北京鸿原在线提供HP SAM Admin Guide v2.3.0_ZH-CN
- 格式:pdf
- 大小:3.67 MB
- 文档页数:97
information about the FIPS140-2Level1defaults,see"Encryption Administration"in"Encryption"on page20.l Java Policy–By default,the java.policy file is not hardened.For information about how to modify the java.policy file,see"Preventing Flows from Accessing the Central/RAS Local File System"on page52.Working with Server and Client CertificatesTransport Layer Security(TLS)certificates digitally bind a cryptographic key to the details of an organization, enabling secure and encrypted connections from a web server to a browser.HPE OO uses the Keytool utility to manage cryptographic keys and trusted certificates.This utility is included in the HPE OO installation folder,in<installation dir>/java/bin/keytool.For more information about the Keytool utility,see /javase/7/docs/technotes/tools/solaris/keytool.html.Installations of HPE OO Central include two files for the management of certificates:l<installation dir>/central/var/security/client.truststore:Contains the list of trusted certificates.l<installation dir>/central/var/security/key.store:Contains the HPE OO certificate(private key). Recommendations:l It is recommended to replace the HPE OO self-signed certificate after a new installation of HPE OO or if your current certificate is expired.l It is recommended to store the TrustStore and KeyStore with read permissions only for the user that runs the Central service.l It is recommended to clear the console after using Keytool or to use the prompt for password inputs. Encrypting the Communication Using a Server Certificate•Replacing the Central TLS Server Certificate30•Importing a CA Root Certificate to the Central TrustStore32•Importing a CA Root Certificate to a RAS TrustStore32•Importing a CA Root Certificate to the OOSH TrustStore33•Importing a CA Root Certificate to the Studio TrustStore34•Changing and Encrypting/Obfuscating the KeyStore/TrustStore Password35•Removing the RC4Cipher from the SSL-supported Ciphers38•Changing the HTTP/HTTPS Ports or Disabling the HTTP Port38•Troubleshooting40 Replacing the Central TLS Server CertificateYou can use a certificate signed by a well-known certificate authority or a custom server certificate from a local certificate authority.dir>/central/var/security/key.store.2.Open a command line in<installation dir>/central/var/security.3.Delete the existing server certificate from the Central key.store file,using the following command:keytool-delete-alias tomcat-keystore key.store-storepass changeit4.If you already have a certificate with.pfx or.p12extension,then go to the next step.If not,then youneed to export the certificate with private key into PKCS12format(.pfx,.p12).For example,if the certificate format is PEM:>openssl pkcs12–export–in<cert.pem>-inkey<.key>-out<certificate name>.p12–name<name>If the certificate format is DER,add the–inform DER parameter after pkcs12.For example:>openssl pkcs12–inform DER–export–in<cert.pem>-inkey<.key>-out<certificate name>.p12–name<name>5.List the alias for your certificate’s alias,using the following command:keytool-list-keystore<certificate_name>-v-storetype PKCS12The certificate alias is displayed and should be provided in the next command.In the example below,it is the fourth line from the bottom.6.Import the PKCS12format server certificate to the Central key.store file using the following command:keytool-importkeystore-srckeystore<PKCS12format certificate path>-destkeystore key.store-srcstoretype pkcs12-deststoretype JKS-alias<cert alias>-destalias tomcat7.If the imported server certificate has a different password from the original server certificate,it isimportant to change the keyPass password.Follow the instructions in"Changing andEncrypting/Obfuscating the KeyStore/TrustStore Password"on page35.It is also recommended to change the default“changeit”password in the automatically generatedKeyStore in the Central server.See"Changing and Encrypting/Obfuscating the KeyStore/TrustStore Password"on page35.8.Start Central.Importing a CA Root Certificate to the Central TrustStoreIf you are using a custom root certificate for Central,you will need to import the trusted root certificate authority(CA)to the client.truststore.If you are using a well known root CA(like Verisign)you do not have to perform the following procedure,because the certificate will already be in the client.truststore file.By default,HPE OO supports all self-signed certificates.However,in a production environment,it is recommended to change this default to a custom CA or a well known CA for security reasons.Replace the parameters that are highlighted in<yellow>.1.Stop Central and back up the original client.truststore file,located in<installationdir>/central/var/security/client.truststore.2.Import the trusted root certificate authority(CA)to the Central client.truststore file if it doesn't alreadyexist in the CA list(by default,all the well known CAs are there):keytool-importcert-alias<any_alias>-keystore<path to the client.truststore>-file<certificate_name.cer>-storepass<changeit>3.Start Central.Importing a CA Root Certificate to a RAS TrustStoreAfter installing a RAS,if you are using a custom root certificate for Central and you didn't provide this root certificate during the RAS installation,you will need to import the trusted root certificate authority(CA)to the RAS client.truststore.If you are using a well known root CA(like Verisign)you do not have to perform the following procedure,because the certificate will already be in the client.truststore file.By default,HPE OO supports all self-signed certificates.However,in a production environment,it is recommended to change this default to a custom CA or a well known CA for security reasons.Replace the parameters that are highlighted in<yellow>.1.Stop the RAS and back up the original client.truststore file,located in<installationdir>/ras/var/security/client.truststore.2.Open command line in<installation dir>/ras/var/security.3.Open the<installation dir>ras/conf/ras-wrapper.conf file and make sure that the-Dssl.support-。
Photo courtesy Image may differ from actual product.OPERATIONSA typical Ground Station often consists of a number of specialized units, e.g. demodulators, modulators, antenna control units (ACUs), converters, switch matrices, etc. These units normally have their own Graphical User Interface (GUI), but also a well-defined interface (API).Instead of handling these units as stand alone units, MEOS™ Control integrates them into one overall system. This allows for efficient operations with minimal personnel, by providing a common user interface.This provides operations of all equipment as one system, implying that ACUs, demodulators, switch matrices, etc. are scheduled in one operation to handle the mission in question.In addition, MEOS™ Control provides a common API for external M&C clients.STATISTICSDuring operation, MEOS™ Control collects all available statistics from the connected equipment, and stores it in a database. These statistics are provided in real-time through the MEOS™ Control‘s external interface, through the embedded GUI, and summarized as post-pass quality reports. By storing all statistics, and providing necessary tools, MEOS™ Control allows for both historical analysis and diagnostics.When combined with MEOS™ Connect, the Ground Station components become an integrated part of an overall Ground Station network.BENEFITS• One common API and GUI to interface all units.• Connected units appear as an integrated part of the system, thus providing one common entry point forscheduling and status information.• Activities can be scheduled immediately or time-based (ahead in time).• Extensive quality reports summarizing past activities, incorporating status from all units into one XMLreport.• The Graphical User Interface can be run locally and remotely on any network attached computer.• Stand-alone operation or controlled by an external monitoring and control system.Saving cost in Ground Station operationMEOS™ Control allows for Ground Station operations with less personnel and improved availability compared to traditional manual operations.MULTI EQUIPMENT SUPPORT• Support for existing Ground Station Equipment • Easy adaption to new equipment DISTRIBUTION• Report distribution through FTP, SFTP SCHEDULING• Automatic, based on orbit prediction forselected missions• Time-base, up to weeks in advance • ImmediateQUALITY REPORTING• Real-time qualitative and quantitativestatistics from all connected units • Historical view of qualitative andquantitative statistics for previous activities from all connected units, based on satellite and orbit. Both as numeric values and graphs.• Automatic generation of reports,including qualitative and quantitative statistics, events and plots from all connected units.Available as file or through standard web browserGRAPHICAL USER INTERFACE (GUI)• Programmable (XML definition).Stand alone or Java application through web browser, local or remote EXTERNAL INTERFACES• TCP socket and XML/Protobuf based,with minimal bandwidth usage • Access authentication • MEOS™ Connect ReadyFUNCTIONAL OVERVIEWSUPPORTED EQUIPMENTThe following equipment are supported by MEOS™ Control:Receivers• MEOS™ Capture , HRDFEP• InSnec Cortex HDR, CRT, Quantum, DPU • Quorum DSP and Modis Receivers • Orbital LRD/HRD-200 demodulator• LSIMSS CTP (Command and Telemetry Processor)Modulators• MEOS™ Capture HRTGSwitch Matrices• Specialty MicroWave RF-Switch, RF-matrix • Cytec Matrix Switches, ECL/TTL matrix • Quintech QRM Matrix Switch, IF matrix • Mini Circuits RF SwitchMiscellaneous Equipment• MEOS™ Capture HRFEP, CMDREC• ADAM modules, relay switch via ADAM 4520• SMP Up/Down Converter • Miteq 9800 converters• LP Technologies LPT-300, Remote SpectrumAnalyzer Antenna Controllers • MEOS™ Antenna • Viasat SCC• L3 Datron GSC, ACA • Yantai ACU • Quorum ACU• Orbital OACP ACU • Leo antennaSUPPORTED INTERFACESThe following interfaces are supported by MEOS™ Control:Monitoring and Control interfaces • TCP/IP, XML and Socket based Equipment interfaces • RS-232/422, TCP/IP Data Distribution interfaces • FTP, FTPS, SFTPPHYSICAL• Rack mountable chassis • Height x Width x Depth:(4.32 x 43.47 x 69.85 cm)• Weight: appr. 15 kg • Power:- 100 to 120 VAC / 200 to 240 VAC (Dual power supplies)• Temperature;- Operating: 10°C to 35°C (non operating: -30°C to 60°C)• Relative humidity (non condensing):- Operating: 10% to 90% (non operating: 5% to 95%)• Separate rack mountable keyboard andmonitor unit (optional) *Also avalable as VMwareGRAPHICAL USER INTERFACE© K S G S - M E O S -P A -K S P T -605-0816, I s s u e /r e v i s i o n 6/2 A u g u s t 2021Specifications subject to change without any further notice.MEOS™ is a registered trademark of Kongsberg Defence & Aerospace AS - in Norway and other countriesKONGSBERGSPACE GROUND SYSTEMSTelephone: +47 77 66 08 00E-mail:*********************spacetec.noTHE CHALLENGEA network of satellite ground stations typically consists of many sites. Each site may have one or more antennas and associated switching matrices and receivers. The stations may have individual technical solutions that may also evolve during the operational life. Operations are typically under a combination of local and centralized control. Equipment diagnostic tools are available primarily at the station level. Generating and distributing status reports and statistics to support operational decisions is typically a manual process.Operational schedules are distributed from the central site to the stations. In some cases manual work is required to run the stations according to these schedules. Manual work is also required at the central site to assemble reports, make statistics available and present this during operations briefings.THE SOLUTIONMEOS™ Control is designed for seamless integration into ground station equipment. Its GUIs and remote monitoring and control capability provide detailed system visibility and control from any location in the network, with minimal bandwidth requirements. Network capacity utilization is optimized by automatic and adaptive bandwidth allocation and retransmission.System status and data quality statistics are automatically generated and disseminated for central archiving and report compilation.BENEFITSMEOS™ Capture, MEOS™ Control and MEOS™ Connect can be combined into a ground station network requiring an absolute minimum of manual operations. This reduces operational cost and delays and improves operations reliability.DELIVERY :MEOS™ Control is normally configured, tested and pre-qualified at KSGS premises.Alternative configurations may be available upon request.RELATED PRODUCTS :• MEOS™ Capture HRFEP- High Rate Front End Processor• MEOS™ Capture HRTG - High Rate Test Generator • MEOS™ Connect– Ground Station Networking / Systems-of-systems •MEOS™ Antenna– 3.0 - 5.0 m multi-band antennaMEOS™ Control GUI, Schedule view。
HPE MSA STORAGE REASONS TO CALL GUIDECONTENTS1. Connect on a pain point (2)2. Motivate with what-if (2)3. Confirm the interest (2)4. Give the elevator pitch (2)5. Communicate the outcome (3)6. Qualify the opportunity (3)7. Ask for the meeting (3)Resources ......................................................................................................................................................................................................................................................................................................................................3Talking pointsCONFIDENTIAL | AUTHORIZED HPE PARTNER USE ONLY1. CONNECT ON A PAIN POINTa.Is your current HPE MSA (Gen3, 4, or 5) reaching or exceeding its intended service life, and is now time to upgrade?b.Is your existing HPE MSA (Gen3, 4, or 5) reaching its performance or capacity limitations?c.As an existing HPE MSA customer, do you want or need to take advantage of the new features of the HPE MSA Gen6 systems?d.Do you still have applications that are still utilizing direct-attached storage (DAS) but could be better utilized if they were usingshared storage serving multiple applications?e.Do you need to support the IT infrastructure at remote sites, branch offices, or departmental groups?f.Are you struggling with flat or declining IT budgets, yet need to provide more data services with less CAPEX?g.Do you have a growing or complex IT Infrastructure but do not have access to an in-house IT specialist?h.Do you need high-performance, easy-to-use shared storage, yet do not have a dedicated storage administrator?i.Are you happy with your current vendor support experience over the last 12 months?j.Are you getting the ideal data efficiency out of your storage? Do you wish you could store more data for less OPEX?2. MOTIVATE WITH WHAT-IFa.What if you could purchase a new HPE MSA Gen6 array with increased performance and improved data protection technology?b.What if you could purchase a hands-free storage array that any IT generalist could easily install, operate, repair, and upgrade?c.What if you can purchase a cost-effective, high performance (> 325K IOPS) hybrid storage array (SSDs + HDDs) starting atunder $12K?d.What if you could own a storage array that dynamically responds to changes in I/O in real time without intervention?e.What if your storage array provided improved data availability and could speed up rebuild times by more than 25X?f.What if you could eliminate idle/cold spares without risking availability?g.What if you could have access to a free health check tool that predicted failures before they happen, would check against bestpractices, and suggest simple-to-follow corrective actions?3. CONFIRM THE INTERESTWhat would be the impact to you and your business if you had a storage solution that could provide what we have discussed so far, and much more?4. GIVE THE ELEVATOR PITCHHewlett Packard Enterprise continues to invest in the HPE MSA storage platform. We are now on our 6th generation of HPE MSA storage systems. The HPE MSA storage family are flash-ready, hybrid storage systems designed to deliver hands-free, affordable application acceleration for small and remote office deployments. Don't let the low cost fool you. The HPE MSA gives you thecombination of simplicity, flexibility, and advanced features you may not expect in an entry-priced array. Start small and scale as needed with any combination of solid-state drives (SSDs), high-performance enterprise SAS HDDs, or lower-cost midline SAS HDDs. With the ability to deliver 325,000 IOPS, the new HPE MSA arrays are up to 45%1 faster than its prior generation with sizeable horsepower for even the most demanding workloads.5. COMMUNICATE THE OUTCOMEa.Built for speed: A new Gen6 RAID acceleration ASIC and controller architecture improve system performance by as much as 50% ascompared to HPE MSA Gen5. This improvement in IOPS and throughput help to lower system latencies enabling connected systems and users to experience better productivity.b.Automated performance tiering: Utilizing new HPE MSA Tiering v2.0 enhancements, hybrid storage configurations automaticallyrespond to I/O changes in real time to deliver up to 45% more workload application acceleration when compared HPE MSA Gen5.Automated Tiering v2.0 operates at the pool level, is always on, and is initiated by adding more than one drive type to the pool.c.Redefining RAID-based recovery for entry-level SAN storage: New HPE MSA DP+ data protection brings significant improvementsto traditional RAID technology including up to 25X faster rebuild performance2 (versus RAID 6), removal of idle drive spares, and configuration expansion at a more granular level (with as little as one drive per add).d.Intuitive user interface—no manuals needed: The HPE MSA Storage Management Utility (SMU v4) supports system configurationwith step-by-step guided workflows that help eliminate errors and dramatically improve the user experience.e.Simplified dashboard offers at-a-glance storage management: HPE MSA SMU v4 management enhancements allow user toquickly access important system information including alerts, capacity, performance, and activity.f.Avoid unplanned downtime with a few simple steps: The HPE MSA Health Check utility simplifies the tasks required toregularly check the health of your HPE MSA storage system. By simply uploading a log file from your HPE MSA array to thecloud-hosted HPE MSA Health Check utility, the application systematically checks for signs of noncompliance with multipleavailability-related best practices. Once completed, HPE MSA Health Check generates a report detailing your system’s healthand adherence to all best practices and known failure signatures. The report also provides detailed next-step guidance onsolving any issues.g.HPE ProLiant and HPE MSA—better together: The HPE MSA storage array has been designed for use with HPE ProLiant servers.With over 15 years of integrated selling, HPE MSA continues to serve as the entry-point for SAN storage supporting the entireportfolio of HPE ProLiant servers.6. QUALIFY THE OPPORTUNITYAssess the customer sense of urgency to solve the problem, if there’s budget planned, and when.a.Are you planning on a storage refresh in the next six months and are tired of disruptive upgrades?b.Are you due for a service renewal and may have to deal with escalating high support costs?c.Are you looking to streamline IT operations moving to an IT generalist model to support the stack?d.Are you deploying applications that have high requirements for performance/availability?7. ASK FOR THE MEETINGBased on our discussion today, I would like to set up another call with one of my storage experts to further discuss how HPE MSA Gen6 storage can address your IT infrastructure concerns.What date and time works best for you? Thanks, and have a great day.RESOURCES•HPE MSA Gen6 product page•HPE MSA Gen6 press release•HPE MSA Storage—Briefcase•Introducing HPE MSA Gen6 Storage: Hands-Free, High Performance, and Simpler than Ever•Introducing the HPE MSA Gen6 Storage Array | ChalkTalk•Competitive Analysis—HPE MSA Storage•Customer presentation with speaker notes—HPE MSA Gen6 Storage Arrays•FAQ—HPE MSA 1060 2060 2062 Storage•Solution brief—HPE MSA Gen6 Hybrid Storage•Technical Presentation—HPE MSA Gen6 Storage Arrays—Customer-facing•Technical Presentation—HPE MSA Gen6 Storage—Main Deck•HPE MSA 1060 Storage data sheet•HPE MSA 2060 Storage data sheet•HPE MSA 2062 Storage data sheet•SMB I.T. Solutions webpage© Copyright 2020 Hewlett Packard Enterprise Development LP. The information contained herein is subject to changewithout notice. The only warranties for Hewlett Packard Enterprise products and services are set forth in the express warrantystatements accompanying such products and services. Nothing herein should be construed as constituting an additional warranty.Hewlett Packard Enterprise shall not be liable for technical or editorial errors or omissions contained herein.。
5620SAMSERVICE AWARE MANAGER HP c7000GNE Driver Version 1.0.0Guide3HE-10563-AAAA-TQZZAIssue1March20165620SAMLegal noticeNokia is a registered trademark of Nokia Corporation.Other products and company names mentioned herein may be trademarks or tradenames of their respective owners.The information presented is subject to change without notice.No responsibility is assumed for inaccuracies contained herein.©2016Nokia.All rights reserved.3HE-10563-AAAA-TQZZA2Issue15620SAMContentsAbout this document (4)HP c7000GNE Driver Version1.0.0Guide (5)1HP c7000driver version1.0.0 (5)2Discovery and management (6)3HE-10563-AAAA-TQZZAIssue135620SAMAbout this documentPurposeThe5620SAM HP c7000Driver version1.0.0document provides information about theHP c7000driver version1.0.0,including compatibility information,driver capabilities,known issues,and discovery and management instructions.The5620SAM manages HP c7000hardware separately from the9471WMM using theGNE management function.Fault management support for the HP c7000requires theimport of a specific GNE driver before discovering the hardware,and is limited tohardware“health”alarms that indicate the status of the platform.Following managementof the HP c7000components,you can bind the associated GNE to the9471WMMinstance.The driver documents are available on OLCS.Document supportCustomer documentation and product support URLs:•Customer Documentation Welcome Page•Technical supportHow to commentDocumentation feedback3HE-10563-AAAA-TQZZA4Issue15620SAM HP c7000driver version1.0.0 HP c7000GNE Driver Version1.0.0Guide1HP c7000driver version1.0.01.1Driver capabilitiesThe following table lists HP c7000driver version1.0.0capabilities.The driver extendsthe management capabilities of the5620SAM for HP c7000devices in the followingapplicable areas.Configuration managementGNE profile automation:The GNE profile for the HPc7000is automatically createdwhen the driver is installed.Alarm catalog integration:The HP c7000alarm catalog is automatically populatedduring driver installation.Operators can edit the alarm catalog to customize alarmcharacteristics.Service managementNot applicableTunnel managementNot applicableNetwork assuranceNot applicableService assuranceNot applicableFault managementAlarm resynchronization–The5620SAM performs periodic polling of trap sequencenumbers and detects gaps,if present.Upon NE alarm loss detection,the5620SAMperforms full NE alarm resynchronization.1.2Closed issuesThere are no closed issues to report.1.3Outstanding issuesThere are no outstanding issues to report.3HE-10563-AAAA-TQZZAIssue15Discovery and management5620SAM2Discovery and management2.1HP c7000post-installation configuration instructionsThe following instructions provide information specific to HP c7000device configurationand discovery.The5620SAM User Guide chapter"Device commissioning andmanagement"should be consulted for full procedural details.Create mediation policies and configure a discovery rulee the5620SAM to create an SNMP v3(USM)mediation policy.See the5620SAM User Guide for information about creating mediation policies.e the5620SAM to configure a discovery rule for the HP c7000that includes theSNMP v3(USM)mediation policy;see the5620SAM User Guide for informationabout creating discovery rules.Associate the GNE with the HP c7000alarm catalog1.Open the properties form of the GNE by right-clicking on the GNE in the equipmenttree or topology map and choosing Properties.The Network Element form opens.2.In the General tab→Generic NE panel,click Properties for Generic NE Type.TheGeneric NE Profile form opens.3.Click on the Trap Configuration tab.4.Click on the Trap Configuration tab.5.In the Alarm Catalog panel,click Select and choose the HP c7000alarm catalog.6.Save the changes and close the form.Associate the GNE with9471WMM instances as needed•Open the properties form of a WMM instance.•In the General tab,click Select in the Associated Hardware panel and specify therequired GNE.The Associated Hardware panel is not displayed if the9471WMM isnot an ngWMM(NextGen WMM).•Save the changes and close the form.3HE-10563-AAAA-TQZZA6Issue1。
2Getting StartedTo get started with HP System Management Homepage(HP SMH),use the following information as a guideline for configuring HP SMH and then setting up users and security properly.To configure HP SMH:•On HP-UX Operating Environments,HP SMH is installed with default settings.You can change the configuration by modifying the environment variables and tag values set in the/opt/hpsmh/lbin/envvars,/opt/hpsmh/mon/smhpd.xml,and/opt/hpsmh/conf/timeout.conf files.•On Linux operating systems,HP SMH is installed with default settings.The settings are configurable by using the perl script(/opt/hp/hpsmh/smhconfig/hpSMHSetup.pl)locatedin/opt/hp/hpsmh/ (on Linux x86and x86_64)and in Itanium systems the perl script islocated in/opt/hp/hpsmh/smhconfig/hpSMHSetup.sh.•On Windows operating systems,the installation enables you to configure the HP SMH settings during installation.NOTE:To change the configurations for the HP-UX,Linux,and Windows operating systems,see the HP System Management Homepage Installation Guide on the HP Technical Documentation Web site at .To set up user access and security properly:1.Add user groups to effectively manage user rights:“User Groups”2.Configure the trust mode:“Trust Mode”3.Configure local or anonymous access:“Local/Anonymous Access”Related Topics•Logging In•Configuring Firewall Settings•Automatically Importing Certificates•Logging OutLogging InThe Login page enables you to access the Home page,which contains the available HP Insight Management Agents.Starting HP System Management Homepage(HP SMH)from Internet Explorer To log in to the HP SMH with Internet Explorer:Related Topics91.Navigate to https://hostname:2381/.NOTE:If you are browsing to an HP-UX server,by default you must instead use the URI:http://hostname:2301/.By default,HP-UX is installed with the autostart feature enabled.A daemon listens onport2301and only starts HP SMH on port2381when requested,then stops it again after atimeout period.You can also configure HP SMH to always be running on port2381.See thesmhstartconfig(1M)command for more information.If the Start on Boot feature is enabled(instead of autostart)a message window explains the security features.You can wait afew seconds to be redirected to port2381or click the link at the bottom of the message.TheSystem Management Homepage Login page will appear.You can find procedures on how to change the configuration variables in the HP SystemManagement Homepage Installation Guide on the HP Technical Documentation Web site at.2.The first time you browse to this URI,the Security Alert dialog box appears,asking you toindicate whether to trust the server.If you do not import the certificate,the Security Alertappears every time you browse to HP SMH.NOTE:If you want to implement your own Public Key Infrastructure(PKI)or install yourown generated certificates into each managed system,you can install a certificate authorityRoot Certificate into each browser to be used for management.If this is implemented,theSecurity Alert dialog box does not appear.If the alert appears when you do not expect it,you might have browsed to the wrong system.You can refer to the online help in yourbrowser for more information about installing the certificate authority Root Certificate.3.Click Yes.The Login page appears.If you have enabled Anonymous access,then System ManagementHomepage appears.4.Enter your user name that is recognized by the operating system.On HP-UX,HP SMH initially only allows access to the root user,on Linux access is initiallyallowed to users belonging to the root operating system group,and on Windows to usersbelonging to the Administrators operating system group.If the user credentials cannot beauthenticated,the user is denied access.After logging into HP SMH as one of the initiallyallowed users,you can use the Security Settings to grant access to users in different operatingsystem groups.NOTE:In most cases,the administrator on Windows and root on HP-UX or Linux haveadministrator access on HP SMH.5.Enter the password that is recognized by the operating system.6.On HP-UX,click Sign In.On Linux and Windows,click Login.System ManagementHomepage appears.Starting HP SMH from Mozilla or FirefoxTo log in to HP SMH with Mozilla or Firefox:10Getting Started1.Navigate to https://hostname:2381/.NOTE:If you are browsing to an HP-UX server,by default you must instead use the URI:http://hostname:2301/.By default,HP-UX is installed with the autostart feature enabled.A daemon listens onport2301and only starts HP SMH on port2381when requested,then stops it again after atimeout period.You can also configure HP SMH to always be running on port2381.See thesmhstartconfig(1M)command for more information.If the Start on Boot feature is enabled(instead of autostart)a message window explains the security features.You can wait afew seconds to be redirected to port2381or click the link at the bottom of the message.TheSystem Management Homepage Login page will appear.You can find procedures on how to change the configuration variables in the HP SystemManagement Homepage Installation Guide on the HP Technical Documentation Web site at.The first time you browse to the URI,the Website Certified by an Unknown Authoritydialog box appears,asking you to indicate whether to trust the server.If you do not selectAccept this certificate permanently,the Website Certified by an Unknown Authoritydialog box appears every time you use a browser.2.Click OK.The Login page appears.If you have enabled Anonymous access,then System ManagementHomepage appears.3.Enter your user name that is recognized by the operating system.On HP-UX,HP SMH initially only allows access to the root user,on Linux access is initiallyallowed to users belonging to the root operating system group,and on Windows to usersbelonging to the Administrators operating system group.If the user credentials cannot beauthenticated,the user is denied access.After logging into HP SMH as one of the initiallyallowed users,you can use the Security Settings to grant access to users in different operatingsystem groups.NOTE:In most cases,the administrator on Windows and root on HP-UX and Linux haveadministrator access on HP SMH.4.Enter the password that is recognized by the operating system.5.On HP-UX,click Sign In.On Linux and Windows,click Login.System Management Homepage appears.Starting HP SMH from HP SIMTo start HP SMH by logging in to HP SIM with a Web browser:Logging In111.Navigate to https://hostname:50000/.The first time you browse to this link,the Security Alert dialog box is displayed,askingyou to indicate whether to trust the server.If you do not import the certificate,the SecurityAlert is displayed every time you browse to HP SIM.NOTE:If you want to implement your own Public Key Infrastructure(PKI)or install yourown generated certificates into each managed system,you can install a certificate authorityRoot Certificate into each browser to be used for management.If this is implemented,theSecurity Alert dialog box does not appear.If the alert is displayed when you do not expectit,you might have browsed to the wrong system.You can refer to the online help in yourbrowser for more information about installing the certificate authority Root Certificate.2.Click Yes.The Login page is displayed.3.Enter a user name that is recognized by the operating system.4.Enter a password that is recognized by the operating system.5.Click Sign In.6.Select Tools→System Information→System Management Homepage.7.Select a target system from the list.8.Select a checkbox next to a target system.Click Apply.9.Verify the target system by selecting a checkbox next to the system.Click Run Now.The Security Alert dialog box is displayed,asking you to indicate whether to trust theserver.If you do not import the certificate,the Security Alert is displayed every time youbrowse to HP SMH.The System Management Homepage is displayed.Starting from the HP-UX Command LineWhen you run either the sam or smh command and the DISPLAY environment variable is set,HP SMH opens in the default web browser.If the DISPLAY environment variable is not set,HP SMH opens in the TUI.Most of the applications for performing administration tasks are nowavailable through the web-based GUI interface and an enhanced TUI.However,few applications continue to open in ObAM based X-windows or ObAM based TUI.You are recommended to use the smh(1M)command.However,the sam(1M)command willcontinue to be available and behave just as the smh(1M)command.Some of the functional areas previously available for system administration are obsolete.These areas are listed in the HP-UX 11i Release Notes available on the HP Technical documentation web site at . HP SMH Management ServerBy default,the HP SMH management server under HP-UX only starts on demand.It does not run continually.A daemon listens on port2301to start an instance of the management server.On Linux,HP SMH is started on boot.Related Topics•Getting Started•Configuring Firewall Settings•Automatically Importing Certificates•Logging Out•HP SMH Pages12Getting Started。
User's Guide - English Guía del usuario - EspañolManuel de l’utilisateur - Français Gebruikersgids - DeutschBenutzerhandbuch - Nederlands Guida per l’utente - Italiano Användarhandbok - svenska ユーザーガイド : 日本語用户指南 : 汉语IncludesConstant Force ™TechnologyLX Desk Dual Direct Armwith C-clamp Top MountENGLISHFor the latest User Installation Guide please visit: User's GuideThese symbols alert users of a safety condi-tion that demands attention. All users should be able to recognize and understand the signi fi cance of the following Safety Hazards if encountered on the product or within the documentation. Children who are not able to recognize and respond appropriately to Safety Alerts should not use this product with-out adult supervision!Hazard Symbols ReviewSafetyImportant! You will need to adjust this product after installation is complete. Make sure all your equipment is properly installed on the product before attempting adjustments. This product should move smoothly and easily through the full range of motion and stay where you set it. If movements are too easy or dif fi cult or if product does not stay in desired positions, follow the adjustmentinstructions to create smooth and easy movements. Depending on your product and the adjustment, it may take many turns to notice a difference. Any time equipment is added or removed from thisproduct, resulting in a change in the weight of the mounted load, you should repeat these adjustment steps to ensure safe and optimum operation.Warning:Because mounting surface materials can vary widely, it is imperative that you make sure mounting surface is strong enough to handle mounted product and equipment.Caution:To avoid the potential to pinch cables it is important to follow the cable routing instructions in this manual. Failure to follow these instructions may result in equipment damage or personal injury.WARNING:Stored Energy Hazard: The arm mechanism is under tension and will move up rapidly, on its own, as soon as attached equipment is removed. For this reason, DO NOT remove equipment unless the arm has been moved to the highest position! Failure to follow this instruction may result in serious personal injury and/or equipment damage!CAUTION: DO NOT rotatemonitor past rear edge of desk. Doing so will create an unstable situation and may causeequipment damage or personal injury.0.5”- 1.26”(12.32mm)ENGLISHFeatures & Speci fi cationsCAUTION: DO NOT EXCEED MAXIMUM LISTED WEIGHT CAPACITY . SERIOUS INJURY OR PROPERTY DAMAGE MAY OCCUR!ComponentsTools Neededa c f21x3ba4ENGLISHAttach monitors to mounting brackets.Loosely thread thumb screws into mounting brackets.5Slide monitor onto crossbar.ENGLISH94xNOTE: Leave enough slack in cable to allow full range of motion.Caution: To avoid the potential to pinch cables it is important to follow the cable routing instructions in this manual. Failure to follow these instructions may result in equipment damage or personal injury.10ENGLISHAdjustment Stepproperly installed on the product before attempting adjustments. This product should move smoothly and easily through the full range of motion and stay where you set it. If movements are too easy or dif fi cult or if product does not stay in desired positions, follow the adjustment instructions to create smooth and easy movements. Depending on your product and the adjustment, it may take many turns to notice a difference. Any timeequipment is added or removed from this product, resulting in a change in the weight of the mounted load, you should repeat these adjustment steps to ensure safe and optimum operation.Increase Lift StrengthIf the mounted weight is too heavy or this product does not stay up when raised, then you'll need to increase Lift Strength:Decrease Lift StrengthIf the mounted weight is too light or this product does not stay down when lowered, then you'll need to decrease Lift Strength:Lift - Up and DowncENGLISHdArm Swing – Side-to-sideCAUTION: DO NOT remove screw. Removing screw may cause damage to equipment.© 2017 Ergotron, Inc. All rights reserved.ENGLISHFor local customer care phone numbers visit: For Service visit: For Warranty visit: /warranty NOTE: When contacting customer service, reference the serial number.Learn more about ergonomic computer use at:Set Your Workstation to Work For YOU!Height Position top of screen slightly below eye level.Position keyboard at about elbow height with wrists fl at.Distance Position screen an arm's length from face—at least 20” (508mm).Position keyboard close enough to create a 90˚ angle in elbow. Angle Tilt screen to eliminate glare.Tilt the keyboard back 10° so that your wrists remain fl at.To Reduce FatigueBreathe - Breathe deeply through your nose.Blink - Blink often to avoid dry eyes.Break • 2 to 3 minutes every 20 minutes• 15 to 20 minutes every 2 hours.。
Photo courtesy MEOS™ NAS is fully compatible with MEOS™ Capture and MEOS™ Polar. Data can also be provided from other systems supporting (S)FTP.When arriving at MEOS™ NAS, the data files will be stored in catalogs corre sponding to file name s. Catalogs are created automatically as needed. Data files are by default under automatic storage management.The NAS storage is maintained automatically by the MEOS™ NAS:• Files older than a configurable age will be deleted (hard links removed) per FIFO scheme• The oldest files will be deleted when storage capacity limit is reachedStored data files can be retrieved by external clients using SLE (Offline RCF/RAF) per mission and time, or interactively using the embedded GUI (Graphical User Interface). Data files can also be retrieved via FTP.Re-distribution of particular ISP files can be done by manual selection of ISP files in the MEOS™ NAS GUI.MEOS™ NAS supports monitoring and control through a well-defined, socket based API, as well as through the embedded GUI. MEOS™ NAS will also generate reports upon data arrival and extraction.To ensure maximum reliability, MEOS™ NAS uses disks with RAID technology for data redundancy and dual power supplies. Cooling fan status and temperatures are monitored.This product is typically use d in ground systems requiring high availability and high reliability.MEOS™ NAS is MEOS™ Connect Ready for seamless integration under KSPT’s overall monitoring and control systems.MEOS™ NAS is a data storage accessible from the network. It provides scalable data storage and automatic data storage management, FTP based data input and output, and data distribution via the Space Link Extension (SLE) protocol. This product can also be used as an online rate buffer.© K S G S - M E O S -P A -K S P T -N A S -1672, I s s u e /r e v i s i o n 2/1, J a n u a r y 2021FEATURES• Diskbased and no consumables • Scalable data storage • VM or dedicated HW• Ideal for station cache • Input:Specifications subject to change without any further notice.MEOS™ is a registered trademark of Kongsberg Defence & Aerospace AS - in Norway and other countriesKONGSBERGSPACE GROUND SYSTEMSTelephone: +47 77 66 08 00E-mailsales:*********************spacetec.noMEOS™ NAS interfaces: • IP inThe MEOS™ NAS receives the real-time data through the ‘IP in’ interfaces, as ISPsand / or VCDUs. The data received is stored to file in the Online storage. •IP OutThe data from an ‘IP in’ interface is forwarded to the ‘IP out’ interface and distributed •(S)FTP(S) inCADU / VCDU / ISP data files are received via FTP / SFTP / FTPS and stored in the online storage•(S)FTP(S) outCADU / VCDU / ISP data files are sent via FTP / SFTP / FTPSSpace Link Extention (SLE) SLE support includes:• RAF (Return All Frames)• RCF (Return Channel Frames)• UIB (User Initiated Bind):- Data pull from an external system • PIB (Provider Initiated Bind):- Data push to an external systemMEOS™ NAS Hardware*• The MEOS™ NAS consists of the followinghardware: - HPE server- Disk Array Configurable 15-500 TB in one unit.• The MEOS™ NAS is configured with RAID6.• The storage capacity of the MEOS™ NAS can beincreased if needed, by adding additional disk storage units.• The online storage is a rolling archive,oldest files will be rolled out according to a configurable disk usage limit.* Available also as VM。
Best Practices guide to security settings in Service Manager When to use Profile security,Mandanten security,or Security Folders.HP®Software—Service ManagementIntroduction (2)Requirements (2)Security Features (2)Module Profiles (2)Format Control Privileges (3)Security Folders (4)Mandanten Security (5)Best Practices:What to use when (7)Precedence workflows (8)Security Features for general use (8)Security Features typically used at an MSP (8)For more information (10)IntroductionRestricting user’s access to data is a common concern in enterprise applications.Service Manageroffers several ways of restricting user access to its data.The restrictions can be on offering users onlycertain forms to view their data,or offering only a certain set of options for actions on the record,as well as limiting the records returned on a query against the database.This document will discussthese different ways,their pros and cons,and recommended use.RequirementsAdministrator access to Service Manager7.00or higher is required to set these security features. Security FeaturesThere are three different ways in which data access can be limited in Service Manager:1.By limiting the form used to display data based on the user’s role:Use Forms Designer to create a form displaying only the data that is relevant for the user.Then assign this form to the user in the profiles,or in links,or based on his capabilitiesvia the initialization Process.2.By limiting the options the user has on the recordLimiting options can be done based on profiles,format control privileges or capabilitywords.Profiles and capability words are assigned to the user in the operator record,format control privileges are assigned to the form or table.3.By limiting the records returned from the databaseLimiting the records returned from the database is usually done with the Mandantenfeature.It is also possible to append to a user’s query via the profile’s append.queryfield.Note:Capability words and Forms are not security features per se,but can be used as helpers to determine to which data and options the user has access.Module ProfilesProfile controls are available for all modules–with the exception of Service Catalog.Module profiles are assigned to the user in the operator record and are the same for every record for that module. They define in detail if the user can perform actions such as view,create,update,or close records in the tables for this module.The profile application defined in the Object record determines the appropriate rights for that table.The profile rights are set on the RAD level and typically determine if a display option(button)is available to the user.Format Control PrivilegesFormat Control privileges are used for all tables that are not protected by module profiles,such as thecontacts or operator tables,or when accessing tables in Administrative Mode from DatabaseManager.The profile application db.environment defined in the Object record determines the appropriate rights based on Format Control privileges.The Format Control privileges are set on theRAD level and usually determine whether a button(display option)is available to the user.Format Control privileges of the master format control typically apply to all records in the table,whereas privileges of a detail Format Control apply to all records viewed from that specific form.Security FoldersSecurity Folders can be used to set user rights,such as create,update,or close on a record by record basis.Which rights are applied is determined based on the content of the folder field of the specific record.Security Folders combine benefits of Mandanten Security in that a subset of records can be restricted as well as Module Profiles in that the restrictions are to the view /create /update level.Security Folders are globally enabled or disabled in the System Information Record and implemented on the application level.Available folders are defined in the FolderDef table.Security Folder rights are assigned to the operator via the module profile and are only available where module profiles are available.Each operator may have a default folder assigned in the operator record that is used for filling in the folder value on every ticket this operator creates.Note:If security folders are used,every profile has to have a setting for every possible folder value.If a folder value is missing,the user will not be able to view records in this folder. Mandanten SecurityMandanten security is typically used in a Multi-Service Provider(MSP)environment.It is available for all tables in Service Manager.Mandanten security is implemented in the RTE layer where a limiting query is automatically added to queries issued against any protected table.Due to this implementation a user either has access to a record or not.Mandanten Security is set up via the operator record,where the operator can belong to none,one or many security groups.The security groups define which values in the Mandanten field make the record visible or invisible.The Mandanten field for the protected table is defined in the scmandant table.Note:When Mandanten-protecting related tables,make sure to have the related value visible,for example,if you are allowed to see records of category Hardware,ensure that the Hardware category record is visible as well.Example:Company A provides service for customers B and C.Customers B and C do not want to share anyincident data,but want to share knowledge in the KB table.The Mandanten field would be the company field in the Incident Management tables.The Knowledge Base table will not be protected,since it is shared between all companies,so no scmandant record should be created against that table.The security groups for operators would be B for employees of customer B,C for employees of customer C,and A for employees of company A.The allowed values(include list)for customer B is B,for customer C is C and for company A is A,B,C (since they are servicing all customers).Best Practices:What to use whenEach of the previously described security concepts has different areas of use.Format Control Privileges and Module Profile rights are always set up.Security Folders and Mandanten protection are additional features that typically are used in MSP implementations.Security Feature Available on allTables Optional/MandatoryImplemented on…layerTypically used byMSPsModule Profiles Mandatory ApplicationFormat ControlPrivilegesX Mandatory ApplicationSecurity Folders Optional Application X Mandanten X Optional RTE XPrecedence workflowsenvironment be able to view certain data with limited rights or should they not be able to view thedata at all.If the data is supposed to be completely segregated,then Mandanten is the concept to implement.If the data access is supposed to be limited,but not completely taken away,SecurityFolders work best.In Security Folders,you can give certain rights based on the folder value,which typically is the nameof the MSP customer.These rights are:∙Create∙Updateo Update only under certain circumstances∙Close∙View∙Update access to records in a certain statusBoth concepts may be used in the same system on different tables.For example the operator tablemay be Mandanten protected,whereas probsummary data can be viewed by all parties and onlymodified by a certain group.Security Folders can mimic Mandanten-behavior by removing all rights for a certain folder,or notincluding a folder in the list of a profile’s folder accesses.Mandanten protection would be moreefficient in this case though,since it modifies the query that retrieves the records,rather than determining on a record by record basis if this record can be viewed.For more informationPlease visit the HP Software support Web site at:/go/hpsoftwaresupportThis Web site provides contact information and details about the products,services,and support thatHP Software offers.HP Software online software support provides customer self-solve capabilities.It provides a fast andefficient way to access interactive technical support tools needed to manage your business.As avalued customer,you can benefit by being able to:∙Search for knowledge documents of interest∙Submit and track progress on support cases∙Submit enhancement requests online∙Download software patches∙Manage a support contract∙Look up HP support contacts∙Review information about available services∙Enter discussions with other software customers∙Research and register for software trainingNote:Most of the support areas require that you register as an HP Passport user and sign in.Manyalso require an active support contract.To find more information about support access levels,go to the following URL:/go/hpsoftwaresupport/new_access_levelsTo register for an HP Passport ID,go to the following URL:/go/hpsoftwaresupport/passport-registration©2007Hewlett-Packard Development Company,L.P.The information contained herein is subject to change without notice.The only warranties for HP products and services are set forth in the express warranty statements accompanying suchproducts and services.Nothing herein should be construed as constituting an additional warranty.HP shall not be liable fortechnical or editorial errors or omissions contained herein.HP and ServiceCenter are registered trademarks of Hewlett-Packard Development Company,L.P.JavaScript is a registeredtrademark of Sun Microsystems,Inc.in the United States and other countries.06/2007。
1HPStreamSmart 400用户指南用于 HP 39/40gs图形计算器2StreamSmart 400 致谢本手册由 G.T. Springer 编写修订历史记录法律声明本手册及其中所包含的所有示例均按“原样”提供,如有更改,恕不另行通知。
Hewlett-Packard Company 不对本手册作任何类型的保证,包括但不限于对适销性、不侵权以及针对特殊用途的适用性的默示保证。
Hewlett-Packard Company 对本手册或其包含的示例中出现的任何错误概不负责;对于与提供、执行或使用本手册或其包含的示例有关的偶发或继发性损害亦概不负责。
版权所有 © 2008 Hewlett-Packard Development Company, L.P.除非版权法允许,否则事先未经 Hewlett-Packard Company 书面许可,严禁复制、改编或翻译本手册。
Hewlett-Packard Company16399 West Bernardo Drive MS 8-600USA1日期版本版本 2008 年 10 月3.01HP 部件号: F2235 - 9001San Diego, CA 92127-1899目录1 HP 移动计算实验室实验类型 (3)数据流实验 (3)StreamSmart Aplet (4)Statistics Aplet (6)手册约定 (7)有用提示 (7)2 数据流实验查看数据流 (12)电池电量不足符号 (17)选择数据集 (17)导出数据集 (19)分析实验数据203 从事件中捕获数据数字视图:计量器模式 (25)设置实验 (26)监控和选择事件 (28)分析数据 (29)数据记录 (29)4 高级主题传感器设置:手动标识传感器 (31)单位设置:手动选择传感器的单位 (32)校准 (33)Plot Setup(图表设置)菜单 (34)设置数据流窗口 (34)图表显示选项 (35)筛选要显示和导出的数据 (36)1数据历史记录 (38)示波器模式 (39)StreamSmart 400 和虚拟的 HP 39/40gs (40)键盘快捷键 (41)数学知识细节:缩放、平移和跟踪 (42)5 保修、法规和联系信息更换电池 (45)HP 有限硬件保修和客户服务 (45)客户服务 (46)Product Regulatory & Environment Information (50)231HP 移动计算实验室HP 移动计算实验室 (HP MCL) 由一个或多个 Fourier ® 传感器、一个 HP StreamSmart 400 和带有 StreamSmart Aplet 的 HP 39gs 或 HP 40gs 图形计算器组成。
管理员指南HP Session Allocation Manager (HP SAM) v.2.3© 版权所有 2007–2008 Hewlett-Packard Development Company, L.P. 此处包含的信息如有变动,恕不另行通知。
Microsoft 和 Windows 是 Microsoft Corporation 在美国和其他国家/地区的商标。
随 HP 产品和服务附带的明示保修声明涵盖了相应产品和服务的全部保修服务。
本文档中的内容不应视为构成任何附加保修条款。
HP 对本文档中出现的技术错误、编辑错误或遗漏不承担任何责任。
本文档包含的所有权信息受版权法保护。
未经 Hewlett-Packard Company 事先书面许可,不得复印、复制本文档的任何部分或将其翻译成其他语言。
本产品中嵌入的部分软件是 gSOAP 软件。
gSOAP 开发的部分软件版权归 (C)2001-2004 Robert A. van Engelen, Genivia inc. 所有。
保留所有权利。
本产品中软件部分由 GENIVIA INC 提供,不做任何形式的明示或暗示担保,包括但不限于特定目的适销性和适用性的暗示担保。
在任何情况下,对于因任何方式导致的、以任何责任逻辑推断的以及是否因为以任何方式使用本软件引发的契约、严格责任或民事侵权行为带来的任何直接、间接、偶然、特殊、惩罚性或必然性的损坏(包括但不限于替代商品或服务的采购、使用、数据或利益的损失或营业中断),作者概不负责,即使已被告知将发生此类损坏的可能性也是如此。
(c) 版权所有 1998-2007 OpenSSL Project。
保留所有权利。
(C) 版权所有 1995-1998 Eric Young(eay@)。
保留所有权利。
管理员指南HP Session Allocation Manager (HP SAM) v.2.3第四版(2008 年 11 月)第三版(2007 年 12 月)第二版(2007 年 8 月)第一版(2007 年 6 月)文档部件号:453252–AA4关于本手册警告!以这种方式显示的文字表示如果不按照指示操作,可能会造成人身伤害或带来生命危险。
注意:以这种方式显示的文字表示如果不按照指示操作,可能会损坏设备或丢失信息。
注:以这种方式显示的文字用以提供重要的补充信息。
ZHCN iiiiv关于本手册ZHCN目录1 简介本发行版中的新增功能 (2)主要特性 (3)概述 (3)HP SAM 的工作原理 (4)HP SAM 软件组件 (5)远程图形软件 (RGS) (6)常规任务 (6)设置 HP SAM (6)设置具有动态资源的用户 (8)设置具有静态(专用)资源的用户 (9)配置用户的显示器布局 (10)2 要求HP SAM 硬件和软件要求 (12)设置 SAM 环境的结构注意事项和最佳操作 (12)HP SAM 的域环境要求 (14)HP SAM Web 服务器和 SQL 服务器要求 (14)HP SAM 注册服务要求 (20)访问设备要求 (20)瘦客户机 (20)移动瘦客户机 (21)台式 PC 或笔记本式 PC (21)刀片式工作站客户端 (21)个人工作站客户端 (22)其他要求 (22)创建服务帐户 (22)获取管理权限 (22)更改防火墙 (22)Active Directory (23)3 安装安装顺序 (24)全新安装 (24)升级 (24)安装 HP SAM Web 服务器和 SQL 软件 (26)授予用户 HP SAM 管理员访问权限 (27)配置 HP SAM 系统设置 (28)ZHCN v配置安全套接字层 (SSL) (28)安装并验证 HP SAM 注册服务软件 (28)安装 HP SAM 注册服务 (28)创建 HP SAM 注册服务配置文件 (29)启动/重新启动 HP SAM 注册服务 (31)测试 HP SAM 注册服务 (31)安装并验证 HP SAM 客户端软件 (31)基于 Internet Explorer 的客户端 (32)基于 Windows XPe 的客户端 (33)基于 Windows CE 5.0 的客户端 (34)基于 Linux 的客户端 (34)配置设置 (36)全局和本地客户端配置文件 (43)合法横幅 (45)将 HP SAM 注册服务部署到所有 HP SAM 计算资源 (46)将 HP SAM 客户端软件部署到所有 HP SAM 访问设备 (46)4 管理登录 (48)常规导航和用户界面设计 (48)每页显示更多(或更少)项 (48)移动列 (48)对结果列表进行排序 (48)选择多个项目 (48)管理 HP SAM 管理员访问列表 (48)向 HP SAM 管理员组添加个人用户 (49)将安全组或组织单位添加到 HP SAM 管理员组 (49)从 HP SAM 管理员组删除用户或组 (50)HP SAM 管理员控制台标签 (51)主页标签 (51)用户和角色标签 (51)资源标签 (59)管理数据中心 (62)策略标签 (63)系统设置标签 (65)报告标签 (69)日志标签 (72)在访问设备上设置智能卡登录 (72)配置远程会话的会话时间限制 (74)附录 A 防火墙规则Web 服务器 (76)客户端 (76)资源 (77)SQL 服务器 (77)附录 B 常见问题vi ZHCN附录 C 注册服务错误代码附录 D 术语表索引 (86)ZHCN viiviii ZHCN1简介HP 远程客户端解决方案旨在满足各种用户的需求 - 从最基本的计算任务到要求更为严格的专业领域和技术应用,同时帮助 IT 管理人员更好地控制技术资源、简化桌面管理、提高灵活性,并尽可能降低总拥有成本。
底层 HP 远程客户端解决方案是一个统一的基础结构,通过一套常规工具可实现客户端部署、会话分配、对计算资源进行平衡,并支持不同用户群的业务需求。
HP Session Allocation Manager (HP SAM) 系统是管理 HP 远程客户端解决方案部署的控制点。
对于最终用户客户端访问设备与在集中位置(通常是数据中心)的计算资源上运行的桌面会话之间建立的连接,HP SAM 能够对其分配进行管理。
HP SAM 的用户可根据需要随时使用这些桌面会话。
有关 HP 远程客户端解决方案的详细信息,请访问/go/rcs。
ZHCN1本发行版中的新增功能●HP CCI 会话计时器的集成◦HP CCI 会话计时器是可从 HP 获得的独立于 HP SAM 的单独工具。
这些计时器允许管理员控制远程 RDP 会话在指定时间段后的自动断开连接或注销。
使用 HP SAM 2.3,这些计时器将与 HP SAM 注册服务一起安装在计算资源上,且现在具有扩展功能。
◦新集成的会话计时器现在已具有控制 RGS 会话和 RDP 会话的能力。
◦现有的会话计时器包括Active Sessions(活动会话)、Active But Idle Sessions(活动但空闲的会话)和Disconnected Sessions(已断开的会话)的可配置时间段。
新的会话计时器为Active But Idle(活动但空闲的会话)和Disconnected Sessions(已断开的会话)添加了 CPU 监视。
如果 CPU 使用率仍然高于可配置的阈值,则将阻止断开连接或注销操作。
这有利于确保连接不会注销,例如在执行重要计算时。
●安装诊断诊断测试在 HP SAM Web 服务器安装期间运行。
这些测试将检查可能导致 SAM 安装失败的常规配置或环境问题。
检查的项目包括 SAM 服务帐户权限;操作系统、SQL 服务器和 .NETFramework 版本支持;域环境支持;Windows 防火墙设置。
●RGS 剪贴板设置布局的控制◦早期版本中的剪贴板设置(客户端上和 HP SAM 策略中)只能启用/禁用 RDP 会话的剪贴板(剪切、复制和粘贴)。
通过使用 HP SAM 2.3,此设置现在可以控制 RDP 和 RGS 会话。
◦由 HP SAM 来控制剪贴板功能需要 RGS 5.2 或更高版本。
◦启用或禁用 HP SAM 客户端用户界面中的剪贴板将影响使用该客户端连接的所有会话。
◦剪贴板设置可使用 SAM 策略强制进行。
如果将此策略分配给角色,则用户就有可能同时打开多个会话,其中一部分会话允许复制和粘贴,其他则不允许。
●Linux 支持 - 客户端和刀片注:HP SAM 2.2 和更早版本的客户端无法连接到 Linux 资源。
●通用存取卡 (CAC) 支持CAC 是一种军用高安全性智能卡。
它在 HP SAM 中的行为与典型智能卡的行为相匹配。
SAM 不会访问 CAC 卡中超出确定用户凭证所需证书范围的扩展数据。
●新支持◦HP SAM Web 服务器上的 Windows 2008 Server◦域控制器上的 Windows 2008 Server◦Microsoft SQL Server 2008◦Windows XP (SP3)◦Windows Vista Service Pack 12第 1 章简介ZHCN主要特性●向用户分配计算资源(如刀片式 PC、刀片式工作站或虚拟机)的分配系统●计算资源可以自身注册●访问设备远程连接设置的集中管理●随身漫游和持久支持功能使用户可以从不同访问设备重新连接到一个打开的会话●可自定义的管理级别●使用和容量计划报告●用户/显示与计算资源之间的专用映射概述使用 HP SAM 可以实现远程计算资源在用户之间进行自动调配。
图 1-1 HP SAM 配置通过配置 HP SAM 可以将用户连接到特定远程计算资源(通过主机名或 IP 地址进行标识)的桌面会话,这就是所谓的静态连接。
在第 3 页的图 1-1 HP SAM 配置中,HP SAM 被配置为将用户 Tom 静态连接到 IP 地址为 15.2.76.100 的刀片式 PC 1。
无论 Tom 使用哪台访问设备,都会自动连接到地址为15.2.76.100 的刀片式 PC 1。
也可以将 HP SAM 配置为允许用户连接到任一计算资源池 - 这就是所谓的动态连接。
HP SAM 允许管理员为每个计算资源定义一个或多个角色。
例如,具有“abcde”角色的计算资源配置的应用程序可能具有管理库存事务或记帐功能。
在第 3 页的图 1-1 HP SAM 配置中,HP SAM 已配置为允许用户 Mai 动态连接到支持“abcde”角色的三台刀片式工作站中的一台。
HP SAM 使用 HP 远程图形软件 (RGS) 或 Microsoft® 远程桌面协议 (RDP) 连接访问设备和计算资源。