Enabling SMASH

You can set the advanced management module to use the System Management Architecture for Server Hardware Command Line Protocol (SMASH CLP).

From the Network Protocols page, you can enable or disable the SMASH or Secure SMASH command line protocols. These changes take effect immediately.

Notes:
  • To use the SMASH interface, you must use a login ID that is defined on the Login Profiles page. LDAP-authenticated users cannot access the SMASH interfaces.
  • The Secure SMASH interface is enabled by default.
  • If no SSH host key is present when the secure SMASH CLP is enabled, the SSH host key is generated automatically. SSH host key generation can take up to 5 minutes. Key generation completion is recorded in the event log.
  • See the IBM SMASH Proxy Installation and User's Guide for more information.

To enable the SMASH command line protocol, complete the following steps:

  1. In the navigation pane, click Network Protocols.
  2. Scroll to the SMASH Command Line Protocol (CLP) section. A page similar to the one in the following illustration is displayed.
    Graphic illustrating the SMASH Command Line Protocol page.
  3. To enable the SMASH command line protocol over Telnet, click Enabled in the SMASH CLP field. The selected value (Enabled/Disabled) takes effect immediately.
  4. To enable the Secure SMASH command line protocol over SSH, click Enabled in the Secure SMASH CLP field. The selected value (Enabled/Disabled) takes effect immediately.
  5. Click Save.