<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: GSP in Operating System - HP-UX</title>
    <link>https://community.hpe.com/t5/operating-system-hp-ux/gsp/m-p/2527031#M596473</link>
    <description>If you want show log of GSP with Accessing Guardian Service Processor Internal Port:&lt;BR /&gt;&lt;BR /&gt;The Guardian Service Processor (GSP) internal port can be used as a "back door" to reset&lt;BR /&gt;security options in case the GSP administrator password is forgotten, for example. It can&lt;BR /&gt;also be used in order to upgrade the GSP firmware from an HP-UX session. The internal&lt;BR /&gt;port needs to be configured in order to use it.&lt;BR /&gt;1. On the system, the GSP internal port should be /dev/tty1p0.&lt;BR /&gt;2. SAM does not configure the GSP internal port.&lt;BR /&gt;3. If the device file is not present, it can be created as follows:&lt;BR /&gt;#cd/dev&lt;BR /&gt;#mknod tty1p0 c 1 0x010000&lt;BR /&gt;4. Since this allows unrestricted access to the GSP and bypasses GSP security features (no&lt;BR /&gt;user or password required). Make sure to delete this device file when you have finished&lt;BR /&gt;using it.&lt;BR /&gt;5. The internal port can be accessed via terminal emulators such as cu. To use cu, you&lt;BR /&gt;need the follow entries (the entries must be exactly as shown):&lt;BR /&gt;/usr/lib/uucp/Systems needs the following entry:&lt;BR /&gt;gspiport Any;5 gspiport,f900 - ''''\r\d\r\d\r ogin:-BREAK-ogin:&lt;BR /&gt;uucp asswrd: uucp-BREAK-ogin: uucp asswrd: uucp&lt;BR /&gt;The spelling looks unusual, but it needs to be exactly as shown.&lt;BR /&gt;/usr/lib/uucp/Devices needs the following entry:&lt;BR /&gt;gspiport tty1p0 - 9600 direct&lt;BR /&gt;6. when all of the configuration is done, you should be able to access the GSP internal port&lt;BR /&gt;with the cu command:&lt;BR /&gt;cu-1/dev/tty1p0&lt;BR /&gt;7. To terminate the cu session, use "~." [return]&lt;BR /&gt;8. Kermit can also be used to access the special device file. See the kermit web pages for&lt;BR /&gt;details.&lt;BR /&gt;CAUTION Securing the /dev/tty1p0 device file with root capabilities will not prevent&lt;BR /&gt;non-root users from accessing the GSP internal port. This is due to the fact&lt;BR /&gt;that cu and kermit carry root access and run with the sticky bit enabled.&lt;BR /&gt;To secure the internal port from unauthorized use, be sure to remove the&lt;BR /&gt;/dev/tty1p0 file after using it.</description>
    <pubDate>Thu, 10 May 2001 14:57:32 GMT</pubDate>
    <dc:creator>Vincenzo Restuccia</dc:creator>
    <dc:date>2001-05-10T14:57:32Z</dc:date>
    <item>
      <title>GSP</title>
      <link>https://community.hpe.com/t5/operating-system-hp-ux/gsp/m-p/2527028#M596470</link>
      <description>I do not have the GSP configured on a Lan port but I have the ATTN amber flashing light on all the time.  Should I be concerned?</description>
      <pubDate>Thu, 10 May 2001 14:39:15 GMT</pubDate>
      <guid>https://community.hpe.com/t5/operating-system-hp-ux/gsp/m-p/2527028#M596470</guid>
      <dc:creator>lastgreatone</dc:creator>
      <dc:date>2001-05-10T14:39:15Z</dc:date>
    </item>
    <item>
      <title>Re: GSP</title>
      <link>https://community.hpe.com/t5/operating-system-hp-ux/gsp/m-p/2527029#M596471</link>
      <description>may be you have to log in to the GSP through the console and acknowledge all messages.&lt;BR /&gt;&lt;BR /&gt;When there is a abrupt shutdown due to power failure or any critcal failures causes the light to flash.&lt;BR /&gt;&lt;BR /&gt;If this solved your problem, please assign points</description>
      <pubDate>Thu, 10 May 2001 14:45:29 GMT</pubDate>
      <guid>https://community.hpe.com/t5/operating-system-hp-ux/gsp/m-p/2527029#M596471</guid>
      <dc:creator>Sprint Unix Team</dc:creator>
      <dc:date>2001-05-10T14:45:29Z</dc:date>
    </item>
    <item>
      <title>Re: GSP</title>
      <link>https://community.hpe.com/t5/operating-system-hp-ux/gsp/m-p/2527030#M596472</link>
      <description>Hi,&lt;BR /&gt;Just to make sure, I would connect GSP:&lt;BR /&gt;At the console type&lt;BR /&gt;CTRL-B then at the prompt type SL&lt;ENTER&gt;, to see what is logged: e&lt;ENTER&gt;, and &lt;ENTER&gt; to leave quit =q&lt;ENTER&gt;&lt;BR /&gt;and co to return at the console...&lt;BR /&gt;&lt;BR /&gt;All the best&lt;BR /&gt;Victor&lt;/ENTER&gt;&lt;/ENTER&gt;&lt;/ENTER&gt;&lt;/ENTER&gt;</description>
      <pubDate>Thu, 10 May 2001 14:46:02 GMT</pubDate>
      <guid>https://community.hpe.com/t5/operating-system-hp-ux/gsp/m-p/2527030#M596472</guid>
      <dc:creator>Victor BERRIDGE</dc:creator>
      <dc:date>2001-05-10T14:46:02Z</dc:date>
    </item>
    <item>
      <title>Re: GSP</title>
      <link>https://community.hpe.com/t5/operating-system-hp-ux/gsp/m-p/2527031#M596473</link>
      <description>If you want show log of GSP with Accessing Guardian Service Processor Internal Port:&lt;BR /&gt;&lt;BR /&gt;The Guardian Service Processor (GSP) internal port can be used as a "back door" to reset&lt;BR /&gt;security options in case the GSP administrator password is forgotten, for example. It can&lt;BR /&gt;also be used in order to upgrade the GSP firmware from an HP-UX session. The internal&lt;BR /&gt;port needs to be configured in order to use it.&lt;BR /&gt;1. On the system, the GSP internal port should be /dev/tty1p0.&lt;BR /&gt;2. SAM does not configure the GSP internal port.&lt;BR /&gt;3. If the device file is not present, it can be created as follows:&lt;BR /&gt;#cd/dev&lt;BR /&gt;#mknod tty1p0 c 1 0x010000&lt;BR /&gt;4. Since this allows unrestricted access to the GSP and bypasses GSP security features (no&lt;BR /&gt;user or password required). Make sure to delete this device file when you have finished&lt;BR /&gt;using it.&lt;BR /&gt;5. The internal port can be accessed via terminal emulators such as cu. To use cu, you&lt;BR /&gt;need the follow entries (the entries must be exactly as shown):&lt;BR /&gt;/usr/lib/uucp/Systems needs the following entry:&lt;BR /&gt;gspiport Any;5 gspiport,f900 - ''''\r\d\r\d\r ogin:-BREAK-ogin:&lt;BR /&gt;uucp asswrd: uucp-BREAK-ogin: uucp asswrd: uucp&lt;BR /&gt;The spelling looks unusual, but it needs to be exactly as shown.&lt;BR /&gt;/usr/lib/uucp/Devices needs the following entry:&lt;BR /&gt;gspiport tty1p0 - 9600 direct&lt;BR /&gt;6. when all of the configuration is done, you should be able to access the GSP internal port&lt;BR /&gt;with the cu command:&lt;BR /&gt;cu-1/dev/tty1p0&lt;BR /&gt;7. To terminate the cu session, use "~." [return]&lt;BR /&gt;8. Kermit can also be used to access the special device file. See the kermit web pages for&lt;BR /&gt;details.&lt;BR /&gt;CAUTION Securing the /dev/tty1p0 device file with root capabilities will not prevent&lt;BR /&gt;non-root users from accessing the GSP internal port. This is due to the fact&lt;BR /&gt;that cu and kermit carry root access and run with the sticky bit enabled.&lt;BR /&gt;To secure the internal port from unauthorized use, be sure to remove the&lt;BR /&gt;/dev/tty1p0 file after using it.</description>
      <pubDate>Thu, 10 May 2001 14:57:32 GMT</pubDate>
      <guid>https://community.hpe.com/t5/operating-system-hp-ux/gsp/m-p/2527031#M596473</guid>
      <dc:creator>Vincenzo Restuccia</dc:creator>
      <dc:date>2001-05-10T14:57:32Z</dc:date>
    </item>
  </channel>
</rss>

