JavaScript is required to for searching.
Skip Navigation Links
Exit Print View
Oracle Integrated Lights Out Manager (ILOM) 3.0 HTML Documentation Collection
search filter icon
search icon

Document Information

Using This Documentation

Related Documentation

Documentation Feedback

Product Downloads

Download Product Software and Firmware

Oracle ILOM 3.0 Firmware Version Numbering Scheme

Support and Accessibility

Feature Updates and Release Notes

Oracle ILOM 3.0 Feature Set

Oracle ILOM 3.0 Feature Set Overview

Updates to Oracle ILOM 3.0.3 Firmware

New Features for Oracle ILOM 3.0.3

Resolved Issues as of Oracle ILOM 3.0.3

Known Issues as of Oracle ILOM 3.0.3

Updates to Oracle ILOM 3.0.4 Firmware

New Features for Oracle ILOM 3.0.4

Resolved Issues as of Oracle ILOM 3.0.4

Known Issues as of Oracle ILOM 3.0.4

Updates to Oracle ILOM 3.0.6 Firmware

New Features for Oracle ILOM 3.0.6

Resolved Issues as of Oracle ILOM 3.0.6

Known Issues as of Oracle ILOM 3.0.6

Updates to Oracle ILOM 3.0.8 Firmware

New Features for Oracle ILOM 3.0.8

Resolved Issues as of Oracle ILOM 3.0.8

Known Issues as of Oracle ILOM 3.0.8

Updates to Oracle ILOM 3.0.9 Firmware

New Features for Oracle ILOM 3.0.9

Resolved Issue as of Oracle ILOM 3.0.9

Known Issues as of Oracle ILOM 3.0.9

Updates to Oracle ILOM 3.0.10 Firmware

New Features for Oracle ILOM 3.0.10

Resolved Issues as of Oracle ILOM 3.0.10

Known Issues as of Oracle ILOM 3.0.10

Updates to Oracle ILOM 3.0.12 and Oracle ILOM 3.0.14 Firmware

New Features for Oracle ILOM 3.0.12 and Oracle ILOM 3.0.14

Resolved Issues as of Oracle ILOM 3.0.14

Known Issue as of Oracle ILOM 3.0.12

Updates to Oracle ILOM 3.0.16 Firmware

Resolved Issues as of ILOM 3.0.16

Documentation Known Issue

Known Issues as of Oracle ILOM 3.0.16

Enhancements to Oracle ILOM Documentation Library

Quick Start

Oracle ILOM 3.0 – Quick Start

Factory Default Settings

Mandatory Setup Tasks

Optional Setup Tasks

Daily Management Tasks

Routine Maintenance Tasks

Initial Setup FAQs

Remote Redirection Consoles

Oracle ILOM Web and CLI Remote Redirection Options

Oracle ILOM Remote Console

Oracle ILOM Storage Redirection CLI

Starting and Stopping a Host Console

Understanding Oracle ILOM Remote Console Features

International Keyboard Support

Single or Multiple Management Views

Network Communication Ports and Protocols

Authentication

Secure Remote Console

Setting Up the Oracle ILOM Remote Console for First-Time Use

Initial Setup Requirements (Oracle ILOM Remote Console)

Configure KVMS Redirection Settings

Registering 32-bit JDK

Securing the Oracle ILOM Remote Console

Launching and Redirecting KVMS Devices Using the Oracle ILOM Remote Console

Usage Requirements (Oracle ILOM Remote Console)

International Keyboard Support

Launch the Oracle ILOM Remote Console

Start, Stop, or Restart Device Redirection

Toggle Keyboard and Mouse Control

Control Keyboard Modes and Key Send Options

Redirect Keyboard Input (Serial Redirection Only)

Redirect Mouse Input (Video Redirection Only)

Redirect Storage Media

Add New Server Redirection Session

Exit the Oracle ILOM Remote Console

Understanding Oracle ILOM Storage Redirection CLI Features

First-Time Use (Oracle ILOM Storage Redirection CLI)

Storage Redirection CLI Architecture

Default Network Communication Port

Setting Up Oracle ILOM Storage Redirection CLI for First Time Use

Initial Setup Requirements (Oracle ILOM Storage Redirection CLI)

Change the Default Storage Redirection Network Port: 2121

Starting the Storage Redirection Service

Download and Install the Storage Redirection Client

Redirecting a Storage Device Using the Oracle ILOM Storage Redirection CLI

Usage Requirements (Storage Redirection CLI)

Launch the Storage Redirection CLI Using a Command Window or Terminal

Verify That the Storage Redirection Service Is Running

Display Storage Redirection CLI Help Information

Start Redirection of Storage Device

View Active Storage Redirections

Stop Redirection of Storage Device

Supported Storage Redirection Commands and Options

Daily Management Concepts

Oracle ILOM Overview

What Is Oracle ILOM?

What Does Oracle ILOM Do?

Oracle ILOM Features and Functionality

New Features in Oracle ILOM 3.0

User Accounts – Backward Compatibly

Preconfigured User Accounts

Oracle ILOM Supported Interfaces

Oracle ILOM on the Server SP and CMM

System Banner Messages

Network Configurations

Oracle ILOM Network Management

Switch Serial Port Console Output (Serial Port Owner)

Oracle ILOM Communication Settings

SP Management Port – Recommended Practice for Spanning Tree Parameters

Network Configurations for IPv4

Dual-Stack Network Configurations for IPv4 and IPv6 (ILOM 3.0.12)

Local Interconnect Interface: Local Connection to ILOM From Host OS

User Account Management

Guidelines for Managing User Accounts

User Account Roles and Privileges

Single Sign On

SSH User Key-Based Authentication

Active Directory

Lightweight Directory Access Protocol



System Monitoring and Alert Management

System Monitoring

Alert Management

Storage Monitoring and Zone Management

Storage Monitoring for HDDs and RAID Controllers

CMM Zone Management Feature

Power Monitoring and Management of Hardware Interfaces

Summary of Power Management Feature Updates

Power Monitoring Terminology

Real-Time Power Monitoring and Management Features

Remote Host Management Operations

Remote Power Control

Host Control - Boot Device on x86 Systems

Oracle ILOM Operations for LDom Configurations on SPARC Servers

Remote Redirection Console Options

Oracle ILOM Host Maintenance and Diagnostics Options

Host Maintenance Operations

Host Diagnostic Options

Example Setup of Dynamic DNS

Dynamic DNS Overview

Example Dynamic DNS Configuration

Daily Management CLI Procedures

CLI Overview

Oracle ILOM CLI — DMTF Server Management Command-Line Protocol User-Interface

Oracle ILOM CLI Connection

Oracle ILOM CLI Management Namespace

Entering CLI Command Syntax and Executing Commands

Common CLI Commands

Oracle ILOM 3.0 Properties Versus Oracle ILOM 2.x Properties

Logging In to ILOM, Displaying Banner Messages, and Setting the CLI Session Time-out

Logging In and Out of ILOM and Recovering a Password

Setting Up Banner Messages and CLI Session Time-Out

Configuring Network, Secure Shell, and Local Interconnect Settings

Configuring Network Settings (CLI)

Configuring Secure Shell Settings (CLI)

Configuring the Local Interconnect Interface (CLI)

Managing User Accounts (CLI)

Configuring User Accounts (CLI)

Configuring SSH User Keys (CLI)

Configuring Active Directory (CLI)

Configuring Lightweight Directory Access Protocol (LDAP) (CLI)

Configuring LDAP/SSL (CLI)

Configuring RADIUS (CLI)

Managing Component Status and Service Actions (CLI)

View Component Information (CLI)

Prepare to Remove a Component (CLI)

Return a Component to Service (CLI)

Enable and Disable Component State (CLI)

View and Clear Faults (CLI)

Monitoring System Sensors and Managing Event Log Entries and Clock Settings (CLI)

Monitoring System Sensors, Indicators, Event Logs (CLI)

View and Manage SP Console Log Output (CLI)

Monitoring Storage Components and Zone Manager

Monitor Storage Component Details on x86 Servers (CLI)

Accessing Sun Blade Zone Manager Functions

Managing System Alerts (CLI)

Managing Alert Rule Configurations (CLI)

CLI Commands: Alert Rules

Configure the SMTP Client (CLI)

Redirecting Storage Media and Locking the Oracle ILOM Remote Console Display

Redirect Storage Media (CLI)

Manage Oracle ILOM Remote Console Lock Options (CLI)

Power Monitoring and Managing of Hardware Interfaces

Summary of Power Management Feature Updates (CLI)

Monitoring System Power Consumption (CLI)

Configuring the Power Policy and Notification Threshold Values (CLI)

Monitoring Component Power Allocation Distributions (CLI)

Configuring Power Limit Properties (CLI)

Manage CMM Power Supply Redundancy Properties (CLI)

Managing Remote Host Power States, BIOS Boot Device, and Host Server Console

Issuing Remote Power State Commands From Server SP CLI or CMM CLI

Configure BIOS Host Boot Device Override (CLI)

Managing the SP Host Console

bootManaging TPM and LDom States on SPARC Servers (CLI)

Control TPM State on a SPARC Server (CLI)

Managing LDom Configurations on SPARC Servers (CLI)

CLI Command Reference

cd Command

create Command

delete Command

dump Command

exit Command

help Command

load Command

reset Command

set Command

show Command

start Command

stop Command

version Command

Diagnosing IPv4 or IPv6 Oracle ILOM Connection Issues

Diagnosing Oracle ILOM Connection Issues

Manual Host OS Configuration Guidelines for Local Interconnect Interface

Configuring Internal USB Ethernet Device on Host OS

Daily Management Web Procedures

Web Interface Overview

About the Web Interface

Browser and Software Requirements

CMM and Server SP Web Interface Connection

Web Interface Navigation Tabs

Logging In to and Out of Oracle ILOM and Displaying Banner Messages (Web)

Before Your Initial Login

Log In Using the Root User Account (Web)

Log In to Oracle ILOM With User Account (Web)

Log Out of Oracle ILOM (Web)

Display Banner Messages on Login Page (Web)

Configuring Network, Secure Shell, and Local Interconnect Settings (Web)

Configuring Network Settings (Web)

Configuring Secure Shell Settings

Configuring the Local Interconnect Interface (Web)

Managing User Accounts (Web)

Configuring User Accounts (Web)

Configuring SSH Keys (Web)

Configuring Active Directory (Web)

Configuring Lightweight Directory Access Protocol (LDAP)

Configuring LDAP/SSL Settings (Web)

Configuring RADIUS (Web)

Managing Component Status and Service Actions (Web)

View Component Status Information (Web)

Prepare to Remove a Component (Web)

Return a Component to Service (Web)

Enable or Disable Components (Web)

Clear Faults Detected by Oracle ILOM (Web)

Monitoring System Sensors and Managing the Event Log (Web)

View Sensor Readings (Web)

Configure System Indicators (Web)

Configure Clock Settings (Web)

Configure Time Zone Settings (Web)

Filter Event Log Output (Web)

View and Clear Oracle ILOM Event Log (Web)

Configure Remote Syslog Receiver IP Addresses (Web)

Monitoring Storage Components and Zone Manager (Web)

Requirements for Monitoring Storage Components

View and Monitor RAID Controller Details (Web)

View and Monitor Details for Disks That Are Attached to RAID Controllers (Web)

View and Monitor RAID Controller Volume Details (Web)

Enabling or Disabling Zone Manager for SAS-2 Storage Devices

Managing System Alerts and Email Notifications (Web)

Managing Alert Rule Configurations (Web)

Configuring SMTP Client for Email Notification Alerts (Web)

Power Monitoring and Management of Hardware Interfaces (Web)

Summary of Power Management Feature Updates (Web)

Monitoring System Power Consumption (Web)

Configuring Power Policy Settings to Manage Server Power Usage (Web)

Configuring Power Consumption Threshold Notifications (Web)

Monitoring and Configuring Component Power Allocation Distributions (Web)

Configuring Server Power Limit Properties (Web)

Monitoring or Configuring CMM Power Supply Redundancy (Web)

Managing Remote Hosts Redirection and Securing the Oracle ILOM Remote Console (Web)

Web Procedures for Redirecting Remote Host KVMS

Managing Remote Hosts Power States (Web)

Controlling Power States From Remote Server SP or CMM (Web)

Managing Host Control of Boot Device on x86 Systems (Web)

Managing TPM and LDom States on SPARC Servers (Web)

Controlling the TPM State on SPARC Servers (Web)

Managing LDom Configurations on SPARC Servers (Web)

Diagnosing IPv4 or IPv6 Oracle ILOM Connection Issues

Diagnosing Oracle ILOM Connection Issues

Manual Host OS Configuration Guidelines for Local Interconnect Interface

Configuring Internal USB Ethernet Device on Host OS

Maintenance and Diagnostics CLI and Web Procedures

Maintenance Operations Overview

Firmware Updates Using Oracle ILOM

Service Processor (SP) Reset

Back Up, Restore, and Reset Oracle ILOM Configurations

Updating Firmware

Updating Firmware Using Oracle ILOM (Web)

Updating Firmware Using Oracle ILOM (CLI)

Resetting the Service Processor Using Oracle ILOM

Reset the SP Using the Oracle ILOM Web Interface

Reset the SP Using the Oracle ILOM CLI

Backing Up, Restoring, or Resetting Oracle ILOM Configurations

Backing Up Configurations

Optionally Edit the Backup XML File

Restoring Configurations

Resetting Oracle ILOM Configuration Settings to the Defaults

Diagnostic Tools Overview

Server SP Diagnostic Tools

Oracle Service-Designated Diagnostic Tools

x86 Server SP Diagnostic Tools

Diagnosing x86 Systems Hardware Issues (Web)

Diagnosing x86 Systems Hardware Issues (CLI)

SPARC Server SP Diagnostic Tools

Diagnosing SPARC Systems Hardware Issues (Web)

Diagnosing SPARC Systems Hardware Issues (CLI)

Oracle Services-Designated Diagnosic Tools

Collecting SP Data to Diagnose System Problems

Using the Oracle ILOM Fault Management Shell

Protocol Management CLI and Web Procedures

SNMP Overview

About Simple Network Management Protocol

SNMP Components


Configuring SNMP Settings in Oracle ILOM

Managing SNMP Read and Write Access, User Accounts, and SNMP Trap Alerts (CLI)

Managing SNMP Read and Write Access, User Accounts, and SNMP Trap Alerts (Web)

Downloading SNMP MIBs Using Oracle ILOM

Manage User Accounts Using SNMP

Before You Begin - User Accounts (SNMP)

Configuring User Accounts (SNMP)

Configuring Active Directory Settings

Manage DNS Name Server Settings (SNMP)

Configuring ILOM for LDAP (SNMP)

Configuring ILOM for LDAP/SSL

Configuring RADIUS Settings (SNMP)

Manage Component Information and Email Alerts (SNMP)

Before You Begin - Component Information (SNMP)

Viewing Component Information

Managing Clock Settings, Event Log, Syslog Receiver, and Alert Rules

Configuring SMTP Client for Email Alert Notifications

Configuring Email Alert Settings (SNMP)

Configuring Telemetry Harness Daemon (SNMP)

Monitor and Manage System Power (SNMP)

Before You Begin - Power Management (SNMP)

Monitoring the Power Consumption Interfaces (SNMP)

Maintaining System Power Policy (SNMP)

Managing System Power Properties (SNMP)

Manage Oracle ILOM Firmware Updates (SNMP)

Update Oracle ILOM Firmware (SNMP)

Manage ILOM Backup and Restore Configurations (SNMP)

View and Configure Backup and Restore Properties (SNMP)

Manage SPARC Diagnostics, POST, and Boot Mode Operations (SNMP)

Before You Begin - Manage SPARC Hosts (SNMP)

Managing SPARC Diagnostic, POST, and Boot Mode Properties (SNMP)

Server Managment Using IPMI

Intelligent Platform Management Interface (IPMI)

Configuring the IPMI State

Using IPMItool to Run ILOM CLI Commands

Performing System Management Tasks (IPMItool)

IPMItool Utility and Command Summary

Server Management Using WS-Management and CIM

WS-Management and CIM Overview

Configuring Support for WS-Management in ILOM

Supported DMTF SMASH Profiles, CIM Classes and CIM Indications

Oracle's Sun-Supported CIM Classes

Document Conventions For Oracle's Sun-Supported CIM Classes


































SNMP Command Examples

snmpget Command

snmpwalk Command

snmpbulkwalk Command

snmptable Command

snmpset Command

snmptrapd Command

CMM Administration CLI and Web Procedures

Oracle ILOM CMM Overview

About the Modular System Chassis

Oracle ILOM CMM Function Overview

Oracle ILOM Versions

Oracle ILOM CMM Documentation

About This Document

Oracle ILOM CMM Initial Setup

Connecting to the Oracle ILOM CMM

Log In to the Oracle ILOM CMM Using a Network Connection

Activating CMM Ethernet Ports

Changing the Blade SP CLI Prompt

Firmware Update Procedures

Updating the Oracle ILOM CMM Firmware

Updating the NEM Firmware

Updating Chassis Component Firmware Using the CMM

Resetting the Oracle ILOM CMM

CMM Power Management

Light Load Efficiency Mode (LLEM)

Force Power Supply Fan Speed

Disabling the Power Management Policy

Oracle ILOM 3.0 for Specific Sun Blade 6048 Cases

SAS Zoning Chassis Blade Storage Resources

Zone Management for Chassis-Level SAS-2 Capable Resources

Manageable SAS-2 Zoning-Capable Devices

Sun Blade Zone Manager Properties

Important SAS Zoning Allocations Considerations

Enabling Zoning and Creating SAS-2 Zoning Assignments

Managing Existing SAS-2 Storage Resource Allocations

Resetting Sun Blade Zone Manager Allocations to Factory Defaults

Resetting the Zoning Password to Factory Default for Third-Party In-Band Management





access control list (ACL)

A software authorization mechanism that enables you to control which users have access to a server. Users can define ACL rules that are specific to a particular file or directory, granting or denying access to one or more users or groups.

Active Directory

A distributed directory service included with Microsoft Windows Server operating systems. It provides both authentication of user credentials and authorization of user access levels to networked resources.

actual power

The amount of power consumed by all power supplies in the system.


In networking, a unique code that identifies a node in the network. Names such as “” are translated to dotted-quad addresses, such as “” by the Domain Name Service (DNS).

address resolution

A means for mapping Internet addresses into physical media access control (MAC) addresses or domain addresses.

Address Resolution Protocol (ARP)

A protocol used to associate an Internet Protocol (IP) address with a network hardware address (MAC address).


The person with full access (root) privileges to the managed host system.


A software process, usually corresponding to a particular local managed host, that carries out manager requests and makes local system and application information available to remote users.


A message or log generated by the collection and analysis of error events. An alert indicates that there is a need to perform some hardware or software corrective action.

Alert Standard Format (ASF)

A preboot or out-of-band platform management specification that enables a device, such as an intelligent Ethernet controller, to autonomously scan ASF-compliant sensors on the motherboard for voltage, temperature, or other excursions and to send Remote Management and Control Protocol (RMCP) alerts according to the Platform Event Trap (PET) specification. ASF was intended primarily for out-of-band management functions for client desktops. ASF is defined by the Distributed Management Task Force (DMTF).

authenticated user

A user that has successfully undergone the process of authentication and has subsequently been granted access privileges to particular system resources.


The process that verifies the identity of a user in a communication session, or a device or other entity in a computer system, before that user, device, or other entity can access system resources. Session authentication can work in two directions. A server authenticates a client to make access-control decisions. The client can authenticate the server as well. With Secure Sockets Layer (SSL), the client always authenticates the server.


The process of granting specific access privileges to a user. Authorization is based on authentication and access control.

available power

On a rackmounted server, available power is the sum of all the power that the power supplies can provide. On a server module, available power is the amount of power the chassis is willing to provide to the server module.



A measure of the volume of information that can be transmitted over a communication link. Often used to describe the number of bits per second a network can deliver.

baseboard management controller (BMC)

A device used to manage chassis environmental, configuration, and service functions, and receive event data from other parts of the system. It receives data through sensor interfaces and interprets this data by using the sensor data record (SDR) to which it provides an interface. The BMC provides another interface to the system event log (SEL). Typical functions of the BMC are to measure processor temperature, power supply values, and cooling fan status. The BMC can take autonomous action to preserve system integrity.

baud rate

The rate at which information is transmitted between devices, for example, between a terminal and a server.


In the Lightweight Directory Access Protocol (LDAP), this refers to the authentication process that LDAP requires when users access the LDAP directory. Authentication occurs when the LDAP client binds to the LDAP server.

BIOS (Basic Input/Output System)

System software that controls the loading of the operating system and testing of hardware at system power on. BIOS is stored in read-only memory (ROM).

bits per second (bps)

The unit of measurement for data transmission speed.

boot loader

A program contained in read-only memory (ROM) that automatically runs at system power-on to control the first stage of system initialization and hardware tests. The boot loader then transfers control to a more complex program that loads the operating system.



A copy of original data that is stored locally, often with instructions or the most frequently accessed information. Cached data does not have to be retrieved from a remote server again when requested. A cache increases effective memory transfer rates and processor speed.


Public key data assigned by a trusted Certificate Authority (CA) to provide verification of an entity's identity. This is a digitally signed document. Both clients and servers can have certificates. Also called a “public key certificate.”

Certificate Authority (CA)

A trusted organization that issues public key certificates and provides identification to the owner of the certificate. A public key Certificate Authority issues certificates that state a relationship between an entity named in the certificate, and a public key that belongs to that entity, which is also present in the certificate.

chassis monitoring module (CMM)

A typically redundant, hot-pluggable module that works with the service processor (SP) on each blade to form a complete chassis management system.


In the client/server model, a system or software on a network that remotely accesses resources of a server on a network.

command-line interface (CLI)

A text-based interface that enables users to type executable instructions at a command prompt.


A terminal, or dedicated window on a screen, where system messages are displayed. The console window enables you to configure, monitor, maintain, and troubleshoot many server software components.

Coordinated Universal Time (UTC)

The international standard for time. UTC was formerly called Greenwich Meridian Time (GMT). UTC is used by Network Time Protocol (NTP) servers to synchronize systems and devices on a network.

core file

A file created by the Solaris or Linux operating system when a program malfunctions and terminates. The core file holds a snapshot of memory, taken at the time the fault occurred. Also called a “crash dump file.”

critical event

A system event that seriously impairs service and requires immediate attention.

customer-replaceable unit (CRU)

A system component that the user can replace without special training or tools.


Data Encryption Standard (DES)

A common algorithm for encrypting and decrypting data.

Desktop Management Interface (DMI)

A specification that sets standards for accessing technical support information about computer hardware and software. DMI is hardware and operating system (OS) independent, and can manage workstations, servers, or other computing systems. DMI is defined by the Distributed Management Task Force (DMTF).

digital signature

A certification of the source of digital data. A digital signature is a number derived from a public key cryptographic process. If the data is modified after the signature was created, the signature becomes invalid. For this reason, a digital signature can ensure data integrity and detection of data modification.

Digital Signature Algorithm (DSA)

A cryptographic algorithm specified by the Digital Signature Standard (DSS). DSA is a standard algorithm used to create digital signatures.

direct memory access (DMA)

The transfer of data directly into memory without supervision of the processor.

directory server

In the Lightweight Directory Access Protocol (LDAP), a server which stores and provides information about people and resources within an organization from a logically centralized location.

Distinguished Name (DN)

In the Lightweight Directory Access Protocol (LDAP), a unique text string that identifies an entry's name and location within the directory. A DN can be a fully qualified domain name (FQDN) that includes the complete path from the root of the tree.

Distributed Management Task Force (DMTF)

A consortium of over 200 companies that authors and promotes standards for the purpose of furthering the ability to remotely manage computer systems. Specifications from the DTMF include the Desktop Management Interface (DMI), the Common Information Model (CIM), and the Alert Standard Format (ASF).


A grouping of hosts that is identified by a name. The hosts usually belong to the same Internet Protocol (IP) network address. The domain also refers to the last part of a fully qualified domain name (FQDN) that identifies the company or organization that owns the domain. For example, “” identifies Oracle Corporation as the owner of the domain.

domain name

The unique name assigned to a system or group of systems on the Internet. The host names of all the systems in the group have the same domain name suffix, such as “” Domain names are interpreted from right to left. For example, “” is both the domain name of Oracle Corporation, and a subdomain of the top-level “.com” domain.

Domain Name Server (DNS)

The server that typically manages host names in a domain. DNS servers translate host names, such as “,” into Internet Protocol (IP) addresses, such as “”

Domain Name System (DNS)

A distributed name resolution system that enables computers to locate other computers on a network or the Internet by domain name. The system associates standard Internet Protocol (IP) addresses, such as “,” with host names, such as “” Machines typically get this information from a DNS server.

Dynamic Domain Name Service (DDNS)

A service that ensures that a Domain Name Server (DNS) always knows the dynamic or static IP address associated with a domain name.

Dynamic Host Configuration Protocol (DHCP)

A protocol that enables a DHCP server to assign Internet Protocol (IP) addresses dynamically to systems on a Transmission Control Protocol/Internet Protocol (TCP/IP) network.


enhanced parallel port (EPP)

A hardware and software standard that enables systems to transmit data at twice the speed of standard parallel ports.


An industry-standard type of local area network (LAN) that enables real-time communication between systems connected directly through cables. Ethernet uses a Carrier Sense Multiple Access/Collision Detection (CSMA/CD) algorithm as its access method, wherein all nodes listen for, and any node can begin transmitting data. If multiple nodes attempt to transmit at the same time (a collision), the transmitting nodes wait for a random time before attempting to transmit again.


A change in the state of a managed object. The event-handling subsystem can provide a notification to which a software system must respond when it occurs, but which the software did not solicit or control.

external serial port

The RJ-45 serial port on the server.

externally initiated reset (XIR)

A signal that sends a “soft” reset to the processor in a domain. XIR does not reboot the domain. An XIR is generally used to escape from a hung system in order to reach the console prompt. A user can then generate a core dump file, which can be useful in diagnosing the cause of the hung system.



The automatic transfer of a computer service from one system, or more often a subsystem, to another to provide redundant capability.

Fast Ethernet

Ethernet technology that transfers data up to 100M bits per second. Fast Ethernet is backward-compatible with 10M-bit per second Ethernet installations.

Fault Management Architecture (FMA)

An architecture that ensures a computer can continue to function despite a hardware or software failure.

field-replaceable unit (FRU)

A system component that is replaceable at the customer site.

file system

A consistent method by which information is organized and stored on physical media. Different operating systems typically have different file systems. File systems are often a tree-structured network of files and directories, with a root directory at the top and parent and child directories below root.

File Transfer Protocol (FTP)

A basic Internet protocol based on Transmission Control Protocol/Internet Protocol (TCP/IP) that enables the retrieving and storing of files between systems on the Internet without regard for the operating systems or architectures of the systems involved in the file transfer.


A network configuration, usually both hardware and software, that protects networked computers within an organization from outside access. A firewall can monitor or prohibit connections to and from specified services or hosts.


Software that is typically used to help with the initial booting stage of a system and with system management. Firmware is embedded in read-only memory (ROM) or programmable ROM (PROM).

fully qualified domain name (FQDN)

The complete and unique Internet name of a system, such as “” The FQDN includes a host server name (www) and its top-level (.com) and second-level (.oracle) domain names. An FQDN can be mapped to a system's Internet Protocol (IP) address.



A computer or program that interconnects two networks and then passes data packets between the networks. A gateway has more than one network interface.

Gigabit Ethernet

Ethernet technology that transfers data up to 1000M bits per second.

graphical user interface (GUI)

An interface that uses graphics, along with a keyboard and mouse, to provide easy-to-use access to an application.



A system, such as a backend server, with an assigned Internet Protocol (IP) address and host name. The host is accessed by other remote systems on the network.

host ID

Part of the 32-bit Internet Protocol (IP) address used to identify a host on a network.

host name

The name of a particular machine within a domain. Host names always map to a specific Internet Protocol (IP) address.


Describes a component that is safe to remove or add while the system is running. However, before removing the component, the system administrator must prepare the system for the hot-plug operation. After the new component is inserted, the system administrator must instruct the system to reconfigure the device into the system.


Describes a component that can be installed or removed by simply pulling the component out and putting a new component into a running system. The system either automatically recognizes the component change and configures it or requires user interaction to configure the system. However, in neither case is a reboot required. All hot-swappable components are hot pluggable, but not all hot-pluggable components are hot-swappable.

Hypertext Transfer Protocol (HTTP)

The Internet protocol that retrieves hypertext objects from remote hosts. HTTP messages consist of requests from client to server and responses from server to client. HTTP is based on Transmission Control Protocol/Internet Protocol (TCP/IP).

Hypertext Transfer Protocol Secure (HTTPS)

An extension of HTTP that uses Secure Sockets Layer (SSL) to enable secure transmissions over a Transmission Control Protocol/Internet Protocol (TCP/IP) network.


in-band system management

Server management capability that is enabled only when the operating system is initialized and the server is functioning properly.

Integrated Lights Out Manager (ILOM)

An integrated hardware, firmware, and software solution for in-chassis or in-blade system management.

Intelligent Platform Management Interface (IPMI)

A hardware-level interface specification that was designed primarily for out-of-band management of server systems over a number of different physical interconnects. The IPMI specification describes extensive abstractions regarding sensors. This enables a management application running on the operating system (OS) or in a remote system to comprehend the environmental makeup of the system and to register with the system's IPMI subsystem to receive events. IPMI is compatible with management software from heterogeneous vendors. IPMI functionality includes Field Replacable Unit (FRU) inventory reporting, system monitoring, logging, system recovery (including local and remote system resets and power on and off capabilities), and alerting.

internal serial port

The connection between the host server and Oracle ILOM that enables an Oracle ILOM user to access the host serial console. The Oracle ILOM internal serial port speed must match the speed of the serial console port on the host server, often referred to as serial port 0, COM1, or /dev/ttyS0. Normally, the host serial console settings match Oracle ILOM's default settings (9600 baud, 8N1 [eight data bits, no parity, one stop bit], no flow control).

Internet Control Message Protocol (ICMP)

An extension to the Internet Protocol (IP) that provides for routing, reliability, flow control, and sequencing of data. ICMP specifies error and control messages used with the IP.

Internet Protocol (IP)

The basic network layer protocol of the Internet. IP enables the unreliable delivery of individual packets from one host to another. IP does not guarantee that the packet will be delivered, how long it will take, or if multiple packets will be delivered in the order they were sent. Protocols layered on top of IP add connection reliability.

Internet Protocol (IP) address

In Transmission Control Protocol/Internet Protocol (TCP/IP), a unique 32-bit number that identifies each host or other hardware system on a network. The IP address is a set of numbers separated by dots, such as “,” which specifies the actual location of a machine on an intranet or the Internet.


A utility used to manage IPMI-enabled devices. IPMItool can manage IPMI functions of either the local system or a remote system. Functions include managing field-replaceable unit (FRU) information, local area network (LAN) configurations, sensor readings, and remote system power control.


Java Remote Console

A console written in Java that allows a user to access an application while it is running.

Java(TM) Web Start application

A web application launcher. With Java Web Start, applications are launched by clicking on the web link. If the application is not present on your system, Java Web Start downloads it and caches it onto your system. Once an application is downloaded to its cache, it can be launched from a desktop icon or browser



The core of the operating system (OS) that manages the hardware and provides fundamental services, such as filing and resource allocation, that the hardware does not provide.

Keyboard Controller Style (KCS) interface

A type of interface implemented in legacy personal computer (PC) keyboard controllers. Data is transferred across the KCS interface using a per-byte handshake.

keyboard, video, mouse, storage (KVMS)

A series of interfaces that enables a system to respond to keyboard, video, mouse, and storage events.


lights out management (LOM)

Technology that provides the capability for out-of-band communication with the server even if the operating system is not running. This enables the system administrator to switch the server on and off; view system temperatures, fan speeds, and so forth; and restart the system from a remote location.

Lightweight Directory Access Protocol (LDAP)

A directory service protocol used for the storage, retrieval, and distribution of information, including user profiles, distribution lists, and configuration data. LDAP runs over Transmission Control Protocol/Internet Protocol (TCP/IP) and across multiple platforms.

Lightweight Directory Access Protocol (LDAP) server

A software server that maintains an LDAP directory and service queries to the directory. The Oracle Sun Directory Services and the Netscape Directory Services are implementations of an LDAP server.

local area network (LAN)

A group of systems in close proximity that can communicate via connecting hardware and software. Ethernet is the most widely used LAN technology.

local host

The processor or system on which a software application is running.


major event

A system event that impairs service, but not seriously.

man pages

Online UNIX documentation.

Management Information Base (MIB)

A tree-like, hierarchical system for classifying information about resources in a network. The MIB defines the variables that the master Simple Network Management Protocol (SNMP) agent can access. The MIB provides access to the server's network configuration, status, and statistics. Using SNMP, you can view this information from a network management station (NMS). By industry agreement, individual developers are assigned portions of the tree structure to which they may attach descriptions that are specific to their own devices.

media access control (MAC) address

Worldwide unique, 48-bit, hardware address number that is programmed in to each local area network interface card (NIC) at the time of manufacture.

Message Digest 5 (MD5)

A secure hashing function that converts an arbitrarily long data string into a short digest of data that is unique and of fixed size.

minor event

A system event that does not currently impair service, but which needs correction before it becomes more severe.



In the tree structure of a Lightweight Directory Access Protocol (LDAP) directory, a set of unique names from which an object name is derived and understood. For example, files are named within the file namespace and printers are named within the printer namespace.

Network File System (NFS)

A protocol that enables disparate hardware configurations to function together transparently.

Network Information Service (NIS)

A system of programs and data files that UNIX systems use to collect, collate, and share specific information about machines, users, file systems, and network parameters throughout a network of computer systems.

network interface card (NIC)

An internal circuit board or card that connects a workstation or server to a networked device.

network management station (NMS)

A powerful workstation with one or more network management applications installed. The NMS is used to remotely manage a network.

network mask

A number used by software to separate the local subnet address from the rest of a given Internet Protocol (IP) address.

Network Time Protocol (NTP)

An Internet standard for Transmission Control Protocol/Internet Protocol (TCP/IP) networks. NTP synchronizes the clock times of networked devices with NTP servers to the millisecond using Coordinated Universal Time (UTC).


An addressable point or device on a network. A node can connect a computing system, a terminal, or various peripheral devices to the network.

nonvolatile memory

A type of memory that ensures that data is not lost when system power is off.


object identifier (OID)

A number that identifies an object's position in a global object registration tree. Each node of the tree is assigned a number, so that an OID is a sequence of numbers. In Internet usage the OID numbers are delimited by dots, for example, “” In the Lightweight Directory Access Protocol (LDAP), OIDs are used to uniquely identify schema elements, including object classes and attribute types.

OpenBoot(TM) PROM

A layer of software that takes control of an initialized system after the power-on self-test (POST) successfully tests components. OpenBoot PROM builds data structures in memory and boots the operating system.


An operating system-independent, event-driven library for simplifying access to the Intelligent Platform Management Interface (IPMI).


A user with limited privileges to the managed host system.

out-of-band (OOB) system management

Server management capability that is enabled when the operating system network drivers or the server are not functioning properly.



A method used by a computer for checking that data received matches data sent. Also refers to information stored with data on a disk that enables the controller to rebuild data after a drive failure.


An application made by Eurosoft (UK) Ltd. that runs diagnostic tests on computer hardware.


A set of privileges granted or denied to a user or group that specify read, write, or execution access to a file or directory. For access control, permissions state whether access to the directory information is granted or denied, and the level of access that is granted or denied.

permitted power

The maximum power that the server will permit to be used at any given time.

physical address

An actual hardware address that matches a memory location. Programs that refer to virtual addresses are subsequently mapped to physical addresses.

Platform Event Filtering (PEF)

A mechanism that configures the service processor to take selected actions when it receives event messages, for example, powering off or resetting the system or triggering an alert.

Platform Event Trap (PET)

A configured alert triggered by a hardware or firmware (BIOS) event. A PET is an Intelligent Platform Management Interface (IPMI)-specific, Simple Network Management Protocol (SNMP) trap, which operates independently of the operating system.


The location (socket) to which Transmission Control Protocol/Internet Protocol (TCP/IP) connections are made. Web servers traditionally use port 80, the File Transfer Protocol (FTP) uses port 21, and Telnet uses port 23. A port enables a client program to specify a particular server program in a computer on a network. When a server program is started initially, it binds to its designated port number. Any client that wants to use that server must send a request to bind to the designated port number.

port number

A number that specifies an individual Transmission Control Protocol/Internet Protocol (TCP/IP) application on a host machine, providing a destination for transmitted data.

power cycling

The process of turning the power to a system off then on again.

Power Monitoring interface

An interface that enables a user to monitor real-time power consumption, including available power, actual power, and permitted power, for the service processor (SP) or an individual power supply with accuracy to within one minute of the time the power usage occurred.

power-on self-test (POST)

A program that takes uninitialized system hardware and probes and tests its components at system startup. POST configures useful components into a coherent, initialized system and hands it over to the OpenBoot PROM. POST passes to OpenBoot PROM a list of only those components that have been successfully tested.

Preboot Execution Environment (PXE)

An industry-standard client/server interface that enables a server to boot an operating system (OS) over a Transmission Control Protocol/Internet Protocol (TCP/IP) network using Dynamic Host Configuration Protocol (DHCP). The PXE specification describes how the network adapter card and BIOS work together to provide basic networking capabilities for the primary bootstrap program, enabling it to perform a secondary bootstrap over the network, such as a TFTP load of an OS image. Thus, the primary bootstrap program, if coded to PXE standards, does not need knowledge of the system's networking hardware.

Privacy Enhanced Mail (PEM)

A standard for Internet electronic mail that encrypts data to ensure privacy and data integrity.


A set of rules that describes how systems or devices on a network exchange information.


A mechanism whereby one system acts on behalf of another system in responding to protocol requests.

public key encryption

A cryptographic method that uses a two-part key (code) that is made up of public and private components. To encrypt messages, the published public keys of the recipients are used. To decrypt messages, the recipients use their unpublished private keys, which are known only to them. Knowing the public key does not enable users to deduce the corresponding private key.


real-time clock (RTC)

A battery-backed component that maintains the time and date for a system, even when the system is powered off.


An operating system-level operation that performs a system shutdown followed by a system boot. Power is a prerequisite.


The channeling of input or output to a file or device rather than to the standard input or output of a system. The result of redirection sends input or output that a system would normally display to the display of another system.

Remote Authentication Dial-In User Service (RADIUS)

A protocol that authenticates users against information in a database on a server and grants authorized users access to a resource.

Remote Management and Control Protocol (RMCP)

A networking protocol that enables an administrator to respond to an alert remotely by powering the system on or off or forcing a reboot.

remote procedure call (RPC)

A method of network programming that enables a client system to call functions on a remote server. The client starts a procedure at the server and the result is transmitted back to the client.

remote system

A system other than the one on which the user is working.


A hardware-level operation that performs a system power-off, followed by a system power-on.


An attribute of user accounts that determines user access rights.


In UNIX operating systems, the name of the superuser (root). The root user has permissions to access any file and carry out other operations not permitted to ordinary users. Roughly equivalent to the Administrator user name on Windows Server operating systems.

root directory

The base directory from which all other directories stem, either directly or indirectly.


A system that assigns a path over which to send network packets or other Internet traffic. Although both hosts and gateways do routing, the term “router” commonly refers to a device that connects two networks.

RSA algorithm

A cryptographic algorithm developed by RSA Data Security, Inc. It can be used for both encryption and digital signatures.



Definitions that describe what type of information can be stored as entries in the directory. When information that does not match the schema is stored in the directory, clients attempting to access the directory might be unable to display the proper results.

Secure Shell (SSH)

A UNIX shell program and network protocol that enables secure and encrypted log in and execution of commands on a remote system over an insecure network.

Secure Socket Layer (SSL)

A protocol that enables client-to-server communication on a network to be encrypted for privacy. SSL uses a key exchange method to establish an environment in which all data exchanged is encrypted with a cipher and hashed to protect it from eavesdropping and alteration. SSL creates a secure connection between a web server and a web client. Hypertext Transfer Protocol Secure (HTTPS) uses SSL.

sensor data record (SDR)

To facilitate dynamic discovery of features, the Intelligent Platform Management Interface (IPMI) includes this set of records. They include software information, such as how many sensors are present, what type they are, their events, threshold information, and so on. The sensor data records enable software to interpret and present sensor data without any prior knowledge about the platform.

serial console

A terminal or a tip line connected to the serial port on the service processor. A serial console is used to configure the system to perform other administrative tasks.

serial port

A port that provides access to the command-line interface (CLI) and the system console stream using serial port redirection.

server certificate

A certificate used with Hypertext Transfer Protocol Secure (HTTPS) to authenticate web applications. The certificate can be self-signed or issued by a Certificate Authority (CA).

Server Message Block (SMB) protocol

A network protocol that enables files and printers to be shared across a network. The SMB protocol provides a method for client applications to read and write to files on and request services from server programs in the network. The SMB protocol enables you to mount file systems between Windows and UNIX systems. The SMB protocol was designed by IBM and subsequently modified by Microsoft Corp. Microsoft renamed the protocol the Common Internet File System (CIFS).

service processor (SP)

A device used to manage chassis environmental, configuration, and service functions, and receive event data from other parts of the system. It receives data through sensor interfaces and interprets this data by using the sensor data record (SDR) to which it provides an interface. The SP provides another interface to the system event log (SEL). Typical functions of the SP are to measure processor temperature, power supply values, and cooling fan status. The SP can take autonomous action to preserve system integrity.

session time-out

A specified duration after which a server can invalidate a user session.

Simple Mail Transfer Protocol (SMTP)

A Transmission Control Protocol/Internet Protocol (TCP/IP) used for sending and receiving email.

Simple Network Management Protocol (SNMP)

A simple protocol used to exchange data about network activity. With SNMP, data travels between a managed device and a network management station (NMS). A managed device can be any device that runs SNMP, such as hosts, routers, web servers, or other servers on the network.

Single Sign On (SSO)

A form of authentication in which a user enters credentials once to access multiple applications.

Snapshot utility

An application that collects data about the state of the server processor (SP). Oracle Services uses this data for diagnostic purposes.


A working scheme that divides a single logical network into smaller physical networks to simplify routing. The subnet is the portion of an Internet Protocol (IP) address that identifies a block of host IDs.

subnet mask

A bit mask used to select bits from an Internet address for subnet addressing. The mask is 32 bits long and selects the network portion of the Internet address and one or more bits of the local portion. Also called an “address mask.”

Sun Blade Modular System

A chassis that holds multiple Sun Blade server modules.

Sun Blade server module

A server module (blade) that can be plugged into a chassis, also known as a modular system

Sun Oracle ILOM Remote Console

A graphical user interface that enables a user to redirect devices (keyboard, mouse, video display, storage media) from a desktop to a remote host server.


A special user who has privileges to perform all administrative functions on a UNIX system. Also called “root.”


A protocol over which log messages can be sent to a server.

system event log (SEL)

A log that provides nonvolatile storage for system events that are logged autonomously by the service processor or directly with event messages sent from the host.

system identifier

A text string that helps identify the host system. This string is included as a varbind in SNMP traps generated from the SUN-HW-TRAP-MIB. While the system identifier can be set to any string, it is most commonly used to help identify the host system. The host system can be identified by a description of its location or by referencing the host name used by the operating system on the host.



The virtual terminal program that enables the user of one host to log in to a remote host. A Telnet user of one host who is logged in to a remote host can interact as a normal terminal user of the remote host.


Minimum and maximum values within a range that sensors use when monitoring temperature, voltage, current, and fan speed.


A specified time after which the server should stop trying to finish a service routine that appears to be hung.

transmission control block (TCB)

Part of the Transmission Control Protocol/Internet Protocol (TCP/IP) that records and maintains information about the state of a connection.

Transmission Control Protocol/Internet Protocol (TCP/IP)

An Internet protocol that provides for the reliable delivery of data streams from one host to another. TCP/IP transfers data between different types of networked systems, such as systems running Solaris, Microsoft Windows, or Linux software. TCP guarantees delivery of data and that packets will be delivered in the same sequence in which they were sent.


Event notification made by Simple Network Management Protocol (SNMP) agents by their own initiative when certain conditions are detected. SNMP formally defines seven types of traps and permits subtypes to be defined.

Trivial File Transport Protocol (TFTP)

A simple transport protocol that transfers files to systems. TFTP uses User Datagram Protocol (UDP).


Uniform Resource Identifier (URI)

A unique string that identifies a resource on the Internet or an intranet.

Universal Serial Bus (USB)

An external bus standard that supports data transfer rates of 450M bits per second (USB 2.0). A USB port connects devices, such as mouse pointers,

user account

A record of essential user information that is stored on the system. Each user who accesses a system has a user account.

User Datagram Protocol (UDP)

A connectionless transport layer protocol that adds some reliability and multiplexing to the Internet Protocol (IP). UDP enables one application program to deliver, via IP, datagrams to another application program on another machine. The Simple Network Management Protocol (SNMP) is usually implemented over UDP.

user identification (userid)

A unique string identifying a user to a system.

user identification number (UID number)

The number assigned to each user accessing a UNIX system. The system uses UID numbers to identify, by number, the owners of files and directories.

user name

A combination of letters, and possibly numbers, that identifies a user to the system.

user privilege levels

An attribute of a user that designates the operations a user can perform and the resources a user can access.


web server

Software that provides services to access the Internet or an intranet. A web server hosts web sites, provides support for HTTP/HTTPS and other protocols, and executes server-side programs.

wide area network (WAN)

A network consisting of many systems that provides file transfer services. A WAN can cover a large physical area, sometimes worldwide.


X Window System

A common UNIX window system that enables a workstation or terminal to control multiple sessions simultaneously.

X.509 certificate

The most common certificate standard. X.509 certificates are documents containing a public key and associated identity information, digitally signed by a Certificate Authority (CA).