Public Works and Government Services
Canada
RETURN BIDS TO:
RETOURNER LES SOUMISSIONS À:
Bid Receiving - PWGSC / Réception des soumissions -
TPSGC
11 Laurier St. / 11, rue Laurier
Place du Portage , Phase III
Core 0A1 / Noyau 0A1
Gatineau
Québec
K1A 0S5
Bid Fax: (819) 997-9776
SOLICITATION AMENDMENT
MODIFICATION DE L'INVITATION
The referenced document is hereby revised; unless otherwise
indicated, all other terms and conditions of the Solicitation
remain the same.
Ce document est par la présente révisé; sauf indication contraire,
les modalités de l'invitation demeurent les mêmes.
Comments - Commentaires
Vendor/Firm Name and Address
Raison sociale et adresse du
fournisseur/de l'entrepreneur
Issuing Office - Bureau de distribution
Marine Machinery and Services / Machineries et
services maritimes
11 Laurier St. / 11, rue Laurier
6C2, Place du Portage
Gatineau
Québec
K1A 0S5
Canada
Travaux publics et Services
gouvernementaux Canada
Title - Sujet
COMPUTER SUBASSEMBLY
Solicitation No. - N° de l'invitation
W8482-145963/A
Client Reference No. - N° de référence du client
W8482-145963
GETS Reference No. - N° de référence de SEAG
PW-$$ML-035-24064
File No. - N° de dossier
035ml.W8482-145963
Solicitation Closes - L'invitation prend fin
02:00 PM
at - à
2013-11-19
on - le
F.O.B. - F.A.B.
Plant-Usine:
Destination:
Address Enquiries to: - Adresser toutes questions à:
Tinkess, Dianne
Telephone No. - N° de téléphone
(819) 956-0178 ( )
Destination - of Goods, Services, and Construction:
Destination - des biens, services et construction:
Instructions: See Herein
Instructions: Voir aux présentes
Delivery Required - Livraison exigée
Vendor/Firm Name and Address
Raison sociale et adresse du fournisseur/de l'entrepreneur
Telephone No. - N° de téléphone
Facsimile No. - N° de télécopieur
Name and title of person authorized to sign on behalf of Vendor/Firm
(type or print)
Nom et titre de la personne autorisée à signer au nom du fournisseur/
de l'entrepreneur (taper ou écrire en caractères d'imprimerie)
Signature
Page 1 of - de 2
1
1
CCC No./N° CCC - FMS No./N° VME
Other-Autre:
Delivery Offered - Livraison proposée
Amendment No. - N° modif.
001
Date
2013-10-10
Time Zone
Fuseau horaire
Eastern Daylight Saving
Time EDT
Buyer Id - Id de l'acheteur
035ml
FAX No. - N° de FAX
(819) 956-0897
Date

Advertising

   Related Manuals for HP 16-port SCS

   Summary of Contents for HP 16-port SCS

  • Page 1

    Public Works and Government Services Travaux publics et Services Canada gouvernementaux Canada RETURN BIDS TO: Title - Sujet RETOURNER LES SOUMISSIONS À: COMPUTER SUBASSEMBLY Bid Receiving - PWGSC / Réception des soumissions - Solicitation No. - N° de l'invitation Amendment No. - N° modif. TPSGC W8482-145963/A 11 Laurier St.

  • Page 2

    Solicitation No. - N° de l'invitation Amd. No. - N° de la modif. Buyer ID - Id de l'acheteur W8482-145963/A 035ml Client Ref. No. - N° de réf. du client File No. - N° du dossier CCC No./N° CCC - FMS No/ N° VME W8482-145963 035mlW8482-145963 This solicitation amendment 001 is raised to provide this question and answer set 1.

  • Page 3: Installation Instructions, Installation Checklist

    The information contained herein is subject to change without notice. The only This kit might contain extra hardware for your convenience. warranties for HP products and services are set forth in the express warranty statements accompanying such products and services. Nothing herein should Required tools be construed as constituting an additional warranty.

  • Page 4

    LAN interface cable between the Ethernet hub or switch and the SCS LAN connector. Use the T-5 screws to secure the 16-port SCS to the shelf in one IMPORTANT: Before mounting the SCS, note the media of the previous positions.

  • Page 5

    Figure 5 Installing cage nuts Install up to four clip nuts for round-hole racks or four cage nuts for square-hole racks. Secure the shelf with the 16-port SCS to rails, using four T-25 Torx screws. Figure 9 Installing clip nuts...

  • Page 6

    MAC address noted in step 2. See the “Configuring the network address settings using BootP” section of the HP 16- and 48-Port Serial Console Server User Guide for Secure the SCS to the rack, using four T-25 Torx screws.

  • Page 7: User Guide

    HP 16- and 48-Port Serial Console Servers User Guide Part number: 391188-002 Second Edition: March 2006...

  • Page 8

    © Copyright 2006 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without notice. The only warranties for HP products and services are set forth in the express warranty statements accompanying such products and services. Nothing herein should be construed as constituting an additional warranty. HP shall not be liable for technical or editorial errors or omissions contained herein.

  • Page 9: Table Of Contents

    Power requirements ..........................6 Grounding ............................7 Airflow requirements ........................... 7 2 Installation and configuration HP 16-port Serial Console Server components ..................... 8 Front panel components ........................8 Rear panel components ........................9 HP 48-port Serial Console Server components ................... 10 Front panel components ........................

  • Page 10: Table Of Contents

    Enabling SNMP traps ........................40 Disabling SNMP traps ........................41 Using HP SIM to manage alert traps ......................42 Using HP Insight Manager 7 SP2 to manage alert traps ................42 4 Using SCS commands Accessing the CLI........................... 44 Entering commands ..........................44 When commands take effect ........................

  • Page 11: Table Of Contents

    7 Technical support Symbols on equipment..........................89 Symbols in text ............................90 Getting help ............................90 Technical support ..........................90 HP website............................90 Authorized reseller ..........................90 8 Regulatory compliance notices Federal Communications Commission notice ..................... 91 Class A equipment ..........................91 Class B equipment ..........................

  • Page 12: Safety Precautions

    1 Important safety information Safety precautions WARNING! To avoid potentially fatal shock hazard and possible damage to equipment, observe the following precautions: Do not use a two-wire extension cord in any product configuration containing this SCS. Test AC outlets at the computer and monitor (if used) for proper polarity and grounding. Use only with grounded outlets at both the computer and monitor.

  • Page 13: Grounding

    Airflow requirements HP 16- and 48-port Serial Console Servers draw cool air in through the front door and expel warm air out through the rear. Therefore, the front door of the rack must be adequately ventilated to allow ambient room air to enter the cabinet, and the rear door must be adequately ventilated to allow warm air to escape from the cabinet.

  • Page 14: Installation And Configuration Hp 16-port Serial Console Server Components

    2 Installation and configuration HP 16-port Serial Console Server components The 16-port SCS has the following front and rear panel components. Front panel components Figure 2-1 HP 16-port Serial Console Server front panel Power LED—Illuminates 100 Mbps LED— when the SCS is connected Illuminates when the SCS to a power source.

  • Page 15: Rear Panel Components

    Rear panel components Figure 2-2 HP 16-port Serial Console Server rear panel AC line cord connector— RJ-45 serial console port. Connects an AC power supply. RJ-45 port connectors— LAN connector—Connects Connects serial cabling. a 10/100 BaseT interface The port number is cable.

  • Page 16: Hp 48-port Serial Console Server Components

    HP 48-port Serial Console Server components The 48-port SCS has the following front and rear panel components. Front panel components Figure 2-3 HP 48-port Serial Console Server front panel Online LED—Illuminates LAN port—Connects a steadily (not blinking) 10BaseT or100BaseT when the SCS self-test and interface cable.

  • Page 17

    Rear panel components Figure 2-4 HP 48-port Serial Console Server rear panel AC line cord connector— DB-9 debug port Connects an AC power connector—Should be supply. used only on the advice and with the guidance of HP Technical Support. Outflow openings—...

  • Page 18: Rack-mounting The 16- And 48-port Scs

    LAN interface cable between the Ethernet hub or switch and the SCS LAN connector. Performing the 16-port SCS rack mount The 16-port SCS can be installed in either the front or rear of the rack, depending on your rack configuration, and can be secured to the shelf in the following positions.

  • Page 19

    Use the T-5 screws to secure the 16-port SCS to the shelf in one of the positions illustrated in Figure 2-5 and Figure 2-6. Figure 2-7 16-port SCS center shelf mount Install up to four clip nuts for round-hole racks or four cage nuts for square-hole racks.

  • Page 20

    Secure the shelf with the 16-port SCS to the rack, using four T-25 Torx screws. Figure 2-10 16-port SCS shelf mount Installation and configuration 14...

  • Page 21: Performing The 48-port Scs Rack Mount

    Performing the 48-port SCS rack mount The 48-port SCS ships with the 1U mounting brackets already attached in the standard position. Figure 2-11 Securing 1U mounting brackets to front of SCS (standard position) Figure 2-12 Securing 1U mounting brackets to the rear of SCS (alternate position) Install up to four clip nuts for round-hole racks or four cage nuts for square-hole racks.

  • Page 22

    Figure 2-13 Installing clip nuts Figure 2-14 Installing cage nuts Secure the SCS to the rack, using four T-25 Torx screws. Figure 2-15 Securing the 48-port SCS into the rack Installation and configuration 16...

  • Page 23: Installing The Hp 16- And 48-port Scs

    Note the media access control (MAC) address on the SCS. NOTE: The MAC address is located on the top of all 16-port SCS and on the bottom of all 48-port SCS. Rack mount the console server. See “Rack mounting the HP 16- and 48-port SCS.”...

  • Page 24: Configuring The Scs

    Configuring the SCS To configure the SCS, you must specify a unique IP address and other network address information, stored in the SCS configuration database. During initial login, specify a password for the Admin user. Configuring the network address settings using BootP Ensure that there is a BootP server on your network that is configured to correctly respond to a BootP request from the SCS.

  • Page 25: Initial Scs Login

    Initial SCS login The SCS ships with a single user defined in its user database. The first time you connect to the SCS, you are prompted for a user name. At the Username prompt, enter There is no factory default password for the Admin user. At the Admin.

  • Page 26: Reinitializing The Scs

    Reinitializing the SCS Reinitializing the SCS removes configured information, which can be useful when reinstalling the unit at another location in your network. You can erase the configuration database, which contains all nonvolatile data except the IP address, subnet mask, and gateway. You can also erase both the configuration database and the network address information.

  • Page 27: Operations Overview

    3 Operations Overview The SCS and its ports are easily configured and managed to meet your requirements for device connection, user authentication, access control, power status monitoring, port history information display, and SNMP compliance for use with third-party network management products. Configuring global settings Generally, the SCS-level commands affect console port operations, configure or initiate physical operations, and enable or disable features.

  • Page 28: Updating The Scs Clock

    Updating the SCS clock The SCS supports the network time protocol (NTP) protocol. When NTP is enabled, the battery-backed real-time clock on the SCS updates immediately after NTP is enabled, each time the SCS reboots, and, optionally, at specified intervals. You can specify one or two NTP servers to provide the time.

  • Page 29: Port Groups

    Port groups The SCS supports access control groups which are composed of one or more serial ports. This feature allows a user to be granted access to a group of ports, using a single specification. Each port can belong to only one group. A port group may then be specified in a user account.

  • Page 30: Connecting To Devices From The Console Port

    Stand-alone third-party Telnet clients You can use third-party Telnet clients to access the SCS directly. Connecting to a device using Telnet Enter Telnet, followed by the SCS IP address and the appropriate TCP port, which by default is 3000 plus the physical port number, in decimal format.

  • Page 31: Configuring And Using Dial-in Connections

    Configuring and using dial-in connections You can attach an external modem to the console port for dial-in serial CLI access to the SCS. This configuration can be used as a backup connection if the SCS is not accessible from the network. It can also be used as a primary connection at remote sites that do not have Ethernet network capability.

  • Page 32: Using Ssh

    When you disable SSH and later re-enable it, you can either use the existing server key or compute a new one. If you are re-enabling the same server at the same IP address, HP recommends that you use the existing key because SSH clients might be using it for verification.

  • Page 33

    Access rights of users are determined from the authentication method used. SSH key authentication always uses the access rights from the local user database. Depending on the server authentication mode specified with the Server Security command, SSH password authentication will use either the access rights from the local user database or the values returned by the RADIUS server.

  • Page 34: Enabling Plain Text Telnet And Ssh Connections

    Session sharing allows multiple concurrent sessions to the same attached device. The 16-port SCS allows up to 32 total concurrent sessions, with up to four concurrent sessions per port. The 48-port SCS allows up to 96 total concurrent sessions, with up to four concurrent sessions per port.

  • Page 35

    The following examples show the interaction between share mode and access levels. Session sharing examples These examples illustrate session sharing and preemption for one port and two users. Assume this port is currently in use by the session originator (SO). Another user, the requesting user (RU), wants to connect to the same port. For simplicity, also assume that if RU is allowed to connect, it will not exceed the maximum allowable number of sessions per port or sessions per SCS.

  • Page 36: Cli Mode

    Enabling session sharing To enable automatic sharing, specify the Auto parameter. -or- To enable sharing only with the permission of the session originator, specify the Query parameter, which is the default value. Disabling session sharing To disable session sharing, issue a Server Share command with the Disable parameter. Initiating a device session with exclusive access At the Username: prompt, enter your user name, followed by an E or e.

  • Page 37: Displaying Cli Access Character Information

    Displaying CLI access character information Issue a Show Server CLI command. show server cli See “Show Server CLI command.” Ending your device sessions Enter CLI mode and issue a Quit command. -or- If you initiated the device session with a Connect command, enter CLI mode and issue a Disconnect command. -or- Allow the port to time-out from inactivity.

  • Page 38: Changing A User's Configuration Information

    Changing a user’s configuration information Issue a User Set command. user set <username> [password=<pwd>] [sshkey=<keyfile>] [ftpip=<ftpadd>] [key=<sshkey>] [access=[+|–]<access>] [group=[+|–]<group1>[,<group2>...]] You can change your own password at any time. You must have USER access rights to change another user’s password or any user’s SSH user key information and access rights. To remove an SSH user key or password, specify Key=“”...

  • Page 39: Managing User Access Rights And Access Levels

    Active Directory. The LDAP module must be managed through HP IP Console Viewer software. The details for configuring LDAP can be located in the documentation for the HP IP Console Viewer software or in the online Help section within the software itself. See http://www.hp.com/go/kvm...

  • Page 40: Authentication Summary

    Connections to the Telnet port (23), serial CLI, and PPP are still authenticated using the local SCS user database, even when authentication is expressly disabled. Generally, these communications paths are used only by administrators, and authentication is enforced to establish appropriate access rights. Authentication cannot be disabled when SSH session access is enabled.

  • Page 41: Displaying Authentication Configuration Information

    Displaying authentication configuration information Issue a Show Server Security command. show server security The display includes the current SCS authentication settings that were configured with the Server Security command. If SSH access has been enabled, the display indicates SSH2. Regardless of whether SSH is enabled, the display includes the authentication method specified with the Server SSH command.

  • Page 42

    Using port history mode commands When you are in port history mode, you can issue the commands listed in Table 3-6. Only the first letter of the command is required. Table 3-6 Port history mode commands Command Description Bottom B sets the view location to the bottom of the file minus 23 history display lines, if available. Clear C clears the port history buffer.

  • Page 43: Nfs History Files

    server cli history=clear|keep If Clear is specified, the port history buffer is cleared and all data is discarded at the end of a session. If Keep is specified, the content of the port history buffer is retained at the end of a session. Clearing and discarding all port history buffer data Issue a Clear command while you are in port history mode.

  • Page 44: Nfs File Names

    If a mount operation is not immediately successful, it will be retried every 60 seconds for approximately 15 minutes. If an existing mount is lost, the SCS automatically attempts to restore it. If an error occurs, the display might include a numeric value and a text message. See “NFS Error Codes” and “Port Status.”...

  • Page 45: Displaying Nfs Configuration Information And Mount Status

    If the file type is daily, the file name specification must also include one or more of the date substitution strings so that the resulting file name is different each day. If you specify a non-default file name and later want to use the default file name, you can change it by issuing a Port NFS Enable command with a File= or File=””...

  • Page 46: Enabling Snmp Processing

    Defining read, write, and trap community names Defining and deleting up to four SNMP management entity IP addresses Enabling and disabling SNMP traps Defining and deleting up to four trap destination IP addresses Defining, copying, and deleting up to 10 alert strings for each port By default, SNMP is enabled, but no traps are enabled and no trap destinations are defined.

  • Page 47: Disabling Snmp Traps

    server snmp trap enable all Disabling SNMP traps Issue a Server SNMP Trap command with the Disable parameter. server snmp trap disable The SCS displays a numbered list of traps that are currently enabled with a prompt requesting you to select traps to disable.

  • Page 48: Using Hp Sim To Manage Alert Traps

    HP SIM automatically detects devices as part of the device discovery process. The device should be installed and running before attempting discovery through HP SIM. Configuring HP SIM to receive traps Before HP SIM can receive traps, the correct MIB file (CPQSERIAL.MIB) must be compiled and added into HP SIM. To register the MIB: IMPORTANT: Before beginning this procedure, remove the previous version of CPQSERIAL.MIB.

  • Page 49

    Configuring the device to send traps to Insight Manager 7 SP2 Add the Insight Manager 7 SP2 server as an SNMP trap recipient. Configure the device to send alert notifications to Insight Manager 7 SP2 as SNMP traps. Operations 43...

  • Page 50: Using Scs Commands Accessing The Cli

    4 Using SCS commands Accessing the CLI You can access the CLI in three ways: using the Telnet CLI, using the console port, or entering the CLI access character during a session to a serial device. When the CLI is accessed, its prompt appears (>), indicating that you can enter a command.

  • Page 51: Command Syntax

    Command syntax A command can have four types of syntax: positional commands, positional parameters, keyword parameters, and keyword values. The following examples demonstrate the syntax types. The following Set Port command changes the baud rate and flow control settings for port 2. >...

  • Page 52: Command Displays

    > port 2 set bauf=57600 flow=xon ---- ERR 26 - SET keyword parameter invalid In the following example, the keyword value “576” is not valid. Numeric keyword values must be fully specified and may not be shortened to three characters. >...

  • Page 53: Command Summary

    Command summary Table 4-4 lists the SCS commands, including a brief description plus the required access rights and level. Table 4-4 SCS command summary Command Description, access right, and access level Connect Description: Accesses devices from the console port. Access right: Port-specific Access level: ADMIN or APPLIANCEADMIN (Users who do not have the ADMIN or APPLIANCEADMIN level must have the appropriate port access configured to issue this command.)

  • Page 54

    Table 4-4 SCS command summary Command Description, access right, and access level Server CLI Description: Specifies the console port type, CLI access character; enables and disables device connection from the console port; specifies a modem initialization string; specifies port history mode operations and a port time-out value Access right: SCON Access level: APPLIANCEADMIN...

  • Page 55

    Table 4-4 SCS command summary Command Description, access right, and access level Show NTP Description: Displays NTP configuration information Access right: SMON Access level: ADMIN or APPLIANCEADMIN Show Port Description: Displays port configuration information and statistics Access right: SMON Access level: ADMIN or APPLIANCEADMIN Show Port In|Out Description: Displays how carriage returns and linefeeds are treated Access right: SMON...

  • Page 56: Scs Commands Connect

    5 SCS commands Connect The Connect command establishes a connection from the console port of the SCS to a device attached to a serial port on that SCS. To use this command, you must have previously issued a Server CLI command with the Connect=On parameter.

  • Page 57

    Syntax: help [<command_name>] Table 5-2 Help command parameter Parameter Description <command_name> Command name Default: Displays list of all commands Examples The following command displays information about the Show Server CLI command. help show server cli The following command displays a list of all commands. help The following command displays a list of all commands that begin with server.

  • Page 58

    Examples The following command enables the use of the NFS on the SCS. The NFS server is located at IP address 192.168.52.50, and files will be created under the subdirectory /scs_history every midnight for ports that are NFS enabled. For information on enabling NFS on individual ports see “Port NFS.” nfs enable ip=192.168.52.50 mount=/scs_history ftype=daily The following command disables using the NFS feature on the SCS.

  • Page 59: Port

    Port The Port command has several forms, as listed in Table 5-5. Table 5-5 Port command summary Command Description Port Alert Add Adds a port alert string to a specified port Port Alert Copy Copies port alert strings from one port to another port Port Alert Delete Deletes one or more port alert strings from a specified port Port Break...

  • Page 60

    Example The following command copies the alert strings defined on port 1 to port 17, replacing any previously defined alert strings on port 17. port 17 alert copy 1 Port Alert Delete The Port Alert Delete command deletes one or more alert strings from a port. When you issue this command, a numbered list of defined alert strings appears, from which you choose those to be deleted.

  • Page 61

    Examples The following command accesses the history mode of the serial port. > port history In port history mode, the following command searches the history buffer in the downward direction for the string “connected to,” ignoring case. port history > s -d -i “connected to” Port Logout The Port Logout command terminates the SCS session on a specified port.

  • Page 62: Port Set

    Examples The following command enables NFS on port 3, using the default file name specification, and setting a size threshold of 20 bytes and a time threshold of zero. With this configuration data will be buffered according to the non-zero threshold value, 20 bytes, and then it will be written to the NFS history file.

  • Page 63

    Table 5-11 Port Set command parameters Parameter Description STOP=<stopbits> Number of stop bits per character. Valid values are 1 and 2. Default = 1 FLOW=<signal> Flow control signal. For hardware flow control, be sure the control signals are correctly wired, or data loss might occur.

  • Page 64: Quit

    Table 5-11 Port Set command parameters Parameter Description GROUP=<group> Group name, up to eight characters. Group names are case-sensitive. If the name contains spaces, enclose the name in double quotes. If the port was previously assigned to a group and a Port Set command is issued with a different group specification, the most recent group name is assigned.

  • Page 65: Server Commands

    Access right: None needed Access level: All Syntax: resume Server commands The Server command has several forms, as listed in Table 5-13. Table 5-13 Server command summary Command Description Server CLI Specifies the console port type, CLI access character, modem initialization string, port history mode operations, and port time-out value.

  • Page 66

    Server CLI The Server CLI command: Specifies the console port type Specifies the CLI access character Enables or disables device connection from the console port Specifies a modem initialization string Specifies port history mode operations Specifies a port time-out value At least one parameter must be specified.

  • Page 67

    SCS startup and self-test logic. The application image (SCS50app.img) contains the program that provides SCS functionality. You will need a TFTP server. Download the latest FLASH image from the HP website and save the image file to the appropriate directory on the TFTP server.

  • Page 68

    Table 5-16 Server Init command parameters Parameter Description Reinitializes the SCS, including the network address information Server PPP The Server PPP command enables or disables the PPP server on the console port. See “Using PPP” and “Configuring and using dial-in connections.” After the PPP server has been configured with this command by specifying the required addresses and masks, those values remain in the database.

  • Page 69

    Table 5-18 Server RADIUS command parameters Parameter Description PRIMARY | SECONDARY Indicates either the primary RADIUS server or the secondary RADIUS server is being defined or deleted. IP=<radius_ip> IP address of the RADIUS authentication server. SECRET=<secret> Eight to 24 character text string for shared secret with the RADIUS server. Enclose the string in quotes if it contains spaces.

  • Page 70

    Table 5-19 Server Security command parameters Parameter Description AUTHENTICATION=<auth> Authentication method. You can specify multiple values (other than None), separated by commas. Valid values are: LOCAL—Use the local SCS user database to authenticate users. RADIUS—Use the previously defined RADIUS servers to authenticate users. NONE—Do not authenticate users.

  • Page 71: Server Snmp Manager Command

    Server SNMP The Server SNMP command enables or disables SNMP UDP port 161 SNMP processing. When you disable SNMP processing, you can still enable and disable traps with the Server SNMP Trap command. See “Managing the SCS using SNMP.” Access right: SCON Access level: APPLIANCEADMIN Syntax: server snmp enable|disable...

  • Page 72: Server Snmp Trap Destination Command

    Example The following command adds an SNMP management entity with the IP address of 192.168.0.1. server snmp manager add 192.168.0.1 Server SNMP Trap The Server SNMP Trap command enables or disables SNMP traps. When you issue this command with the Enable parameter, the SCS displays a numbered list of all currently disabled traps.

  • Page 73: Show Commands

    Server SSH command The Server SSH command enables or disables SSH session access to the SCS and specifies the SSH authentication method. When you enable SSH, all SCS sessions will be terminated if an SCS SSH server key must be generated. You must also have previously specified an authentication method other than None with the Server Security command.

  • Page 74: Show Ntp Command, Show Port Command

    Access right: SMON Access level: ADMIN or APPLIANCEADMIN Syntax: show nfs Show NTP command The Show NTP command displays NTP configuration information. If NTP has never been enabled on the SCS, the default values appear. If NTP was previously enabled, successfully configured, then later disabled, the display will retain the configured address and update values, and the status will remain Success.

  • Page 75

    Table 5-30 Show Port command display fields for TD=Console Field Content Power Signal Signal and state being monitored for device power status (from Port Set command). If monitoring is disabled, this field indicates None. Port name Port name assigned with the Port Set command or the default name (last three octets of MAC address plus the port number).

  • Page 76: Show Server Command

    Show Port In/Out command The Show Port In/Out command displays the translation settings for all ports. These translation settings indicate how carriage returns and linefeeds are treated in incoming and outgoing serial data. Access right: SMON Access level: ADMIN or APPLIANCEADMIN Syntax: show port in|out Show Server command...

  • Page 77: Show Server Cli Command

    Show Server CLI command The Show Server CLI command displays the serial CLI settings. Access right: SMON Access level: ADMIN or APPLIANCEADMIN Syntax: show server cli Table 5-32 Show Server CLI command display fields Field Content CLI Port Console port terminal type. Access Character Control character used to access the CLI.

  • Page 78: Show Server Security Command, Show Server Snmp Command, Show User Command

    Show Server Security command The Show Server Security command displays the current authentication, connection, and lock-out settings that were configured with the Server Security and Server SSH commands. Access right: SMON Access level: ADMIN or APPLIANCEADMIN Syntax: show server security Table 5-33 Show Server Security command display fields Field...

  • Page 79

    Table 5-35 Show User command parameters Parameter Description Requests a display of all defined users The Show User command display for one user includes the information in Table 5-36. Table 5-36 Show User command display fields Field Content User User name. Level User’s access level.

  • Page 80: User Commands

    User commands The User command has several forms, as listed in Table 5-38. Table 5-38 User command summary Command Description User Add Adds a new user to the user database User Delete Deletes a user from the user database User Logout Terminates an active session of a user User Set Changes the configuration information of a user...

  • Page 81: Override Admin Account

    > user add JaneDoe ssh=SCS_key2.pub ftp=10.0.0.3 access=pall The following command adds the user name JDoe, with the password mysecret and the SCS Administrator access level, which enables access to all ports, and SCS commands. > user add JDoe pas=mysecret access=applianceadmin The following command adds the user name JohnD with the password pword and the Administrator access level.

  • Page 82: User Set Command

    User Set command The User Set command changes a user’s configuration in the user database. See “Managing user accounts” and “Access rights and levels.” You can delete a user’s password or key. However, each user must have a password or a key, so you cannot remove both.

  • Page 83: User Unlock Command

    The following command deletes the SSH key information for JohnDoe. The command will complete successfully only if JohnDoe has a password configured in a previous User Add or User Set command and if there are other users with USER access rights. >...

  • Page 84: Technical Specifications

    6 Technical specifications Table 6-1 SCS technical specifications Item SCS 16 SCS 48 Device ports Number Type Serial ports Serial ports Connectors Serial port RJ-45 Serial port RJ-45 Console port Number Connector Serial port RJ-45 Serial port RJ-45 Network connection Number Type Ethernet: IEEE 802.3, 10Base T...

  • Page 85: Adapters For Use With Cat5 And Cat6 Cable

    Table 6-3 lists the adapters available for use with CAT5 and CAT6 cables. Table 6-3 Adapters for use with CAT5 and CAT6 cables Part number Description AF103A HP RJ-45 to DB9 (DCE) F Adapter AF104A HP Cable CAT5 RJ-45 Cisco AF105A HP RJ-45 to DB-9M (DTE) Adapter AF106A...

  • Page 86

    Figure 6-1 CAT5 and CAT6 cable adapter pin assignments Technical specifications 80...

  • Page 87: Supported Traps

    Supported traps The SCS supports the following MIB2 traps: authenticationFailure linkup linkDown coldStart Table 6-4 lists the supported enterprise traps. Table 6-4 SCS enterprise traps Trap Description and variables ConfigurationFileLoaded The SCS has loaded a configuration file. Variables: Initiating user name and name of loaded file FactoryDefaultsSet The SCS has received a command to set itself to factory default values.

  • Page 88

    Table 6-4 SCS enterprise traps Trap Description and variables NFSPortNeedsMount NFS is enabled on the port, but a mount is required (using an NFS Enable command) before the port can open and write to the history file on the NFS server. Variables: SCS port number, port error status, plus primary and secondary NFS error codes.

  • Page 89: Nfs Error Codes

    Table 6-4 SCS enterprise traps Trap Description and variables UserLocked A user account has been locked. Variables: Client IP address, locked user name, and reason UserLogin A user logged in to the SCS. Variable: User name UserLogout A user logged out of the SCS Variable: User name UserModified A user’s definition has been modified in the SCS user database.

  • Page 90

    Table 6-5 NFS error codes Error code Description From the remote procedure call: broadcasting is not supported. From the remote procedure call: the name-to-address translation failed. From the remote procedure call: an unspecified error occurred. From the remote procedure call: an asynchronous error occurred. From the remote procedure call: an asynchronous error occurred.

  • Page 91

    Table 6-5 NFS error codes Error code Description The operation was not allowed because the caller does not have the correct permission to perform the requested operation. (This error differs from error 63, which is restricted to owner or privileged user permission failures.) The specified file already exists.

  • Page 92

    Table 6-5 NFS error codes Error code Description An attempt to lock a file was denied. Because this might be a temporary condition, the client is encouraged to retry the lock request until the lock is accepted. A lease has expired that is being used in the current operation. A read or write operation was attempted on a locked file.

  • Page 93

    Table 6-5 NFS error codes Error code Description A name string in a request contains valid UTF-8 characters supported by the server, but the name is not supported by the server as a valid name for the current operation. The range for a LOCK, LOCKT, or LOCKU operation is not appropriate for the allowable range of offsets for the server.

  • Page 94: Nfs Port Status Values

    NFS port status values Table 6-6 describes the port status values that may be reported by the SCS for NFS history file operations. Table 6-6 NFS port status values Value Description Mount needed. Error opening history file—Still retrying. Error opening history file—Gave up. Current write error encountered (on most recent write file).

  • Page 95: Technical Support Symbols On Equipment

    7 Technical support Symbols on equipment The following symbols may be placed on equipment to indicate the presence of potentially hazardous conditions. WARNING! This symbol, in conjunction with any of the following symbols, indicates the presence of a potential hazard. The potential for injury exists if warnings are not observed. Consult your documentation for specific details.

  • Page 96: Symbols In Text

    Third-party hardware or software Operating system type and revision level HP website The HP website has information on this product, as well as the latest drivers and flash ROM images. Authorized reseller For the name of the nearest authorized reseller: In the United States, see the HP US service locator webpage (http://www.hp.com/service_locator).

  • Page 97: Regulatory Compliance Notices Federal Communications Commission Notice

    8 Regulatory compliance notices Federal Communications Commission notice Part 15 of the Federal Communications Commission (FCC) Rules and Regulations has established Radio Frequency (RF) emission limits to provide an interference-free radio frequency spectrum. Many electronic devices, including computers, generate RF energy incidental to their intended function and are, therefore, covered by these rules. These rules place computers and related peripheral devices into two classes, A and B, depending upon their intended installation.

  • Page 98: Declaration Of Conformity For Products Marked With The Fcc Logo, United States Only

    Hewlett-Packard Company P. O. Box 692000, Mail Stop 530113 Houston, Texas 77269-2000 1-800-HP-INVENT (For continuous quality improvement, calls may be recorded or monitored.) For questions regarding this FCC declaration, contact us by mail or telephone: Hewlett-Packard Company P. O. Box 692000, Mail Stop 510101...

  • Page 99: European Union Regulatory Notice

    European Union regulatory notice This product complies with the following EU Directives: Low Voltage Directive 73/23/EEC EMC Directive 89/336/EEC Compliance with these directives implies conformity to applicable harmonized European standards (European Norms) which are listed on the EU Declaration of Conformity issued by Hewlett-Packard for this product or product family. This compliance is indicated by the following conformity marking placed on the product: This marking is valid for non-Telecom products and EU harmonized Telecom products (e.g., Bluetooth).

  • Page 100: Korean Notice

    Korean notice Class A equipment Class B equipment BSMI notice Disposal of waste equipment by users in private households in the European Union This symbol on the product or on its packaging indicates that this product must not be disposed of with your other household waste. Instead, it is your responsibility to dispose of your waste equipment by handing it over to a designated collection point for the recycling of waste electrical and electronic equipment.

  • Page 101

    Telnet and SSH port history mode, 36 authentication methods, 33 connections, 28 rack mounting, 12 displaying authentication PPP configuration information, 26 16-port SCS, 12 information, 35 Telnet, 23 48-port SCS, 15 LDAP authentication, 33 third-party Telnet, 24 reboot, 19...

  • Page 102

    Show Server PPP, 71 disabling traps, 41 user accounts Show Server RADIUS, 71 displaying configuration adding user, 31 Show Server Security, 72 information, 41 changing configuration, 32 Show Server SNMP, 72 enabling, 40 deleting user, 32 Show User, 72 enabling traps, 40 displaying user configuration, 32 SNMP managing user access, 33...

  • Page 103

    Managing switch users through Active Directory ................12 Authenticate Only mode......................13 LDAP mode..........................14 Local KVM console operation......................16 Integrating HP console switches and HP Lights-Out technology ..............17 Integrating legacy KVM components ....................18 KVM consoling example........................18 Implementation best practices......................19 Firmware upgrades ........................

  • Page 104

    Abstract This paper describes the best methods to properly deploy an HP IP consoling solution to maximize server management at minimum cost. Keyboard/video/mouse (KVM) consoles, console switches, and adapters can be combined to work together to address such data center problems as space constraints, management of heterogeneous systems, remote access needs, unpleasant working environments, and cable clutter.

  • Page 105

    HP consoles, switches, and accessories HP console switches allow control of multiple servers through one or more KVM consoles for efficient server management. HP Serial Console Servers allow the use of remote consoles or terminals to manage servers and other devices through their serial ports.

  • Page 106

    HP IP Console Switch with Virtual Media The HP IP Console Switch with Virtual Media (Figure 3) is a rack-mountable, digital KVM switch that offers local or remote IP KVM console functionality and supports virtual media. This highly scalable switch allows an administrator to directly access up to 16 servers, and more servers in a tiered system.

  • Page 107

    The interface adapter also stores a user- configured server name (up to 16 characters). If a server is to be relocated, HP recommends that the interface adapter remain attached to (and move with) the server.

  • Page 108

    The HP KVM Console Switches use all four pairs to send the signal data. CAT5 cables are available from HP in standard lengths of 3, 6, 12, 20, and 40 feet. To reduce cable clutter or the need to coil extra cable, customers can fabricate their own CAT5 cables to custom lengths for connecting devices to the HP IP Console Switch.

  • Page 109

    The HP IP Console Switch with Virtual Media is recommended as a main access or first tier switch for a management system. It provides both local and remote access. Using IP Console Viewer software and LDAP integration with Active Directory, HP IP Console Switch remote users can fully manage any server connected directly or tiered downstream.

  • Page 110

    An IMG image file of a floppy disk or ISO image file of a CD-ROM can also be mapped to a target server from a remote client using IP Console Viewer 3.0 or later. HP IP Console Viewer has the built-in ability to mount and use .img and .iso images.

  • Page 111

    Figure 7 illustrates an example of a two-tiered system with local and remote KVM consoles attached to an HP IP Console Switch at the first tier and a local KVM console attached to an HP Server Console Switch on the second tier. Local KVM Console A and four Remote KVM Consoles have access to all servers in the system (Groups A and B), while the Local KVM Console B has access only to the servers in Group B.

  • Page 112

    Remote KVM console operation A PC or workstation can function as a remote (in-band) KVM console by connecting to the HP IP Console Switch through a network interface. An IT administrator can use a workstation as a KVM console to access and manage the servers in the data center.

  • Page 113

    Session types Figure 9 shows an image of the HP IP Console Viewer 3.0 display when properly configured for use with an HP ProLiant server and EMS. As indicated by the arrows, three types of sessions—a KVM, iLO, and serial session—can be launched simultaneously to the selected server.

  • Page 114

    The HP IP Console Switch with Virtual Media comes with full LDAP support. LDAP enables system administrators to use directory services for managing remote KVM console switch users with the same efficiency as managing network users and resources.

  • Page 115

    The directory services option can be configured to operate in one of two basic modes: Authenticate Only and LDAP (for authentication and authorization). Note With LDAP operation, if the directory service of the domain controller is unavailable, the built-in, console switch administrator account still has access to the switch and all connected servers.

  • Page 116

    In Basic mode (Figure 12), only the user ID and password are checked against the directory. If the user exists and the password is correct, then the user obtains access without further validation. Note For security reasons, HP recommends using LDAP Basic mode only for testing connectivity. Figure 12. Query processing in LDAP Basic mode...

  • Page 117

    LDAP User Attribute mode In User Attribute mode (Figure 13) the directory checks the user ID and password. If they are valid, the directory uses an attribute in the notes field of the user object to determine access rights. Figure 13. Query processing in LDAP User Attribute mode Domain Controller User ID + password...

  • Page 118

    In Group Attribute mode, a user’s accessibility to systems is determined by the group listing. For console switch queries, the directory checks for a group that contains both the user and the KVM switch. For server queries, the directory checks for a group that contains the user and the server or the user and the switch.

  • Page 119

    KVM control of server functions, including system boot and power down. The HP IP Console provides remote KVM access to all the servers, while iLO Standard provides virtual power to those servers that support it. Table 4 indicates key differences between the HP IP Console Switch and HP Lights-Out technology.

  • Page 120

    Console attached to the HP IP Console Switch can also manage any server in the system and can map the USB removable media drive attached to the HP IP Console Switch to any server in either tier. The Local KVM Console attached to the HP Server Console Switch can manage any server in the...

  • Page 121

    The server numbers indicate the port designations that the user will see, either at the remote KVM console or the Local KVM Console connected to the HP IP Console Switch. A third tier is possible by adding another console switch to the second tier switch. However, port blocking can become an issue if a number of switches are cascaded this way.

  • Page 122

    For all ProLiant server environments with iLO, HP recommends a 0×2×16 Server Console Switch in every rack for local access, and one IP Console Switch for every 16 Server Console Switches to provide row access from a local KVM console and a redundant remote KVM console.

  • Page 123

    TechCom@HP.com. © 2006, 2008 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without notice. The only warranties for HP products and services are set forth in the express warranty statements accompanying such products and services. Nothing herein should be construed as constituting an additional warranty.

This manual also for:

48-port scs

Comments to this Manuals

Symbols: 0
Latest comments: