======================================================================
   NEC ESMPRO Agent Ver.4.5
   Installation Guide (Linux)                 SA45_E-IG-L-023-02-010
----------------------------------------------------------------------
[ Software name ]  NEC ESMPRO Agent (for Linux)
[ Version ] 4.5.20-1 or later
[ Copyright (C) ]  NEC Corporation
[ Applicable models ] NEC Express5800 Server Series
                      NEC NX7700x Server Series
[ Users ]  Customers who use NEC ESMPRO Agent (for Linux)
[ Software type ]  Application software

======================================================================

----------------------------------------------------------------------
User license agreement for NEC software
----------------------------------------------------------------------
  This user license agreement is an agreement between you and the NEC 
  Corporation (hereinafter referred to as NEC). Under the following 
  terms of agreement, NEC grants you the right to utilize this 
  software program (hereinafter referred to as "licensed program"), 
  but the customer will be bound to these to the terms.
  NEC will not be held liable for the use, installation, or the 
  results of the use of the licensed program. In addition, the source 
  code that GNU Lesser General Public License (LGPL) or Berkeley 
  Software Distribution License (BSD) was applied to obeys an 
  agreement of LGPL.

1.Terms
 (1)This user license agreement takes effect from the day the 
    software product is received by the user.
 (2)You may terminate your rights to use the licensed program under 
    this user license agreement at any time, by notifying NEC, in 
    writing, at least one month or longer prior to the requested date 
    of termination.
 (3)NEC reserves the right to terminate this license agreement if you 
    violate any of the provisions in this agreement.
 (4)Your rights to use the licensed program will continue until it is 
    terminated in accordance with the provisions stated in this 
    license agreement.
 (5)If the agreement is terminated for any reason by either party, 
    you are required to destroy the software, copies of the software 
    and its manuals and media, or return them to NEC immediately.

2.Usage right
  You may use the licensed program only on [ Applicable models ] 
  mentioned above using your Linux OS.

3.Copying, altering, and combining of the licensed program
 (1)You are granted the permission to create on copy of the licensed 
    program to use as a backup in case the program data becomes lost, 
    damaged or destroyed.
    Once the licensed program is loaded into memory on a PC, a copy 
    of the program may be stored only as backup incase the fixed 
    memory of the PC becomes damaged or lost.
 (2)The copyrights and license agreement must be attached to all 
    copies of the licensed program.
 (3)Unless otherwise specified in this user license agreement, you 
    may not use, copy, alter the licensed program or combine it with 
    another module. It may not reproduced in any publications or 
    networks. The handling of the licensed program and/or documents 
    must strictly follow the terms and conditions of this license 
    agreement, and at no time shall it be handled in any other terms.
 (4)All related documents (e.g., manuals) provided with the licensed 
    program may not be copied, altered or reproduced in any 
    publications or networks, under any circumstances.
 (5)This user license agreement does not transfer the intellectual 
    property of the licensed program to the user.

4.Transfer of the licensed program
 (1)All rights of this license agreement may be transferred to 
    another party ONLY when the following conditions are satisfied:
  (a) All materials including the licensed program, all copies of the 
      licensed program, this license agreement, and all other related 
      documents are transferred to the other party, and no material 
      concerning the licensed program is retained by you.
  (b) The recipient party agrees to conform to the terms of this user 
      license agreement.
 (2)Unless otherwise specified in this user license agreement, the 
    licensed program or rights for its use may not be transferred to 
    a third party.
    All matters concerning the transferring of the rights and program 
    must strictly follow the terms and conditions included in this 
    license agreement.

5.Decompilation
  You may not reverse engineer, decompile, or disassemble the 
  licensed program.

6.Term of a guarantee
 (1)NEC makes no warranties, expressed or implied concerning this 
    licensed program, and will at no time, be held liable to pay for 
    any expenses which may be incurred, should a problem result from 
    the use of the licensed program.
 (2)Regardless of the terms stated above in term (1), upon correction 
    of the licensed program errors (bugs), NEC may, at its own 
    discretion, release an update patch for error-correction 
    (hereinafter referred to as modification program), or 
    information, including NEC approved method of error correction.
    The modification program provided to you will be regarded as the 
    licensed program, and will follow the terms and conditions of 
    this license agreement.

7.No liability
  In no event shall NEC be held responsible for any indirect, direct 
  or consequential damages (including damages which NEC can or can 
  not foresee) which may be claimed to you by a third party.

8.Others
  The user must agree that any disputes concerning this user license 
  agreement will be settled at the Tokyo district court as the 
  exclusively appointed court.

----------------------------------------------------------------------
Trademarks
----------------------------------------------------------------------
  Linux is a trademark or registered trademark of Linus Torvalds in 
  Japan and other countries.
  Red Hat and Red Hat Enterprise Linux are trademarks or registered 
  trademarks of Red Hat, Inc. in the United States and other 
  countries.

  All other product, brand, or trade names used in this publication 
  are the trademarks or registered trademarks of their respective 
  trademark owners.
  (TM) or (R) mark is not specified in this document.

----------------------------------------------------------------------
Open-source software
----------------------------------------------------------------------
  Software consented to based on following license is included in NEC 
  ESMPRO Agent.
    LGPL
      libesmtp.dll is included in Esmpro-Express package.
    NET-SNMP(UCD-SNMP)
      ntagent is included in Esmpro-common package.
      ntpass.so is included in Esmpro-common package.
      libutil.so is included in Esmpro-common package.
    OpenSSL
      libcrypto.so is included in Esmpro-Express package.
    MD5
      amrpop.dll is included in Esmpro-Express package.

  Refer to "Open-source software that NEC ESMPRO Agent for Linux 
  applies" showing in the next website.
    http://www.express.nec.co.jp/linux/dload/esmpro/esm/private/license_en.html

----------------------------------------------------------------------
Summary
----------------------------------------------------------------------
  Chapter 1 Software introduction
  Chapter 2 Preparation before installation
            1)Checks of necessary packages
            2)Setting of snmpd.conf
  Chapter 3 Installation or Upgrade
  Chapter 4 Preparation after installation
            1)Setting of access control
            2)Setting of SELinux
            3)Setting of SigmaSystemCenter
            4)Setting of BMC (EXPRESSSCOPE Engine)
            5)Setting of Manager(SNMP)
            6)Setting of Express Report Service
  Chapter 5 Uninstallation

----------------------------------------------------------------------
Chapter 1 Software introduction
----------------------------------------------------------------------
  ESMPRO Agent is used with ESMPRO Manager which offers a management 
  function. ESMPRO Agent offers the function of management of server 
  operating statuses, prevention of server failures and surveillance 
  of server failures.

  Carefully read the following user license agreement for NEC 
  software before using this software. If you do not agree to the 
  terms of the agreement, do not download this software. By 
  downloading this software, you agree to be bound by the terms of 
  the agreement.

----------------------------------------------------------------------
Chapter 2 Preparation before installation
----------------------------------------------------------------------
  When it upgrade NEC ESMPRO Agent, this chapter is not necessary.
  Log in to the system as the root user when you set this chapter.

  1)Checks of necessary packages
    The following packages are needed to use NEC ESMPRO Agent. All 
    the packages are installed upon OS installation. If there are any 
    packages which are not installed, install them.

    The package installed by minimal does not list it.

    When the packages exists according to the architecture, it 
    install the packages of the architecture same as environment 
    installing NEC ESMPRO Agent. The RPM package name is named by 
    the following rules.
      <package name>-<version>-<number of release>.<architecture>.rpm

    Because there is dependence in a package, install it in higher 
    group order (Grp1 -> Grp2 -> Grp3).

    When you use Express Report Service (HTTPS), install the next 
    package.
          zip                           libcurl

    (*1) For interdependence, you appoint RPM package file at the 
         same time, and install it.
           # rpm -ivh *.rpm

    < Red Hat Enterprise Linux 7 >
    
    Grp1  lm_sensors-libs              | perl-parent             (*1)
          net-snmp-libs                | perl-PathTools          (*1)
          OpenIPMI-modalias            | perl-Pod-Escapes        (*1)
          perl                    (*1) | perl-podlators          (*1)
          perl-Carp               (*1) | perl-Pod-Perldoc        (*1)
          perl-constant           (*1) | perl-Pod-Simple         (*1)
          perl-Encode             (*1) | perl-Pod-Usage          (*1)
          perl-Exporter           (*1) | perl-Scalar-List-Utils  (*1)
          perl-File-Path          (*1) | perl-Socket             (*1)
          perl-File-Temp          (*1) | perl-Storable           (*1)
          perl-Filter             (*1) | perl-Text-ParseWords    (*1)
          perl-Getopt-Long        (*1) | perl-threads            (*1)
          perl-HTTP-Tiny          (*1) | perl-threads-shared     (*1)
          perl-libs               (*1) | perl-Time-HiRes         (*1)
          perl-macros             (*1) | perl-Time-Local         (*1)
    -----------------------------------+------------------------------
    Grp2  libtirpc                     | OpenIPMI-libs
          net-snmp-agent-libs          | perl-Data-Dumper
    -----------------------------------+------------------------------
    Grp3  net-snmp                     | OpenIPMI
          net-snmp-utils               | rpcbind
    ==================================================================

    < Red Hat Enterprise Linux 6 / Oracle Linux 6 >
    
    Grp1  libgssglue                   | perl-Module-Pluggable   (*1)
          lm_sensors-libs              | perl-Pod-Escapes        (*1)
          perl                    (*1) | perl-Pod-Simple         (*1)
          perl-libs               (*1) | perl-version            (*1)
    -----------------------------------+------------------------------
    Grp2  libtirpc                     | OpenIPMI-libs
          net-snmp-libs                |
    -----------------------------------+------------------------------
    Grp3  compat-libstdc++-296   (x86) | net-snmp-utils
          compat-libstdc++-33 (x86_64) | OpenIPMI
          dmidecode                (*) | rpcbind
          net-snmp
    ==================================================================
    (*) compat-libstdc++-296 and compat-libstdc++-33 are different in 
        a package to install by the architecture.
    (*) Minimal of Oracle Linux 6, dmidecode is not installed.

    < SUSE Linux Enterprise Server 12 >
    
    Grp1  libsensors4                  | snmp-mibs
    -----------------------------------+------------------------------
    Grp2  libslang2                    | libsnmp30
    -----------------------------------+------------------------------
    Grp3  libgthread-2_0               | perl-Term-ReadKey
          libnewt0_52              (*) | tcl
          perl-SNMP               (*1) | 
    -----------------------------------+------------------------------
    Grp4  aaa_base                     | newt                     (*)
          e2fsprogs                    | OpenIPMI
          glibc                        | rpcbind
          libstdc++                    | sed
          net-snmp                (*1) | tar
    ==================================================================
    (*)Download it from the next website, and please install it.
       https://build.opensuse.org/package/show/devel:libraries:c_c++/newt
         [Build Results] -> SLE_12*

  2)Setting of snmpd.conf
    Modify the environment setting file of snmpd (/etc/snmp/snmpd.conf) 
    to set a community privilege to "READ WRITE".
      dlmod ntpass /opt/nec/esmpro_sa/lib/ntpass.so
      ntpass .1.3.6.1.4.1.119.2.2.4.4          (ESMPRO MIB)
      ntpass .1.3.6.1.2.1.10.7                 (Ethernet Like MIB)

    Edit the environment setting file using vi commands, etc. For 
    details of the settings, see the online manual for snmpd.conf.

    "READ WRITE" gives authority to the following setting for all 
    MIB of community (public) of the existing set price.

    (Example 1)
      ####
      # Third, create a view for us to let the group have rights to:
      #       name           incl/excl     subtree         mask(optional)
      #view    systemview    included   .1.3.6.1.2.1.1
      #view    systemview    included   .1.3.6.1.2.1.25.1.1
      view    all            included      .1              80

      ####
      # Finally, grant the group read-only access to the systemview view.
      #       group       context sec.model sec.level prefix read   write  notif
      #access notConfigGroup ""   any       noauth    exact systemview none none
      access  notConfigGroup ""   any       noauth    exact  all    all    none

    (Example 2)
      # These really aren't meant for production use.  They include all MIBS
      # and can use considerable resources.  See snmpd.conf(5) for information
      # on setting up groups and limiting MIBS.
      #rocommunity public 127.0.0.1
      rwcommunity public default

    About the details of setting, refer to Help of the snmpd.conf.
    Carry out the following commands to confirm a help of snmpd.conf.
      # man snmpd.conf

----------------------------------------------------------------------
Chapter 3 Installation or Upgrade
----------------------------------------------------------------------
  This chapter describes installation or upgrade procedure of NEC 
  ESMPRO Agent.

   1. Log in to the system as the root user.

   2. Execute installation script of NEC ESMPRO Agent.
      In the case of an old version, installed NEC ESMPRO Agent is 
      upgraded.
        # sh ./esmsainst.sh -l en_US.UTF-8

      Installation script of NEC ESMPRO Agent enable automatic start 
      of snmpd and rpcbind, ipmi.

   3. Execute the following command to restart the system:
      [ Red Hat Enterprise Linux 7 and SUSE Linux Enterprise Server 12 ]
          # systemctl reboot

      [ Other than those above ]
          # reboot


----------------------------------------------------------------------
Chapter 4 Preparation after installation
----------------------------------------------------------------------
  When it upgrade NEC ESMPRO Agent, this chapter is not necessary.
  Log in to the system as the root user when you set this chapter.

  1)Setting of access control
    NEC ESMPRO Manager and Agent use the following ports. If a 
    firewall is placed between Manager and Agent, or if the firewall 
    is enabled on your system, open the following ports. Refer to the 
    following files for the port range.
      /proc/sys/net/ipv4/ip_local_port_range

    - Between Manager and Agent
      --------------------------+------------------------+------------
      Function                  |  Agent        Manager  | Note
      --------------------------+------------------------+------------
      Server Monitoring (SNMP)  |  161/udp  <-  161/udp  | snmp
      Report to Manager (SNMP)  |           ->           |
      --------------------------+------------------------+------------
      Report to Manager (SNMP)  | Auto-     ->  162/udp  | snmp-trap
                                | assignment             |
      --------------------------+------------------------+------------
      Report to Manager         | Auto-     -> 31134/tcp |
      (TCP/IP in Band,          | assignment             |
            TCP/IP Out-of-Band) |           <-           |
      --------------------------+------------------------+------------
      Express Report Service    | Auto-     -> 31136/tcp |
      (Via Manager)             | assignment             |
                                |           <-           |
      --------------------------+------------------------+------------
      Express Report Service    | Auto-     -> 31138/tcp |
      (HTTPS Via Forward        | assignment             |
                       Manager) |           <-           |
      --------------------------+------------------------+-------------
      * The upper direction shows the direction at start-up, and the 
        lower shows the return.
      * The port number to use other than SNMP sets it than Report 
        Setting screen.
      * The open examples of the port using iptables or firewalld are 
        as follows.
        Stop the service (iptables or firewalld) which is not used.
        + The open examples of the port using iptables are as follows.
          When you use an opening example of the port using iptables, 
          installation of iptables and iptables-services (RHEL7) are 
          necessary beforehand.
            # iptables -I INPUT  -p udp --dport 161 -s <IP Addres of Manager> -j ACCEPT
            # iptables -I OUTPUT -p udp --dport 161 -j ACCEPT
            # iptables -I OUTPUT -p udp --dport 162 -j ACCEPT
            # iptables -I OUTPUT -p tcp --dport 31134 -j ACCEPT
            # iptables -I OUTPUT -p tcp --dport 31136 -j ACCEPT
            # iptables -I OUTPUT -p tcp --dport 31138 -j ACCEPT
            # service iptables save
        + The open examples of the port using firewalld are refer to 
          the following website.
            Product Documentation for Red Hat Enterprise Linux
            https://access.redhat.com/documentation/en/red-hat-enterprise-linux/
              Red Hat Enterprise Linux 7
               +- Security Guide
                   +- 5. Using Firewalls
      * The open examples of the port using TCP Wrappers are refer to 
        the following website.
          Product Documentation for Red Hat Enterprise Linux
          https://access.redhat.com/documentation/en/red-hat-enterprise-linux/
            Red Hat Enterprise Linux 6
             +- Security Guide
                 +- 2. Securing Your Network
                     +- 2.6. TCP Wrappers and xinetd
            Red Hat Enterprise Linux 5
             +- Deployment Guide
                 +- VII. Security And Authentication
                     +- 48. Securing Your Network
                         +- 48.5. TCP Wrappers and xinetd

    - Between Mail Server and Agent
      --------------------------+------------------------+------------
      Function                  |  Agent        Manager  | Note
      --------------------------+------------------------+------------
      Express Report Service    | Auto-     ->   25/tcp  | smtp
      (Internet Mail)           | assignment             |
                                |------------------------+------------
                                | Auto-     ->  110/tcp  | pop3
                                | assignment             |
      --------------------------+------------------------+-------------
      * The upper direction shows the direction at start-up, and the 
        lower shows the return.
      * You can change the port to use than Report Setting.
      * The open examples of the port using iptables or firewalld are 
        as follows.
        Stop the service (iptables or firewalld) which is not used.
        + The open examples of the port using iptables are as follows.
          When you use an opening example of the port using iptables, 
          installation of iptables and iptables-services (RHEL7) are 
          necessary beforehand.
            # iptables -I OUTPUT -p tcp --dport 25 -j ACCEPT
            # iptables -I OUTPUT -p tcp --dport 110 -j ACCEPT
            # service iptables save
        + The open examples of the port using firewalld are refer to 
          the following website.
            Product Documentation for Red Hat Enterprise Linux
            https://access.redhat.com/documentation/en/red-hat-enterprise-linux/
              Red Hat Enterprise Linux 7
               +- Security Guide
                   +- 5. Using Firewalls
      * The open examples of the port using TCP Wrappers are refer to 
        the following website.
          Product Documentation for Red Hat Enterprise Linux
          https://access.redhat.com/documentation/en/red-hat-enterprise-linux/
            Red Hat Enterprise Linux 6
             +- Security Guide
                 +- 2. Securing Your Network
                     +- 2.6. TCP Wrappers and xinetd
            Red Hat Enterprise Linux 5
             +- Deployment Guide
                 +- VII. Security And Authentication
                     +- 48. Securing Your Network
                         +- 48.5. TCP Wrappers and xinetd

    - Between HTTPS Server and Agent
      --------------------------+------------------------+------------
      Function                  |  Agent        Manager  | Note
      --------------------------+------------------------+------------
      Express Report Service    | Auto-     ->  443/tcp  | https
      (HTTPS)                   | assignment             |
      --------------------------+------------------------+-------------
      * The upper direction shows the direction at start-up, and the 
        lower shows the return.
      * You can change the port to use than Report Setting.
      * The open examples of the port using iptables or firewalld are 
        as follows.
        Stop the service (iptables or firewalld) which is not used.
        + The open examples of the port using iptables are as follows.
          When you use an opening example of the port using iptables, 
          installation of iptables and iptables-services (RHEL7) are 
          necessary beforehand.
            # iptables -I OUTPUT -p tcp --dport 443 -j ACCEPT
            # service iptables save
        + The open examples of the port using firewalld are refer to 
          the following website.
            Product Documentation for Red Hat Enterprise Linux
            https://access.redhat.com/documentation/en/red-hat-enterprise-linux/
              Red Hat Enterprise Linux 7
               +- Security Guide
                   +- 5. Using Firewalls
      * The open examples of the port using TCP Wrappers are refer to 
        the following website.
          Product Documentation for Red Hat Enterprise Linux
          https://access.redhat.com/documentation/en/red-hat-enterprise-linux/
            Red Hat Enterprise Linux 6
             +- Security Guide
                 +- 2. Securing Your Network
                     +- 2.6. TCP Wrappers and xinetd
            Red Hat Enterprise Linux 5
             +- Deployment Guide
                 +- VII. Security And Authentication
                     +- 48. Securing Your Network
                         +- 48.5. TCP Wrappers and xinetd

    NEC ESMPRO Agent uses the following ports in local host.
    When it does access-limit setting using iptables or TCP Wrappers, 
    it admits the access to these.

    - Agent uses internal ports
      --------------------------+------------------------
      Function                  | Port
      --------------------------+------------------------
      rpcbind                   | 111/tcp
                                | 111/udp
      --------------------------+------------------------
      NEC ESMPRO Agent          | Auto-assignment
      --------------------------+------------------------
      * The open examples of the port using iptables are as follows.
        When you use an opening example of the port using iptables, 
        installation of iptables and iptables-services (RHEL7) are 
        necessary beforehand.
          # iptables -A INPUT -i lo -j ACCEPT
          # service iptables save
      * The open examples of the port using TCP Wrappers are refer to 
        the following website.
          Product Documentation for Red Hat Enterprise Linux
          https://access.redhat.com/documentation/en/red-hat-enterprise-linux/
            Red Hat Enterprise Linux 6
             +- Security Guide
                 +- 2. Securing Your Network
                     +- 2.6. TCP Wrappers and xinetd
            Red Hat Enterprise Linux 5
             +- Deployment Guide
                 +- VII. Security And Authentication
                     +- 48. Securing Your Network
                         +- 48.5. TCP Wrappers and xinetd

  2)Setting of SELinux
    If setting of SELinux is not "Disabled", change to "Disabled".

     1. Log in to the system as the root user.

     2. Confirm current setting of SELinux.

        - Case of disabled, displayed as follows.
            # getenforce
            Disabled

        - Case of enable, displayed as follows.
           # getenforce
           Enforcing

        - Case of displayed to warning, displayed as follows.
            # getenforce
            Permissive

    In the case of enabled, execute the following command:

     3. It open /etc/sysconfig/selinux by an editor and and look for 
        the following lines.
          SELINUX=<current setting>

     4. It edit the line mentioned above and save a file.
        - Case of Disabled, edit as follows.
            SELINUX=disabled
        - Case of Enforcing, edit as follows.
            SELINUX=enforcing
        - Case of Permissive, edit as follows.
            SELINUX=permissive

     5. Restart the system.
        [ Red Hat Enterprise Linux 7 and SUSE Linux Enterprise Server 12 ]
            # systemctl reboot

        [ Other than those above ]
            # reboot

  3)Setting of SigmaSystemCenter
    When you manage this machine in SigmaSystemCenter, 
    carry out this procedure. 
    When you do not manage this machine in SigmaSystemCenter, 
    this procedure is unnecessary.

     1. Log in to the system as the root user.

     2. Execute setting script of SigmaSystemCenter.
          # sh ./esmsscset.sh

     3. When using a blade server, refer to "Chapter 6 Using OSD (On 
        Screen Display) Feature" of the following document (User's 
        Guide) and set CPU blade name.

        - N8405-043 (SIGMABLADE-Hv2)
          http://www.58support.nec.co.jp/global/download/pdf/UGe_N8405-043_13th.pdf
        - N8405-019/019A (SIGMABLADE-M)
          http://www.58support.nec.co.jp/global/download/pdf/UGe_N8405-019_019A_15th.pdf

        Tips:
            It is written in EM Card User's Guide with "If NEC ESMPRO 
            Agent is used, do not use this feature to change the 
            blade name", but the change is no problem, when using 
            this NEC ESMPRO Agent for SigmaSystemCenter.

  4)Setting of BMC (EXPRESSSCOPE Engine)
    When you Auto Registration or Manual Registration this server 
    (NEC ESMPRO Agent) with NEC ESMPRO Manager to watch this server 
    (hardware), enable BMC (EXPRESSSCOPE Engine). If BMC 
    (EXPRESSSCOPE Engine) do not enable, can not monitor hardware. 
    Therefore NEC ESMPRO Manager cannot display the sensor 
    information such as temperature, the voltage, the fan of system. 
    And it is not reported to NEC ESMPRO Manager even if a state of 
    the hardware changes.

    In addition, Authentication Key is necessary to Auto Registration 
    or Manual Registration. Set Authentication Key beforehand in BMC 
    (Management Software) of EXPRESSSCOPE Engine 3.

     1. Login to EXPRESSSCOPE Engine 3.
        Input the user name / password of the following default and 
        log in.
          Default of IP address: 192.168.1.1
          Default of user name: Administrator
          Default of password: Administrator

     2. Select "Miscellaneous" in "Configuration" tab.
        Click <Edit> button in "ESMPRO Management".

     3. Select the following setting in PEF and Management Software.
          PEF
            Platform Event Filtering : Enable
          Management Software
            ESMPRO Management : Enable
            Authentication Key : Any
            Redirection(LAN) : Enable

     4. Click <Apply> button. The configuration information is set in 
        the BMC.

     5. Select "SNMP Alert" of "Alert" in "Configuration" tab.
        Click <Edit> button in "Alert".

     6. Select "Enable" in "Alert".

     7. Item of the SNMP Alert is displayed, select the following 
        setting.
          Alert : Enable
          Computer Name : Any
          Community Name : Any
          Alert Acknowledge : Enable
          Alert Receiver 1 IP Address : IP address of the management 
                                        PC on which NEC ESMPRO Manager
                                        is installed.

     8. Click <Apply> button. The configuration information is set in 
        the BMC.

     9. Login to NEC ESMPRO Manager.

    10. Register NEC ESMPRO Agent and BMC (EXPRESSSCOPE Engine) in 
        "Add Component" of "Auto Registration" or "Manual 
        Registration"

        For details, see NEC ESMPRO Manager online help.

    11. Case of "Auto Registration", see a.
        Case of "Manual Registration", see b.

     a. Auto Registration.

     a-1. The IP address of "IP Address Range Discovery" sets it so 
          that BMC and NEC ESMPRO Agent are included.

        CHECK:
            If you register the "Management Controller" management 
            for a server which has EXPRESSSCOPE Engine SP3 (2BMC 
            model), you should specify the search range which 
            includes both BMC IP addresses of Master and Standby.

     a-2. Enable search in SNMP(NEC ESMPRO Agent). The SNMP community 
          name sets it to a community name of this computer.
          The public is default of OS.

     a-3. Enable search in BMC (EXPRESSSCOPE Engine), and the SNMP 
          community name sets it to a community name of this computer.
          Input "Authentication Key", and click <Add> button.

     a-4. Click <Run Discovery> button, and register NEC ESMPRO Agent 
          and BMC.

     b. Manual Registration.

     b-1. Input the required items.

     b-2. Registration in "SNMP (NEC ESMPRO Agent)/WS-Man", and 
          select SNMP. The SNMP community name sets it to a community 
          name of this computer. The public is default of OS.

     b-3. Registration in "BMC (EXPRESSSCOPE Engine)/vPro (LAN)", 
          select BMC. Input "Authentication Key".

     b-4. Input IP address of BMC in IP Address1 of "BMC 
          (EXPRESSSCOPE Engine)/vPro (LAN)".

        CHECK:
            If the managed component is a server which has 
            EXPRESSSCOPE Engine SP3 (2BMC model), you should enter 
            the IP address of the management LAN port for the Master 
            BMC to the IP Address1, you should enter the IP address 
            of the management LAN port for the Standby BMC to the 
            form.

     b-5. Click <Add> button, and register NEC ESMPRO Agent and BMC.

     b-6. Click <Check Connection> button, and check connection with 
          NEC ESMPRO Agent and BMC.

  5)Setting of Manager(SNMP)
    It is necessary to set report means in "Report Setting" to report 
    it from NEC ESMPRO Agent to NEC ESMPRO Manager after having 
    reboot a system. Refer to NEC ESMPRO Agent Users Guide for the 
    setting method of other report means.

     1. Log in to the system as the root user.

     2. Move to the directory where ESMamsadm is stored.
          # cd /opt/nec/esmpro_sa/bin/

     3. Start Control Panel (ESMamsadm).
          # ./ESMamsadm
        [Report Setting] screen is displayed.

     4. Select "Base Setting" of "Report Setting".
        [Base Setting] screen is displayed.

     5. Select "Manager(SNMP)" of "Base Setting".
        [SNMP Trap Setting] screen is displayed.

     6. Select <add>. Input IP address.

     7. Select [ok]. [SNMP Trap Setting] screen is closed.

     8. Select [close]. [Base Setting] screen is closed.

     9. Select [close]. [Report Setting] screen is closed.

  6)Setting of Express Report Service

    When Express Report Service is introduced, refer to Express 
    Report Service Setup Guide (Linux/VMware).

----------------------------------------------------------------------
Chapter 5 Uninstallation
----------------------------------------------------------------------
  This chapter describes uninstallation procedure of NEC ESMPRO Agent.

   1. Log in to the system as the root user.

   2. Execute uninstallation script of NEC ESMPRO Agent.
        # sh ./esmsauninst.sh

          CHECK:
              A message of "warning: file {file name}: remove failed: 
              No such file or directory." is displayed when it 
              uninstall by rpm command, but NEC ESMPRO Agent is 
              uninstalled.
                # rpm -e Esmpro-type3
                # rpm -e Esmpro-Express
                # rpm -e Esmpro-common

   3. Execute the following command to restart the system:
      [ Red Hat Enterprise Linux 7 and SUSE Linux Enterprise Server 12 ]
          # systemctl reboot

      [ Other than those above ]
          # reboot

----------------------------------------------------------------------
                                        Copyright NEC Corporation 2017
