Users Guide

NOTE: For M1000E chassis, we can select either VLT or Uplink from any of the port but it has to
match port-to-port. VLT is available for I/0-Agregator port but not for MXL ( M100e Chassis).
Completing the chassis configuration
1. On the Summary page, click Finish to apply the configuration on the chassis you have selected.
In the ResourcesAll Resources tab, the state of the chassis are displayed as Updating until the
configuration is complete.
2. If you want modify the chassis configuration settings, click Back.
Adding or editing Chassis Management Controller (CMC) user
1. On the Create Local User page, enter User Name of an account.
2. Enter the Password for the user account to log in to CMC. Reenter the password for confirmation.
3. Select one of the following Role to assign to user account:
Administrator
Power User
Guest User
None
4. To enable this user account, select Enable User check box. Clear the Enable User check box to add
the user in a disabled state.
Adding or editing Integrated Dell Remote Access Controller (iDRAC) user
1. On the Create Local User page, enter User Name of an account.
2. Enter the Password for the user account to log in to iDRAC. Reenter the password for confirmation.
3. Select one of the following Role to assign to user account:
User
Operator
Administrator
No Access
4. To enable this user account, select Enable User check box. Clear the Enable User check box to add
the user in a disabled state.
Removing resources
NOTE: On the user with Administrator role can remove the resource from ASM.
To remove any particular resource from ASM, perform the following steps:
1. In the left pane, click Resources.
2. On the Resources page, click the All Resources tab.
3. From the list of resources, select one or more resources, and click Remove.
4. Click OK when the confirmation message is displayed.
If you remove a Chassis, the Chassis and associated servers and I/O modules are removed from ASM. The
removal process shuts down the servers and erases identity information to prevent potential corruption,
and identity information returns to the associated pool. Associated targets (for example, storage volume)
are not affected.
103