOUT command: SHOW {HR | FPL | LIVELOGS | SEL | SYSLOG | PARTITION CONSOLELOG} CONNECT {BLADE | INTERCONNECT | PARTITION } If a user has one of these commands active, their session will not be removed when a session timeout occurs;...
  • Page 27: Set User Fullname

    Access level/Bay level: ◦ All users can modify their own contact information. ◦ The OA Administrator can modify all users. Restrictions: ◦ The is case-sensitive. The must be a maximum of 20 characters long and includes all alphanumeric characters, the dash, the underscore, and spaces.
  • Page 28: Show Password Settings

    ◦ The character set includes all printable characters. ◦ You must specify the password when in SCRIPT MODE. SHOW PASSWORD SETTINGS Command: SHOW PASSWORD SETTINGS Description: Displays the current minimum password length and strong password settings Access level/Bay level: All users Restrictions: None Example:...
  • Page 29: Sleep

    Access level/Bay level: Restrictions: The is case-sensitive. Users who do not have OA Administrator or OA Operator access levels can view only their user information. Example: OA-0018FE27577F> SHOW USER Local User "Administrator" Information: Full name: System Administrator Contact Info: User Rights: Admin Account Status: Enabled Server Bay Access List: 1 1A 1B 2 2A 2B 3 3A 3B 4 4A 4B 5 5A 5B 6 6A 6B...
  • Page 30: Unassign Oa

    UNASSIGN OA Command: UNASSIGN OA {"" | LDAP GROUP ""} Description: Removes the Onboard Administrator from the control of the user that it is currently assigned Access level/Bay level: OA Administrator Restrictions: The is case-sensitive. User account commands...
  • Page 31: Two-Factor Authentication Commands

    6 Two-Factor Authentication commands DISABLE CRL Command: DISABLE CRL Description: Disables certificate revocation checks Access level/Bay level: OA Administrator Restrictions: None DISABLE TWOFACTOR Command: DISABLE TWOFACTOR Description: Disables Two-Factor Authentication Access level/Bay level: OA Administrator Restrictions: None DOWNLOAD CA CERTIFICATE Command: DOWNLOAD CA CERTIFICATE ""...
  • Page 32: Download User Certificate

    DOWNLOAD USER CERTIFICATE Command: DOWNLOAD USER CERTIFICATE "" Description: ◦ Downloads an x.509 certificate for the user from . The file at must be a Base64 PEM encoded file. ◦ Downloads a CA certificate used in Two-Factor Authentication. Access level/Bay level: OA Administrator Restrictions:...
  • Page 33: Show Twofactor Info

    OA-0016355E560A> SHOW CA CERTIFICATE Details for ca certificate 1 certificateVersion issuerOrganization = ca.com issuerOrganizationalUnit = IT Infrastructure issuerCommonName = Hewlett-Packard Primary Class 2 Certification Authority subjectOrganization = hp.com subjectOrganizationalUnit = IT Infrastructure subjectCommonName = Hewlett-Packard Primary Class 2 Certification Authority validFrom...
  • Page 34: Directory Commands

    7 Directory commands ADD LDAP CERTIFICATE Command: ADD LDAP CERTIFICATE Description: Adds an LDAP certificate on the command line. To add the certificate: Start with a string that does not appear within the certificate (the end marker). Paste the certificate.
  • Page 35: Assign Oa Ldap Group

    Access level/Bay level: OA Administrator Restrictions: None ASSIGN OA LDAP GROUP Command: ASSIGN OA {"" | LDAP GROUP ""} Description: Assigns the specified group access to the Onboard Administrator. Access level/Bay level: OA Administrator Restrictions: None DISABLE LDAP NOTE: If LDAP is enabled, local accounts are disabled, and the LDAP server becomes unavailable, you can recover by booting into Lost Password mode.
  • Page 36: Enable Ldap

    ENABLE LDAP NOTE: If LDAP is enabled, local accounts are disabled, and the LDAP server becomes unavailable, you can recover by booting into Lost Password mode. When booting in Lost Password mode, the local Administrator password will be reset, LDAP is disabled, and Local Logins are re-enabled.
  • Page 37: Set Ldap Group Access

    SET LDAP GROUP ACCESS Command SET LDAP GROUP ACCESS "" {ADMINISTRATOR | OPERATOR | USER} Description: ◦ Sets the LDAP group access level. ◦ Additionally, use the ASSIGN OA command to give a user or group rights to the Onboard Administrator.
  • Page 38: Set Ldap Port

    SET LDAP PORT Command: SET LDAP PORT Description: Sets the TCP port number of the LDAP SSL service. Port 636 is the standard value. Access level/Bay level: OA Administrator Restrictions: The valid port number range is 1 to 65535. SET LDAP SEARCH Command: SET LDAP SEARCH {1|2|3} ""...
  • Page 39: Show Ldap Group

    Restrictions: None Example: OA-0016355E560A> SHOW LDAP CERTIFICATE 1 Certificate name: 17D6A5ECBF51A1A47D44C1CDD29D19EE.pem -----BEGIN CERTIFICATE----- MIIHIzCCBgugAwIBAgIKFTKZbQAAAFx1EDANBgkqhkiG9w0BAQUFADB4MRMwEQYK CZImiZPyLGQBGRYDbmV0MRcwFQYKCZImiZPyLGQBGRYHY3BxY29ycDEbMBkGCgmS JomT8ixkARkWC2FzaWFwYWNpZmljMSswKQYDVQQDEyJIUFEgSXNzdWluZyBDQSBB c2lhLVBhY2lmaWMgUmVnaW9uMB4XDTA3MTAyMDIyMzU0M1oXDTA5MTAxOTIyMzU0 M1owKTEnMCUGA1UEAxMeY2NlZ2NhbTAxLmFtZXJpY2FzLmhwcWNvcnAubmV0MIGf MA0GCSqGSIb3DQEBAQUAA4GNADCBiQKBgQDNYsB8T6rJhJQXbKvM5JLi6EXNAtFL ayV11QVyrtjRtOjRGySwFCk9KNzRS7PIP/p9gH20Ic+ZvgX0fRPnnU/2imMeTGr2 raIYGRSFBJ4sCpAP87m/7Hzk0kiyZ+7KJq92Q61Pipkea....-----END CERTIFICATE----- SHOW LDAP GROUP Command: SHOW LDAP GROUP {LIST | ""} Description: This command displays the LDAP group information. If you specify LIST, then a list of all the LDAP groups appears.
  • Page 40: Test Ldap

    Restrictions: None Example: OA-0018FE27577F> SHOW LDAP INFO Directory Services (LDAP) Enabled : Disabled Local Users Enabled : Enabled NT Name Mapping : Disabled Directory Server Directory Server SSL Port : 0 Search Context #1 Search Context #2 Search Context #3 TEST LDAP Command: TEST LDAP [""] [""]...
  • Page 41: Unassign Oa Ldap Group

    UNASSIGN OA LDAP GROUP Command: UNASSIGN OA {"" | LDAP GROUP ""} Description: Disables access to the Onboard Administrator for the group specified Access level/Bay level: OA Administrator Restrictions: None UNASSIGN OA LDAP GROUP...
  • Page 42: Hp Sim Commands

    8 HP SIM commands ADD HPSIM CERTIFICATE Command: ADD HPSIM CERTIFICATE Description: Adds an HP SIM certificate on the command line: Start with a string that does not appear within the certificate (the end marker). Paste the certificate.
  • Page 43: Set Hpsim Trust Mode

    SET HPSIM TRUST MODE Command: SET HPSIM TRUST MODE {CERTIFICATE [ON] | DISABLED [OFF]} Description: Enables or disables the HP SIM SSO mode. When enabled, the trusted applications can access the Onboard Administrator GUI data without requiring additional authentication. Access level/Bay level: OA Administrator Restrictions: The CERTIFICATE (On) mode trusts only applications with certificates that have been uploaded...
  • Page 44: General Management Commands

    9 General management commands DOWNLOAD OA CERTIFICATE Command: DOWNLOAD OA CERTIFICATE [] Description: ◦ Downloads a CA supplied pkcs#7 file to replace the current security certificate on Onboard Administrator specified by . If you omit , then the current Onboard Administrator is targeted.
  • Page 45: Generate Certificate Prompts

    Generate certificate prompts Prompt Description Restrictions OA Host Name (CN) This is the most important field. This is the Must be 1 to 60 characters long. To prevent Onboard Administrator name that appears in security alerts, the value of this field must match the browser web address box.
  • Page 46: Set Device Serial_Number Blade

    Access level/Bay level: Restrictions: The must be in the form ###.###.###.###, where each ### ranges from 0 to 255. SET DEVICE SERIAL_NUMBER BLADE Command: SET DEVICE SERIAL_NUMBER BLADE "" Description: Sets the serial number of the specified Storage, Tape, or I/O expansion blade. Access level/Bay level: OA Administrator Restrictions:...
  • Page 47: Set Script Mode

    SET SCRIPT MODE Command: SET SCRIPT [MODE] {ON | OFF} Description: ◦ Ceases all prompting and verifying of entries when SCRIPT MODE is on. ◦ The ADD USER command must have a password argument if executed in SCRIPT MODE. ◦ Default values are used for any parameters that would normally require user interaction.
  • Page 48: Show Device Serial_Number Blade

    SHOW SERVER STATUS ALL SHOW SERVER TEMP ALL SHOW PARTITION DVD SHOW SERVER POWERDELAY ALL SHOW SERVER BOOT ALL SHOW SYSLOG SERVER ALL SHOW SYSLOG ILO ALL SHOW TOPOLOGY SHOW USBKEY SHOW USER(current user) SHOW USER SESSIONS SHOW USER LIST SHOW LDAP INFO SHOW LDAP CERTIFICATE SHOW LDAP GROUP LIST...
  • Page 49: Show Interconnect Sessions

    Access level/Bay level: ◦ ◦ Bay specific Restrictions: Dependent on bay privileges Example: OA-0016355E560A> SHOW DEVICE SERIAL_NUMBER BLADE Serial number: USM81500RP SHOW INTERCONNECT SESSIONS Command: SHOW INTERCONNECT SESSIONS Description: Displays which users have serial console sessions in progress for each interconnect Access level/Bay level: ◦...
  • Page 50 Access level/Bay level: ◦ OA Administrator, OA Operator Restrictions: None Example: [MFG Shell Enabled]iduno-oa> show user sessions Username Idle Type IP Address -------- ----------- ---------- ----- ---------------- Administrator 3s 0s Local 16.127.73.207 Administrator 2h 53m 56s 2h 53m 52s Local 16.191.144.136 Administrator 6h 24m 30s 3m 45s Local 16.119.117.151...
  • Page 51: 10 Enclosure Bay Ip Addressing Commands

    10 Enclosure Bay IP Addressing commands ADD EBIPA Command: ADD EBIPA { BLADE | INTERCONNECT } DNS [ { , | - } ] NOTE: SERVER is a valid alias for BLADE. Description: Adds a DNS server IP address to the list of DNS servers for either BLADE bays or INTERCONNECT bays Access Level/Bay level: Administrator, Operator...
  • Page 52: Remove Ebipa

    NOTE: SERVER is a valid alias for BLADE. Description: Enables the Onboard Administrator to provide IP addresses to the devices in the bays using DHCP. If you do not specify any bay numbers, then EBIPA is enabled for all bays. DHCP traffic from iLO and the switch modules can no longer go outside the enclosure.
  • Page 53: Show Ebipa

    If no bays are specified when setting the , then all the bays are assigned an IP address in the range starting from the . The keyword NONE can be used in the place of , , or to clear the IP address.
  • Page 54 0.0.0.0 0.0.0.0 0.0.0.0 0.0.0.0 0.0.0.0 0.0.0.0 0.0.0.0 0.0.0.0 0.0.0.0 0.0.0.0 0.0.0.0 0.0.0.0 0.0.0.0 0.0.0.0 0.0.0.0 0.0.0.0 0.0.0.0 0.0.0.0 0.0.0.0 0.0.0.0 0.0.0.0 0.0.0.0 0.0.0.0 0.0.0.0 0.0.0.0 0.0.0.0 0.0.0.0 0.0.0.0 0.0.0.0 0.0.0.0 0.0.0.0 0.0.0.0 0.0.0.0 0.0.0.0 0.0.0.0 0.0.0.0 0.0.0.0 0.0.0.0 0.0.0.0 0.0.0.0 0.0.0.0 0.0.0.0 0.0.0.0...
  • Page 55: 1 Enclosure Network Configuration Commands

    1 1 Enclosure network configuration commands ADD OA DNS Command: ADD OA DNS [] Description: Adds an IP address of a DNS server to the list. DNS servers are used if the system is configured to use a static IP address. If a bay number is not specified, the command defaults to the active Onboard Administrator.
  • Page 56: Add Trusted Host

    Access level/Bay level: Administrator Restrictions: ◦ SSHKEY is only available for the Administrator local account. ◦ The SSHKEY string is limited to 8 KB. ADD TRUSTED HOST Command: ADD TRUSTED HOST Description: Adds an IP address to the list of systems permitted connectivity with the Onboard Administrator. Access level /Bay level: OA Administrator, OA Operator Restrictions:...
  • Page 57: Disable Alertmail

    OA Bays Restrictions: ◦ All blades in the enclosure must be powered off before clearing the VCMODE. ◦ The enclosure is no longer managed by Virtual Connect, and blades revert to default Ethernet MAC and Fibre Channel WWN assignments. Virtual Connect might disconnect the servers from Ethernet networks and Fibre Channel fabrics.
  • Page 58: Disable Securesh

    DISABLE SECURESH Command: DISABLE SECURESH Description: Disables SSH access to the Onboard Administrator. Disabling SSH prevents access to the web-based user interface and the SSH terminal interface until a terminal session re-enables the SSH protocol. Access level/Bay level: OA Administrator, OA Operator Restrictions: None DISABLE SNMP...
  • Page 59: Disable Trusted Host

    DISABLE TRUSTED HOST Command: DISABLE TRUSTED HOST Description: Disables the host-based access to the Onboard Administrator. Disabling TRUSTED HOSTS allows all hosts to connect to the Onboard Administrator. Access level/Bay level: OA Administrator Restrictions: None DISABLE XMLREPLY Command: DISABLE XMLREPLY Description: Disables XML reply data return over the HTTP port Access level/Bay level:...
  • Page 60: Download Sshkey

    To execute a configuration script from a USB key, use usb:///