You can set the advanced management module to
use the System Management Architecture for Server Hardware Command
Line Protocol (SMASH CLP).
From the Network Protocols page, you can enable or disable
the SMASH or Secure SMASH command line protocols. These changes take
effect immediately.
Notes:
- To use the SMASH interface, you must use a login ID
that is defined on the Login Profiles page. LDAP-authenticated users
cannot access the SMASH interfaces.
- The Secure SMASH interface is enabled by default.
- If no SSH host key is present when the secure SMASH CLP is enabled,
the SSH host key is generated automatically. SSH host key generation
can take up to 5 minutes. Key generation completion is recorded in
the event log.
- See the IBM SMASH Proxy Installation and User's
Guide for more information.
To enable the SMASH command
line protocol, complete the following steps: