A hp smh file locations b hp smh ciphers, Glossary index – HP Systems Insight Manager User Manual
Page 5
Maximum Number of Sessions (Windows and Linux only)..........................................................................68
Session Timeout....................................................................................................................................68
UI Timeout...........................................................................................................................................68
Log Level..............................................................................................................................................68
Port 2301.............................................................................................................................................69
Multihomed certificate alternative names list.............................................................................................69
Custom UI............................................................................................................................................69
Log-based Directory...............................................................................................................................69
Configurable Logging............................................................................................................................69
Autostart Mode.....................................................................................................................................69
Httpd Error Log.....................................................................................................................................70
Icon View.............................................................................................................................................70
Box Order............................................................................................................................................70
Box Item Order.....................................................................................................................................70
Kerberos Authentication.........................................................................................................................70
User Groups.........................................................................................................................................71
Help message......................................................................................................................................71
File Based Command Line Interface.........................................................................................................71
Command Line Log Reader.....................................................................................................................72
SSL Cipher Suite configuration................................................................................................................73
Table of Contents
5