Server Management Unit : MMB
PRIMEQUEST ManageMent Board (MMB) manages the entire server. With dedicated CPUs and memory, the MMB can provide server control functions even if the server fails. The independent monitoring and integrated Web-based GUI helps control the server from a remote site.
* Please notice MMB based administration is only available for PRIMEQUEST 1800E. For monitoring PRIMEQUEST 1800E2, you need to install Server View Operating Manager.
Server Administration Outline
PRIMEQUEST 1800E MMB based administration include:
- Simple operation using a Web interface
- Ability to power on and power down partitions and the whole server
- Viewing of server component status (Fans, Power Supply Units, System Boards, I/O Units, CPUs, memory, and HDDs)
- Easy identification of server problem with alarm view
- Ability to change server configuration for each partition
- Swift troubleshooting of server problems by generating system administrative log files and viewing them via the MMB viewer
- Notification of administrative messages via e-mail or standard network administrative protocol (SNMP) Traps
The above functions are enabled by MMB inter-working with the system board management agent: PRIMEQUEST 1800E Server Agent (PSA). The PSA resides in each partition and manages server resources such as CPUs, memory, and I/O.
MMB can be redundantly configured by addition of a second MMB.
PRIMEQUEST 1800E can also be integrated with 3rd party system management products by defining SNMP Traps in the corresponding software configuration.
Remote Console (Video redirection)
Even from a remote site, you can access each PRIMEQUEST 1800E partition.
- Able to access OS console
- Can mount PC storage devices as server storage. PC storage such as DVD drives, USB devices, iso images, CD drives, and floppy drives are all compatible as PRIMEQUEST 1800E Remote Storage
BIOS view is also visible from the PC screen.
High Level Security
PRIMEQUEST 1800E has a solid security system. External communications can be encrypted. Even if a user account is stolen, the danger can be minimized. If someone tries to exploit the stolen account, any malicious actions can be prevented. Three major security features ensure such safe administration.
||Security of communications
||All data transmitted to/from administrators is rigorously encrypted. Secured Socket Layer (SSL) is used for https communication. Secured SHell (SSH) is used to encrypt data for shell script execution.
||Minimization of allowable operations
||There are three types of system resource actions.
- Viewing system status or configuration
- Activating or deactivating system resources. Starting or stopping system services
- Modifying system configurations
Administrators need only the first and second items. The 3rd item is not required. So, privileges such as Operator and Partition Operator, which administrators commonly use, do not include a privilege for system configuration changes.
This proper separation of privileges minimizes risk of malicious modification of system configurations. All the operations for the 3rd type can be executable only by privileged administrators.
||IP address restriction
||Even the worst possible case is countermeasure protected.
If privileged administrator account information is stolen, it is still possible to prevent malicious actions by making sufficient preparation -- in particular, restrict accessible IP addresses to MMB view.
This makes it practically impossible to steal such an IP address. Even if the intruder knew it, they could not change the IP address of their PC.