Chassis Management Controller Version 1.
Notes, Cautions, and Warnings NOTE: A NOTE indicates important information that helps you make better use of your computer. CAUTION: A CAUTION indicates either potential damage to hardware or loss of data and tells you how to avoid the problem. WARNING: A WARNING indicates a potential for property damage, personal injury, or death. Copyright © 2014 Dell Inc. All rights reserved. This product is protected by U.S. and international copyright and intellectual property laws.
Contents 1 Overview.....................................................................................................................................13 What Is New In This Release................................................................................................................................. 14 Key Features........................................................................................................................................................... 14 Management Features.......
Configuring Initial CMC Network......................................................................................................................31 Interfaces and Protocols to Access CMC.............................................................................................................. 34 Launching CMC Using Other Systems Management Tools............................................................................. 36 Downloading and Updating CMC Firmware........................................
Enabling or Disabling Warning Message to Change Default Login Password Using RACADM......................48 Updating I/O Module Infrastructure Device Firmware...........................................................................................48 Updating I/O Module Infrastructure Device Firmware Using CMC Web Interface......................................... 49 Updating I/O Module Infrastructure Device Firmware Using RACADM..........................................................
Viewing Chassis Controller Information and Status............................................................................................... 65 Viewing Information and Health Status of All Servers........................................................................................... 65 Viewing Health Status and Information for Individual Server................................................................................ 66 Viewing Information and Health Status of the IOM..........................
Chassis Group Inventory and Firmware Version..............................................................................................83 Viewing Chassis Group Inventory ................................................................................................................... 83 Viewing Selected Chassis Inventory Using Web Interface............................................................................. 84 Viewing Selected Server Component Firmware Versions Using Web Interface..............
Configuring CMC To Send Alerts..........................................................................................103 Enabling Or Disabling Alerts................................................................................................................................. 103 Enabling Or Disabling Alerts Using CMC Web Interface............................................................................... 103 Enabling Or Disabling Alerts Using RACADM...............................................
11 Configuring CMC to Use Command Line Consoles..........................................................135 CMC Command Line Console Features.................................................................................................................135 CMC Command Line Interface Commands.................................................................................................... 135 Using Telnet Console With CMC....................................................................................
Enabling or Disabling LED Blinking for I/O Modules.............................................................................................157 14 Managing and Monitoring Power...................................................................................... 159 Redundancy Policies............................................................................................................................................ 159 AC Redundancy Policy.........................................................
Executing Power Control Operations on the IOM Using RACADM................................................................172 15 Managing Chassis Storage................................................................................................. 175 Viewing Status of the Storage Components.........................................................................................................175 Viewing the Storage Topology...............................................................................
Observing LEDs to Isolate the Problem..........................................................................................................191 Obtain Recovery Information from DB-9 Serial Port...................................................................................... 191 Recovering Firmware Image.......................................................................................................................... 192 Troubleshooting Network Problems.........................................
Overview 1 The Dell Chassis Management Controller (CMC) for Dell PowerEdge VRTX is a Systems Management hardware and software solution for managing the PowerEdge VRTX chassis. The CMC has its own microprocessor and memory and is powered by the modular chassis into which it is plugged.
You can configure CMC to send email alerts or SNMP trap alerts for warnings or errors such as temperature, hardware misconfiguration, power outage, fan speed, and blowers.
• Remote power management — Provides remote power management functions, such as turn off and reset of any chassis component, from a management console. • Power usage reporting. • Secure Sockets Layer (SSL) encryption — Provides secure remote system management through the web interface. • Launch point for the Integrated Dell Remote Access Controller (iDRAC) web interface. • Support for WS-Management.
Item Indicator, Button, or Connector 1 Status/identification indicator (CMC 1) 2 Power indicator (CMC 1) 3 CMC connector ports (2) 4 Power indicator (CMC 2) 5 Status/identification indicator (CMC 2) A Back Panel view of the chassis is given here with a table that lists the parts and devices available in the CMC.
Item Indicator, Button, or Connector 1 PCIe expansion card slots low-profile (5) 2 PCIe expansion card slots full height (3) 3 CMC GB Ethernet port (CMC-2) 4 CMC GB Ethernet port (CMC-1) 5 Serial Connector 6 Blower modules (4) 7 I/O module ports 8 PSU 4 9 PSU 3 10 PSU 1 11 PSU 2 A Front Panel view of the chassis is given here with a table that lists the parts and devices available in the CMC.
Figure 1. Front-Panel Features And Indicators—3.5 Inch Hard Disk Drive Chassis Item Indicator, Button, or Connector Description 1 USB connectors (2) Allows a keyboard and mouse to be connected to the system. 2 LCD panel Provides system information and status, and error messages to indicate when the system is operating correctly or when the system needs attention. 3 LCD menu scroll buttons (4) Moves the cursor in one-step increments.
Item Indicator, Button, or Connector Description 9 Vents for the temperature sensor. Vents NOTE: To make sure about proper cooling, verify that the vents are not blocked. 10 Video connector Allows a monitor to be connected to the system. 11 Server modules Up to four PowerEdge M520 or M620 server modules specifically configured for the enclosure. Supported Remote Access Connections The following table lists the supported Remote Access Controllers. Table 1.
• Google Chrome 26.0.1410 on Windows 8 32-bit, Windows 8 64-bit. • Native Mozilla Firefox on SLES 10 SP4, SLES 11 SP2, SLES 11 SP3, RHEL 5.8 32-bit, RHEL 5.8 64- bit,RHEL 6.3, RHEL 6.4. Managing Licenses The CMC features are available based on the license (CMC Express or CMC Enterprise) purchased. Only licensed features are available in the interfaces that allow you to configure or use CMC. For example, CMC Web interface, RACADM, WS-MAN, and so on.
• Learn More — Learn more about an installed license, or the licenses available for a component installed in the server. NOTE: For the Learn More option to display the correct page, make sure that *.dell.com is added to the list of Trusted Sites in the Security Settings. For more information, see the Internet Explorer help documentation.
RACADM (SSH, Local, and Remote) Yes Yes CMC Setup Backup No Yes CMC Setup Restore Yes Yes WS-MAN Yes Yes SNMP Yes Yes Telnet Yes Yes SSH Yes Yes Web-based Interface Yes Yes Email Alerts Yes Yes LCD Deployment Yes Yes Extended iDRAC Management Yes Yes Enclosure Restore and Backup No Yes Server Module Firmware Update No Yes Remote Syslog No Yes Directory Services No* Yes iDRAC Single Sign-On No Yes Two-Factor Authentication No Yes PK Authentication No Yes
Virtual Adapter to Slot Mapping No* Yes Virtual Adapter to Slot UnMapping Yes Yes Server cloning No Yes One-to-many Server Firware Update No Yes One-to-many configuration for iDRAC No Yes *For non-default mapping of Virtual Adapters, only Default mapping is allowed with an Express license. Restore Default will change virtual adapter mapping to factory default.
• Dell systems management application documentation provides information about installing and using the systems management software. The following system documents provide more information about the system in which VRTX CMC is installed: • The safety instructions that came with your system provide important safety and regulatory information. For additional regulatory information, see the Regulatory Compliance home page at www.dell.com/ regulatory_compliance.
– • * Client System Management * Enterprise System Management * Remote Enterprise System Management * Serviceability Tools To view the document, click the required product version. Using search engines as follows: – Type the name and version of the document in the Search box.
Installing and Setting Up CMC 2 This section provides information about how to install your CMC hardware, establish access to CMC, configure your management environment to use CMC, and guides you through the tasks for configuring a CMC: • Set up initial access to CMC. • Access CMC through a network. • Add and configure CMC users. • Update CMC firmware. For more information about installing and setting up redundant CMC environments, see Understanding Redundant CMC Environment.
NOTE: iDRAC LAN interface on some servers are disabled by default. This information can be found on the CMC web interface under Server Overview → Setup. This might be an advanced license option; in which case you must use the SetUp feature for each server). 9. Provide the IO module with an IP address in the CMC web interface. You can get the IP address by clicking I/O Module Overview, and then clicking Setup. 10. Connect to each iDRAC through the Web browser and provide final configuration of iDRAC.
5. For help about the RACADM command, type racadm help after you run the previous commands. For more information about RACADM, see the Chassis Management Controller for Dell PowerEdge VRTX RACADM Command Line Reference Guide. NOTE: When using the RACADM remote capability, you must have the 'write' permission on the folders where you are using the RACADM subcommands, involving the file operations. For example, racadm getconfig -f . Uninstalling RACADM From a Linux Management Station 1.
5. In the Exceptions section, add the addresses for CMCs and iDRACs on the management network to the semicolonseparated list. You can use DNS names and wildcards in your entries. Mozilla FireFox To edit the exception list in Mozilla Firefox version 19.0: 1. Start Mozilla Firefox. 2. Click Tools → Options (for systems running on Windows), or click Edit → Preferences (for systems running on Linux). 3. Click Advanced, and then click the Network tab. 4. Click Settings. 5.
Enabling Animations In Internet Explorer When transferring files to and from the web interface, a file transfer icon spins to show transfer activity. While using Internet explorer, you have to configure the browser to play animations. To configure Internet Explorer to play animations: 1. Start Internet Explorer. 2. Click Tools → Internet Options → Advanced . 3. Go to the Multimedia section, and then select the Play animations in web pages option.
Configuring CMC Network Using LCD Panel Interface Configuring CMC Using Quick Setup (DHCP) NOTE: You can customize the orientation of an LCD display (for rack or tower mode) by keeping the up-down buttons pressed for two seconds. Alternately, you can also use the right-left buttons. For more information about the buttons available on a CMC LCD panel, see LCD Navigation. To set up a network using the LCD panel interface:s 1. Press the chassis power button to turn on the chassis.
6. On the Protocol panel, select an Internet Protocol (IPv4 Only, IPv6 Only, or Both) that you want to use for CMC, press the center button, and then press the center button. 7. If you select IPv4 or Both, go to step 9 or 10 on the basis of whether you select DHCP or Static mode. Else, if you select IPv6, go to step 11 later in this procedure. 8. On the Mode panel, select the mode in which the CMC must obtain the NIC IP addresses.
15. On the iDRAC Configuration panel, the following message is displayed. Apply settings to installed servers? To apply all iDRAC network settings to the installed servers, select Yes , and then press the center button. Else, select No and press the center button and go to step 17 later in this procedure. 16. On the next iDRAC Configuration panel, the following message is displayed.
Interface Description Chassis LCD Panel Use the LCD on the front panel to: • • • Telnet View alerts, CMC IP or MAC address, user programmable strings. Set DHCP. Configure CMC static IP settings. Provides command line access to CMC through the network. The RACADM command line interface and the connectcommand, which is used to connect to the serial console of a server or IO module, are available from the CMC command line. NOTE: Telnet is not a secure protocol and is disabled by default.
Launching CMC Using Other Systems Management Tools You can also launch CMC from the Dell Server Administrator or Dell OpenManage Essentials. To access CMC interface using Dell Server Administrator, launch Server Administrator on your management station. In the left pane of the Server Administrator home page, click System → Main System Chassis → Remote Access Controller. For more information, see the Dell Server Administrator User’s Guide at dell.com/support/manuals.
Setting Date and Time on CMC Using RACADM To set the date and time using the command line interface, see the config command and cfgRemoteHosts database property group sections in the Chassis Management Controller for PowerEdge VRTX RACADM Command Line Reference Guide available at dell.com/support/manuals.
Configuring CMC Properties You can configure CMC properties such as power budgeting, network settings, users, and SNMP and email alerts using the web interface or RACADM commands. Configuring iDRAC Launch Method Using CMC Web Interface To configure the iDRAC launch method from the General Chassis Settings page: 1. In the left pane, click Chassis Overview → Setup. The General Chassis Settings page is displayed. 2. In the drop-down menu for the iDRAC Launch Method property, select IP Address or DNS. 3.
• User blocking • IP address blocking • Number of login attempts allowed • Timespan for the lockout failure counts to occur • Lockout penalty time • To enable user blocking feature, use: racadm config -g cfgRacTuning -o cfgRacTuneUserBlkEnable <0|1> • To enable IP blocking feature, use: racadm config –g cfgRacTuning –o cfgRacTuneIPBlkEnable <0|1> • To specify the number of login attempts, use: racadm config –g cfgRacTuning –o cfgRacTuneIpBlkFailCount • To specify the time span within which
NOTE: For information about installing a CMC, see the VRTX Owner’s Manual. For instructions about installing CMC firmware on your standby CMC, see Updating Firmware. CMC Failsafe Mode Similar to the failover protection offered by the redundant CMC, the PowerEdge VRTX enclosure enables the fail-safe mode to protect the servers and I/O module from not functioning. The fail-safe mode is enabled when a CMC is not in control of the chassis.
Configuring Power Button To configure the chassis power button: 1. In the left pane, click Chassis Overview → Front Panel → Setup. 2. On the Front Panel Configuration page, under the Power Button Configuration section, select the Disable Chassis Power Button option, and then click Apply. The chassis power button is disabled. Configuring LCD 1. In the left pane, clickChassis Overview → Front Panel → Setup . 2.
Mapping a Server to a DVD Drive To map the server to the chassis DVD drive: 1. In the left pane, click Chassis Overview → Front Panel → Setup . 2. On the Front Panel Configuration page, under the DVD Drive Configuration section: From the DVD Mapped drop-down menu, select one of the servers. Select the servers for which chassis DVD drive access is required. 3. 42 Click Apply.
Logging in to CMC 3 You can log in to CMC as a CMC local user, as a Microsoft Active Directory user, or as an LDAP user. The default user name and password is root and calvin respectively. You can also log in using Single Sign-On or a Smart Card. Accessing CMC Web Interface Before you log in to CMC using the web interface, make sure that you have configured a supported web browser (Internet Explorer or Firefox) and the user account is created with the required privileges.
To log in as a local user, Active Directory user, or LDAP user. 1. In the Username field, type your user name: – CMC user name: – Active Directory user name: \, / or @. – LDAP user name: NOTE: This field is case-sensitive. 2. In the Password field, type the user password. NOTE: For Active Directory user, the Username field is case-sensitive. 3. Optionally, select a session timeout.
3. Type the PIN and click Submit. NOTE: If the smart card user is present in Active Directory, an Active Directory password is not required. Else, you have to log in by using an appropriate username and password. You are logged in to CMC with your Active Directory credentials. Logging Into CMC Using Single Sign-on When Single Sign-On (SSO) is enabled, you can log in to CMC without providing your domain user authentication credentials, such as user name and password.
• Remote RACADM — Allows you to run RACADM commands on a management station with the -r option and the DNS name or IP address of the CMC. NOTE: Remote RACADM is included on the Dell Systems Management Tools and Documentation DVD and is installed on a management station. • Firmware RACADM — Allows you to log in to the CMC using Telnet, SSH, or a serial connection. With firmware RACADM, you can the RACADM implementation that is part of the CMC firmware.
• You log in to CMC with Configure Users privilege. • Default password warning feature is enabled. • Default user name and password for any currently enabled account are root and calvin respectively. The same warning message is displayed if you log in using Active Directory or LDAP. Active Directory and LDAP accounts are not considered when determining if any (local) account has root and calvin as the credentials.
Enabling or Disabling Default Password Warning Message Using Web Interface To enable or disable the display of the default password warning message after logging in to iDRAC: 1. Go to Chassis Controller → User Authentication → Local Users . The Users page is displayed. 2. In the Default Password Warning section, select Enable, and then click Apply to enable the display of the Default Password Warning page when you log in to CMC. Else, select Disable.
Updating I/O Module Infrastructure Device Firmware Using CMC Web Interface To update the I/O Module Infrastructure device firmware, in the CMC web interface: 1. Go to Chassis Overview → I/O Module Overview → Update . The IOM Firmware and Software page is displayed. Alternatively, go to any of the following: – Chassis Overview → Update – Chassis Overview → Chassis Controller → Update The Firmware Update page is displayed, which provides a link to access the IOM Firmware and Software page. 2.
Updating Firmware 4 You can update firmware for: • CMC — active and standby • Chassis infrastructure • I/O Module • iDRAC7 You can update firmware for the following server components: • iDRAC • BIOS • Lifecycle Controller • 32–bit diagnostics • Operating System Drivers Pack • Network Interface Controllers • RAID controllers Downloading CMC Firmware Before beginning the firmware update, download the latest firmware version from support.dell.com, and save it to your local system.
Viewing Currently Installed Firmware Versions Using RACADM To view the IP information for iDRAC and CMC, and the CMC service- or asset tag using RACADM, run the racadm getsysinfo sub-command. For more information about other RACADM commands, see the Chassis Management Controller for PowerEdge VRTX RACADM Command Line Reference Guide. Updating the CMC Firmware You can update the CMC firmware using web interface or RACADM. The firmware update, by default, retains the current CMC settings.
To update the CMC firmware using the CMC web interface: 1. In the left pane, go to any of the following pages: 2. – Chassis Overview → Update – Chassis Overview → Chassis Controller → Update On the Firmware Update page, in the CMC Firmware section, select the required components under the Update Targets column for the CMC or CMCs (if standby CMC is present) you want to update, and then click Apply CMC Update. 3.
Additional instructions to follow: • Do not click the Refresh icon, or navigate to another page during the file transfer. • The Update State field displays the firmware update status. When the update is complete, there is a brief loss of connectivity to the main board, because it resets and the new firmware is displayed on the Firmware Update page. Updating Chassis Infrastructure Firmware Using RACADM To update chassis infrastructure firmware using RACADM, use the fwupdate sub-command.
4. Click Begin Firmware Update, and then click Yes. The Firmware Update Progress section provides firmware update status information. A progress bar indicates the status of the upload process. File transfer time varies on the basis of connection speed. When the internal update process begins, the page automatically refreshes and the firmware update timer is displayed. NOTE: Additional instructions to follow: – Do not click the Refresh icon or navigate to another page during the file transfer.
If Lifecycle Controller service is disabled on the server, the Component/Device Firmware Inventory section displays Lifecycle Controller may not be enabled. Enabling Lifecycle Controller You can enable the Lifecycle Controller service when turning on a server: • For iDRAC6 servers, on the boot console, press , when the following message is displayed. Press for Remote Access Setup within 5 sec. . Then, on the setup screen, click System Services.
Sometimes, a BIOS firmware update image may be compatible across a number of server models. Such optimizations are ignored in case this compatibility is no longer true in the future. • Automatic filtering is important for firmware updates of Network Interface Controllers (NIC) and RAID Controllers. These device categories have different types and models.
Viewing Firmware Inventory Using CMC Web Interface To view the firmware inventory: 1. In the left pane, click Server Overview, and then click Update . 2. On the Server Component Update page, view the firmware inventory details in the Component/Device Firmware Inventory section. On this page, you can view the following information: – Servers that currently do not support the Lifecycle Controller service are listed as Not Supported.
Field Description Job Status Displays the job status of any operations that are scheduled on the server. The job status is continuously updated dynamically. If a job completion with state completed is detected, then the firmware versions for the components and devices on that server are automatically refreshed in case there has been a change of firmware version on any of the components or devices.
Reinstalling Server Component Firmware You can reinstall the firmware image of the currently installed firmware for selected components or devices across one or more servers. The firmware image is available within the Lifecycle Controller. Re-installing Server Component Firmware Using Web Interface To reinstall a server component firmware: 1. In the left pane, click Server Overview → Update. 2. On the Server Component Update page, filter the component or device (optional). 3.
It is recommended to clear the job queue before initializing a server component firmware update. A list of all jobs on the servers is available on the Lifecycle Controller Jobs page. This page enables deletion of single or multiple jobs or purging of all jobs on the server. BIOS updates are specific to the model of the server. Sometimes, even though a single Network Interface Controller (NIC) device is selected for firmware update on a server, the update may get applied to all the NIC devices on the server.
Deleting Scheduled Server Component Firmware Jobs NOTE: To use this feature, you must have an Enterprise License. You can delete jobs scheduled for the selected components and/or devices across one or more servers. Deleting Scheduled Server Component Firmware Jobs Using the Web Interface To delete scheduled server component firmware jobs: 1. In the left pane, click Server Overview, and then click Update. 2. On the Server Component Update page, filter the component or device (optional). 3.
Viewing Chassis Information and Monitoring Chassis and Component Health 5 You can view information and monitor the health of the following: • Active and standby CMCs • All severs and individual servers • IO Module • Fans • Power Supply Units (PSUs) • Temperature sensors • Hard disk drives • LCD assembly • Storage controllers • PCIe devices Viewing Chassis and Component Summaries When you log in to the CMC web interface, the Chassis Health page displays the health of the chassis and its
Chassis Graphics The chassis is represented by the front and back views (the upper and lower images respectively). Servers, DVDs, HDDs, KVMs, and LCD are shown in the front view and the remaining components are shown in the back view. Component selection is indicated by a blue cast and is controlled by clicking the image of the required component.
• Properties — Displays the component properties that do not vary with time, or that change only infrequently. • Quick Links — Provides links to navigate to the most frequently accessed pages, and also the most frequently performed actions. Only links applicable to the selected component are displayed in this section. Viewing Server Model Name and Service Tag You can view the model name and service tag of each server instantly using the following steps: 1. In the left pane, click Server Overview.
Viewing Health Status and Information for Individual Server To view health status for individual servers, do any of the following: 1. Go to Chassis Overview → Properties → Health . The Chassis Health page displays a graphical overview of all the servers installed in the chassis. Server health status is indicated by the overlay of the server subgraphic. Move the cursor to hover over an individual server subgraphic. A corresponding text hint or screen tip provides additional information for that server.
Viewing Information and Health Status of Fans CMC controls the speed of the chassis fan by increasing or decreasing the fan speed on the basis of system events. You can run the fan in three modes such as Low, Medium, and High. For more information about configuring a fan, see the Online Help. To set up the properties of fans by using RACADM commands, type the following command at the CLI interface.
Using the Medium Fan Offset setting for example, increases the speed of fans 1–6 by 50% of its maximum speed. The increase is above the speed already set by the system for cooling on the basis of installed hardware configuration. With any of the Fan Offset options enabled, the power consumption will be increased. The system will be louder with the Low offset, noticeably louder with the Medium offset, and significantly louder with the High offset.
Viewing KVM Information and Health Status To view the health status of the KVMs associated with the chassis, do any of the following: 1. Click Chassis Overview. The Chassis Health page is displayed. The left pane displays the front view of the chassis and contains the health status of a KVM. KVM health status is indicated by the overlay of the KVM sub-graphic. Move the pointer over an KVM sub-graphic and a corresponding text hint or screen tip is displayed.
Configuring CMC 6 Chassis Management Controller enables you to configure properties, set up users, and alerts to perform remote management tasks. Before you begin configuring the CMC, you must first configure the CMC network settings to allow CMC to be managed remotely. This initial configuration assigns the TCP/IP networking parameters that enable access to the CMC. For more information, see Setting Up Initial Access to CMC. You can configure CMC using Web interface or RACADM.
NOTE: You must have Chassis Configuration Administrator privilege to set up CMC network settings. Viewing and Modifying CMC Network LAN Settings Using CMC Web Interface To view and modify the CMC LAN network settings using CMC Web interface: 1. In the left pane, click Chassis Overview, and then click Network. The Network Configuration page displays the current network settings. 2. Modify the general, IPv4, or IPv6 settings as required. For more information, see the Online Help. 3.
For an IPv4 network, to disable DHCP and specify static CMC IP address, gateway, and subnet mask, type: racadm config -g cfgLanNetworking -o cfgNicUseDHCP 0 racadm config -g cfgLanNetworking -o cfgNicIpAddress racadm config -g cfgLanNetworking -o cfgNicGateway racadm config -g cfgLanNetworking -o cfgNicNetmask By default, for IPv6, the CMC requests and automatically obtains a CMC IP address from the IPv6 autoconfiguration mechanism.
Configuring DNS Settings (IPv4 and IPv6) • CMC Registration — To register the CMC on the DNS server, type: racadm config -g cfgLanNetworking -o cfgDNSRegisterRac 1 NOTE: Some DNS servers only register names of 31 characters or fewer. Make sure the designated name is within the DNS required limit. • NOTE: The following settings are valid only if you have registered the CMC on the DNS server by setting cfgDNSRegisterRac to 1. CMC Name — By default, the CMC name on the DNS server is cmc-.
NOTE: Blocking by IP address is applicable only for IPV4 addresses. You can set the IP range attributes using CMC web interface or RACADM. To use the IP address blocking and user blocking features, enable the options using CMC web interface or RACADM. Configure the login lockout policy settings to enable you to set the number of unsuccessful login attempts for a specific user or for an IP address. After exceeding this limit, the blocked user can log in only after the penalty time expires.
Configuring Virtual LAN Tag Properties for CMC VLANs are used to allow multiple virtual LANs to co-exist on the same physical network cable and to segregate the network traffic for security or load management purposes. When you enable the VLAN functionality, each network packet is assigned a VLAN tag. Configuring VLAN Tag Properties for CMC Using RACADM 1. Enable the VLAN capabilities of the external chassis management network: racadm config -g cfgLanNetworking -o cfgNicVLanEnable 1 2.
3. Click Apply. The VLAN tag settings are saved. You can also access this page from the Chassis Overview → Servers → Setup → VLAN. Configuring Services You can configure and enable the following services on CMC: • CMC serial console — Enable access to CMC using the serial console. • Web Server — Enable access to CMC web interface. Disabling the web server also disables Remote RACADM. • SSH — Enable access to CMC through firmware RACADM.
Configuring Services Using CMC Web Interface To configure CMC services using CMC web interface: 1. In the left pane, click Chassis Overview, and then click Network → Services. The Services Management page is displayed. 2. Configure the following services as required: – CMC Serial – Web Server – SSH – Telnet – Remote RACADM – SNMP – Remote Syslog For information about the fields, see the Online Help. 3. Click Apply, and then update all default time-out and maximum time-out limits.
To enable or repair the Removable Flash Media using the CMC web interface: 1. In the left pane, go to Chassis Overview, and then click Chassis Controller → Flash Media. 2. On the Removable Flash Media page, from the drop-down menu, select one of the following as appropriate: – Repair active controller media – Stop using flash media for storing chassis data For more information about these options, see the Online Help. 3. Click Apply to apply the selected option.
3. Click Setup → Group Administration. 4. Under Group Management, enter the member’s IP address or DNS name in the Hostname/IP Address field. 5. In the User Name field, enter a user name with chassis administrator privileges for the member chassis. 6. Type the corresponding password in the Password field. 7. Optionally, select Sync New Member with Leader Properties to push leader properties to the member. 8. Click Apply. 9.
Launching the Web page of a Member Chassis or Server You can access the web page of the member chassis, remote console of the server, or the web page of the iDRAC server from the lead chassis group page. If the member device has the same login credentials as the lead chassis, you can use the same credentials to access the member device. To navigate to member devices: 1. Log in to the lead chassis. 2. Select Group: name in the tree. 3.
• Empty slots and extension slots (including full height and double width server modules). Saving Server Inventory Report To save the server inventory report using the CMC web interface: 1. In the left pane, select the Group. 2. On the Chassis Group Health page, click Save Inventory Report. The File Download dialog box is displayed asking you to open or save the file. 3. Click Save and specify the path and file name for the server module inventory report.
Data Field Example Total System Memory 4.0 GB NOTE: Requires VRTX CMC 1.0 (or later) on member; otherwise shown as blank. # of CPUs 2 NOTE: Requires VRTX CMC 1.0 (or later) on member; otherwise shown as blank. CPU Info Intel (R) Xeon (R) CPU E5502 @1.87GHzn NOTE: Requires VRTX CMC 1.0 (or later) on member; otherwise shown as blank. Data Format The inventory report is generated in a .CSV file format such that it can be imported to various tools, such as Microsoft Excel. The inventory report .
Viewing Selected Chassis Inventory Using Web Interface To view the selected chassis inventory using CMC Web interface: 1. In the system tree, select Group. click Properties → Firmware Version . The Chassis Group Firmware Version page displays all the chassis in the group. 2. In the Select a Chassis section, select the member chassis for which you want to view the inventory.
5. Reset the target CMC that was configured. At the command prompt, type: racadm reset The getconfig -f myfile.cfg subcommand requests the CMC configuration for the active CMC and generates the myfile.cfg file. If required, you can rename the file or save it to a different location. You can run the getconfig command to perform the following actions: – Display all configuration properties in a group (specified by group name and index). – Display all configuration properties for a user by user name.
CAUTION: Use the racresetcfg subcommand to reset the database and the CMC Network Interface settings to the original default settings and remove all users and user configurations. While the root user is available, other users’ settings are also reset to the default settings. • If you type racadm getconfig -f .cfg, the command builds a .cfg file for the current CMC configuration. This configuration file can be used as an example and as a starting point for your unique .cfg file.
To view the contents of an indexed group, run the following command: racadm getconfig -g -i • For indexed groups the object anchor must be the first object after the [ ] pair. The following are examples of the current indexed groups: [cfgUserAdmin] cfgUserAdminUserName= • When using remote RACADM to capture the configuration groups into a file, if a key property within a group is not set, the configuration group is not saved as part of the configuration file.
NOTE: To end a session, you must have Chassis Configuration Administrator privilege. Viewing and Ending CMC Sessions Using Web Interface To view or end a session using the web interface: 1. In the left pane, go to Chassis Overview and click Network → Sessions. The Sessions page displays the session ID, username, IP address, and session type. For more information about these properties, see the Online Help. 2. To end the session, click Terminate for a session.
Configuring Servers 7 You can configure the following settings of a server: • Slot Names • iDRAC Network Settings • DRAC VLAN Tag Settings • First Boot Device • Server FlexAddress • Remote File Share • BIOS Settings Using Server Clone Configuring Slot Names Slot names are used to identify individual servers. When choosing slot names, the following rules apply: • Names may contain a maximum of 15 non-extended ASCII characters (ASCII codes 32 through 126).
3. To use a server’s host name as slot name, select the Use Host Name for the Slot name option. This overrides the static slot names with the server’s Host Name (or system name), if available. This requires the OMSA agent to be installed on the server. For more information about the OMSA agent, see the Dell OpenManage Server Administrator User's Guide available at dell.com/support/manuals. 4. To save the settings, click Apply.
To enable and set the iDRAC QuickDeploy settings: 1. In the left pane, click Server Overview → Setup → iDRAC . 2. On the Deploy iDRAC page, in the QuickDeploy Settings section, specify the settings mentioned in the following table. For more information about the fields, see the Online Help. Table 7.
Setting Description NOTE: The subnet mask and the gateway are not incremented such as the IP address. For example, if the starting IP address is 192.168.0.250 and the subnet mask is 255.255.0.0 then the QuickDeploy IP address for slot 15 is 192.168.0.265. If the subnet mask is 255.255.255.0, the QuickDeploy IP address range is not fully within QuickDeploy Subnet error message is displayed when you click Save QuickDeploy Settings or AutoPopulate Using QuickDeploy Settings. 3.
Modifying iDRAC Network Settings for Individual Server iDRAC Using this feature, you can configure the iDRAC network configurations settings for each installed server. The initial values displayed for each of the fields are the current values read from the iDRAC. To use this feature, you must have an Enterprise License. To modify the iDRAC Network Settings: 1. In the left pane, click Server Overview, and then click Setup .
The valid values for are 1–4. The valid values for are 1–4000 and 4021–4094. Default is 1. The valid values for are 0–7. Default is 0. For example: racadm setniccfg -m server-1 -v 1 7 For example: • To remove a server VLAN, disable the VLAN capabilities of the specified server's network: racadm setniccfg -m server- -v The valid values for are 1–4.
Boot Device Description Virtual Floppy Boot from the virtual floppy drive. The floppy drive (or a floppy disk image) is on another computer on the management network, and is attached using the iDRAC GUI console viewer. Virtual CD/DVD Boot from a virtual CD or DVD drive or CD or DVD ISO image. The optical drive or ISO image file is located on another computer or boot disk available on the management network and is attached using the iDRAC GUI console viewer.
Configuring Server FlexAddress For information about configuring FlexAddress for servers, see Configuring FlexAddress for Chassis-Level Fabric and Slots Using CMC Web Interface. To use this feature, you must have an Enterprise License. Configuring Remote File Share The Remote Virtual Media File Share feature maps a file from a share drive on the network to one or more servers through CMC to deploy or update an operating system.
• iDRAC must have the minimum version that is required. iDRAC7 servers require version 1.00.00. • Server must be powered on. Server versions and profile compatibilities: • iDRAC7 with Lifecycle Controller 2 version 1.1 can accept any profile version. • iDRAC7 with Lifecycle Controller 2 version 1.0 only accept BIOS or BIOS and Boot profiles. • Saving a profile from a server iDRAC7 with Lifecycle Controller 2 version 1.1 results in a All Settings profile.
Applying Profile Server cloning is possible only when server profiles are available as stored profiles in the nonvolatile media on the CMC. To initiate a server cloning operation, you can apply a stored profile to one or more servers. NOTE: If a server does not support Lifecycle Controller or the chassis is powered off, you cannot apply a profile to the server. To apply a profile to one or more server(s): 1. Go to the Server Profiles page.
Editing Profile You can edit the name and description of a server profile that is stored on the CMC nonvolatile media (SD Card). To edit a stored profile: 1. Go to the Server Profiles page. In the Profiles on SD Card section, select the required profile and then click Edit Profile. The Edit BIOS Profile — section is displayed. 2. Edit the profile name and description of the server profile as required and then click Edit Profile. For more information, see the Online Help.
Quick Deploy of Profiles The Quick Deploy feature enables you to assign a stored profile to a server slot. Any server supporting server configuration replication that is inserted into a slot is configured using the profile assigned to that slot. You can perform the Quick Deploy action only if the Enable Server Profile Deployment option is enabled in the Deploy iDRAC page. To go to the Deploy iDRAC page, select Server Overview → Setup → iDRAC . Profiles that can be deployed are contained in the SD card.
NOTE: Users may be prompted to log in to iDRAC (see the third Single Sign-on policy bullet above). NOTE: If the iDRAC network LAN is disabled (LAN Enabled = No), single sign-on is not available. If the server is removed from the chassis, the iDRAC IP address is changed, or the iDRAC network connection experiences a problem, then clicking Launch iDRAC GUI may display an error page. Launching iDRAC from Server Status Page To launch the iDRAC management console for an individual server: 1.
Launching Remote Console from Servers Status Page To launch a remote console from the Servers Status page: 1. In the left pane, go to Server Overview, and then click Properties → Status. The Servers Status page is displayed. 2. Click Launch Remote Console for the required server.
Configuring CMC To Send Alerts 8 You can set alerts and actions for certain events that occur on the chassis. An event occurs when the status of a system component is greater than the pre-defined condition. If an event matches an event filter and you have configured this filter to generate an alert message (email alert or SNMP trap), then an alert is sent to one or more configured destinations such as email address, IP address, or an external server. To configure CMC to send alerts: 1.
NOTE: To apply chassis events configuration changes, you must have the Alert Configuration privilege. 1. In the left pane, click Chassis Overview → Alerts. 2. On the Chassis Events page, under the Alerts Filter section, select one or more of the following categories: 3. 4. – System Health – Storage – Configuration – Audit – Updates Select one or more of the following severity levels: – Critical – Warning – Informational Click Apply.
Configuring SNMP Trap Alert Destinations Using CMC Web Interface To configure IPv4 or IPv6 alert destination settings using CMC Web interface: 1. In the left pane, click Chassis Overview → Alerts → Trap Settings. 2. On the Chassis Event Alert Destinations page, type the following: – In the Destination field, type a valid IP address. Use the quad-dot IPv4 format, standard IPv6 address notation, or FQDN. For example: 123.123.123.123 or 2001:db8:85a3::8a2e:370:7334 or dell.com.
5. Specify a destination IP address to receive the traps alert: racadm config -g cfgTraps -o cfgTrapsAlertDestIPAddr -i where is a valid destination, and is the index value specified in step 4. 6. Specify the community name: racadm config -g cfgTraps -o cfgTrapsCommunityName -i where is the SNMP community to which the chassis belongs, and is the index value specified in steps 4 and 5.
Configuring EMail Alert Settings Using RACADM To send a test email to an email alert destination using RACADM: 1. Open a serial/Telnet/SSH text console to CMC and log in. 2. Enable alert generation: racadm config -g cfgAlerting -o cfgAlertingEnable 1 NOTE: Only one filter mask may be set by both SNMP and email alerting. If you have already set a filter mask, do not perform the task in step 3. 3.
Configuring User Accounts and Privileges 9 You can setup user accounts with specific privileges (role-based authority) to manage your system with CMC and maintain system security. By default, CMC is configured with a local administrator account. The default user name is rootand the password is calvin. As an administrator, you can set up user accounts to allow other users to access the CMC.
Privilege Description this reason, slot names and slot priorities can be added or changed whether or not servers are present in the slots. When a server is moved to a different chassis, it inherits the slot name and priority assigned to the slot it occupies in the new chassis. The previous slot name and priority remain with the previous chassis. NOTE: CMC users with the Chassis Configuration Administrator privilege can configure power settings.
Privilege Description chassis user does not have the Server Administrative privilege on the chassis. Server Configuration Administrator: • • • • Set IP address Set gateway Set subnet mask Set first boot device Configure Users: • • Set iDRAC root password iDRAC reset Server Control Administrator: • • • • • Power on Power off Power cycle Graceful shutdown Server Reboot Test Alert User User can send test alert messages. Debug Command Administrator User can execute system diagnostic commands.
User Group Privileges Granted Power User • Fabric A Administrator • • • • • • Login Clear Logs Administrator Chassis Control Administrator (Power commands) Server Administrator Test Alert User Fabric A Administrator Guest User Login Custom Select any combination of the following permissions: • • • • • • • • • None CMC Login User Chassis Configuration Administrator User Configuration Administrator Clear Logs Administrator Chassis Control Administrator (Power commands) Server Administrator Test Al
Modifying Root User Administrator Account Settings For added security, it is strongly recommended that you change the default password of the root (User 1) account. The root account is the default administrative account that is shipped with CMC. To change the default password for the root account: 1. In the left pane, click Chassis Overview, and then click User Authentication. 2. On the Users page, in the User ID column, click 1.
NOTE: You can also type racadm getconfig -f and view or edit the myfile.cfg file, which includes all the CMC configuration parameters. Several parameters and object IDs are displayed with their current values. Two objects of importance are: # cfgUserAdminIndex=XX cfgUserAdminUserName= If the cfgUserAdminUserName object has no value, that index number, which is indicated by the cfgUserAdminIndex object, is available for use.
To delete a CMC user, the command syntax is: racadm config -g cfgUserAdmin -o cfgUserAdminUserName -i "" racadm config -g cfgUserAdmin -i 2 -o cfgUserAdminPrivilege 0x0 A null string of double quotation marks ("") instructs CMC to remove the user configuration at the specified index, and then reset the user configuration to the factory default values. Enabling CMC User With Permissions To enable a user with specific administrative permissions (role-based authority): 1.
on the specific CMC card. The role and the privilege level is defined on each CMC card and not in the Active Directory. You can configure up to five role groups in each CMC. The following table shows the default role group privileges. Table 12.
Configuring Active Directory With Standard Schema Using CMC Web Interface NOTE: For information about the various fields, see the CMC Online Help. 1. In the left pane, go to Chassis Overview, and then click User Authentication → Directory Services. The Directory Services page is displayed. 2. Select Microsoft Active Directory (Standard Schema). The settings to be configured for standard schema is displayed on the same page. 3. Specify the following: 4.
Configuring Active Directory With Standard Schema Using RACADM At the RACADM command prompt, run the following commands: – Using config command: racadm config -g cfgActiveDirectory -o cfgADEnable 1 racadm config -g cfgActiveDirectory -o cfgADType 2 racadm config -g cfgStandardSchema -i -o cfgSSADRoleGroupName racadm config -g cfgStandardSchema -i -o cfgSSADRoleGroupDomain racadm config -g cfgStandardSchema -i -o cfgSSADRo
NOTE: If certificate validation is enabled, specify the Domain Controller Server addresses and the Global Catalog FQDN. Make sure that DNS is correctly configured. Extended Schema Active Directory Overview Using the extended schema solution requires the Active Directory schema extension. Active Directory Schema Extensions The Active Directory data is a distributed database of attributes and classes.
Additionally, you can configure Active Directory objects in a single domain or in multiple domains. For example, you have two CMCs (RAC1 and RAC2) and three existing Active Directory users (user1, user2, and user3). You want to give user1 and user2 an administrator privilege to both CMCs and give user3 a login privilege to the RAC2 card. When adding Universal Groups from separate domains, create an Association Object with Universal Scope.
• LDIF script file If you use the LDIF script file, the Dell organizational unit is not added to the schema. The LDIF files and Dell Schema Extender are located on your Dell Systems Management Tools and Documentation DVD in the following respective directories: • DVDdrive:\SYSMGMT\ManagementStation\support\OMActiveDirectory_Tools\Remote_Management_Advanced \LDIF_Files • :\SYSMGMT\ManagementStation\support\OMActiveDirector y_Tools\Remote_Management_Advanced \Schema Extender To use the LDIF fi
OID 1.2.840.113556.1.8000.1280.1.7.1.1 Attributes dellSchemaVersion dellRacType Table 15. delliDRACAssociationObject Class OID 1.2.840.113556.1.8000.1280.1.7.1.2 Description Represents the Dell Association Object. The Association Object provides the connection between the users and the devices. Class Type Structural Class SuperClasses Group Attributes dellProductMembers dellPrivilegeMember Table 16. dellRAC4Privileges Class OID 1.2.840.113556.1.8000.1280.1.1.1.
Table 18. dellProduct Class OID 1.2.840.113556.1.8000.1280.1.1.1.5 Description The main class from which all Dell products are derived. Class Type Structural Class SuperClasses Computer Attributes dellAssociationMembers Table 19. List of Attributes Added to the Active Directory Schema Assigned OID/Syntax Object Identifier Single Valued Attribute: dellPrivilegeMember FALSE Description: List of dellPrivilege objects that belong to this attribute. OID: 1.2.840.113556.1.8000.1280.1.1.2.
Assigned OID/Syntax Object Identifier Single Valued Attribute: dellIsServerResetUser TRUE Description: TRUE if the user has Server Reset rights on the device. OID: 1.2.840.113556.1.8000.1280.1.1.2.7 Boolean (LDAPTYPE_BOOLEAN 1.3.6.1.4.1.1466.115.121.1.7) Attribute: dellIsTestAlertUser TRUE Description: TRUE if the user has Test Alert User rights on the device. OID: 1.2.840.113556.1.8000.1280.1.1.2.10 Boolean (LDAPTYPE_BOOLEAN 1.3.6.1.4.1.1466.115.121.1.
When you install your systems management software using the Dell Systems Management Tools and Documentation DVD, you can extend the Snap-in by selecting the Active Directory Users and Computers Snap-in option during the installation procedure. See the Dell OpenManage Software Quick Installation Guide for additional instructions about installing systems management software. For 64-bit Windows Operating Systems, the Snap-in installer is located at :\SYSMGMT\ManagementStation\support\OMActiveDirect o
Adding Objects To Association Object Using the Association Object Properties window, you can associate users or user groups, privilege objects, and RAC devices or RAC device groups. If your system is running on Microsoft Windows 2000 operating system or later version, use Universal Groups to span domains with your user or RAC objects. You can add groups of Users and RAC devices. Adding Users Or User Groups To add users or user groups: 1. Right-click the Association Object and select Properties. 2.
4. Click Apply to save the settings. NOTE: You must apply the settings before continuing. If you do not apply the settings, the settings are lost when you navigate to the next page. 5. In the Extended Schema Settings section, type the CMC device name and the domain name. 6. If you have enabled certificate validation, you must upload the domain forest root certificate authority-signed certificate to CMC.
NOTE: In this case, you do not have to upload a CA certificate. To enforce the certificate validation during SSL handshake (optional): racadm config -g cfgActiveDirectory -o cfgADCertValidationEnable 1 In this case, you must upload a CA certificate: racadm sslcertupload -t 0x2 -f < ADS root CA certificate > NOTE: If certificate validation is enabled, specify the Domain Controller Server addresses and the FQDN. Make sure that DNS is configured correctly under.
Configuring Generic LDAP Directory Service Using CMC Web Interface To configure the generic LDAP directory service: NOTE: You must have the Chassis Configuration Administrator privilege. 1. In the left pane, click Chassis Overview → User Authentication → Directory Services. 2. Select Generic LDAP. 3. Specify the following: The settings to be configured for standard schema is displayed on the same page. NOTE: For information about the various fields, see the Online Help.
• $ racadm config -g cfgLDAP -o cfgLDAPEnable 1 • $ racadm config -g cfgLDAP -o cfgLDAPServer 192.168.0.1 • $ racadm config -g cfgLDAP -o cfgLDAPBaseDN dc= company,dc=com CMC can be configured to optionally query a DNS server for SRV records. If the cfgLDAPSRVLookupEnable property is enabled, the cfgLDAPServer property is ignored. The following query is used to search the DNS for SRV records: _ldap._tcp.domainname.com ldap in the above query is the cfgLDAPSRVLookupServiceName property.
Configuring CMC For Single Sign-On Or Smart Card Login 10 This section provides information to configure CMC for Smart Card login and Single Sign-On (SSO) login for Active Directory users. SSO uses Kerberos as an authentication method allowing users, who have signed in as an automatic- or single sign-on to subsequent applications such as Exchange.
CMC • Each CMC must have an Active Directory account. • CMC must be a part of the Active Directory domain and Kerberos Realm. Prerequisites For Single Sign-On Or Smart Card Login The pre-requisites to configure SSO or Smart Card logins are: • Setup the kerberos realm and Key Distribution Center (KDC) for Active Directory (ksetup). • A robust NTP and DNS infrastructure to avoid issues with clock drift and reverse lookup.
For information about configuring CMC for Extended Schema Active Directory, see Extended Schema Active Directory Overview. Configuring Browser For SSO Login Single Sign-On (SSO) is supported on Internet Explorer versions 6.0 and later, and Firefox versions 3.0 and later. NOTE: The following instructions are applicable only if CMC uses Single Sign-On with Kerberos authentication. Internet Explorer To configure Internet Explorer for Single Sign-On: 1.
NOTE: For information about the options, see the Online Help. 1. 2. While configuring Active Directory to setup a user account, perform the following additional steps: – Upload the keytab file. – To enable SSO, select the Enable Single Sign-On option. – To enable smart card login, select the Enable Smart-Card Login option. NOTE: If these two options are selected, all command line out-of-band interfaces, including secure shell (SSH), Telnet, Serial, and remote RACADM remain unchanged . Click Apply.
11 Configuring CMC to Use Command Line Consoles This section provides information about the CMC command line console (or serial/Telnet/Secure Shell console) features, and explains how to set up the system so that you can perform systems management actions through the console. For information about using the RACADM commands in CMC through the command line console, see Chassis Management Controller for PowerEdge VRTX RACADM Command Line Reference Guide.
If your management station is running Microsoft Windows XP or Microsoft Windows Server 2003, you may experience an issue with the characters in a CMC Telnet session. This issue may occur as a frozen login where the return key does not respond and the password prompt does not appear. To fix this issue, download hotfix 824810 from support.microsoft.com. For more information, you can also see Microsoft Knowledge Base article 824810.
Scheme Type Scheme Message Integrity • • • • Authentication Password HMAC-SHA1-160 HMAC-SHA1-96 HMAC-MD5-128 HMAC-MD5-96 Configure Public Key Authentication Over SSH You can configure up to six public keys that can be used with the service username over an SSH interface. Before adding or deleting public keys, make sure to use the view command to see what keys are already set up, so that a key is not accidentally overwritten or deleted.
3. Click Generate and move the mouse in the window as directed. After the key is created, you can modify the key comment field. You can also enter a passphrase to make the key secure. Ensure that you save the private key. 4. You have two options for using the public key: – Save the public key to a file to upload later. – Copy and paste the text from the Public key for pasting window when adding the account using the text option.
To delete all public keys, run the following command: racadm sshpkauth –i svcacct –k all –d Configuring Terminal Emulation Software CMC supports a serial text console from a management station running one of the following types of terminal emulation software: • Linux Minicom. • Hilgraeve’s HyperTerminal Private Edition (version 6.3). Complete the tasks in the following subsections to configure the required type of terminal software.
Table 22. Minicom Settings Setting Description Required Setting Bps/Par/Bits 115200 8N1 Hardware flow control Yes Software flow control No Terminal emulation ANSI Modem dialing and parameter settings Clear the init, reset, connect, and hangup settings so that they are blank Connecting to Servers or I/O Module Using Connect Command CMC can establish a connection to redirect the serial console of a server or I/O module.
communication is assumed and the escape character is disabled. If the iDRAC is not available, the No route to host error message is displayed. The connect server-n command enables the user to access the server's serial port. After this connection is established, the user can view the server's console redirection through CMC's serial port that includes both the BIOS serial console and the operating system serial console.
Edit the /etc/grub.conf file as follows: 1. Locate the general setting sections in the file and type the following two new lines: serial --unit=1 --speed=57600 terminal --timeout=10 serial 2. Append two options to the kernel line: kernel console=ttyS1,57600 3. If the /etc/grub.conf contains a splashimage directive, comment it out. The following example shows the changes described in this procedure. # grub.
The following example shows the file with the new line. # # inittab This file describes how the INIT process # should set up the system in a certain # run-level. # # Author: Miquel van Smoorenburg # Modified for RHS Linux by Marc Ewing and # Donnie Barnes # # Default runlevel.
Add a new line, with the name of the serial tty for COM2: ttyS1 The following example shows a sample file with the new line.
Using FlexAddress and FlexAdress Plus Cards 12 This section provides information about FlexAddress, FlexAddress Plus Cards, and configuring and using these the cards. NOTE: The FlexAddress feature is licensed, and you must an Enterprise License to use this. About FlexAddress The FlexAddress feature is an optional upgrade that allows server modules to replace the factory-assigned World Wide Name and Media Access Control (WWN/MAC) network IDs with WWN/MAC IDs provided by the chassis.
chassis to assign World Wide Name/Media Access Control (WWN/MAC) addresses to Fibre Channel and Ethernet devices. Chassis assigned WWN/MAC addresses are globally unique and specific to a server slot. Activating FlexAddress FlexAddress is delivered on a Secure Digital (SD) card that must be inserted into CMC to activate the feature. To activate a FlexAddress feature, software updates may be required. If you are not activating FlexAddress, these updates are not required.
Activating FlexAddress Plus FlexAddress Plus is delivered on the FlexAddress Plus Secure Digital (SD) card along with the FlexAddress feature. NOTE: The SD card labeled FlexAddress contains only the FlexAddressess and the card labeled FlexAddress Plus contains FlexAddress and FlexAddress Plus. The card must be inserted into CMC to activate the feature. Some servers may require more MAC addresses than FA can provide to CMC, on the basis of how they are configured.
If there are no active features on the chassis, the command returns a message: racadm feature -s No features active on the chassis Dell Feature Cards may contain more than one feature. Once any feature included on a Dell Feature Card has been activated on a chassis, any other features that may be included on that Dell Feature Card cannot be activated on a different chassis.
The FlexAddress has a value Active or Not Active. The value Active indicates that the feature is installed on the chassis and Not Active indicates that the feature is not installed and not in use on the chassis. Run the following RACADM command to display FlexAddress status for the entire chassis: racadm getflexaddr To display FlexAddress status for a particular slot: racadm getflexaddr [-i ] where is a value from 1–4.
Configuring FlexAddress FlexAddress is an optional upgrade that allows server modules to replace the factory-assigned WWN/MAC ID with a WWN/MAC ID provided by the chassis. NOTE: In this section, the term FlexAddress also indicates FlexAddress Plus. NOTE: By using the racresetcfg subcommand, you can reset the Flex Address of a CMC to its factory-default setting, which is “disabled”.
To enable or disable fabric and slots to use the FlexAddress feature using the CMC Web interface: 1. In the left pane, click Server Overview → Setup → FlexAddress. . 2. On the Deploy FlexAddress page, in the Select Fabrics for Chassis-Assigned WWN/MACs section, select the fabric type (Fabric-A or iDRAC) to which you want to enable FlexAddress. To disable, clear the option. NOTE: If no fabric is selected, the following message is displayed. FlexAddress is not enabled for the selected slots. 3.
Command Messages The following table lists the RACADM commands and output for common FlexAddress situations. Table 26. FlexAddress Commands and Output Situation Command Output SD card in the active CMC module is bound to another service tag.
FlexAddress DELL SOFTWARE LICENSE AGREEMENT This is a legal agreement between you, the user, and Dell Products L.P. or Dell Global B.V. ("Dell"). This agreement covers all software that is distributed with the Dell product, for which there is no separate license agreement between you and the manufacturer or owner of the software (collectively the "Software"). This agreement is not for the sale of Software or any other intellectual property.
IN NO EVENT SHALL DELL OR ITS SUPPLIERS BE LIABLE FOR ANY DAMAGES WHATSOEVER (INCLUDING, WITHOUT LIMITATION, DAMAGES FOR LOSS OF BUSINESS PROFITS, BUSINESS INTERRUPTION, LOSS OF BUSINESS INFORMATION, OR OTHER PECUNIARY LOSS) ARISING OUT OF USE OR INABILITY TO USE THE SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGES. Because some jurisdictions do not allow an exclusion or limitation of liability for consequential or incidental damages, the above limitation may not apply to you.
Managing Fabrics 13 The chassis supports a fabric type, which is Fabric A. Fabric A is used by the single I/O Module, and is always connected to the on-board Ethernet adapters of the servers. The chassis has only one I/O module (IOM), where the IOM is a pass-through or switch module. The I/O Module is classified as group A. Chassis IOM uses a discrete data path called Fabric, and it is named A. The Fabric A supports only Ethernet.
Configuring Network Settings for IOM You can specify the network settings for the interface used to manage the IOM. For Ethernet switches, the out-of-band management port (IP address) is configured. The in-band management port (that is, VLAN1) is not configured using this interface. Before configuring the network settings for the IOM, make sure the IOM is turned on. To configure the network setting of IOM in Group A, you must have the Fabric A Administrator privileges.
Enabling or Disabling LED Blinking for I/O Modules For information to enable LED blinking for I/O Module(s), see Configuring LEDs to Identify Components on the Chassis.
Managing and Monitoring Power 14 The Dell PowerEdge VRTX chassis is the most power-efficient modular server enclosure. It is designed to include highlyefficient power supplies and fans, has an optimized layout for the air to flow more easily through the system, and contains power-optimized components throughout the enclosure.
AC Redundancy Policy The purpose of the AC redundancy policy is to enable a modular enclosure system to operate in a mode in which it can tolerate AC power failures. These failures may originate in the AC power grid, the cabling and delivery, or a PSU itself. When you configure a system for AC redundancy, the PSUs are divided into grids: PSUs in slots 1 and 2 are in the first grid while PSUs in slots 3 and 4 are in the second grid.
To operate remaining PSUs at their maximum efficiency, use the following power redundancy modes: • PSU Redundancy mode with DPSE provides power efficiency. At least two supplies are online, with one PSU required to power the configuration, and one to provide redundancy in case of a PSU failure. PSU Redundancy mode offers protection against the failure of any one PSU, but offers no protection in the event of an AC grid loss.
CAUTION: In AC redundancy mode, you must have balanced sets of PSUs (at least one PSU in each grid). If this condition is not met, AC redundancy is not possible. Power Supply Redundancy When power supply redundancy is enabled, a PSU in the chassis is kept as a spare, ensuring that the failure of any one PSU does not cause the servers or chassis to turn off. Power supply redundancy mode requires minimum two PSUs.
priority servers may get less power than priority-one servers based on System Input Max Power Capacity, and the userconfigured setting of System Input Power Cap. Configuration changes, such as an additional server, shared HDDs, or PCIe cards in the chassis, may require the System Input Power Cap to be increased. Power needs in a modular enclosure also increase when thermal conditions change and the fans are required to run at higher speed, which causes them to consume additional power.
Assigning Priority Levels To Servers Using CMC Web Interface To assign priority levels: 1. In the left pane, click Server Overview → Power → Priority . The Server Priority page lists all the servers in the chassis. 2. From the Priority drop-down menu, select a priority level (1–9, where 1 is the highest priority) for one, multiple, or all servers. The default value is 1. You can assign the same priority level to multiple servers. 3. Click Apply to save your changes.
For more information about getpbinfo, including output details, see the getpbinfo command section in the Chassis Management Controller for PowerEdge VRTX RACADM Command Line Reference Guide. Redundancy Status and Overall Power Health The redundancy status is a factor in determining the overall power health. When the power redundancy policy is set, for example, to AC Redundancy and the redundancy status indicates that the system is operating with redundancy, the overall power health is typically OK.
Table 28. CMC Response When a Server Power-On is Attempted Worst Case Power is Available CMC Response Server Power On Yes No power conservation is required Allowed No Perform power conservation: • • Power required for new server is available Power required for new server is not available Allowed Not Allowed If a PSU stops functioning, it results in a non-critical health state and a PSU failure event is generated. The removal of a PSU results in a PSU removal event.
DC output lost Power supply failed. Events related to changes in the power redundancy status that record entries in the SEL are redundancy loss and redundancy regain for the modular enclosure that is configured for either an AC Redundancy power policy or Power Supply Redundancy power policy. The following table lists the SEL entries that are related to power redundancy policy changes. Power Policy Event System Event Log (SEL) Entry Redundancy lost Power supply redundancy is lost.
In maximum power conservation mode, all servers start functioning at their minimum power levels, and all subsequent server power allocation requests are denied. In this mode, the performance of powered on servers may be degraded. Additional servers cannot be powered on, regardless of server priority. The system is restored to full performance when the maximum conservation mode is cleared.
controls compatible server power allocations, CMC no longer controls the Maximum Power Conservation Mode. Hence, this selection is disabled. When the Maximum Power Conservation Mode is enabled, the CMC sets the System Input Power Capacity to the maximum that the chassis can handle. CMC does not allow power to exceed the highest capacity. However, PM3 handles all other power capacity limitations.
To enable and set the redundancy policy: 1. Open a serial/Telnet/SSH text console to CMC and log in. 2. Set properties as needed: – To select a redundancy policy, type: racadm config -g cfgChassisPower -o cfgChassisRedundancyPolicy where is 0 (AC Redundancy), and 1 (Power Supply Redundancy). The default value is 0.
– To enable remote power management by Open Manage Power Center (OPMC), type: racadm config -g cfgChassisPower -o cfgChassisServerBasedPowerMgmtMode 1 – To restore CMC power management, type: racadm config -g cfgChassisPower -o cfgChassisServerBasedPowerMgmtMode 0 For information about RACADM commands for chassis power, see the config, getconfig, getpbinfo, and cfgChassisPower sections in the Chassis Management Controller for PowerEdge VRTX RACADM Command Line Reference Guide.
Executing Power Control Operations on a Server You can remotely perform power management actions for multiple servers at a time or an individual server in the chassis. NOTE: To perform power management actions, you must have the Chassis Configuration Administrator privilege. Executing Power Control Operations for Multiple Servers Using CMC Web Interface To execute power control operation for multiple servers using the Web interface: 1. In the left pane, click Server Overview → Power.
where indicates the operation you want to execute: power cycle.
Managing Chassis Storage 15 On the Dell PowerEdge VRTX, you can perform the following operations: • View the status of physical disks drives and storage controllers. • View the properties of controllers, physical disk drives, virtual disks, and enclosures. • Set up controllers, physical disk drives, and virtual disks. • Assign virtual adapters. • Troubleshoot controller, physical disk drives, and virtual disks. • Update storage components.
• Virtual disks are created and they are assigned as Virtual Adapter 1, Virtual Adapter 2, Virtual Adapter 3, or Virtual Adapter 4. For more information, see Applying Virtual Adapter Access Policy to Virtual Disks. NOTE: You can map only one virtual adapter to one server at a time. Without an appropriate license, you can map the VA to the default server, or unmap a VA–server assignment. The default mapping is VA1–Server Slot 1, VA2– Server Slot 2, VA3–Server Slot 3, and VA4–Server Slot 4.
To view the properties of physical disk drives: 1. In the left pane, go to Chassis Overview → Storage → Physical Disks. The Properties page is displayed. 2. To view properties of all the physical disk drives, under the Physical Disks section, click the the following filters to view specific physical disk drive's properties: . You can also use – Under the Basic Physical Disks Filter option , from the Group By drop-down menu, select Virtual Disk, Controller, or Enclosure, and then click Apply.
To view the virtual disk properties: 1. In the left pane, click Chassis Overview → Storage → Virtual Disks → Properties. 2. On the Properties page, under the Virtual Disks section, click the specific virtual disk properties: . You can also use the following filters to view – Under Basic Virtual Disks Filter section, from the Controller drop-down menut, select controller name, and then click Apply. – Click Advanced Filter, select the values for various attributes, and then click Apply.
Modifying Virtual Disk Properties Using CMC Web Interface To modify the virtual disk properties: 1. In the left pane, click Chassis Overview → Storage → Virtual Disks → Manage. 2. On the Manage Virtual Disks page, from the Virtual Disk Actions drop-down menu, select one of the following actions, and then click Apply. – Rename – Delete NOTE: If you select Delete, the following message is shown indicating that deleting a virtual disk will permanently delete data available in that virtual disk.
Managing PCIe Slots 16 By default, all slots are unmapped. You can do the following: • View the status of all PCIe Slots in the chassis. • Assign or unassign a PCIe slot to the servers. Consider the following before assigning a PCIe slot to a server: • An empty PCIe slot cannot be assigned to a server that is turned on. • A PCIe slot with an adapter assigned to a server cannot be assigned to another server if the currently-assigned server (source) is turned on.
Managing PCIe Slots Using RACADM You can assign or unassign a PCIe slot to a server by using the RACADM commands. Some of the commands are given here. For more information about the RACADM commands, see the Chassis Management Controller for PowerEdge VRTX RACADM Command Line Reference Guide available at dell.com/support/Manuals.
Troubleshooting and Recovery 17 This section explains how to perform tasks related to recovering and troubleshooting problems on the remote system using the CMC web interface. • Viewing chassis information. • Viewing the event logs. • Gathering configuration information, error status, and error logs. • Using the diagnostic console. • Managing power on a remote system. • Managing Lifecycle Controller jobs on a remote system. • Reset components.
Subsystem RACADM Command General System/RAC information getsysinfo Session information getssninfo Sensor information getsensorinfo Switches information (IO Module) getioinfo Mezzanine card information (Daughter card) getdcinfo All modules information getmodinfo Power budget information getpbinfo KVM information getkvminfo NIC information (CMC module) getniccfg Redundancy information getredundancymode Trace log information gettracelog RAC event log getraclog System event log getsel
– • • • • Problem: The PSU state is displayed as Failed (No AC), even when an AC cord is connected and the power distribution unit is producing good AC output. – Resolution A: Check and replace the AC cord. Check and confirm that the power distribution unit providing power to the power supply is operating as expected. If the failure still persists, call Dell customer service for replacement of the power supply. – Resolution B: Check that the PSU is connected to the same voltage as the other PSUs.
Troubleshooting Alerts Use the CMC log and the trace log to troubleshoot CMC alerts. The success or failure of each email and/or SNMP trap delivery attempt is logged into the CMC log. Additional information describing the particular error is logged in the trace log. However, since SNMP does not confirm delivery of traps, use a network analyzer or a tool such as Microsoft’s snmputil to trace the packets on the managed system.
Viewing Hardware Logs Using RACADM To view the hardware log using RACADM, open a serial/Telnet/SSH text console to CMC, log in, and type: racadm getsel To clear the hardware log, type: racadm clrsel Viewing Chassis Log CMC generates a log of the chassis-related events. NOTE: To clear the chassis log, you must have the Clear Logs Administrator privilege.
NOTE: To reset components, you must have Debug Command Administrator privilege. To reset the components using the CMC Web interface, 1. In the left pane, click Chassis Overview → Troubleshooting → Reset Components. The Reset Components page is displayed. 2. To reset the active CMC, in the CMC Status section, click Reset/Failover CMC. If a standby CMC is present and a chassis is fully redundant, a failover occurs causing the standby CMC to become active.
If you attempt to configure a Windows-based NTP server, it may help to increase the MaxDist parameter for ntpd. Before changing this parameter, understand all the implications, since the default setting must be large enough to work with most NTP servers.
Component Server IOM (Common) IOM (Pass through) Blower PSU 190 LED Color, Blinking Pattern Status Blue, dark Standby Green, glowing steadily Turned on Green, blinking Firmware is being uploaded Green, dark Turned off Blue, glowing steadily Normal Blue, blinking User-enabled module identifier Amber, glowing steadily Not used Amber, blinking Fault Blue, dark No fault Green, glowing steadily Turned on Green, blinking Firmware is being uploaded Green, dark Turned off Blue, glow
Component LED Color, Blinking Pattern Status (Oval) Green, blinking Not used (Oval) Green, dark AC Not OK Amber, glowing steadily Not used Amber, blinking Fault Amber, dark No fault (Circle) Green, glowing steadily DC OK (Circle) Green, dark DC Not OK Troubleshooting Non-responsive CMC If you cannot log in to CMC using any of the interfaces (the web interface, Telnet, SSH, remote RACADM, or serial), you can verify the CMC functionality observing the LEDs on CMC, obtaining recovery informati
3. Press the key. If a recovery prompt appears, additional information is available. The prompt indicates the CMC slot number and failure type. To display failure reason and syntax for a few commands, type recover, and then press . Sample prompts: recover1[self test] CMC 1 self test failure recover2[Bad FW images] CMC2 has corrupted images – If the prompt indicates a self test failure, there are no serviceable components on CMC. CMC is bad and must be returned to Dell.
Troubleshooting Controller To troubleshoot a controller: 1. In the left pane, click Chassis Overview → Storage → Controllers → Troubleshooting. 2. On the Controller Troubleshooting page, from the Actions drop-down list for the respective controller, select any one of the following, and then click Apply. – Reset Configuration — Deletes the virtual disks and hots spares. However, the data on the disks are not erased.
18 Using LCD Panel Interface You can use the LCD panel on the chassis to perform configuration and diagnostics, and to obtain status information about the chassis and its contents. The following figure illustrates the LCD panel. The LCD screen displays menus, icons, pictures, and messages. Figure 2. LCD Display 1. 3. LCD screen Scroll buttons (4) 2.
Accept/Yes — Highlight and press the center button to accept a change and return to the previous screen. Skip/Next — Highlight and press the center button to skip any changes and go to the next screen. No — Highlight and press the center button to answer "No" to a question and go to the next screen. Component Identify — Blinks the blue LED on a component. NOTE: There is a blinking blue rectangle around this icon when Component Identify is enabled.
NOTE: The DVD Mapping feature is displayed on the LCD Main Menu screen only if you have a DVD drive installed. Enclosure Menu From this screen, you can navigate to the following screens: • Front Status • Rear • Side • Enclosure Status Use the navigation buttons to highlight the desired item (highlight the Back icon to return to the Main Menu), and then press the center button. The selected screen is displayed.
Default Screen The Default Screen allows you to change the screen that the LCD panel displays when there is no activity at the panel. The factory default screen is the Main Menu.
Table 33. CMC Status Item Description Example: CMC1, CMC2 Name/Location. No Errors If no error occurs then “No Errors” is displayed, else lists error messages. Firmware Version Only displays on an active CMC. Displays Standby for the standby CMC. IP4 Displays current IPv4 enabled state only on an active CMC. IP4 Address: Only displays if IPv4 is enabled only on an active CMC.
Table 36. PSU Status Item Description Name/Location Example: PSU1, PSU2, and so on. Error Messages If no error then "No Errors" is shown; otherwise error messages are listed, critical errors first, then warnings. Status Offline, Online, or Standby. Maximum Wattage Maximum Wattage that PSU can supply to the system. Table 37.
Item Description iDRAC Firmware Version Displays if iDRAC finished booting. NOTE: iDRAC version 1.01 is displayed as 1.1. There is no iDRAC version 1.10. IP4 Displays the current IPv4 enabled state. IP4 Address: Only displays if IPv4 is enabled. IP6 Only displays if iDRAC supports IPv6. Displays current IPv6-enabled state. IP6 Local Address: Only displays if iDRAC supports IPv6 and IPv6 is enabled.
Frequently Asked Questions 19 This section lists the frequently asked questions about the following: • RACADM • Managing and Recovering a Remote System • Active Directory • FlexAddress and FlexAddressPlus RACADM After performing a CMC reset (using the RACADM racreset subcommand), when a command is entered, the following message is displayed: racadm Transport: ERROR: (RC=-1) What does this message mean? Another command must be issued only after CMC completes the reset.
CMC includes a default CMC server certificate to ensure network security for the web interface and remote RACADM features. When this certificate is used, the web browser displays a security warning because the default certificate is issued to CMC default certificate which does not match the host name of CMC (for example, the IP address). To address this security concern, upload a CMC server certificate issued to the IP address of CMC.
Active Directory Does Active Directory support CMC login across multiple trees? Yes. The CMC’s Active Directory querying algorithm supports multiple trees in a single forest. Does the login to CMC using Active Directory work in mixed mode (that is, the domain controllers in the forest run different operating systems, such as Microsoft Windows 2000 or Windows Server 2003)? Yes.
No activation or modifications to the card should occur. The card is ignored by CMC.
If the CMC subsequently becomes active, with the FlexAddressPlus feature card still in the card slot, the FlexAddressPlus feature gets reactivated, and slot or fabric flexaddress configuration changes can resume. IOM After a configuration change, sometimes CMC displays the IP address as 0.0.0.0. Click the Refresh icon to see if the IP address is set correctly on the switch. If an error is made in setting the IP/mask/ gateway, the switch does not set the IP address and returns a 0.0.0.0 in all fields.