Войти:
Оценок - 0, средний балл: 0 ( )

Инструкция по эксплуатации HP, модель HP Integrity NonStop Service Information

Производитель: HP
Размер: 153.69 kb
Название файла:
Язык инструкции:en
Перейти к скачиванию



К этому устройству также есть другие инструкции:

Фрагмент инструкции



HP NonStop S-Series and NS-Series Server Automated Remote Support

access requires NSK security, but not a SUPER
1. Actively authorize each notification
group logon. Monitoring access to the TSM or
2. Automatically authorize reporting of all
OSM server is used for discovery and
IRs without user intervention
informational access as well as for non-sensitive
3. Choose, by IR type, which ones are to
actions. Discovery and information requests
be automatically reported and which
gather information from the server but do not
require pre-authorization
affect any of the resources on the system. In

addition, there are some actions that do not affect
The notification is over a PPP (Point-to-Point
resources on the system but provide useful
Protocol) connection. The GMCSC system
information or interaction with the system.
receiving the notifications is accessible only to

GMCSC personnel and is separated by a firewall
The non-sensitive actions are “CRU Responsive
from other HP networks.
Test” actions (known colloquially as “ping”

actions), the System Session Responsive Test,
B. TSM or OSM Components
and Notification Director Actions (“Get Pending
TSM or OSM is available only on NonStop™ S-
Incident Reports” and “Generate Periodic
Series and NS-Series servers and is an
Incident Report”).
integrated set of client/server applications

running in a LAN environment. The applications
Actions, other than those covered above, require
use various protocols and communications
a SUPER group NSK logon. This includes
methods depending upon the user access level.
powering on or powering off a disk, upping or

downing a disk, running a “Test Verify” on any

The TSM or OSM environment is made
resource, resetting a CPU, resetting an SP, etc.
up of four client applications:


The Service Connection Application
Controlling access to the server by providing
(SC)
usernames and passwords is entirely within the

The Low-Level Link Application (LLL)
purview of the system manager. By monitoring

The Notification Director Application
access, the manager can see all resources in a
(ND)
system, the state of those resources, information

about those resources (serial number, part

The EMS Event Viewer Application (EV)

number, tracking ID, revision level, firmware
revision, etc.). Using action access with a
C. The Service Connection Application
SUPER group logon, the manager can control
Security
and modify the resources of the system.
The TSM and OSM applications use TCP/IP for

monitoring and control and FTP (File Transfer
In the private service LAN environment, security
Protocol) for copying notification attachments
entails physical access to the NSC Console and
from the NonStop™ S-Series or NS-Series
allocation of NSK logons. Both of these aspects
server to the NSC Console. The TSM or OSM
are totally within the system manager’s control.
applications use NSK security for both of these

functions.
The Low-Level Link (LLL) runs on the NSC

Console workstation to provide service control of
1. Connection
the NSK server, either by the GMCSC or on-site
The user is presented with a “Connect” dialog
service provider staff. All service access from the
and log in, requiring a username and password.
client software to the NonStop™ S-Series server
The username and password must have
requires Service Processor (SP) security. The
previously been established with NSK on the
NS-Series server requires Maintenance Entity
NonStop™ S-Series or NS-Series server. The
(ME) security.
username and password are encoded and

passed along in application layer protocol
3. FTP
requests.
FTP is used to move attachments to Incident

Reports (IRs). IRs are handled by the Notification
2. Access
Director (ND). If an attachment list is contained in
The Service Connection (SC) application is client
a notification received by the NSC Console, the
software that runs on the NSC Console
files in that attachment list are copied to the NSC
workstation to provide operations control of the
Console. The user may then view the
NSK server. All operations access from the client
attachments, based on the type of the file. NSK
software to the NonStop™ S-Series or NS-Series
security is used for the FTP session.
server requires NSK security. This can be

categorized into two areas; general monitoring

access (including discovery of the server

components) and actions. General monitoring




Page 3 of 7


...


Напишите ваш отзыв об устройстве



Текст отзыва
Ваше имя:
Введите две цифры:
capcha





Категории