2. In the Learn section, click Online publications.3. On the “Online publications” page, in the Brand field, select Servers.4. In the Family field, select BladeCenter.5. Click Continue.Detailed information about SOL setup instructions is available in the BladeCenterJS20 Installation and User’s Guide on the IBM BladeCenter Documentation CD.Also, see the documentation for the operating system for information aboutcommands that you can enter through an SOL connection. See the IBM EserverBladeCenter and BladeCenter T Management Module Command Line InterfaceReference Guide for information about:v Command-line interface guidelinesv Command syntax and descriptionsv Command-line interface error messagesSelecting the command targetYou can use the command-line interface to target commands to the managementmodule or to other devices installed in the BladeCenter unit. The command lineprompt indicates the persistent command environment: the environment wherecommands are entered unless otherwise redirected. When a command-lineinterface session is started, the persistent command environment is “system”; thisindicates that commands are being directed to the BladeCenter unit. See the IBMEserver BladeCenter and BladeCenter T Management Module Command LineInterface Reference Guide for additional information.Starting the command-line interfaceStart the management-module command-line interface from a client computer byestablishing a Telnet connection to the IP address of the management module or byestablishing an SSH connection. You can establish up to 14 separate Telnet or SSHsessions to the BladeCenter management module.Although a remote network administrator can access the management-modulecommand-line interface through Telnet, this method does not provide a secureconnection. As a secure alternative to using Telnet to access the command-lineinterface, SSH ensures that all data that is sent over the network is encrypted andsecure.The SSH clients listed below are available. Although some SSH clients have beentested, support or non-support of any particular SSH client is not implied.v The SSH clients distributed with operating systems such as Linux, AIX ® , andUNIX ® (see the operating-system documentation for information). The SSH clientof Red Hat Linux 8.0 Professional was used to test the command-line interface.v The SSH client of cygwin (see http://www.cygwin.com for information)v Putty (see http://www.chiark.greenend.org.uk/~sgatham/putty for information)The following table shows the types of encryption algorithms that are supported,according to the client software version that is being used.34 BladeCenter JS20 Type 8842: Hardware Maintenance Manual and Troubleshooting Guide