Still celebrating National IT Professionals Day with 3 months of free Premium Membership. Use Code ITDAY17

x
?
Solved

HP SIM (7.1) question?

Posted on 2014-03-21
10
Medium Priority
?
227 Views
Last Modified: 2015-05-07
Hi Experts

Can someone please tell me how to i can do the following on HP SIM.

1- run a report on all servers which are out of date with firmware - Please provide detials in steps, as i have never used HP sim before so its a bit of a grey area for me at the moment.

2- We have some servers in our domain that have more than 1 nic card configured, (e,g backup lan and data lan). HP sim is picking up all the nic including the ILO/RIB. I dont want these, so what is the best way to confiigure HP sim to filter out unnecessary information.

thanks
0
Comment
Question by:badabing1
[X]
Welcome to Experts Exchange

Add your voice to the tech community where 5M+ people just like you are talking about what matters.

  • Help others & share knowledge
  • Earn cash & points
  • Learn & ask questions
  • 2
  • 2
10 Comments
 
LVL 62

Expert Comment

by:gheist
ID: 39996064
You can filter that information logging in into local SMH on each server that has surplus network devices and non-hp controllers.
0
 

Author Comment

by:badabing1
ID: 40042533
can you please tell me how exactly i should do this and also what about number 1?

Thanks
0
 
LVL 62

Accepted Solution

by:
gheist earned 2000 total points
ID: 40042686
1) install on one node version control repository then configure others to use it
2) on each node disable unconnected adapters
0
 

Author Comment

by:badabing1
ID: 40232024
I will check this and report back.
0

Featured Post

Does Your Cloud Backup Use Blockchain Technology?

Blockchain technology has already revolutionized finance thanks to Bitcoin. Now it's disrupting other areas, including the realm of data protection. Learn how blockchain is now being used to authenticate backup files and keep them safe from hackers.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

Monitor input from a computer is usually nothing special.  In this instance it prevented anyone from using the computer.  This was a preconfiguration that didn't work.
This paper addresses the security of Sennheiser DECT Contact Center and Office (CC&O) headsets. It describes the DECT security chain comprised of “Pairing”, “Per Call Authentication” and “Encryption”, which are all part of the standard DECT protocol.
In this tutorial you'll learn about bandwidth monitoring with flows and packet sniffing with our network monitoring solution PRTG Network Monitor (https://www.paessler.com/prtg). If you're interested in additional methods for monitoring bandwidt…
In this video we outline the Physical Segments view of NetCrunch network monitor. By following this brief how-to video, you will be able to learn how NetCrunch visualizes your network, how granular is the information collected, as well as where to f…

705 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question