NEC NEC Express5800 Series User Manual

Manual is about: Express5800 Series;

Summary of NEC Express5800 Series

  • Page 1

    Nec express server express5800 series expressscope engine 3 user’s guide 1. Overview 2. Configuring the host system 3. Configuring a management pc 4. Networking 5. Using remote management 6. Command line interface 7. Ws-management (web service for management) 8. Troubleshooting 4th edition jun, 2012...

  • Page 2

    Trademarks and patents expressscope is registered trademarks of nec corporation. Expressbuilder and esmpro are registered trademarks of nec corporation. Microsoft, windows and windows vista are registered trademarks of microsoft corporation in the united states and other countries. Firefox is regist...

  • Page 3

    Table of contents trademarks and patents..............................................................................................................................2 notes .................................................................................................................................

  • Page 4

    State acquisition ...................................................................................................................................60 power state acquisition ....................................................................................................................60 lamp ...

  • Page 5

    Symbols the following symbols are used throughout this manual. Notice items to be observed or points to be noted when using this product. Items to be checked when using this product or software. Information useful or convenient for you. Example of troubles occurred. - 5 -.

  • Page 6

    Preface the expressscope engine 3 enables you to monitor the operating status of the host system (power supplies, fans, temperature and so forth), to operate the host system’s keyboard, video, and mouse (kvm) from a remote console* and to access to cd-rom/floppy disk drives on a remote site*. The ex...

  • Page 7: 1. Overview

    1. Overview the host system comes standard with the bmc (system management lsi) and a management lan port dedicated to the bmc. By connecting the management lan port to your network, you can monitor and control the host system from a remote site via a web browser and ssh client. With the optional n8...

  • Page 8

    2. Configuring the host system this chapter describes the settings necessary to configure the bmc in the host system. Default network settings the bmc’s default network settings are as follows: ip address: 192.168.1.1 user name: administrator password: administrator • connect the management lan port...

  • Page 9

    Management lan settings you can configure basic setting of management lan settings of bmc for remote management using web server function and command line interface of bmc by using some tools • web browser please refer to chapter 5 for details. • bmc configuration (off-line) press the f4 key during ...

  • Page 10

    Subnet mask of your management lan. If dhcp has been used, an automatically obtained subnet mask ip address will appear. (default setting is 255.255.255.0.) default gateway if dhcp is not used to automatically obtain a default gateway ip address, enter the default gateway of your management lan. If ...

  • Page 11

    - 11 - the bmc initialization also deletes the settings for esmpro/ servermanager(a software application bundled for remote management). Be sure to perform a backup for the esmpro/servermanager settings before you change the bmc settings. * in some systems, the default settings are different for dch...

  • Page 12

    3. Configuring a management pc this chapter describes the settings necessary for the remote management pc that will be connected to the host system. Setting your browser configure the following settings: - enable ssl. - allow java script execution. - allow java execution. - accept cookies. - allow p...

  • Page 13

    Notice if the management pc runs windows xp, remote media function may not work. You need to apply the latest service pack. - 13 -.

  • Page 14: 4. Networking

    - 14 - 4. Networking tcp/ip ports the bmc uses the tcp/ip ports listed below. If you use the bmc in a firewall environment, you need to allocate the port numbers (shown in the right column) to the individual non-block ports. Module name port # protocol direction module name port # remote media (non-...

  • Page 15: 5. Using Remote Management

    5. Using remote management overview the bmc web server function allows you to control the host system’s power and kvm from a remote console via a web browser. Part of the above function is implemented by java applet. Connecting to the web server access the following url from the web browser on the r...

  • Page 16

    If you use internet explorer 7(or 8), the following page is displayed and https connection is blocked. In this case, select "continue to this website" to continue. - 16 -.

  • Page 17

    Login and logout login when the login page appears, input the user name and password, and then click [login]. 1. The display language can be selected to english or japanese. 2. The online help is displayed. 3. Please input username and password. 4. Secure mode(https) or non secure mode(http) can be ...

  • Page 18

    - 18 - logout click “logout” in the upper right corner of the window. When a confirmation dialog appears, click [ok] to log out. After you log out, you return to the login page. Besides, all the remote device windows that were opened during login will be closed. Notice if the browser is slow during ...

  • Page 19

    Server panel the server panel is displayed under a browser after log in. The server panel has following functions. 7 6 5 4 3 2 1 1. The virtual lcd that displays the state of the host system. 2. The button to start remotekvm/media 3. The button that minimizes the server panel. 4. The power switch an...

  • Page 20

    System a 4 3 1 2 c b a. The system tab. Bmc supported functions are displayed. B. The menu that can be selected in the system tab is displayed. C. Information selected by b is displayed. The screen of "summary" is displayed in the above-mentioned example. Menu 1 summary the state of information and ...

  • Page 21

    Remote access b a c 1 2 3 4 a. The remote access tab. Bmc supported functions are displayed. B. The menu that can be selected in the remote access tab is displayed c. Information selected by b is displayed. The screen of "power control" is displayed in the above-mentioned example. Menu 1 power contr...

  • Page 22

    - 22 - the host system detects remote media as following devices: • ami remote fd • ami remote cd/dvd • ami remote usb mem the access lamp comes to remain lighting after it connects it according to the kind of the floppy disk drive of management pc. Notice when the operation into which the resolutio...

  • Page 23

    Configuration c 1 2 3 4 5 6 7 8 a b a. The configuration tab. Bmc supported functions are displayed. B. The menu that can be selected in the configuration tab is displayed c. Information selected by b is displayed. The screen of "eco" is displayed in the above-mentioned example. Menu 1 network set i...

  • Page 24

    Power consumption and the throttling situation are displayed. Set to manage the electric power control. 6 miscellaneous set to manage from sel, the access log, ac-link, pef, and the management software. 7 backup/restore backup and restore each item that was set. 8 system bios some functions of syste...

  • Page 25

    Group domain blank blank privilege administrator user ldap authentication disable disable ip address 0.0.0.0 blank port 389 or 639 389 search base blank blank bind domain name blank blank bind password blank blank mail alert disable disable waiting time for smtp server's response 30 30 to:1 enable d...

  • Page 26

    Port (no encryption) 5120 5120 port (encryption) 5124 5124 aggressive mode(*1) disable no change power threshold(pa) max power consumption no change correction time limit 2 no change shutdown system disable no change non-aggressive mode(*2) disable no change power threshold(pn) max power consumption...

  • Page 27

    - 27 - example of an e-mail alert: following contents are sent as e-mail alert. Virtual lcd message: system rear fan4 lower non-critical event information: record id: 0aa0h timestamp: 10/13/2011 17:59:23 severity: non-critical description: fan(speed) - error lower non-critical - going low dump: a0 0...

  • Page 28

    Update 1 2 b a c a. The update tab. Bmc supported functions are displayed. B. The menu that can be selected in the update tab is displayed c. Information selected by b is displayed. The screen of "bmc firmware" is displayed in the above-mentioned example. Menu 1 bmc firmware update the bmc firmware ...

  • Page 29: 6.  Command Line Interface

    6. Command line interface overview with the bmc command line interface, you can control the host system from a remote ssh client. The bmc supports ssh (version 2) protocol. Connecting to bmc access the bmc ip address or dns host name from ssh client on the remote management pc. To use command line i...

  • Page 30

    Login and logout login enter your user name and password at login prompt. A command prompt will be displayed after login. Also you can login by using public key authentication. The user account is common to the one for a remote management function via web browser. The number of users who can log in ...

  • Page 31

    Basic commands this section describes basic commands to use them as the command line interface. These basic commands manage the host system by using the concept of command (verb) and target (managed element) proposed by dmtf (distributed management task force). Each basic command functions to a spec...

  • Page 32

    Help syntax: help [] [] description: a basic command, , can be specified for the . The help command displays the help string for specified basic command when argument is specified. Reset syntax: reset [] [] description: the reset command performs a hardware reset on the . /admin1/system1 and /admin1...

  • Page 33

    The show command is used to display information about the target specified by the argument. The command displays the target specified by the as the first line of the information. It displays the current default target in the first line if is not specified. The default behavior of the command for the...

  • Page 34

    - 34 - version syntax: version [] description: the version command is used to display the version of the command line protocol specification which is supported..

  • Page 35

    Remote control you can perform remote control of the host system at the command prompt. Notice performing remote control when the operating system is running may cause the loss of data in the host system. The user must have an account as operator or administrator for remote control. Power on enter t...

  • Page 36

    Remote console to start a character-based remote console, enter the following command at the command prompt. Start /admin1/system1/textredirectsvc1 to return from the character-based remote console to the command interface session, enter the stop keys (key, key, key, key and key) during the characte...

  • Page 37

    - 37 - to stop the character-based remote console using by other user forcibly, enter the following command at the command prompt. Set /admin1/system1/textredirectsvc1/textredirectsap1 enabledstate=6 please confirm in advance whether it is ok to stop the character-based remote console using by other...

  • Page 38

    Uid switch control you can turn on/off the uid (unit id) led on the host system by the virtual uid switch through the command line interface. This function is available only in the host system with uid led. Notice the user must have an account as administrator for uid switch control (turning on or t...

  • Page 39

    • the uid led will blink (flash) when it is controlled by chassis identify function of management software such as esmpro/ servermanager. The uid led will turn on when it is controlled by pushing the uid switch of the host system or using uid switch control function of bmc's web server or command li...

  • Page 40

    System event log you can display system event log and modify setting of the system event log through the command line interface. Viewing system event log to move the current default target to /admin1/system1/log1, enter the following command at the command prompt. Cd /admin1/system1/log1 here, to co...

  • Page 41

    Setting of system event log to move the current default target to /admin1/system1/log1, enter the following command at the command prompt. Cd /admin1/system1/log1 the "properties" section reported by the following command indicates the current setting of system event log. Show enter the following co...

  • Page 42

    Access log you can display, clear, and set the access log for the management lan. The user must have an account as administrator for clearing and setting the access log. The following are events supported by the access log function. • login and logout events for http, https, and ssh connections • sy...

  • Page 43

    You can display only access log that corresponded to the specified from following condition. • timestamp specify the date by the following format: mm/dd/yyyy • user specify the user name. • ipaddress specify the ip address on the remote management pc by the following format: xxx.Xxx.Xxx.Xxx • protoc...

  • Page 44

    Access log might not be correctly displayed with timestamp condition about the log of recorded from ac on to dc on on host system. Clearing access log to move the current default target to /admin1/sp1/log1/record1, enter the following command at the command prompt. Cd /admin1/sp1/log1/record1 enter ...

  • Page 45

    - 45 - means that the access log is disabled. This is the dynamic setting. • oemnec_httplog_enable this specifies whether access log for login/logout of http is enabled. The valid values for this property are "2" and "3". "2" means that the access log is enabled. "3" means that the access log is dis...

  • Page 46

    User settings this section describes how to confirm and modify the user account through the command line interface. To move the current default target to an user account target which you would like to confirm or (and) modify, enter the following command at the command prompt. Means any value between...

  • Page 47

    Network settings this section describes how to confirm and modify the network setting for management lan through the command line interface. To move the current default target to /admin1/sp1/enetport1, enter the following command at the command prompt: cd /admin1/sp1/enetport1 enter the following co...

  • Page 48

    The properties which the access limitation target contains are as follows: • oemnec_allowedaccessips this specifies the ip addresses that permit access to the management lan. Divide ip address by "," (ex. 192.168.1.2, 192.168.1.2, …) or use asterisk (ex. 192.168.1.*), if you would like to set multip...

  • Page 49

    Followings describe how to confirm and modify the dhcp setting for management lan through the command line interface. To move the current default target to /admin1/sp1/enetport1/lanendpt1/ipendpt1, enter the following command at the command prompt: cd /admin1/sp1/enetport1/lanendpt1/ipendpt1 enter t...

  • Page 50

    • accessinfo this specifies the ip address of the default gateway for the management lan. This property is read-only. Followings describe how to confirm and modify the network setting with disabling dhcp for management lan through the command line interface. To move the current default target to /ad...

  • Page 51

    Set = the properties which the http service target contains are as follows: • enabledstate this specifies whether http port is enabled for the management lan. The valid values for this property are "2" and "3". "2" means that the http port is enabled. "3" means that the http port is disabled. This i...

  • Page 52

    - 52 - enter the following command if you would like to modify a property of the ssh service target. Set = the properties which the ssh service target contains are as follows: • enabledstate this specifies whether ssh port is enabled for the management lan. The valid values for this property are "2"...

  • Page 53

    Power consumption control you can control the power consumption of the host system through the command line interface. The user must have an account as administrator for controlling the power consumption. To move the current default target to /admin1/system1, enter the following command at the comma...

  • Page 54

    • oemnec_bootperformanceoptimized this specifies whether performance optimized mode is enabled. This is the dynamic setting. This property is not displayed if oemnec_boottimeconfig is disabled. • oemnec_boottimeconfig this specifies whether bootingmode is enabled. This is the dynamic setting. Defaul...

  • Page 55

    - 55 - this specifies the value of the power consumption starting he power consumption control. This is the dynamic setting. This property is not displayed if oemnec_aggressivemode is disabled. • oemnec_aggressivemodesetablepowercapvalue (oemnec_setablepowercapvalue) this specifies the value range o...

  • Page 56

    Confirming system information this section describes how to confirm the system information (product, bios/bmc firmware revision, mac address of system lan, cpu, memory) through the command line interface. The values of the properties for items not supported by the host system is not displayed for th...

  • Page 57

    Confirming system bios revision you can confirm the system bios revision through the command line interface by entering following the basic command at the command prompt. Show /admin1/system1/swid1 in this case, the system bios revision is appeared at the right side of "versionstring=" string in the...

  • Page 58

    For example, enter the following command when you would like to confirm the information of cpu1. Show cpu1 the example of displaying information in this case is shown below. Ufip=/admin1/system1/cpu1 properties: enabledstate=enabled oemnec_clock=2660mhz oemnec_validcore=4 oemnec_maxcore=4 oemnec_val...

  • Page 59

    Confirming memory information to move the current default target to /admin1/system1, enter the following command at the command prompt. Cd /admin1/system1 here, to confirm all the targets for memory (dimm), enter the following command at the command prompt. All the memory (dimm) targets are represen...

  • Page 60

    Special extended commands this section describes the special extended command which can do state acquisition (powerstate, lampstate) and interrupt generation for os dump (nmidump). The special extended commands use the syntaxes different from the basic command's ones. State acquisition you can acqui...

  • Page 61

    - 61 - status led state acquisition enter the following command at the command prompt: lampstate -statuslamp one of the following responses is returned according to the status led state. Off status led is turned off. Green on status led lights in green. Green blink status led is blinking in green. A...

  • Page 62

    Interrupt generation for os dump you can execute os dump by entering following command at the command prompt. Nmidump /admin1/system1 notice the user must have an account as administrator for executing the nmidump command. The above command behavior is equivalent to pressing the dump switch on the h...

  • Page 63: Management)

    7. Ws-management (web service for management) overview with the ws-management protocol, you can control the host system and check the sensor of host system. Expressscope engine 3 implementation of ws-management complies with the specification, dtmf web services for management 1.0.0. Expressscope eng...

  • Page 64

    Power on create the file input-requestpowerstatechange2.Xml and enter the following command, if you use winrm. Winrm invoke requestpowerstatechange http://schemas.Dmtf.Org/wbem/wscim/1/cim-schema/2/cim_powermanagementserv ice?__cimnamespace=root/cimv2+name=ipmi¥_power¥_service+creationclassna me=cim...

  • Page 65

    - 65 - d.32+systemcreationclassname=host_computersystem -r:https://ip_address/wsman -username:username -password:password -auth:basic -encoding:utf-8 -format:xml -file:input-requestpowerstatechange6.Xml -skipcncheck -skipcacheck -skiprevocationcheck input-requestpowerstatechange6.Xml xmlns:n1="http:...

  • Page 66

    Os shutdown create the file input-requestpowerstatechange8.Xml and enter the following command, if you use winrm. Winrm invoke requestpowerstatechange http://schemas.Dmtf.Org/wbem/wscim/1/cim-schema/2/cim_powermanagementserv ice?__cimnamespace=root/cimv2+name=ipmi¥_power¥_service+creationclassna me=...

  • Page 67

    - 67 - system reset create the file input-requestpowerstatechange10.Xml and enter the following command, if you use winrm. Winrm invoke requestpowerstatechange http://schemas.Dmtf.Org/wbem/wscim/1/cim-schema/2/cim_powermanagementserv ice?__cimnamespace=root/cimv2+name=ipmi¥_power¥_service+creationcl...

  • Page 68

    Interrupt generation for os dump create the file input-requestpowerstatechange11.Xml and enter the following command, if you use winrm. Winrm invoke requestpowerstatechange http://schemas.Dmtf.Org/wbem/wscim/1/cim-schema/2/cim_powermanagementserv ice?__cimnamespace=root/cimv2+name=ipmi¥_power¥_servi...

  • Page 69

    Sensor information you can get sensor information either by enumeration of all sensors or by retrieving specified sensor. Enumeration of all sensors enter the following command, if you enumerate numeric sensors (e.G.: temperature, voltage) with winrm. Winrm enumerate http://schemas.Dmtf.Org/wbem/wsc...

  • Page 70: 8.  Troubleshooting

    - 70 - 8. Troubleshooting error messages abnormality occurs while using remote management, and the error dialog might be displayed in management pc. Please refer to the list of the message of the online help for the main message and the coping process. About eco setting the electric power value may ...

  • Page 71: License Notes

    License notes this product includes open source software programs described below. Gnu general public license • busybox • linux kernel • u-boot • stunnel gnu general public license version 2, june 1991 copyright (c) 1989, 1991 free software foundation, inc., 51 franklin street, fifth floor, boston, ...

  • Page 72

    Software. If the software is modified by someone else and passed on, we want its recipients to know that what they have is not the original, so that any problems introduced by others will not reflect on the original authors' reputations. Finally, any free program is threatened constantly by software...

  • Page 73

    C) if the modified program normally reads commands interactively when run, you must cause it, when started running for such interactive use in the most ordinary way, to print or display an announcement including an appropriate copyright notice and a notice that there is no warranty (or else, saying ...

  • Page 74

    Anything that is normally distributed (in either source or binary form) with the major components (compiler, kernel, and so on) of the operating system on which the executable runs, unless that component itself accompanies the executable. If distribution of executable or object code is made by offer...

  • Page 75

    Implemented by public license practices. Many people have made generous contributions to the wide range of software distributed through that system in reliance on consistent application of that system; it is up to the author/donor to decide if he or she is willing to distribute software through any ...

  • Page 76

    Programs), even if such holder or other party has been advised of the possibility of such damages. End of terms and conditions how to apply these terms to your new programs if you develop a new program, and you want it to be of the greatest possible use to the public, the best way to achieve this is...

  • Page 77

    This general public license does not permit incorporating your program into proprietary programs. If your program is a subroutine library, you may consider it more useful to permit linking proprietary applications with the library. If this is what you want to do, use the gnu lesser general public li...

  • Page 78

    We protect your rights with a two-step method: (1) we copyright the library, and (2) we offer you this license, which gives you legal permission to copy, distribute and/or modify the library. To protect each distributor, we want to make it very clear that there is no warranty for the free library. A...

  • Page 79

    Linked with the library has the freedom and the wherewithal to run that program using a modified version of the library. The precise terms and conditions for copying, distribution and modification follow. Pay close attention to the difference between a "work based on the library" and a "work that us...

  • Page 80

    Distribute such modifications or work under the terms of section 1 above, provided that you also meet all of these conditions: a) the modified work must itself be a software library. B) you must cause the files modified to carry prominent notices stating that you changed the files and the date of an...

  • Page 81

    Subsequent copies and derivative works made from that copy. This option is useful when you wish to copy part of the code of the library into a program that is not a library. 4. You may copy and distribute the library (or a portion or derivative of it, under section 2) in object code or executable fo...

  • Page 82

    This license. You must supply a copy of this license. If the work during execution displays copyright notices, you must include the copyright notice for the library among them, as well as a reference directing the user to the copy of this license. Also, you must do one of these things: a) accompany ...

  • Page 83

    Permitted, and provided that you do these two things: a) accompany the combined library with a copy of the same work based on the library, uncombined with any other library facilities. This must be distributed under the terms of the sections above. B) give prominent notice with the combined library ...

  • Page 84

    Generous contributions to the wide range of software distributed through that system in reliance on consistent application of that system; it is up to the author/donor to decide if he or she is willing to distribute software through any other system and a licensee cannot impose that choice. This sec...

  • Page 85

    Failure of the library to operate with any other software), even if such holder or other party has been advised of the possibility of such damages. End of terms and conditions how to apply these terms to your new libraries if you develop a new library, and you want it to be of the greatest possible ...

  • Page 86

    License issues ============== the openssl toolkit stays under a dual license, i.E. Both the conditions of the openssl license and the original ssleay license apply to the toolkit. See below for the actual license texts. Actually both licenses are bsd-style open source licenses. In case of any licens...

  • Page 87

    * of the possibility of such damage. * ==================================================================== * * this product includes cryptographic software written by eric young * (eay@cryptsoft.Com). This product includes software written by tim * hudson (tjh@cryptsoft.Com). * */ original ssleay l...

  • Page 88

    * however caused and on any theory of liability, whether in contract, strict * liability, or tort (including negligence or otherwise) arising in any way * out of the use of this software, even if advised of the possibility of * such damage. * * the licence and distribution terms for any publically a...

  • Page 89

    * copyright (c) 1995 tatu ylonen , espoo, finland * all rights reserved * * as far as i am concerned, the code i have written for this software * can be used freely for any purpose. Any derived versions of this * software must be clearly marked as such, and if the derived work is * incompatible with...

  • Page 90

    * copyright (c) 1998 core sdi s.A., buenos aires, argentina. * * all rights reserved. Redistribution and use in source and binary * forms, with or without modification, are permitted provided that * this copyright notice is retained. * * this software is provided ``as is'' and any express or implied...

  • Page 91

    * implied warranties of merchantability and fitness for a particular purpose * are disclaimed. In no event shall the regents or contributors be liable * for any direct, indirect, incidental, special, exemplary, or consequential * damages (including, but not limited to, procurement of substitute good...

  • Page 92

    A) md5crypt.C, md5crypt.H * "the beer-ware license" (revision 42): * wrote this file. As long as you retain this * notice you can do whatever you want with this stuff. If we meet * some day, and you think this stuff is worth it, you can buy me a * beer in return. Poul-henning kamp b) snprintf replac...

  • Page 93

    Some code is licensed under a mit-style license to the following copyright holders: free software foundation, inc. * permission is hereby granted, free of charge, to any person obtaining a * * copy of this software and associated documentation files (the * * "software"), to deal in the software with...

  • Page 94

    All rights reserved. Redistribution and use in source and binary forms, with or without modification, are permitted only as authorized by the openldap public license. A copy of this license is available in the file license in the top-level directory of the distribution or, alternatively, at . Openld...

  • Page 95

    * copies. * * this software is provided "as is" and without any expressed or implied * warranties, including, without limitation, the implied warranties of * merchantibility and fitness for any particular purpose. ************************************************************************/ /* * copyrig...

  • Page 96

    Sqlite sqlite is in the public domain all of the deliverable code in sqlite has been dedicated to the public domain by the authors. All code authors, and representatives of the companies they work for, have signed affidavits dedicating their contributions to the public domain and originals of those ...

  • Page 97

    * any express or implied warranties, including, but not limited to, the * implied warranties of merchantability and fitness for a particular purpose * are disclaimed. In no event shall the author or contributors be liable * for any direct, indirect, incidental, special, exemplary, or consequential *...

  • Page 98

    * may be used to endorse or promote products derived from this software * without specific prior written permission. * * this software is provided by the project and contributors ``as is'' and * any express or implied warranties, including, but not limited to, the * implied warranties of merchantabi...

  • Page 99

    "licensor" shall mean the copyright owner or entity authorized by the copyright owner that is granting the license. "legal entity" shall mean the union of the acting entity and all other entities that control, are controlled by, or are under common control with that entity. For the purposes of this ...

  • Page 100

    Use, offer to sell, sell, import, and otherwise transfer the work, where such license applies only to those patent claims licensable by such contributor that are necessarily infringed by their contribution(s) alone or by combination of their contribution(s) with the work to which such contribution(s...

  • Page 101

    Contributor provides its contributions) on an "as is" basis, without warranties or conditions of any kind, either express or implied, including, without limitation, any warranties or conditions of title, non-infringement, merchantability, or fitness for a particular purpose. You are solely responsib...

  • Page 102

    1. “digital font program” shall mean a computer program containing, or used to render or display fonts. 2. “licensed program” shall mean a digital font program licensed by the licensor under this agreement. 3. “derived program” shall mean a digital font program created as a result of a modification,...

  • Page 103

    6. The recipient may reproduce the licensed program as is without modification and transfer such copies, publicly transmit or otherwise redistribute the licensed program to a third party for commercial or non-commercial purposes (“redistribute”), in accordance with the provisions set forth in articl...

  • Page 104

    - 104 - of any rights granted hereunder, even if advised of the possibility of such damages. 4. The licensor is under no obligation to respond to any technical questions or inquiries, or provide any other user support in connection with the installation, use or the reproduction and other exploitatio...

  • Page 105

    Expressscope engine 3 user’s guide ©nec corporation 2011-2012 - 105 -.