HP Integrity BL870c Operation Manual page 223

Hp integrity ilo 2 operations guide, eleventh edition
Hide thumbs Also See for Integrity BL870c:
Table of Contents

Advertisement

Target Address
This entity is responsible for discovering and enumerating the managed elements within the
Scheme
local domain, for maintaining the addressing and naming structure of the local domain, and
Resolution
coordinating this information with the operation invocation engine.
Service
Telnet
A telecommunications protocol providing specifications for emulating a remote computer
terminal so that one can access a distant computer and function online using an interface that
appears to be part of the user's local system.
U
Universal Serial
An external bus standard that supports data transfer rates of 450 Mb/s (USB 2.0). A USB port
Bus (USB)
connects devices such as mouse pointers, keyboards, and printers, to the computer system.
User
The CLP User represents an instance of a client which transmits and receives CLP-compliant
messages. The CLP is part of the SM CLP architecture. It is intended to either be a person or a
script interacting with a terminal service such as Telnet or SSHv2.
User Account
A record of essential user information that is stored on the system. Each user who accesses a
system has a user account.
User Friendly
A short, user-friendly synonym for a CIM class name. It has the same properties and methods
class Tag (UFcT)
as the CIM class it represents.
User Friendly
A unique path to an instance formed by concatenating the UFiTs of each instance from the root
instance Path
instance to the terminating instance. The intervening '/' between each UFiT represents an address
(UFiP)
association.
User Friendly
A unique instance tag within the scope of the target instance's containment class. A UFiT is
instance Tag
created by adding an nonzero positive-integer suffix to the target instance's UFcT.
(UFiT)
User Friendly Tag
A short, user-friendly tag for a CIM class name or instance. There are two types of UFTs; UFcT
(UFT)
and UFiT.
User Name
A combination of letters, and possibly numbers, that identifies a user to the system.
UTF-8
Unicode Transformation Format (8-bit). A variable-length character encoding for Unicode.
V
Verb
Used with SMASH SM CLP. The verb selects a management action for a target.
vKVM
Virtual keyboard, video, mouse. The iLO 2 graphical IRC provides virtual keyboard, video
(monitor), and mouse (vKVM) capabilities with KVM-over-IP performance.
VPN
Virtual private network. A network that is constructed using public wires (the Internet) to
connect nodes. These systems use encryption and other security mechanisms to ensure only
authorized users can access the network and that the data cannot be intercepted.
223

Advertisement

Table of Contents
loading

Table of Contents