Solved

Obtain RSA info or configure RSA from within Windows?

Posted on 2007-11-27
5
5,016 Views
Last Modified: 2011-10-03
I need to configure an RSA in one of our domain controllers.  I don't want to take it off line.  Is it possible?

I'm hoping for some utility or something that can be run from Windows.  But based on past experiences with IBM, I'm not counting on it...
0
Comment
Question by:Cerixus
  • 3
  • 2
5 Comments
 
LVL 26

Expert Comment

by:lnkevin
Comment Utility
IBM suggest to remove power cable to install RSA because some servers require the external power-supply adapter (which comes with the Remote Supervisor Adapter) to provide the needed power for full functionality of theRemote Supervisor Adapter. So the default answer would be "NO"
Although you can sucessfully plug the card in with no power surge, you still need to update firmware at the reboot... so the best way is upgrade it on the weekend or off hours. Check this guide if you have not done so.
ftp://ftp.software.ibm.com/systems/support/system_x_pdf/48p9832.pdf

K
0
 
LVL 1

Author Comment

by:Cerixus
Comment Utility
The card is already physically installed.  I just need to find out if it has already been configured (get the IP) or configure it (set an IP).
0
 
LVL 1

Accepted Solution

by:
Cerixus earned 0 total points
Comment Utility
Ah ha!  One of the other engineers stumbled across the MPCLI utility (Management Processor Command Line Interface Utility).

http://publib.boulder.ibm.com/infocenter/eserver/v1r2/index.jsp?topic=/diricinfo/fqm0_r_mpcli_overview.html

Looks like this will do exactly what I want.  Apparently the syntax would be as follows (once you launch the utility):

setip -interface 1 -ipaddress x.x.x.x setip -interface 1 -gateway x.x.x.x setip -interface 1 -subnet x.x.x.x resetoutput restartmp

Now to try it out :)
0
 
LVL 26

Expert Comment

by:lnkevin
Comment Utility
If the card was plugged in, I am sure you can configure it without interfere your server's operation.

K
0
 
LVL 1

Author Comment

by:Cerixus
Comment Utility
...
0

Featured Post

Find Ransomware Secrets With All-Source Analysis

Ransomware has become a major concern for organizations; its prevalence has grown due to past successes achieved by threat actors. While each ransomware variant is different, we’ve seen some common tactics and trends used among the authors of the malware.

Join & Write a Comment

Suggested Solutions

Every server (virtual or physical) needs a console: and the console can be provided through hardware directly connected, software for remote connections, local connections, through a KVM, etc. This document explains the different types of consol…
Learn about cloud computing and its benefits for small business owners.
Sending a Secure fax is easy with eFax Corporate (http://www.enterprise.efax.com). First, Just open a new email message.  In the To field, type your recipient's fax number @efaxsend.com. You can even send a secure international fax — just include t…
This video demonstrates how to create an example email signature rule for a department in a company using CodeTwo Exchange Rules. The signature will be inserted beneath users' latest emails in conversations and will be displayed in users' Sent Items…

771 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question

Need Help in Real-Time?

Connect with top rated Experts

10 Experts available now in Live!

Get 1:1 Help Now