Users Guide
The CMC cannot be cabled for Management Network Port redundancy prior to actually configuring it for this operation. The CMC must
use the standard single network connection for deployment, after which the second redundant connection may be made.
NOTE: When Management Port 2 is set for Redundant but is cabled for Stacking, the downstream CMCs (further from
the TOR switch) will not have a network link.
NOTE: When Management Port 2 is set for Stacking but is cabled for Redundant (two connections to the TOR switch),
routing loops could cause a network storm.
To specify Redundant operation, use racadm config –g cfgNetTuning –o cfgNetTuningNicRedundant 1 command.
To specify Stacking operation, use racadm config –g cfgNetTuning –o cfgNetTuningNicRedundant 0 command.
By default, the Management Port 2 is set for Stacking.
Configuring Management Port 2 using CMC web interface
To configure Management Port using CMC Web Interface:
1. In the left pane, click Chassis Overview > Network, and then click the Network tab.
2. On the Network Configuration page, in the General Settings section, next to Management Port 2, select either Redundant or
Stacking.
3. Click Apply Changes.
• When Management Port 2 is set for Redundant but is cabled for Stacking, the downstream CMCs (further from the top-of-rack
switch) does not have a network link.
• When Management Port 2 is set for Stacking but is cabled for Redundant (two connections to the TOR switch), routing loops
could cause a network storm.
Configuring Management Port 2 using RACADM
To specify Redundant operation, use racadm config –g cfgNetTuning –o cfgNetTuningNicRedundant 1 command.
To specify Stacking operation, use racadm config –g cfgNetTuning –o cfgNetTuningNicRedundant 0 command.
By default, the Management Port 2 is set for Stacking.
Federal Information Processing Standards
The agencies and contractors of the Federal government of the United States use Federal Information Processing Standards (FIPS), a
computer security standard, which is related to all applications that have communicative interfaces. The 140–2 comprises of four levels —
Level 1, Level 2, Level 3, and Level 4. The FIPS 140–2 series stipulate that all communicative interfaces must have the following security
properties:
• authentication
• confidentiality
• message integrity
• non-repudiation
• availability
• access control
If any of the properties depend on cryptographic algorithms, then FIPS must approve these algorithms.
By default, the FIPS mode is disabled. When FIPS is enabled, the minimum key size for OpenSSL FIPS is SSH-2 RSA 2048 bits.
NOTE: PSU firmware update is not supported when the FIPS mode is enabled in the chassis.
For more information, see CMC Online Help.
The following features/applications support FIPS.
• Web GUI
• RACADM
• WSMan
• SSH v2
• SMTP
62
Configuring CMC