Contents
Chapter 1. Introduction . . . . . . . . . . . . . . . . . . . . . . 1
Remote Supervisor Adapter II features  | . .  | . .  | .  | .  | .  | 1  | 
Web browser and   | . .  | . .  | .  | .  | .  | 3  | 
Notices used in this book  | . .  | . .  | .  | .  | .  | 3  | 
Chapter 2. Opening and using the Web interface  | . .  | . .  | .  | .  | .  | 5  | 
Logging in to the Remote Supervisor Adapter II  | . .  | . .  | .  | .  | .  | 5  | 
Remote Supervisor Adapter II action descriptions  | . .  | . .  | .  | .  | .  | 8  | 
Chapter 3. Configuring the Remote Supervisor Adapter II .  | . .  | . . .  | .  | .  | 
  | 11  | 
Setting system information  | . .  | . . .  | .  | .  | 
  | 12  | 
Setting server timeouts . . . . . . . . . . . . . . . . . . . . . 13
Setting the date and time  | . .  | . . . .  | . .  | . .  | .  | .  | 16  | 
Synchronizing clocks in a network  | . .  | . . . .  | . .  | . .  | .  | .  | 17  | 
Disabling the USB device driver interface . .  | . .  | . . . .  | . .  | . .  | .  | .  | 18  | 
Creating a login profile  | . .  | . . . .  | . .  | . .  | .  | .  | 18  | 
Configuring the global login settings  | . .  | . . . .  | . .  | . .  | .  | .  | 20  | 
Configuring remote alert settings  | . .  | . . . .  | . .  | . .  | .  | .  | 22  | 
Configuring remote alert recipients  | . .  | . . . .  | . .  | . .  | .  | .  | 23  | 
Forwarding alerts . . . . . . . . . . . . . . . . . . . . . . . 25 Setting remote alert attempts. . . . . . . . . . . . . . . . . . . 26 Setting remote alerts . . . . . . . . . . . . . . . . . . . . . . 27 Setting local events . . . . . . . . . . . . . . . . . . . . . . 29 Configuring the serial connectors . . . . . . . . . . . . . . . . . . 30 Configuring the dual serial connectors for serial redirection. . . . . . . . . 33 
Configuring the   | .  | .  | 36  | 
Configuring port assignments  | .  | .  | 38  | 
Configuring network interfaces . . . . . . . . . . . . . . . . . . . 39
Configuring an Ethernet connection to the Remote Supervisor Adapter II  | 39  | 
Configuring PPP access over a serial connection  | . . 42  | 
Configuring network protocols . . . . . . . . . . . . . . . . . . . 43
Configuring SNMP  | .  | .  | 43  | 
Configuring SMTP. . . . . . . . . . . . . . . . . . . . . . . 45  | |||
Configuring LDAP . . . . . . . . . . . . . . . . . . . . . . . . 46  | |||
Setting up a client to use the LDAP server  | .  | .  | 46  | 
Configuring the LDAP client authentication  | .  | .  | 49  | 
Configuring the LDAP search attributes  | .  | .  | 49  | 
TCP Command Mode Protocol  | .  | .  | 52  | 
Service Location Protocol (SLP)  | .  | .  | 52  | 
Secure Web server and secure LDAP  | .  | .  | 53  | 
Configuring security  | .  | .  | 53  | 
SSL certificate overview  | .  | .  | 54  | 
SSL server certificate management  | .  | .  | 55  | 
Enabling SSL for the secure Web server  | .  | .  | 60  | 
SSL client certificate management  | .  | .  | 60  | 
SSL client trusted certificate management  | .  | .  | 61  | 
Enabling SSL for the LDAP client  | .  | .  | 62  | 
Configuring the Secure Shell server  | .  | .  | 62  | 
Generating a Secure Shell server key  | .  | .  | 63  | 
Enabling the Secure Shell server  | .  | .  | 63  | 
Using the Secure Shell server  | .  | .  | 64  | 
© Copyright IBM Corp. 2003, 2007  | iii  |