Solved

Step-By-Step commands for enabling new Solaris10 T2000 server for remote admin.

Posted on 2008-10-10
3
1,021 Views
Last Modified: 2013-12-21
We are purchasing a new Sun T2000 server (Solaris10) in Europe and our onsite IT support is not familiar with Solaris. The T2000 server is brand new still in the box.

We need to provide the step by step commands to setup remote admin access for our vendor to perform remote configuration.

Assuming the details are:
Userid: root
Password: ????? what is the default root password?
IP Address: 10.0.0.2
Subnet Mask: 255.255.255.0
Gateway: 10.0.0.1
DNS: 10.0.0.1

What are the minimal commands/steps to configure IP address and enable remote administration?

Thanks
Joo
0
Comment
Question by:artradis
3 Comments
 
LVL 13

Assisted Solution

by:Rowley
Rowley earned 150 total points
ID: 22686324
check out http://docs.sun.com/source/819-7991-10/configure.html#50524174_pgfId-426451 for detailed, step by step instructions.
0
 
LVL 5

Assisted Solution

by:si_shamil
si_shamil earned 150 total points
ID: 22687042
Here is a very good step by step instructions for this model
http://woss.name/2006/04/21/getting-started-with-a-sun-t2000/
0
 
LVL 11

Accepted Solution

by:
jgiordano earned 200 total points
ID: 22692005
the first time you log into the T2000 alom issue at the sc> prompt  setupsc and this will take you into a wizard and ask you the questions above along with other management questions.

It will ask you to change the password first if you haven't already. There is no password by default and the user is admin not root. (it will drive you nuts for a while)

If you just want to configure the above issue:

setsc netsc_dhcp false
setsc netsc_ipaddr <IP ADDRESS>
setsc netsc_ipgateway <GATEWAY>
setsc netsc_ipnetmask <NETMASK>


something to consider is older alom software did not support ssh; if yours does you could also issue a
setsc if_connection ssh to use instead of telnet. (you could upgrade the firmware for the latest ssh option)
0

Featured Post

Better Security Awareness With Threat Intelligence

See how one of the leading financial services organizations uses Recorded Future as part of a holistic threat intelligence program to promote security awareness and proactively and efficiently identify threats.

Join & Write a Comment

Suggested Solutions

Introduction Regular patching is part of a system administrator's tasks. However, many patches require that the system be in single-user mode before they can be installed. A cluster patch in particular can take quite a while to apply if the machine…
The purpose of this article is to demonstrate how we can use conditional statements using Python.
Learn how to get help with Linux/Unix bash shell commands. Use help to read help documents for built in bash shell commands.: Use man to interface with the online reference manuals for shell commands.: Use man to search man pages for unknown command…
Learn how to find files with the shell using the find and locate commands. Use locate to find a needle in a haystack.: With locate, check if the file still exists.: Use find to get the actual location of the file.:

759 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question

Need Help in Real-Time?

Connect with top rated Experts

19 Experts available now in Live!

Get 1:1 Help Now