
Contents
Chapter 1. Introduction . . . . . . . . . . . . . . . . . . . . . . 1
Remote Supervisor Adapter II features | . . | . . | . | . | . | 1 |
Web browser and | . . | . . | . | . | . | 3 |
Notices used in this book | . . | . . | . | . | . | 3 |
Chapter 2. Opening and using the Web interface | . . | . . | . | . | . | 5 |
Logging in to the Remote Supervisor Adapter II | . . | . . | . | . | . | 5 |
Remote Supervisor Adapter II action descriptions | . . | . . | . | . | . | 8 |
Chapter 3. Configuring the Remote Supervisor Adapter II . | . . | . . . | . | . |
| 11 |
Setting system information | . . | . . . | . | . |
| 12 |
Setting server timeouts . . . . . . . . . . . . . . . . . . . . . 13
Setting the date and time | . . | . . . . | . . | . . | . | . | 16 |
Synchronizing clocks in a network | . . | . . . . | . . | . . | . | . | 17 |
Disabling the USB device driver interface . . | . . | . . . . | . . | . . | . | . | 18 |
Creating a login profile | . . | . . . . | . . | . . | . | . | 18 |
Configuring the global login settings | . . | . . . . | . . | . . | . | . | 20 |
Configuring remote alert settings | . . | . . . . | . . | . . | . | . | 22 |
Configuring remote alert recipients | . . | . . . . | . . | . . | . | . | 23 |
Forwarding alerts . . . . . . . . . . . . . . . . . . . . . . . 25 Setting remote alert attempts. . . . . . . . . . . . . . . . . . . 26 Setting remote alerts . . . . . . . . . . . . . . . . . . . . . . 27 Setting local events . . . . . . . . . . . . . . . . . . . . . . 29 Configuring the serial connectors . . . . . . . . . . . . . . . . . . 30 Configuring the dual serial connectors for serial redirection. . . . . . . . . 33
Configuring the | . | . | 36 |
Configuring port assignments | . | . | 38 |
Configuring network interfaces . . . . . . . . . . . . . . . . . . . 39
Configuring an Ethernet connection to the Remote Supervisor Adapter II | 39 |
Configuring PPP access over a serial connection | . . 42 |
Configuring network protocols . . . . . . . . . . . . . . . . . . . 43
Configuring SNMP | . | . | 43 |
Configuring SMTP. . . . . . . . . . . . . . . . . . . . . . . 45 | |||
Configuring LDAP . . . . . . . . . . . . . . . . . . . . . . . . 46 | |||
Setting up a client to use the LDAP server | . | . | 46 |
Configuring the LDAP client authentication | . | . | 49 |
Configuring the LDAP search attributes | . | . | 49 |
TCP Command Mode Protocol | . | . | 52 |
Service Location Protocol (SLP) | . | . | 52 |
Secure Web server and secure LDAP | . | . | 53 |
Configuring security | . | . | 53 |
SSL certificate overview | . | . | 54 |
SSL server certificate management | . | . | 55 |
Enabling SSL for the secure Web server | . | . | 60 |
SSL client certificate management | . | . | 60 |
SSL client trusted certificate management | . | . | 61 |
Enabling SSL for the LDAP client | . | . | 62 |
Configuring the Secure Shell server | . | . | 62 |
Generating a Secure Shell server key | . | . | 63 |
Enabling the Secure Shell server | . | . | 63 |
Using the Secure Shell server | . | . | 64 |
© Copyright IBM Corp. 2003, 2007 | iii |