Sponsored Content
Operating Systems Solaris Help with Reviving a NETRA240 Pls? Post 303026365 by ozsavran on Monday 26th of November 2018 11:16:44 AM
Old 11-26-2018
Sun SC Cannot believe it has turned the system power on...

Dear Hicks,

Downloaded all the manuals about Netra, ALOM, etc. Very superficial, lightly touches on things. But still explained a few points like the DB9 serial port. That indeed was not intended to help with ALOM access. Just a regular serial port for after the OS boots, not a management port at all.

Now as I wrote I can start the leaf blower fan inside with just a "poweron" command. To start individual sub-components (FRUs), I tried " poweron {fru} " commands. For motherboard ı tried "poweron MB", "poweron MOTHERBOARD", and "poweron MB.SEEPROM", for SCSI disks I tried "poweron SCSI", "poweron ENC", "poweron ENC.SEEPROM", does not like these names, declares invalid. When I try "poweron PS1", or "removefru PS1", the SC does NOT declare these name are invalid but says they are NOT present! Smilie

Now this is fun indeed! ıf we have no Power Supplies present how the heck are we talking to you Mr. SC?

In summary I need to supply power to the DVD drive to boot anything. I looked inside the DVD bay, there indeed seems to be socket there intact. Since the HDD power light comes on and goes out, I think we just need the correct FRU name for the SCSI subsystem.

Help with Reviving a NETRA240 Pls?-wp_20181126_012jpg


Help with Reviving a NETRA240 Pls?-wp_20181126_013jpg


Help with Reviving a NETRA240 Pls?-wp_20181126_017jpg


Help with Reviving a NETRA240 Pls?-wp_20181126_019jpg
 

10 More Discussions You Might Find Interesting

1. Linux

pls help me

we hv a big enviroment networked. we use squid proxy. access allowed by src address previously. we have win2000 network with ads. my requirement is the proxy should allow domain users only for access. how can i map my windows userdatabase with squid is there any thing specific which has 2 b... (1 Reply)
Discussion started by: sriram.s
1 Replies

2. UNIX for Dummies Questions & Answers

Need help pls

Hi, I'm a newbie. I need help on my first assignment in UNIX. 1. How do I determine the number of non-empty directories? I was told to create a variable ARCHIVE, which points to the directory that contains the archive of the messages. But I'm so dumb and I don't even know how to do this. 2. In... (1 Reply)
Discussion started by: hygsg
1 Replies

3. UNIX for Dummies Questions & Answers

Pls Help

Hi every one I have got very very bad Email, My question is: How can I get all information about that f*** Email, I do mean IP,reall name, Adress, user name, password etc... I wonder if there is any program or website that I can see that email, help me please When I used windows Xp(old... (2 Replies)
Discussion started by: Cano
2 Replies

4. UNIX for Dummies Questions & Answers

Help pls!

Hi... Why should I press F1 to start windows?! I have Xp in my computer... thx 4 help Cano (1 Reply)
Discussion started by: Cano
1 Replies

5. Shell Programming and Scripting

pls help

I have a list of variables: ss1, ss5, ss6, ss8, st2 etc. (these values are not fixed, configurable). Now, I have assigned ss5=”test”. And I want to search in the list for the string “test” to know which variable is having the value “test”. Can u pls tell me how to do this? (10 Replies)
Discussion started by: kanchan_cp
10 Replies

6. Shell Programming and Scripting

pls help

Hi, I need your help guys. I have two data files, namely 101.amberized.pdb & 101.pdb . Now I want to replace the whole 3rd column of 101.amberized.pdb with the 3rd column of 101.pdb file. How do I do it in shell? Thanks in advance Parimal (11 Replies)
Discussion started by: chuchu
11 Replies

7. Shell Programming and Scripting

Pls Pls do help me

When i run this command, everything is ok. The file can be email and attached but soon after i download the file, the file cant be read. It's seem corrupted. Totally cant be read although i'm using context or wordfile. Original file generated at ek_bkup/alert/tbspace_datafile.log is OK..... ... (7 Replies)
Discussion started by: adzuanamir
7 Replies

8. UNIX for Dummies Questions & Answers

HELP PLs

I have this code: #!/bin/sh awk 'BEGIN NR == 2 repl = "PHI" $4 = repl print $0 'dryloop.txt and this code: #!/bin/sh sed -e '1s/\|$/\|COMID\|/g' -e 's/^087.*$/&PHI\|g' hl.dsldryloop > textdry.txt My code won't work. I want to change the COMID of lines starting with 087 . this is my... (15 Replies)
Discussion started by: arkhei
15 Replies

9. Homework & Coursework Questions

Help pls

How to find the ten most common words in a file (1 Reply)
Discussion started by: jass
1 Replies

10. Solaris

NETRA240 in HLR CDMA Wireless Exchange... help is apreciated

Greetings, I hope my post finds you all OK, I have a Netra240 server in an HLR inside a wireless CDMA Exchange, it works as a Hard Disk Unit (HDU) as shown in Local Management Terminal (LMT) as show in the picture 1 attached. The power went down because of a power failure in main UPS, when... (2 Replies)
Discussion started by: Sharista
2 Replies
ATTACH(5)							File Formats Manual							 ATTACH(5)

NAME
attach, session, nop - messages to initiate activity SYNOPSIS
Tnop tag[2] Rnop tag[2] Tsession tag[2] chal[8] Rsession tag[2] chal[8] authid[28] authdom[48] Tattach tag[2] fid[2] uid[28] aname[28] ticket[72] auth[13] Rattach tag[2] fid[2] qid[8] rauth[13] DESCRIPTION
The nop request does nothing overt but may be used to synchronize the channel between two service hosts initially. The session request is used to initialize a connection between a client and a server. All outstanding I/O on the connection is aborted. The set of messages between session requests is called a session. The host's user name (authid) and its authentication domain (authdom) identify the key to be used when authenticating to this host. The exchanged challenges (chal) are used in the authentication algorithm. If authid is a null string no authentication is performed in this session. The tag should be NOTAG (value 0xFFFF) for a nop or session message. The attach message serves as a fresh introduction from a user on the client machine to a server. The message identifies the user (uid) and may select the file tree to access (aname). The ticket and auth arguments contains authorization data derived from the exchanged chal- lenges of the session message; see auth(6). As a result of the attach transaction, the client will have a connection to the root directory of the desired file tree, represented by fid. An error is returned if fid is already in use. The server's idea of the root of the file tree is represented by the returned qid. ENTRY POINTS
An attach transaction will be generated for kernel devices (see intro(3)) when a system call evaluates a file name beginning with Pipe(2) generates an attach on the kernel device pipe(3). The mount system call (see bind(2)) generates an attach messages to the remote file server. When the kernel boots, an attach is made to the root device, root(3), and then an attach is made to the requested file server machine. SEE ALSO
auth(6) ATTACH(5)
All times are GMT -4. The time now is 05:14 AM.
Unix & Linux Forums Content Copyright 1993-2022. All Rights Reserved.
Privacy Policy