Dell PowerEdge M1000e Chassis Management Controller Firmware Version 5.
Notes, cautions, and warnings NOTE: A NOTE indicates important information that helps you make better use of your computer. CAUTION: A CAUTION indicates either potential damage to hardware or loss of data and tells you how to avoid the problem. WARNING: A WARNING indicates a potential for property damage, personal injury, or death. Copyright © 2015 Dell Inc. All rights reserved. This product is protected by U.S. and international copyright and intellectual property laws.
Contents 1 Overview............................................................................................................... 15 What Is New In This Release............................................................................................................... 16 Key Features.........................................................................................................................................16 Management Features.................................................................
Setting Chassis Physical Location and Chassis Name....................................................................... 37 Setting Chassis Physical Location and Chassis Name Using Web Interface...............................37 Setting Chassis Physical Location and Chassis Name Using RACADM...................................... 38 Setting Date and Time on CMC..........................................................................................................
Viewing Currently Installed Firmware Versions Using RACADM................................................. 52 Updating CMC Firmware.................................................................................................................... 52 Updating CMC Firmware Using Web Interface............................................................................ 53 Updating CMC Firmware Using RACADM....................................................................................
Viewing LCD Information and Health.................................................................................................81 6 Configuring CMC................................................................................................83 Viewing and Modifying CMC Network LAN Settings.........................................................................84 Viewing and Modifying CMC Network LAN Settings Using CMC Web Interface.......................
Chassis Configuration Profiles..........................................................................................................102 Saving Chassis Configuration..................................................................................................... 102 Restoring Chassis Configuration Profile.....................................................................................103 Viewing Stored Chassis Configuration Profiles.................................................................
Applying Profile............................................................................................................................127 Importing Profile..........................................................................................................................127 Exporting Profile.......................................................................................................................... 128 Editing Profile..................................................................
Supported Active Directory Authentication Mechanisms..........................................................152 Standard Schema Active Directory Overview.............................................................................152 Configuring Standard Schema Active Directory........................................................................ 154 Extended Schema Active Directory Overview............................................................................
About Flexaddress.............................................................................................................................188 About FlexAddress Plus.....................................................................................................................189 FlexAddress and FlexAddress Plus Comparison.............................................................................. 189 Activating FlexAddress...........................................................................
Configuring Management VLAN on IOMs Using RACADM....................................................... 212 Configuring VLAN settings on IOMs Using CMC Web Interface...............................................213 Viewing the VLAN settings on IOMs Using CMC Web Interface............................................... 214 Adding Tagged VLANs for IOMs Using CMC Web Interface..................................................... 214 Removing VLANs for IOMs Using CMC Web Interface..............................
Default Redundancy Configuration................................................................................................. 237 Grid Redundancy........................................................................................................................ 238 Power Supply Redundancy.........................................................................................................238 No Redundancy.............................................................................................
Viewing CMC Log and Enhanced Chassis Log.......................................................................... 258 Using Diagnostic Console................................................................................................................ 259 Resetting Components.................................................................................................................... 260 Saving or Restoring Chassis Configuration......................................................................
Backup the CMC Configurations and Server Configurations......................................................... 294 Update Firmware for Management Consoles Without Servers Downtime ...................................294 Extended Power Performance Scenarios - Using Web Interface...................................................294 Extended Power Performance Scenarios - Using RACADM...........................................................
Overview 1 The Dell Chassis Management Controller (CMC) for Dell PowerEdge M1000e chassis is a systems management hardware and software solution for managing multiple Dell server chassis. It is a hotpluggable card that is installed at the back of Dell PowerEdge M1000e chassis. The CMC has its own microprocessor and memory and is powered by the modular chassis into which it is plugged.
What Is New In This Release This release of CMC supports: • Support for 13th generation of Dell PowerEdge servers. NOTE: For more information on the applicable servers, see the Dell Chassis Management Controller (CMC) Version 5.1 for Dell PowerEdge M1000e Release Notes available at dell.com/ support/manuals. • An option to use iDRAC DNS name as slot name. • CMC DNS server setting through iDRAC QuickDeploy feature.
• Launch point for the Integrated Dell Remote Access Controller (iDRAC) Web interface. • Support for WS-Management. • FlexAddress feature — Replaces the factory-assigned World Wide Name/Media Access Control (WWN/ MAC) IDs with chassis-assigned WWN/MAC IDs for a particular slot, an optional upgrade. • iDRAC IO Identity feature support for enhanced WWN/MAC Address Inventory. • Graphical display of chassis component status and health. • Support for single and multi-slot servers.
Chassis Overview The following figure shows the facing edge of a CMC (inset) and the locations of the CMC slots in the chassis. 1 GB Port 2 STK Port CMC Port Information The following TCP/IP ports are required to remotely access CMC through firewalls. These are the ports CMC listens to for connections. Table 1.
Table 2. CMC Client Port Port Number Function 25 SMTP 53 DNS 68 DHCP-assigned IP address 69 TFTP 162 SNMP trap 514* Remote syslog 636 LDAPS 3269 LDAPS for global catalog (GC) * Configurable port Minimum CMC Version The following table lists the minimum CMC version required to enable the listed Blade Servers. Table 3. Minimum CMC Version for Blade Servers Servers Minimum version of CMC PowerEdge M600 CMC 1.0 PowerEdge M605 CMC 1.0 PowerEdge M805 CMC 1.2 PowerEdge M905 CMC 1.
The following table lists the minimum CMC version required to enable the listed IOMs. Table 4. Minimum CMC Version for IOMs IOM Switches Minimum version of CMC PowerConnect M6220 CMC 1.0 PowerConnect M6348 CMC 2.1 PowerConnect M8024 CMC 1.2 PowerConnect M8024-k CMC 3.2 PowerConnect M8428-k CMC 3.1 Dell 10/100/1000Mb Ethernet Pass-Through CMC 1.0 Dell 4Gbps FC Pass-Through Module CMC 1.0 Dell 8/4Gbps FC SAN Module CMC 1.2 Dell 10Gb Ethernet Pass-Through CMC 2.
Table 5. Latest Firmware Versions for BIOS, iDRAC, and Lifecycle Controller Servers BIOS iDRAC Lifecycle Controller PowerEdge M600 2.4.0 1.65 Not Applicable PowerEdge M605 5.4.1 1.65 Not Applicable PowerEdge M805 2.3.3 1.65 Not Applicable PowerEdge M905 2.3.3 1.65 Not Applicable PowerEdge M610 6.3.0 3.50 1.6 PowerEdge M610x 6.3.0 3.50 1.6 PowerEdge M710 6.3.0 3.50 1.6 PowerEdge M710HD 7.0.0 3.50 1.6 PowerEdge M910 2.9.0 3.50 1.6 Power Edge M915 3.0.4 3.50 1.
Connection Features • Other connections • Support for binary interchange for applications specifically designed to communicate with a binary protocol to a particular type of IOM. Serial port can be connected internally to the serial console of a server, or I/O module, using the connect (or racadm connect) command. • Access to the Dell CMC console through the Avocent Integrated KVM Switch Module (iKVM). Supported Platforms CMC supports modular systems designed for the PowerEdge M1000e platform.
Other Documents You May Need In addition to this guide, you can access the following guides available at dell.com/support/manuals. Select Choose from a list of all Dell products and click Continue. Click Software, Monitors, Electronics & Peripherals → Software: • Click Remote Enterprise System Management and then click Dell Chassis Management Controller Version 5.0 to view: – The CMC Online Help provides information about using the Web interface.
Contacting Dell NOTE: If you do not have an active Internet connection, you can find contact information on your purchase invoice, packing slip, bill, or Dell product catalog. Dell provides several online and telephone-based support and service options. Availability varies by country and product, and some services may not be available in your area. To contact Dell for sales, technical support, or customer service issues: 1. Go to dell.com/support. 2. Select your support category. 3.
Installing and Setting Up CMC 2 This section provides information about how to install the PowerEdge M1000e Chassis Management Controller (CMC) hardware, establish access to CMC, configure your management environment to use CMC, and guides you through the next steps for configuring the CMC: • Set up initial access to CMC. • Access CMC through a network. • Add and configure CMC users. • Update CMC firmware.
NOTE: Do not turn on the servers. 6. Using the LCD panel on the front of the system, provide CMC with a static IP address or configure it for DHCP. 7. Connect to the CMC IP address and provide default username (root) and password (calvin). 8. Provide each iDRAC with an IP address in the CMC Web interface and enable the LAN and IPMI interface. NOTE: iDRAC LAN interface on some servers are disabled by default. 9. Provide each I/O module with an IP address in the CMC Web interface. 10.
1 Management Network 2 Standby CMC 3 Active CMC The following figures provide examples of incorrect cabling of CMC.
To daisy-chain up to four chassis: 1. Connect the GB port of the active CMC in the first chassis to the management network. 2. Connect the GB port of the active CMC in the second chassis to the STK port of the active CMC in the first chassis. 3. If you have a third chassis, connect the GB port of its active CMC to the STK port of the active CMC in the second chassis. 4. If you have a fourth chassis, connect the GB port of its active CMC to the STK port of the third chassis. 5.
• • Docs — Contains documentation for systems, systems management software products, peripherals, and RAID controllers. SERVICE — Contains the tools required to configure your system, and delivers the latest diagnostics and Dell-optimized drivers for your system. For information about installing Dell OpenManage software components, see the Dell OpenManage Installation and Security User's Guide available on the DVD or at dell.com/support/manuals.
operating system, some Internet Explorer settings can interfere with connectivity even though you use a command line interface to access the management network.
happen if you are using the browser or another interface such as remote RACADM. Follow these steps to disable the phishing filter: 1. Start Internet Explorer. 2. Click Tools → Phishing Filter, and then click Phishing Filter Settings. 3. Select the Disable Phishing Filter check box and click OK. Certificate Revocation List (CRL) Fetching If your CMC has no access to the Internet, disable the certificate revocation list (CRL) fetching feature in Internet Explorer.
Ensure that CMC and iDRAC on each server and the network management ports for all switch I/O Modules are connected to a common internal network in the M1000e chassis. This allows the management network to be isolated from the server data network. It is important to separate this traffic for uninterrupted access to chassis management. CMC is connected to the management network. All external access to CMC and iDRACs is accomplished through CMC.
• Remote RACADM • CMC Web interface CMC supports both IPv4 and IPv6 addressing modes. The configuration settings for IPv4 and IPv6 are independent of one another. Configuring CMC Network Using LCD Panel Interface NOTE: The option to configure CMC using the LCD panel is available only until CMC is deployed or the default password is changed. If the password is not changed, you can the continue to use the LCD to reset the configurations of the CMC causing a possible security risk.
Dynamic Host Configuration Protocol (DHCP) CMC retrieves IP configuration (IP address, mask, and gateway) automatically from a DHCP server on your network. CMC is assigned to a unique IP address allotted over your network. If you have selected the DHCP option, press the center button. The Configure iDRAC screen appears; go to step 9.
• • 11. select a number for each position. This address is the static IP of the iDRAC located in the first slot. The static IP address of each subsequent iDRAC is calculated as a slot number increment of this IP address. When you have finished setting the Static IP Address, press the center button to continue. Set the subnet mask, and then press the center button. Set the gateway, and then press the center button. • Select whether to Enable or Disable the IPMI LAN channel.
Interface Description the NIC interface from a supported Web browser on the management station. For a list of supported Web browsers, see the Supported Browsers section in the Chassis Management Controller Version 5.0 Release Notes at dell.com/support/manuals. Remote RACADM command line interface Use this command line utility to manage CMC and its components.
Interface Description The CMC WS-MAN implementation uses SSL on port 443 for transport security, and supports basic authentication. The data available through WS-Management is provided by CMC instrumentation interface mapped to the DMTF profiles and extension profiles. For more information, see the following: • MOFs and Profiles — delltechcenter.com/page/DCIM.Library • DTMF Web site — dmtf.org/standards/profiles/ • WS-MAN release notes or Read Me file. • www.wbemsolutions.com/ws_management.
The General Chassis Settings page is displayed. 2. Type the location properties and the chassis name. For more information, see the CMC Online Help. NOTE: The Chassis Location field is optional. It is recommended to use the Data Center, Aisle, Rack, and Rack Slot fields to indicate the physical location of the chassis. 3. Click Apply. The settings are saved.
NOTE: Only servers can be selected on this page. • Chassis Overview → I/O Module Overview → Troubleshooting → Identify. The Identify page is displayed. 2. To enable blinking for a component LED, select required component and click Blink. 3. To disable blinking for a component LED, clear the required component and click UnBlink.
The Log in Security enables you to configure the IP range attributes for CMC login using the CMC Web interface. To configure the IP range attributes using CMC Web interface: 1. In the system tree, go to Chassis Overview and click Network → Network. The Network Configuration page is displayed. 2. In the IPv4 Settings section, click Advanced Settings. Alternatively, to access the Log in Security page, in the system tree, go to Chassis Overview, click Security → Log in.
• Run the RACADM cmcchangeover command. (See the cmcchangeover command section in the Chassis Management Controller for Dell PowerEdge M1000e RACADM Command Line Reference Guide). • Run the RACADM racreset command on the active CMC. (See the racreset command section in the Chassis Management Controller for Dell PowerEdge M1000e RACADM Command Line Reference Guide). • Reset the active CMC from Web interface.
• CMC reset — Chassis management resumes after CMC reboots or chassis fails over to the standby CMC. • CMC failover command issued — Chassis management resumes after the chassis fails over to the standby CMC. • CMC firmware update — Chassis management resumes after CMC reboots or chassis fails over to the standby CMC. It is recommended that you update the standby CMC first so that there is only one failover event.
Logging In to CMC 3 You can log in to CMC as a CMC local user, as a Microsoft Active Directory user, or as an LDAP user. The default user name and password is root and calvin, respectively. You can also log in using Single Sign-On or Smart Card.
Logging Into CMC Using Smart Card Logging Into CMC Using Single Sign-on Logging Into CMC as Local User, Active Directory User, or LDAP User To log in to CMC, you must have a CMC account with Log In to CMC privilege. The default CMC user name is root, and the password is calvin. The root account is the default administrative account that ships with CMC. NOTE: • For added security, it is strongly recommended that you change the default password of the root account during initial setup.
Related Concepts Configuring User Accounts and Privileges Related Tasks Accessing CMC Web Interface Logging Into CMC Using Smart Card You can log in to CMC using a smart card. Smart cards provide Two Factor Authentication (TFA) that provide two-layers of security: • Physical smart card device. • Secret code such as a password or PIN. Users must verify their credentials using the smart card and the PIN. NOTE: You cannot use the IP address to log in to CMC using Smart Card login.
Before logging in to CMC using Single Sign-on, make sure that: • You have logged in to your system using a valid Active Directory user account. • Single Sign-On option is enabled during Active Directory configuration. To log in to CMC using Single Sign-on: 1. Log in to the client system using your network account. 2. Access the CMC Web interface using: https:// For example, cmc-6G2WXF1.cmcad.lab, where cmc-6G2WXF1 is the cmc-name and cmcad.lab is the domain-name.
NOTE: Remote RACADM is included on the Dell Systems Management Tools and Documentation DVD and is installed on a management station. • Remote RACADM — Allows you to run RACADM commands on a management station with the -r option and the DNS name or IP address of the CMC. • Firmware RACADM — Allows you to log in to the CMC using Telnet, SSH, a serial connection, or the iKVM. With Firmware RACADM, you run the RACADM implementation that is part of the CMC firmware.
Interface Maximum Sessions per Interface Telnet 4 SSH 4 WS-MAN 4 iKVM 1 Serial 1 Changing Default Login Password The warning message that prompts you to change the default password is displayed if: • You log in to CMC with Configure Users privilege. • Default password warning feature is enabled. • Default user name and password for any currently enabled account are root and calvin respectively. The same warning message is displayed if you log in using Active Directory or LDAP.
Changing Default Login Password Using RACADM To change the password, run the following RACADM command: racadm config –g cfgUserAdmin –o cfgUserAdminPassword –i where, is a value from 1 to 16 (indicates the user account) and is the new user–defined password. For more information, see the Chassis Management Controller for Dell PowerEdge M1000e RACADM Command Line Reference Guide.
Updating Firmware 4 You can update firmware for the following: • CMC - active and standby • iKVM • IOMs You can update firmware for the following server components: • iDRAC - iDRACs earlier than iDRAC6 must be updated using the recovery interface. iDRAC6 firmware can also be updated with the recovery interface, but is deprecated for iDRAC6 and future versions.
DRM to search for latest firmware updates, see Using Dell Repository Manager to Search for the Latest Updates on the Dell Support Site on the Dell Tech Center. For information on saving the inventory file that DRM uses as input to create the repositories, see Saving Chassis Inventory Report Using CMC Web Interface Saving Chassis Inventory Report Using CMC Web Interface.
Viewing Currently Installed Firmware Versions Using RACADM To view the currently installed firmware versions using RACADM, use the getkvminfo subcommand. For more information, see the Chassis Management Controller for Dell PowerEdge M1000e RACADM Command Line Reference Guide. Updating CMC Firmware You can update CMC firmware using Web interface or RACADM. The firmware update, by default, retains the current CMC settings.
When transferring files to and from CMC, the file transfer icon spins during the transfer. If your icon is animated, make sure that your browser is configured to allow animations. For instructions, see Allow Animations in Internet Explorer. If you experience problems downloading files from CMC using Internet Explorer, enable the Do not save encrypted pages to disk option. For instructions, see Downloading Files From CMC With Internet Explorer.
Updating CMC Firmware Using RACADM To update CMC firmware using RACADM, use the fwupdate subcommand. For more information, see Chassis Management Controller for Dell PowerEdge M1000e RACADM Command Line Reference Guide. Updating iKVM Firmware The iKVM resets and becomes temporarily unavailable after the firmware is successfully uploaded.
Updating IOM Infrastructure Device Firmware By performing this update, the firmware for a component of the IOM device is updated, but not the firmware of the IOM device itself; the component is the interface circuitry between the IOM device and CMC. The update image for the component resides in the CMC file system, and the component displays as an updatable device on the CMC Web interface only if the current revision on the component and the component image on CMC do not match.
Updating IOM Firmware Using RACADM To update IOM infrastructure device firmware using RACADM, use the fwupdate subcommand. For more information, see Chassis Management Controller for Dell PowerEdge M1000e RACADM Command Line Reference Guide. Updating Server iDRAC Firmware Using Web Interface To update the iDRAC firmware in the server using in the CMC Web interface: 1.
Updating Server iDRAC Firmware Using RACADM To update iDRAC firmware using RACADM, use the fwupdate subcommand. For more information, see Chassis Management Controller for Dell PowerEdge M1000e RACADM Command Line Reference Guide for iDRAC and CMC. Updating Server Component Firmware The one-to-many update feature in CMC enables you to update server component firmware across multiple servers.
NOTE: The Single Click all blade update method has the following benefits: • Enables you to update all the components on all the blade servers with minimal clicks. • All the updates are packaged in a directory. This avoids individual upload of each component’s firmware. • Faster and consistent method of updating the server components.
NOTE: When you update the firmware versions for all the server components at one time, the update sequence is handled by Lifecycle Controller. Supported Firmware Versions for Server Component Update The following section provides the supported component versions for CMC firmware update and Server Component Update. The following table lists the supported firmware versions for server components when CMC Firmware is updated from 5.0 to 5.1 version but the server components are not updated to the next version.
M710HD M420 M520 M620 M820 M630 60 Diagnostics 5154A0 BIOS 2.7.9 iDRAC 2.7.9 Lifecycle Controller 1.5.5.27 Diag 5154A0 BIOS 6.0.3 NIC 7.6.15 iDRAC 1.45.45 Lifecycle Controller 1.1.5.165 Diagnostics 4225A2 BIOS 1.6.6 NIC 7.6.15 iDRAC 1.45.45 Lifecycle Controller 1.1.5.165 Diagnostics 4225A2 BIOS 1.8.6 iDRAC 1.45.45 Lifecycle Controller 1.1.5.165 Diagnostics 4225A2 BIOS 1.7.6 NIC 7.6.15 iDRAC 1.45.45 Lifecycle Controller 1.1.5.
M830 Lifecycle Controller Not Applicable Diagnostics Not Applicable BIOS Not Applicable iDRAC 2.05.05.05 Lifecycle Controller 2.05.05.05 Diagnostics 4239A16_4239.24 BIOS 0.4.3 The following table lists the supported firmware versions for server components in a scenario where the existing CMC Firmware version is 5.1 and the server components are updated from N-1 version to N version.
M910 M710HD M420 M520 M620 62 Diagnostics 5154A0 5158A3 BIOS 6.2.3 6.3.0 iDRAC 3.42_A00 3.50 A00 Lifecycle Controller 1.5.5.27 1.6.0.73 Diagnostics 5154A0 5158A3 BIOS 2.7.9 2.9.0 iDRAC 3.42_A00 3.50 A00 Lifecycle Controller 1.5.5.27 1.6.0.73 Diagnostics 5154A0 5158A3 BIOS 6.0.3 7.0.0 NIC 7.6.15 7.8.15 iDRAC 1.45.45 1.50.50 Lifecycle Controller 1.1.5.165 1.3.0.850 Diagnostics 4225A2 4231A0 BIOS 1.6.6 2.0.22 NIC 7.6.15 7.8.15 iDRAC 1.45.45 1.50.
M820 M630 M830 iDRAC 1.45.45 1.50.50 Lifecycle Controller 1.1.5.165 1.3.0.850 Diagnostics 4225A2 4231A0 BIOS 1.6.6 2.0.21 iDRAC Not Applicable 2.05.05.05 Lifecycle Controller Not Applicable 2.05.05.05 Diagnostics Not Applicable 4239A16_4239.24 BIOS Not Applicable 0.4.3 iDRAC 2.05.05.05 2.20.20.20 Lifecycle Controller 2.05.05.05 2.20.20.20 Diagnostics 4239A16_4239.24 4239.32 BIOS 0.4.3 1.2.
Choosing Server Component Firmware Update Type Using CMC Web Interface To select the type of server component update type: 1. In the system tree, go to Server Overview, and then click Update → Server Component Update. The Server Component Update page is displayed. 2.
Supported? (Yes or No) Diagnostics No No No No OS Driver Pack No No No No Lifecycle Controller No No No Yes BIOS Yes Yes Yes Yes RAID Controller Yes Yes Yes Yes Backplanes Yes Yes Yes Yes Enclosures Yes Yes No Yes NIC Yes Yes Yes Yes iDRAC Yes **No *No *No Power Supply Unit Yes Yes Yes Yes CPLD No Yes Yes Yes FC Cards Yes Yes Yes Yes PCIe SSD Yes Yes Yes Yes * Indicates that though a system restart is not required, iDRAC must be restarted to ap
The Server Component Update page is displayed. 2. In the Choose Update Type section, select Update from File. For more information, see Choosing Server Component Update Type 3. In the Component/Device Update Filter section, filter the component or device (optional). For more information see Filtering Components for Firmware Updates Using CMC Web Interface. 4. In the Update column, select the check boxes for the component or device for which you want to update the firmware to the next version.
Pre-requisites for Using Network Share Update Mode The following pre-requisites are required to update server component firmware using Network Share mode: • The servers must belong to 12th or later generations and must have iDRAC Enterprise license. • CMC version must be at version 4.5 or later. • Lifecycle Controller must be enabled on the servers. • iDRAC Version 1.50.50 or later must be available on the 12th generation servers. • Dell Repository Manager 1.
NOTE: The Job Status column displays the job status of the operations scheduled on the server. The job status is dynamically updated. Filtering Components for Firmware Updates Information for all the components and devices across all servers is retrieved at one time. To manage this large amount of information, the Lifecycle Controller provides various filtering mechanisms. These filters enable you to: • Select one or more categories of components or devices for easy viewing.
The Firmware Inventory section displays only the associated components or devices across all servers present in the chassis. The filter is a pass filter; this means that it only permits components or devices associated with the filter and excludes all others. After the filtered set of components and devices is displayed in the inventory section, further filtering may occur when a component or device is selected for update.
– The new devices are inserted into the server. To automate this action, iDRAC Configuration Utility (for iDRAC) or the iDRAC Settings Utility (for iDRAC) provides an option that can be accessed through the boot console: – For iDRAC servers, on the boot console, when prompted with the message Press for Remote Access Setup within 5 sec., press . Then, on the setup screen, enable Collect System Inventory on Restart. – For iDRAC servers, on the boot console, select F2 for System Setup.
For more information, see the Chassis Management Controller for Dell PowerEdge M1000e RACADM Command Line Reference Guide available at dell.com/support/manuals. Saving Chassis Inventory Report Using CMC Web Interface To save the chassis inventory report: 1. In the system tree, go to Server Overview, and then click Update → Server Component Update. The Server Component Update page is displayed. 2. Click Save Inventory. The Inventory.xml file is saved on an external system.
• Update • Delete Jobs Only one type of operation can be performed at a time. Components and devices that are not supported may be listed as part of the inventory, but do not permit Lifecycle Controller operations. To perform the Lifecycle Controller operations, you must have: • For CMC: Server Administrator privilege. • For iDRAC: Configure iDRAC privilege and Log in to iDRAC privilege. A Lifecycle Controller operation scheduled on a server may take 10 to 15 minutes to complete.
Rolling Back Server Component Firmware You can install the firmware image of the previously installed firmware for selected components or devices across one or more servers. The firmware image is available within the Lifecycle Controller for a rollback operation. The availability is subject to the version compatibility logic of the Lifecycle Controller. It also assumes the previous update was facilitated by the Lifecycle Controller.
Early generations of servers can have corrupted firmware recovered using the new update iDRAC firmware process. When CMC detects corrupted iDRAC firmware, it lists the server on the Firmware Update page. Perform the steps as mentioned for updating firmware.
Viewing Chassis Information and Monitoring Chassis and Component Health 5 You can view information and monitor the health for the following: • Active and standby CMCs • All severs and individual servers • Storage arrays • All IO Modules (IOMs) and individual IOMs • Fans • iKVM • Power supplies (PSUs) • Temperature sensors • LCD assembly Viewing Chassis Component Summaries When you log in to the CMC Web interface, the Chassis Health page allows you to view the health of the chassis and it
displayed when you click on that component. In addition, the latest events in the CMC Hardware Log are also displayed. For more information, see the CMC Online Help. If your chassis is configured as a Group Lead, the Group Health page is displayed after login. It displays the chassis level information and alerts. All active critical and non-critical alerts are displayed. Chassis Graphics The chassis is represented by front and back views (the upper and lower images, respectively).
Icon Description No server is present. Selected Component Information Information for the selected component is displayed in three independent sections: • Health and Performance and Properties — Displays the active critical and non-critical events as shown by the hardware logs and the performance data that vary with time. • Properties — Displays the component properties that do not vary with time or change only infrequently.
Power Supply Units Power Status Fans • IOM Slot Speed • Firmware • Hardware Capacity • Lower Critical Threshold • Upper Critical Threshold • Power State • Model • Role • Service Tag • Power Supply Status • Power Consumption • System Budget • Fans Status IOM Status Viewing Server Model Name and Service Tag You can view the model name and service tag of each server instantly using the following steps: 1. Expanding Servers in the System tree.
Viewing Health Status and Information for Individual Server To view health status for individual servers, do any of the following: 1. Go to Chassis Overview → Properties → Health. The Chassis Health page displays a graphical overview of all the servers installed in the chassis. Server health status is indicated by the overlay of the server subgraphic. Move the cursor to hover over an individual server subgraphic. A corresponding text hint or screen tip provides additional information for that server.
The I/O Module Status page provides overviews of all IOMs associated with the chassis. For more information, see the CMC Online Help. Viewing Information and Health Status For Individual IOM To view health status of the individual IOMs, in the CMC Web interface, do any of the following: 1. Go to Chassis Overview → Properties → Health. The Chassis Health page is displayed. The lower section of Chassis Graphics depicts the rear view of the chassis and contains the health status for the IOMs.
To view the health status of the iKVMs associated with the chassis, do any of the following: 1. Go to Chassis Overview → Properties → Health. The Chassis Health page is displayed. The lower section of chassis graphics provides the rear view of the chassis and contains the health status of the iKVM. iKVM health status is indicated by the overlay of the iKVM subgraphic. Move the cursor over an iKVM subgraphic and a corresponding text hint or screen tip is displayed.
The Chassis Health page is displayed. The top section of Chassis Graphics depicts the front view of the chassis. LCD health status is indicated by the overlay of the LCD subgraphic. 2. Move the cursor over the LCD subgraphic. The corresponding text hint or screen tip provides additional information on the LCD. 3. Click the LCD subgraphic to view the LCD information on the right. For more information, see the CMC Online Help.
Configuring CMC 6 CMC enables you to configure CMC properties, set up users, and set up alerts to perform remote management tasks. Before you begin configuring the CMC, you must first configure the CMC network settings to allow the CMC to be managed remotely. This initial configuration assigns the TCP/IP networking parameters that enable access to the CMC. For more information, see Setting Up Initial Access to CMC. You can configure CMC using Web interface or RACADM.
Configuring Multiple CMCs through RACADM Using Configuration File Viewing and Modifying CMC Network LAN Settings The LAN settings, such as community string and SMTP server IP address, affect both the CMC and the external settings of the chassis. If you have two CMCs (active and standby) on the chassis, and they are connected to the network, the standby CMC automatically assumes the network settings of the active CMC in the event of failover.
NOTE: If you disable CMC network interface, the disable operation performs the following actions: • Disables the network interface access to out-of-band chassis management, including iDRAC and IOM management. • Prevents the down link status detection. • To disable only CMC network access, disable both CMC IPv4 and CMC IPv6. NOTE: The CMC NIC is enabled by default.
You can disable the DHCP for NIC address feature and specify a static IP address, subnet mask, and gateway. For more information, see Setting Up Initial Access to CMC. Enabling or Disabling DHCP for DNS IP Addresses By default, the CMC’s DHCP for DNS address feature is disabled. When enabled, this feature obtains the primary and secondary DNS server addresses from the DHCP server. While using this feature, you do not have to configure static DNS server IP addresses.
• DNS Domain Name — The default DNS domain name is a single blank character. To set a DNS domain name, type: racadm config -g cfgLanNetworking -o cfgDNSDomainName where is a string of up to 254 alphanumeric characters and hyphens. For example: p45, atz-1, r-id-001.
Configuring IP Range Attributes Using CMC Web Interface NOTE: To perform the following task, you must have Chassis Configuration Administrator privilege. To configure the IP range attributes using CMC Web interface: 1. In the system tree, go to Chassis Overview and click Network → Network. The Network Configuration page is displayed. 2. In the IPv4 Settings section, click Advanced Settings. The Log in Security page is displayed.
Configuring Virtual LAN Tag Properties for CMC VLANs are used to allow multiple virtual LANs to co-exist on the same physical network cable and to segregate the network traffic for security or load management purposes. When you enable the VLAN functionality, each network packet is assigned a VLAN tag. Configuring Virtual LAN Tag Properties for CMC Using Web Interface To configure VLAN for CMC using the CMC Web interface: 1.
4. To remove the CMC VLAN, disable the VLAN capabilities of the external chassis management network: racadm config -g cfgLanNetworking -o cfgNicVLanEnable 0 You can also remove the CMC VLAN using the following command: racadm setniccfg -v Configuring Services You can configure and enable the following services on CMC: • CMC Serial console — Enable access to CMC using the serial console. • Web Server — Enable access to CMC Web interface.
Configuring Services Using CMC Web Interface To configure CMC services using CMC Web interface: 1. In the system tree, go to Chassis Overview, and then click Network → Services. The Services page is displayed. 2. Configure the following services as required: • CMC serial console • Web server • SSH • Telnet • Remote RACADM • SNMP • Remote Syslog For information about the fields, see CMC Online Help. 3. Click Apply, and then update all default time outs and maximum time out limits.
To enable or repair the Removable Flash Media using the CMC Web interface: 1. In the System tree, go to Chassis Overview, and then click Chassis Controller → Flash Media. The Removable Flash Media page is displayed. 2.
Related Tasks Adding Members to Chassis Group Removing a Member from the Leader Disbanding a Chassis Group Disabling an Individual Member at the Member Chassis Launching a Member Chassis’s or Server’s Web page Propagating Leader Chassis Properties to Member Chassis Adding Members to Chassis Group After the Chassis Group is setup, you can add members to the group: 1. Login with chassis administrator privileges to the leader chassis. 2. Select the Lead chassis in the tree. 3.
Related Tasks Disabling an Individual Member at the Member Chassis Disbanding a Chassis Group To disband a chassis group from the lead chassis: 1. Login with administrator privileges to the leader chassis. 2. Select the Lead chassis in the tree. 3. Click Setup → Group Administration. 4. In the Chassis Group page, under Role, select None, and then click Apply. The lead chassis then communicates to all the members that they have been removed from the group.
Propagating Leader Chassis Properties to Member Chassis You can apply the properties from the leader to the member chassis of a group. To synchronize a member with the leader properties: 1. Login with administrator privileges to the leader chassis. 2. Select the Lead chassis in the tree. 3. Click Setup → Group Administration. 4.
To get the most accurate server inventory report: • • The Chassis Group leader chassis and all Chassis Group member chassis must be in Chassis Power State On. All servers in the associated chassis must be powered on.
→ From Text in MS Excel. After the inventory report is imported into MS Excel, and if a message is displayed prompting for additional information, select comma-delimited to import the file into MS Excel. Chassis Group Inventory and Firmware Version The Chassis Group Firmware Version page displays the group inventory and firmware versions of the servers and the server components in the chassis. This page also enables you to organize the inventory information and filter the firmware versions view.
NOTE: The firmware versions of USC, Diagnostics, OS Drive, RAID devices, and NIC devices of servers are not available if: • • • The server belongs to the 10th generation of PowerEdge servers. These servers do not support Lifecycle Controller. The server belongs to the 11th generation of PowerEdge servers, but the iDRAC firmware does not support Lifecycle Controller. The CMC firmware version of a member chassis is earlier to version 4.45.
• Allow both systems to establish an encrypted connection. This encryption process provides a high level of data protection. CMC employs the 128-bit SSL encryption standard, the most secure form of encryption generally available for Internet browsers in North America. The CMC Web server includes a Dell self-signed SSL digital certificate (Server ID).
with the remote system cannot be viewed or changed by others. Without a secure server certificate, CMC is vulnerable to access from unauthorized users. To obtain a secure server certificate for CMC, you must submit a Certificate Signing Request (CSR) to a certificate authority of your choice. A CSR is a digital request for a signed, secure server certificate containing information about your organization and a unique, identifying key.
NOTE: You can upload a self-signed certificate (generated using the CSR feature) only once. Any attempt to upload the certificate a second time is not successful, as the private key is deleted after the first certificate upload. Uploading Server Certificate Using CMC Web Interface To upload a server certificate using the CMC Web interface: 1. In the system tree, go to Chassis Overview, and then click Network → SSL. The SSL Main Menu is displayed. 2.
CMC resets and becomes temporarily unavailable after the certificate has been uploaded successfully. To avoid disconnecting other users during a reset, notify authorized users who might log into CMC and check for active sessions in the Sessions page under the Network tab.
interface and RACADM commands. You can also use the XML file that is saved to restore the configuration on the same chassis or to configure other chassis. NOTE: Server and iDRAC settings are not saved or restored with the chassis configuration. To save the current chassis configuration, perform the following tasks: 1. Go to the Chassis Configuration Profiles page. In the Save and Backup → Save Current Configuration section, enter a name for the profile in the Profile Name field.
Importing Chassis Configuration Profiles You can import chassis configuration profiles that are stored on a network share to the local management station. To import a stored profile on a remote file share to CMC, perform the following tasks: 1. Go to the Chassis Configuration Profiles page. In the Chassis Configuration Profiles → Stored Profiles section, click Import Profile. The Import Profile section is displayed. 2.
3. Click OK. Deleting Chassis Configuration Profiles You can delete a chassis configuration profile that is stored on the network share. To delete a chassis configuration profile, perform the following tasks: 1. Go to the Chassis Configuration Profiles page. In the Chassis Configuration Profiles → Stored Profiles section, select the required profile and then click Delete Profile. A warning message is displayed indicating that deleting a profile would delete the selected profile permanently. 2.
you can export chassis configuration profiles to local management station through remote RACADM interface. 1. To export the chassis configuration profiles as clone.xml file, type the following: racadm –r xx.xx.xx.xx –u USERNAMECMC –p PASSWORDCMC get –f clone.xml –t xml Importing Chassis Configuration profiles You can import chassis configuration profiles from network share to another chassis by using the set command. 1.
00000 …. Configuring Multiple CMCs through RACADM Using Configuration File Using configuration file, you can configure one or more CMCs with identical properties through RACADM..
Creating a CMC Configuration File The CMC configuration file, .cfg, is used with the racadm config -f .cfgcommand to create a simple text file. The command allows you to build a configuration file (similar to a .ini file) and configure the CMC from this file. You may use any file name, and the file does not require a .cfg extension (although it is referred to by that designation in this subsection).
Related Concepts Parsing Rules Parsing Rules • Lines that start with a hash character (#) are treated as comments. A comment line must start in column one. A "#" character in any other column is treated as a # character. Some modem parameters may include # characters in their strings. An escape character is not required. You may want to generate a .cfg from a racadm getconfig -f .cfg command, and then perform a racadm config -f .
NOTE: A NULL string (identified by two " characters) directs the CMC to delete the index for the specified group. To view the contents of an indexed group, run the following command: racadm getconfig -g -i • For indexed groups the object anchor must be the first object after the [ ] pair.
Viewing and Terminating CMC Sessions You can view the number of users currently logged in to iDRAC and terminate the user sessions. NOTE: To terminate a session, you must have Chassis Configuration Administrator privilege. Viewing and Terminating CMC Sessions Using Web Interface To view or terminate a session using Web interface: 1. In the system tree, go to Chassis Overview and click Network → Sessions. The Sessions page displays the session ID, username, IP address, and session type.
By default, the ECM feature is disabled on a chassis. The ECM enabling and disabling operations are recorded in the CMC logs. The ECM mode state is maintained after CMC failovers and chassis AC power cycles. You can enable or disable the ECM feature using the CMC Web interface or the RACADM CLI interface. Configuring Enhanced Cooling Mode for Fans Using Web Interface To configure Enhanced Cooling Mode (ECM) for fans using CMC Web interface: 1.
Configuring Enhanced Cooling Mode for Fans Using RACADM To enable and configure the Enhanced Cooling Mode for fans, use the following RACADM object under the cfgThermal group: cfgThermalEnhancedCoolingMode For example, to enable the ECM mode, use: racadm config –g cfgThermal –o cfgThermalEnhancedCoolingMode 1 In case of errors, an error message is displayed. The default value of Enhanced Cooling Mode option is disabled (0). This value is set to disabled (0) when racresetcfg command is issued.
Configuring Server 7 You can do the following on the server: • Configuring Slot Names • Configuring iDRAC Network Settings • Configuring iDRAC VLAN Tag Settings • Setting First Boot Device • Configuring Server FlexAddress • Configuring Remote File Share • Configuring BIOS Settings Using Server Clone Configuring Slot Names Slot names are used to identify individual servers.
The slot name setting does not extend to the optional iKVM. The slot name information is available through the iKVM FRU. The slot name setting in the CMC Web interface always overrides any change you make to the display name in the iDRAC interface. To edit a slot name using the CMC Web interface: 1. In the system tree, go to Chassis Overview → Server Overview and then click Setup → Slot Names. The Slot Names page is displayed. 2. In the Slot Name field, edit the slot name.
Table 15. : QuickDeploy Settings Setting Description QuickDeploy Enabled Enables or disables the QuickDeploy feature that automatically applies the iDRAC settings configured on this page to newly inserted servers. The auto configuration must be confirmed locally on the LCD panel. NOTE: This includes the root user password if the Set iDRAC Root Password on Server Insertion box is checked. By default, this option is disabled.
Setting Description Enable iDRAC IPMI over LAN Enables or disables the IPMI over LAN channel for each iDRAC present in the chassis.By default, it is disabled. Enable iDRAC DHCP Enables or disables DHCP for each iDRAC present in the chassis. If this option is enabled, the fields QuickDeploy IP, QuickDeploy Subnet Mask, and QuickDeploy Gateway are disabled, and cannot be modified since DHCP is used to automatically assign these settings for each iDRAC. By default, this option is disabled.
Setting Description Starting iDRAC IPv4 Address (Slot 1) Specifies the static IP address of iDRAC in the server, in slot 1 of the enclosure. The IP address of each subsequent iDRAC is incremented by 1 for each slot from slot 1's static IP address. In the case where the IP address plus the slot number is greater than the subnet mask, an error message is displayed. NOTE: The subnet mask and the gateway are not incremented like the IP address. For example, if the starting IP address is 192.168.0.
3. Setting Description Use CMC DNS Settings Enables the CMC DNS Server settings ( IPv4 and IPv6) that are propagated to iDRAC when a blade server is inserted in the chassis. Click Save QuickDeploy Settings to save the settings. If you have made changes to the iDRAC network setting, click Apply iDRAC Network Settings to deploy the settings to the iDRAC. The QuickDeploy feature only executes when it is enabled, and a server is inserted in the chassis.
The following figure shows the QuickDeploy IP addresses assignment to the servers when there are 32 quarter height severs in a M1000e chassis: Configuring Reserved QuickDeploy IP Addresses Using RACADM To modify the number of static IP addresses allocated for servers on the chassis using RACADM, use the following command: racadm deploy –q -n where is the number of IP addresses, 8. 16, or 32.
NOTE: Changes made to QuickDeploy fields are immediate, but changes made to one or more iDRAC server network configuration settings may require a couple of minutes to propagate from CMC to iDRAC. Clicking Refresh too soon may display only partially correct data for a one or more iDRAC servers.
For example: racadm setniccfg -m server-1 -v 1 7 For example: • To remove a server VLAN, disable the VLAN capabilities of the specified server's network: racadm setniccfg -m server- -v The valid values for are 1-16. For example: racadm setniccfg -m server-1 -v Setting First Boot Device You can specify the CMC first boot device for each server.
Boot Device Description Local SD Card Boot from the local SD (Secure Digital) card - for servers that support iDRAC system only. Floppy Boot from a floppy disk in the local floppy disk drive. RFS Boot from a Remote File Share (RFS) image. The image file is attached using the iDRAC GUI console viewer.
For more information about these objects, see the Chassis Management Controller for Dell PowerEdge M1000e RACADM Command Line Reference Guide available at dell.com/support/manuals. Configuring Server FlexAddress For information to configure FlexAddress for servers, see Configuring FlexAddress for Server-Level Slots.
• BIOS — This group includes only the BIOS settings of a server. These profiles are generated from CMC versions earlier than 4.3. • BIOS and Boot — This group includes the BIOS and the Boot settings of a server. These profiles are generated from: – CMC version 4.3 – CMC version 4.45 with 11th generation servers – CMC version 4.45 and 12th generation servers with Lifecycle Controller 2 version earlier than 1.
Accessing Server Profiles Page You can add, manage, and apply server profiles to one or more servers using the Server Profiles page. To access the Server Profiles page using the CMC Web interface, in the system tree, go to Chassis Overview → Server Overview. Click Setup → Profiles. The Server Profiles page is displayed.
NOTE: The process to gather the settings runs in the background. Hence, it may take some time before the new profile is displayed. If the new profile is not displayed, check the profile log for errors. Related Tasks Accessing Server Profiles Page Applying Profile Server cloning is possible only when server profiles are available as stored profiles in the nonvolatile media on the CMC or stored on the remote share.
Exporting Profile You can export a stored server profile saved on the CMC nonvolatile media (SD Card) to a specified path on a management station. To export a stored profile: 1. Go to the Server Profiles page. In the Stored Profiles section, select the required profile, and then click Export Copy of Profile. A File Download message is displayed prompting you to open or save the file. 2. Click Save or Open to export the profile to the required location.
A warning message is displayed indicating that deleting a profile would delete the selected profile permanently. 2. Click OK to delete the selected profile. For more information, see the CMC Online Help. Viewing Profile Settings To view Profile settings for a selected server, go to the Server Profiles page. In the Server Profiles section, click View in the Server Profile column for the required server. The View Settings page is displayed.
The results displayed for the completion or failure are similar to the information displayed in the iDRAC Lifecycle Controller log for the specific server. Quick Deploy of Profiles The Quick Deploy feature enables you to assign a stored profile to a server slot. Any server supporting server cloning inserted into that slot is configured using the assigned profile.
NOTE: • If an assigned profile is on the Network Share which is not accessible when a server is inserted in the slot, the LCD displays a message that the assigned profile is not available for Slot . • The Network Share option is enabled and the details are displayed in the Stored Profiles section only if the network share is mounted and is accessible. If the Network Share is not connected, configure the Network Share for the chassis.
For Emulex Fibre Channel (FC) cards, the Enable/Disable Boot From SAN attribute in the Option ROM is disabled by default. Enable the attribute in the Option ROM and apply the boot identify profile to the server for booting from SAN. To save a profile, perform the following tasks: 1. Go to the Server Profiles page. In the Boot Identity Profiles section, select the server that has the required settings with which you want to generate the profile and select FQDD from the FQDD dropdown menu. 2.
The Apply Identity option is enabled. 3. Click Apply Identity. A warning message is displayed that applying a new identity overwrites the current settings and also reboots the selected server. You are prompted to confirm if you want to continue the operation. NOTE: To perform server configuration replication operations on the server, the CSIOR option must be enabled for the servers. If CSIOR option is disabled, a warning message is displayed that CSIOR is not enabled for the server.
Exporting Boot Identity Profiles You can export a boot identity profiles that are saved on the network share to a specified path on a management station. To export a stored profile, perform the following tasks: 1. Go to the Server Profiles page. In the Boot Identity Profiles → Stored Profiles section, select the required profile and then click Export Profile. 2. Click Save or Open to export the profile to the required location. A File Download message is displayed prompting you to open or save the file.
To create a MAC pool: 1. Go to the Server Profiles page. In the Boot Identity Profiles → Manage Virtual MAC Address Pool section. 2. Enter the starting MAC address of the MAC address pool in the Starting MAC Address field. 3. Enter the count of the MAC addresses in the Number of MAC Addresses field. 4. Click Create MAC Pool to create the MAC address pool.
To remove MAC addresses from the network share: 1. Go to the Server Profiles page. In the Boot Identity Profiles → Manage Virtual MAC Address Pool section, select the active MAC address(es) that you want to deactivate. 2. Click Deactivate MAC Address(es). Launching iDRAC using Single Sign-On CMC provides limited management of individual chassis components, such as servers.
Launching iDRAC from Server Status Page To launch the iDRAC management console for an individual server: 1. In the system tree, expand Server Overview. All of the servers (1–16) appear in the expanded Servers list. 2. Click the server for which you want to launch the iDRAC Web interface. The Server Status page is displayed. 3. Click Launch iDRAC GUI. The iDRAC Web interface is displayed.
Launching Remote Console from Servers Status Page To launch a remote console from the Servers Status page: 1. In the system tree, go to Server Overview, and then click Properties → Status. The Servers Status page is displayed. 2. 138 Click Launch Remote Console for the required server.
Configuring CMC To Send Alerts 8 You can set alerts and actions for certain events that occur on the managed system. An event occurs when the status of a system component is greater than the pre-defined condition. If an event matches an event filter and you have configured this filter to generate an alert (email alert or SNMP trap), then an alert is sent to one or more configured destinations. To configure CMC to send alerts: 1. Enable the global chassis event alerts. 2.
Configuring Alert Destinations The management station uses Simple Network Management Protocol (SNMP) to receive data from CMC. You can configure the IPv4 and IPv6 alert destinations, email settings, and SMTP server settings, and test these settings. Before configuring the email alert or SNMP trap settings, make sure that you have Chassis Configuration Administrator privilege.
Configuring SNMP Trap Alert Destinations Using RACADM To configure IP alert destination using RACADM: 1. Open a serial/Telnet/SSH text console to CMC and log in. NOTE: Only one filter mask may be set for both SNMP and email alerting. You can skip step 2 if you have already selected the filter mask. 2. Enable alert generation: racadm config -g cfgAlerting -o cfgAlertingEnable 1 3.
4. Event Filter Mask Value Firmware Version Mismatch 0x400000 Chassis Power Threshold Error 0x1000000 SDCARD Absent 0x2000000 SDCARD Error 0x4000000 Chassis Group Error 0x8000000 Server Sleeve Absent 0x10000000 Fabric Mismatch 0x20000000 Enable traps alerts: racadm config -g cfgTraps -o cfgTrapsEnable 1 -i where is a value between 1–4. CMC uses the index number to distinguish up to four configurable destinations for traps alerts.
You must configure the SMTP email server to accept relayed emails from the CMC IP address, a feature which is normally turned off in most mail servers due to security concerns. For instructions to do this in a secure manner, see the documentation that was provided with the SMTP server. NOTE: If your mail server is Microsoft Exchange Server 2007, make sure that iDRAC domain name is configured for the mail server to receive the email alerts from iDRAC. NOTE: Email alerts support both IPv4 and IPv6 addresses.
6. Specify the name of the person receiving the email alert: racadm config -g cfgEmailAlert -o cfgEmailAlertEmailName -i where is the name of the person or group receiving the email alert, and is the index value specified in step 4 and step 5. The email name can contain up to 32 alphanumeric characters, dashes, underscores, and periods. Spaces are not valid. 7. Setup the SMTP host: racadm config -g cfgRemoteHosts -o cfgRhostsSmtpServerIpAddr host.
9 Configuring User Accounts and Privileges You can setup user accounts with specific privileges (role-based authority) to manage your system with CMC and maintain system security. By default CMC is configured with a local administrator account. This default user name is root and the password is calvin. As an administrator, you can setup user accounts to allow other users to access CMC.
Privilege Description It is possible for a user to have other privileges without the CMC Login User privilege. This feature is useful when a user is temporarily not allowed to login. When that user’s CMC Login User privilege is restored, the user retains all the other privileges previously granted. Chassis Configuration Administrator User can add or change data that: • • • • Identifies the chassis, such as chassis name and chassis location.
Privilege Description Without the Server Administrator privilege, a user created on the chassis can only execute a command on a server when all of the following conditions are true: • The same user name exists on the server. • The same user name must have the same password on the server. • The user must have the privilege to execute the command.
Privilege Description Fabric C Administrator User can set and configure the Fabric C IOM, which resides in either slot C1 or slot C2 of the I/O slots. The CMC user groups provide a series of user groups that have pre-assigned user privileges. NOTE: If you select Administrator, Power User, or Guest User, and then add or remove a privilege from the pre-defined set, the CMC Group automatically changes to Custom. Table 19.
User Group Privileges Granted None No assigned permissions Table 20.
Configuring Local Users You can configure up to 16 local users in CMC with specific access permissions. Before you create a CMC local user, verify if any current users exist. You can set user names, passwords, and roles with the privileges for these users. The user names and passwords can be changed using any of the CMC secured interfaces (that is, Web interface, RACADM or WS-MAN).
If the cfgUserAdminUserName object has no value, that index number, which is indicated by the cfgUserAdminIndex object, is available for use. If a name is displayed after the "=", that index is taken by that user name. When you manually enable or disable a user with the racadm config subcommand, you must specify the index with the -i option. The "#" character in the command objects indicates that it is a read only object. Also, if you use the racadm config -f racadm.
racadm config -g cfgUserAdmin -i 2 -o cfgUserAdminPrivilege 0x0 A null string of double quote characters ("") instructs CMC to remove the user configuration at the specified index and reset the user configuration to the original factory defaults. Enabling CMC User With Permissions To enable a user with specific administrative permissions (role-based authority): 1. Locate an available user index using the command syntax: racadm getconfig -g cfgUserAdmin -i 2.
In Active Directory, a standard group object is used as a role group. A user who has CMC access is a member of the role group. To give this user access to a specific CMC card, the role group name and its domain name need to be configured on the specific CMC card. The role and the privilege level is defined on each CMC card and not in the Active Directory. You can configure up to five role groups in each CMC. The following table shows the default role group privileges. Table 21.
Role Group Default Privilege Level Permissions Granted • • • • • • Bit Mask Chassis Control Administrator (Power Commands) Server Administrator Test Alert User Fabric A Administrator Fabric B Administrator Fabric C Administrator 3 None CMC Login User 0x00000001 4 None No assigned permissions 0x00000000 5 None No assigned permissions 0x00000000 NOTE: The Bit Mask values are used only when setting Standard Schema with the RACADM.
6. Specify the group name, domain, and privileges for a role group. 7. Click Apply to save the role group settings and then click Go Back To Configuration page. 8. If you have enabled certificate validation, you must upload the domain forest root certificate authority-signed certificate to CMC. In the Manage Certificates section, type the file path of the certificate or browse to the certificate file. Click Upload to upload the file to CMC.
• If DHCP is enabled on CMC and you want to use the DNS address obtained automatically by the DHCP server, type the following command: racadm config -g cfgLanNetworking -o cfgDNSServersFromDHCP 1 • If DHCP is disabled on CMC or you want manually to input your DNS IP address, type the following commands: racadm config -g cfgLanNetworking -o cfgDNSServersFromDHCP 0 racadm config -g cfgLanNetworking -o cfgDNSServer1 racadm config -g cfgLanNetworking -o cfgDNSServer2
However, each association object can be linked (or, may link users, groups of users, or RAC device objects) to only one privilege object. This example allows an administrator to control each user’s privileges on specific CMCs. The RAC device object is the link to RAC firmware for querying Active Directory for authentication and authorization.
To configure the objects for the single domain scenario: 1. Create two Association Objects. 2. Create two RAC Device Objects, RAC1 and RAC2, to represent the two CMCs. 3. Create two Privilege Objects, Priv1 and Priv2, in which Priv1 has all privileges (administrator) and Priv2 has login privilege. 4. Group user1 and user2 into Group1. 5. Add Group1 as Members in Association Object 1 (A01), Priv1 as Privilege Objects in A01, and RAC1, RAC2 as RAC Devices in A01. 6.
To configure the objects for the multiple domain scenario: 1. Ensure that the domain forest function is in Native or Windows 2003 mode. 2. Create two Association Objects, A01 (of Universal scope) and A02, in any domain. The figure Setting Up Active Directory Objects in Multiple Domains shows the objects in Domain2. 3. Create two RAC Device Objects, RAC1 and RAC2, to represent the two CMCs. 4.
• :\SYSMGMT\ManagementStation\support\OMActiveDirector y_Tools \Remote_Management\Schema Extender To use the LDIF files, see the instructions in the readme included in the LDIF_Files directory. You can copy and run the Schema Extender or LDIF files from any location. Using Dell Schema Extender CAUTION: The Dell Schema Extender uses the SchemaExtenderOem.ini file. To make sure that the Dell Schema Extender utility functions properly, do not modify the name of this file. 1.
Table 24. : delliDRACAssociationObject Class OID 1.2.840.113556.1.8000.1280.1.7.1.2 Description Represents the Dell Association Object. The Association Object provides the connection between the users and the devices. Class Type Structural Class SuperClasses Group Attributes dellProductMembers dellPrivilegeMember Table 25. : dellRAC4Privileges Class OID 1.2.840.113556.1.8000.1280.1.1.1.3 Description Defines the privileges (Authorization Rights) for CMC device.
Table 27. : dellProduct Class OID 1.2.840.113556.1.8000.1280.1.1.1.5 Description The main class from which all Dell products are derived. Class Type Structural Class SuperClasses Computer Attributes dellAssociationMembers Table 28. : List of Attributes Added to the Active Directory Schema Assigned OID/Syntax Object Identifier Single Valued Attribute: dellPrivilegeMember FALSE Description: List of dellPrivilege objects that belong to this attribute. OID: 1.2.840.113556.1.8000.1280.1.1.2.
Assigned OID/Syntax Object Identifier Single Valued Description: TRUE if the user has User Configuration Administrator rights on the device. OID: 1.2.840.113556.1.8000.1280.1.1.2.5 Boolean (LDAPTYPE_BOOLEAN 1.3.6.1.4.1.1466.115.121.1.7) Attribute: delIsLogClearAdmin TRUE Description: TRUE if the user has Clear Logs Administrator rights on the device. OID: 1.2.840.113556.1.8000.1280.1.1.2.6 Boolean (LDAPTYPE_BOOLEAN 1.3.6.1.4.1.1466.115.121.1.
Assigned OID/Syntax Object Identifier Single Valued Attribute: dellRacType TRUE Description: This attribute is the Current Rac Type for the dellRacDevice object and the backward link to the dellAssociationObjectMembers forward link. OID: 1.2.840.113556.1.8000.1280.1.1.2.13 Case Ignore String(LDAPTYPE_CASEIGNORESTRING 1.2.840.113556.1.4.905) Attribute: dellAssociationMembers FALSE Description: List of dellAssociationObjectMembers that belong to this Product.
• Create a RAC device Object • Create a Privilege Object • Create an Association Object • Add objects to an Association Object Related Concepts Adding Objects to Association Object Related Tasks Creating RAC Device Object Creating Privilege Object Creating Association Object Creating RAC Device Object To create RAC device object: 1. In the Console Root (MMC) window, right-click a container. 2. Select New → Dell Remote Management Object. 3. Enter a name for the new object.
Adding Objects to Association Object Using the Association Object Properties window, you can associate users or user groups, privilege objects, and RAC devices or RAC device groups. If your system is running on Microsoft Windows 2000 mode or higher, use Universal Groups to span domains with your user or RAC objects. You can add groups of Users and RAC devices. The procedure for creating Dell-related groups and nonDell-related groups is identical.
• If you want the directed call to search the domain controller and global catalog, select the Search AD Server to search (Optional) option and specify the domain controller and global catalog details. NOTE: Setting the IP address as 0.0.0.0 disables CMC from searching for a server. NOTE: You can specify a list of domain controller or global catalog servers separated by commas. CMC allows you to specify up to three IP addresses or host names. 4.
racadm config -g cfgActiveDirectory -o cfgADRacDomain racadm config -g cfgActiveDirectory -o cfgADRootDomain racadm config -g cfgActiveDirectory -o cfgADRacName racadm sslcertupload -t 0x2 -f -r racadm sslcertdownload -t 0x1 -f NOTE: You can use this command through remote RACADM only.
cfgDNSServer1 racadm config -g cfgLanNetworking -o cfgDNSServer2 The Extended Schema feature configuration is complete. Configuring Generic LDAP Users CMC provides a generic solution to support Lightweight Directory Access Protocol (LDAP)-based authentication. This feature does not require any schema extension on your directory services. A CMC administrator can now integrate the LDAP server user logins with CMC.
Authentication of LDAP Users Some directory servers require a bind before any searches can be performed against a specific LDAP server. To authenticate a user: 1. Optionally bind to the Directory Service. The default is an anonymous bind. 2. Search for the user based upon their user login. The default attribute is uid. If more than one object is found, then the process returns an error. 3. Unbind and perform a bind with the user's DN and password. If the bind fails, then the login fails.
where ldap is the service name and dell.com is the search domain. 4. Click Apply to save the settings. NOTE: You must apply the settings before continuing. If you do not apply the settings, the settings are lost when you navigate to the next page. 5. In the Group Settings section, click a Role Group. The Configure LDAP Role Group page is displayed. 6. Specify the group domain name and privileges for the role group. 7.
10 Configuring CMC For Single Sign-On Or Smart Card Login This section provides information to configure CMC for Smart Card login and Single Sign-On (SSO) login for Active Directory users. Starting with CMC version 2.10, CMC supports Kerberos based Active Directory authentication to support Smart Card and SSO logins. SSO uses kerberos as an authentication method allowing users who have signed in to the domain to have an automatic or single sign-on to subsequent applications such as Exchange.
NOTE: If you are using Active Directory on Windows 2003, make sure that you have the latest service packs and patches installed on the client system. If you are using Active Directory on Windows 2008, make sure that you have installed SP1 along with the following hot fixes: Windows6.0-KB951191-x86.msu for the KTPASS utility. Without this patch the utility generates bad keytab files. Windows6.0-KB957072-x86.msu for using GSS_API and SSL transactions during an LDAP bind.
Service Principal Name (SPN) bindings to a user account and export the trust information into a MIT-style Kerberos keytab file. For more information on the ktpass utility, see the Microsoft website. Before generating a keytab file, you must create an Active Directory user account for use with the mapuser option of the ktpass command. You must use the same name as the CMC DNS name, to which you upload the generated keytab file. To generate a keytab file using the ktpass tool: 1.
Mozilla Firefox 1. In Firefox, type about:config in the address bar. NOTE: If the browser displays the This might void your warranty warning, click I'll be careful. I promise. 2. In the Filter text box, type negotiate. The browser displays a list of preference names limited to those containing the word negotiate. 3. From the list, double-click network.negotiate-auth.trusted-uris. 4. In the Enter string value dialog box, type the CMC's domain name and click OK.
again. For more information, see RACADM Chassis Management Controller for Dell PowerEdge M1000e RACADM Command Line Reference Guide on dell.com/support/manuals. Uploading the Keytab File The Kerberos keytab file serves as the CMC's user name and password credentials to the Kerberos Data Center (KDC), which in turns allows access to the Active Directory. Each CMC in the Kerberos realm must be registered with the Active Directory and must have a unique keytab file.
11 Configuring CMC to Use Command Line Consoles This section provides information about the CMC command line console (or serial/Telnet/Secure Shell console) features, and explains how to set up the system so that you can perform systems management actions through the console. For information on using the RACADM commands in CMC through the command line console, see Chassis Management Controller for Dell PowerEdge M1000e RACADM Command Line Reference Guide.
Command Description exit, logout, and quit All the commands perform the same action. They end the current session and return to a login prompt. Using Telnet Console With CMC You can have up to four Telnet sessions with CMC at a time. If your management station is running Microsoft Windows XP or Windows 2003, you may experience an issue with the characters in a CMC Telnet session. This issue may occur as a frozen login where the return key does not respond and the password prompt does not appear.
Supported SSH Cryptography Schemes To communicate with CMC using SSH protocol, it supports multiple cryptography schemes listed in the following table. Table 30.
Date/Time SSH 09:00:00 SSH 09:00:00 PC1 x.x.x.x 06/16/2009 PC2 x.x.x.x 06/16/2009 For more information on the sshpkauth, see the Chassis Management Controller for Dell PowerEdge M1000e RACADM Command Line Reference Guide.
–t must be dsa or rsa. –b specifies the bit encryption size between 768 and 4096. –c allows modifying the public key comment and is optional. The is optional. After the command completes, use the public file to pass to the RACADM for uploading the file. RACADM Syntax Notes for CMC When using the racadm sshpkauth command, ensure the following: • • For the –i option, the parameter must be svcacct. All other parameters for -i fail in CMC.
• Linux Minicom. • Hilgraeve’s HyperTerminal Private Edition (version 6.3). Perform the steps in the following subsections to configure the required type of terminal software. Configuring Linux Minicom Minicom is a serial port access utility for Linux. The following steps are valid for configuring Minicom version 2.0. Other Minicom versions may differ slightly but require the same basic settings. See the information in the Required Minicom Settings section to configure other versions of Minicom.
Setting Description Required Setting Modem dialing and parameter settings Clear the init, reset, connect, and hangup settings so that they are blank Connecting to Servers or I/O Modules Using Connect Command CMC can establish a connection to redirect the serial console of server or I/O modules. For servers, serial console redirection can be accomplished using: • racadm connect command.
I/O Module Label Switch C2 switch-c2 or switch-6 NOTE: There can only be one IOM connection per chassis at a time. NOTE: You cannot connect to pass-throughs from the serial console. To connect to a managed server serial console, use the command connect server-, where n is 1-8 and x is a,b, c, or d. You can also use the racadm connect server-n command. When you connect to a server using the -b option, binary communication is assumed and the escape character is disabled.
The managed server reboots. Configuring Windows for Serial Console Redirection There is no configuration necessary for servers running the Microsoft Windows Server versions, starting with Windows Server 2003. Windows receives information from the BIOS, and enable the Special Administration Console (SAC) console one COM1. Configuring Linux for Server Serial Console Redirection During Boot The following steps are specific to the Linux GRand Unified Bootloader (GRUB).
When you edit the /etc/grub.conf file, follow these guidelines: • Disable GRUB's graphical interface and use the text-based interface; otherwise, the GRUB screen is not displayed in console redirection. To disable the graphical interface, comment out the line starting with splashimage. • To start multiple GRUB options to start console sessions through the serial connection, add the following line to all options: console=ttyS1,57600 The example shows console=ttyS1,57600 added to only the first option.
pf::powerfail:/sbin/shutdown -f -h +2 "Power Failure; System Shutting Down" # If power was restored before the shutdown kicked in, cancel it.
Using FlexAddress and FlexAdress Plus Cards 12 This section provides information about FlexAddress and FlexAddress Plus cards, how to configure and use these cards. Related Concepts About Flexaddress About FlexAddress Plus FlexAddress and FlexAddress Plus Comparison About Flexaddress If a server is replaced, the FlexAddress for the slot remains the same for the given server slot.
For example: (starting_mac)00188BFFDCFA + (mac_count)0xCF - 1 = (ending_mac)00188BFFDDC8 NOTE: Lock the SD card prior to inserting in the USB Memory Card Reader to prevent accidently modifying any of the contents. You must unlock the SD card before inserting into CMC. About FlexAddress Plus The FlexAddress Plus is a new feature added to the feature card version 2.0. It is an upgrade from FlexAddress feature card version 1.0. FlexAddress Plus contains more MAC addresses than the FlexAddress feature.
Activating FlexAddress FlexAddress is delivered on a Secure Digital (SD) card that must be inserted into CMC to activate the feature. To activate the FlexAddress feature, software updates may be required; if you are not activating FlexAddress these updates are not required. The updates (listed in the following table) include server module BIOS, I/O mezzanine BIOS or firmware, and CMC firmware. You must apply these updates before you enable FlexAddress.
NOTE: If CMC firmware that supports FlexAddress (version 1.10 or later) is not installed, the feature is not activated. See the Chassis Management Controller (CMC) Secure Digital (SD) Card Technical Specification document for SD card installation instructions. NOTE: The SD card contains a FlexAddress feature. Data contained on the SD card is encrypted and may not be duplicated or altered in any way as it may inhibit system function and cause the system to malfunction.
Status Message Actions that the CMC with the SD feature card installed is the active CMC and not the standby CMC. The feature card inserted is valid and contains the following feature(s) FlexAddress: The feature card is bound to this chassis. No action required. The feature card inserted is valid and contains the Remove the SD card; locate and install the SD card following feature(s) FlexAddress: The feature card for the current chassis.
To deactivate the FlexAddress feature and restore the SD card: racadm feature -d -c flexaddress The command returns the following status message if it is successfully deactivated: feature FlexAddress is deactivated on the chassis successfully.
Wake-On-LAN with FlexAddress When the FlexAddress feature is deployed for the first time on a given server module, it requires a powerdown and power-up sequence for FlexAddress to take effect. FlexAddress on Ethernet devices is programmed by the server module BIOS. For the server module BIOS to program the address, it needs to be operational which requires the server module to be powered up.
For more information on setflexaddr command, see the Chassis Management Controller for Dell PowerEdge M1000e RACADM Command Line Reference Guide. at dell.com/support/manuals. Configuring FlexAddress for Server-Level Slots At the server level, you can enable or disable the FlexAddress feature for individual slots. Configuring FlexAddress for Server-Level Slots Using CMC Web Interface To enable or disable an individual slot to use the FlexAddress feature using the CMC Web interface: 1.
• Fabric Configuration NOTE: – Fabric A displays the type of the Input/Output fabric installed. If Fabric A is enabled, unpopulated slots display chassis-assigned MAC addresses for Fabric A. – iDRAC management controller is not a fabric, but its FlexAddress is considered as a fabric. – A check mark against the component indicates that the fabric is enabled for FlexAddress or FlexAddressPlus. • Protocol that is being used on the NIC Adapter port. For example, LAN, iSCSI, FCoE, and so on.
Viewing Basic WWN/MAC Address Information Using Web Interface To view WWN/MAC Address information for each server slot or all servers in a chassis, in the basic mode: 1. Click Server Overview → Properties → WWN/MAC. The WWN/MAC Summary page displays the WWN/MAC Address Information. Alternatively, click Server Overview → Slot → Setup → FlexAddress to view the WWN/MAC Address information for a specific server slot. The FlexAddress page is displayed. 2.
4. Click the against a slot or click Expand/Collapse All to expand or collapse the attributes listed for a specific slot or all the slots in the WWN/MAC Addresses table. 5. From the Server Slot drop-down menu, select All Servers or a specific Slot to view the WWN/MAC Addresses attributes for all servers or servers in specific slots only respectively. 6.
To display the console assigned MAC/WWN of all LOMs or mezzanine cards, use the following RACADM command: racadm getmacaddress -c all To display the chassis assigned WWN/MAC address, use the following RACADM command: racadm getmacaddress -c flexaddress To display the MAC/WWN addresses for all LOMs or mezzanine cards, use the following RACADM command: racadm getmacaddress -c factory To display the Ethernet and iSCSI MAC/WWN addresses for all iDRAC/LOMs/mezzanine cards, use the following RACADM command: racad
Command Messages The following table lists the RACADM commands and output for common FlexAddress situations. Table 34. FlexAddress Commands and Output Situation Command Output SD card in the active CMC module is bound to another service tag.
Situation Command $racadm setflexaddr -i 1 Changing the slot/fabric 1 FlexAddress settings while the server modules are powered ON. Output ERROR: Unable to perform the set operation because it affects a powered ON server FlexAddress DELL SOFTWARE LICENSE AGREEMENT This is a legal agreement between you, the user, and Dell Products L.P. or Dell Global B.V. ("Dell").
transferable. Any implied warranties are limited to ninety (90) days from the date you receive the Software. Some jurisdictions do not allow limits on the duration of an implied warranty, so this limitation may not apply to you. The entire liability of Dell and its suppliers, and your exclusive remedy, shall be (a) return of the price paid for the Software or (b) replacement of any disk not meeting this warranty that is sent with a return authorization number to Dell, at your cost and risk.
GENERAL This license is effective until terminated. It terminates upon the conditions set forth above or if you fail to comply with any of its terms. Upon termination, you agree that the Software and accompanying materials, and all copies thereof, is destroyed. This agreement is governed by the laws of the State of Texas. Each provision of this agreement is severable.
Managing I/O Fabric 13 The chassis can have up to six I/O modules (IOMs), where each IOM is a pass-through or switch module. The IOMs are classified into three groups—A, B, and C. Each group has two slots—Slot 1 and Slot 2. The slots are designated with letters, from left to right, across the back of the chassis: A1 | B1 | C1 | C2 | B2 | A2. Each server has slots for two mezzanine cards (MCs) to connect to the IOMs. The MC and the corresponding IOM must have the same fabric.
Fabric Management Overview Fabric management helps avoid electrical, configuration, or connectivity related problems due to installation of an IOM or MC that has an incompatible fabric type from the chassis' established fabric type. Invalid hardware configurations can cause electric or functional problems to the chassis or its components. Fabric management prevents invalid configurations from powering on. The following figure shows the location of IOMs in the chassis.
For example: • An Ethernet MC connected to a Fibre Channel IOM is an invalid configuration. However, an Ethernet MC connected to both an Ethernet switch and an Ethernet pass-through IOM installed in the same IOM group is a valid connection. • A Fibre Channel pass-through IOM and a fibre channel switch IOM in slots B1 and B2 is a valid configuration if the first MCs on all of the servers are also fibre channel. In this case, CMC powers-on the IOMs and the servers.
Viewing I/O Module Uplink and Downlink Status Using Web Interface You can view the Dell PowerEdge M I/O Aggregator 's uplink and downlink status information using the CMC Web interface: 1. Go to Chassis Overview and expand I/O Module Overview in the system tree. All the IOMs (1–6) appear in the expanded list. 2. Click the IOM (slot) you want to view. The I/O Module Status page specific to the IOM slot is displayed. The I/O Module Uplink Status and I/O Module Downlink Status tables are displayed.
The racadm getioinfo command with the -s option enables you to view the I/O Aggregator related stacking information for the switches present in the chassis and their stacked units in both the local chassis and external chassis.
4. Click Apply. The network settings are configured for the IOM(s). NOTE: For IOMs that are manageable, you can reset the VLANs, network properties, and IO ports to default configurations. Configuring Network Settings for IOMs Using RACADM To configure the network settings for IOMs using RACADM, set the date and time. See the deploy command section in the Chassis Management Controller for Dell PowerEdge M1000e RACADM Command Line Reference Guide.
To update the IOM Infrastructure device software, in the CMC Web interface: 1. Go to Chassis Overview → I/O Module Overview → Update. The IOM Firmware Update page is displayed. Alternatively, go to any of the following: • Chassis Overview → Update • Chassis Overview → Chassis Controller → Update • Chassis Overview → iKVM → Update The Firmware Update page is displayed, which provides a link to access the IOM Firmware Update page. 2.
Launching IOA GUI from the I/O Module Overview page In the directory tree, go to I/O Module Overview. On the I/O Module Status page, click Launch I/O Module GUI. The IOA login page is displayed. Launching IOA GUI from the I/O Module Status page In the directory tree, under the I/O Module Overview, click an I/O Aggregator. On the I/O Module Status page, click Launch I/O Module GUI.
Managing VLAN for IOM Virtual LANs (VLANs) for IOMs allow you to separate users into individual network segments for security and other reasons. By using VLANs you can isolate the networks for individual users on a 32 port switch. You can associate selected ports on a switch with selected VLAN and treat these ports as a separate switch. CMC Web Interface allows you to configure the in-band management ports (VLAN) on the IOMs.
The valid values for are 0 – 7. Default is 0. For example: racadm setniccfg -m switch -1 -v 1 7 For example: • To remove an IOM VLAN, disable the VLAN capabilities of the specified IOM's network: racadm setniccfg -m switch- -v The valid values for are 1 – 6. For example: racadm setniccfg -m switch-1 -v Configuring VLAN settings on IOMs Using CMC Web Interface NOTE: You can configure VLAN settings only on PowerEdge M I/O Aggregator IOM.
8. Click Apply. The network settings are configured for the IOM(s). Viewing the VLAN settings on IOMs Using CMC Web Interface To view the VLAN settings on IOM(s) using the CMC Web interface: 1. In the system tree, go to I/O Module Overview and click Setup → VLAN Manager. The VLAN Manager page is displayed. The Summary VLANs of All Ports section displays information about the current VLAN settings for the IOMs. 2. Click Save to save the VLAN settings to a file.
3. In the Step 3: Edit VLANs section, select Remove VLANs in the drop down list and click Apply. The VLANs assigned to the selected IOMs are removed. An Operation Successful message is displayed. The current VLAN settings that are assigned to the IOMs are displayed in the VLAN Assignment Summary field. Updating Untagged VLANs for IOMs Using CMC Web Interface To update untagged VLANs for IOM(s) using the CMC Web interface: 1. In the system tree, go to I/O Module Overview and click Setup → VLAN Manager.
Managing Power Control Operation for IOMs For information to set the power control operation for IOM(s), see Executing Power Control Operations on an IOM. Enabling or Disabling LED Blinking for IOMs For information to enable LED blinking for IOM(s), see Configuring LEDs to Identify Components on the Chassis.
Configuring and Using iKVM 14 The local access KVM module for the Dell M1000e server chassis is called the Avocent Integrated KVM Switch Module, or iKVM. The iKVM is an analog keyboard, video, and mouse switch that plugs into the chassis. It is an optional, hot-pluggable module to the chassis that provides local keyboard, mouse, and video access to the servers in the chassis, and to the active CMC’s command line.
Managing iKVM From CMC Updating iKVM Firmware Physical Connection Interfaces You can connect to a server or the CMC CLI console through the iKVM from the chassis front panel, an Analog Console Interface (ACI), and the chassis rear panel. NOTE: The ports on the control panel on the front of the chassis are designed specifically for the iKVM, which is optional. If you do not have the iKVM module, you cannot use the front control panel ports.
Configuring OSCAR Launching OSCAR To launch OSCAR: 1. Press . The Main dialog box is displayed. If a password is assigned, the Password dialog box appears after clicking . 2. Type the password and click OK. The Main dialog box appears. NOTE: There are four options for invoking OSCAR. You can enable one, multiple, or all of these key sequences by selecting boxes in the Invoke OSCAR section of the Main dialog box.
Key or Key Sequence Result , + <0> Immediately disconnects a user from a server; no server is selected. Status flag displays Free. (This action only applies to the =<0> on the keyboard and not the keypad.) Immediately turns on screen saver mode and prevents access to that specific console, if it is password protected. Up/Down Arrow keys Moves the cursor from line to line in lists.
Changing Display Behavior Use the Menu dialog box to change the display order of servers and set a screen delay time for OSCAR. To change the display behavior: 1. Press to launch OSCAR. The Main dialog box is displayed. 2. Click Setup and then Menu. The Menu dialog box is displayed. 3. To choose the default display order of servers, do one of the following: • 4. Select Name to display servers alphabetically based on the name.
The Flag dialog box appears. 3. Select Displayed to always display the flag or Displayed and Timed to display the flag for only five seconds after switching. NOTE: If you select Timed by itself, the flag is not displayed. 4. In the Display Color section, select a flag color. Options are black, red, blue, and purple. 5. In Display Mode, select Opaque for a solid color flag or Transparent to see the desktop through the flag. 6. To position the status flag on the desktop, click Set Position.
chassis slot number the server occupies. The Slot column indicates the slot number in which a server is installed. NOTE: The Dell CMC command line occupies Slot 17. Selecting this slot displays the CMC command line, where you can execute RACADM commands or connect to the serial console of server or I/O modules. NOTE: Server names and slot numbers are assigned by CMC.
Soft Switching Soft switching is switching between servers using a hotkey sequence. Press to soft switch to a server and then type the first few characters of its name or number. If you have previously set a delay time (the number of seconds before the Main dialog box is displayed after is pressed) and if you press the key sequences before that time has elapsed, the OSCAR interface does not display.
To prevent this scenario, before starting the iDRAC Web interface console redirection, the remote user can disable the local console in the iDRAC Web interface. The local iKVM user sees an OSCAR message that the connection is preempted in a specified amount of time. The local user should finish using the console before the iKVM connection to the server is terminated. There is no preemption feature available to the iKVM user.
3. In the Repeat field, type the password again, and press . 4. Click OK and close the dialog box. Password-protecting the Console To password-protect the console: 1. Set the password as described in Setting Password. 2. Select the Enable Screen Saver box. 3. Type the number of minutes of Inactivity Time (from 1 through 99) to delay password protection and screen saver activation. 4. For Mode: If the monitor is ENERGY STAR compliant, select Energy; if not select Screen.
3. Select Energy if your monitor is ENERGY STAR compliant, if not select Screen. CAUTION: Monitor damage may result from the use of Energy mode with monitors not compliant with Energy Star. 4. Optional: To activate the screen saver test, click Test. The Screen Saver Test dialog box is displayed. Click OK to start the test. The test takes 10 seconds. After it completes, the Security dialog box is displayed. NOTE: Enabling Screen Saver mode disconnects the user from a server.
To display version information: 1. Press . The Main dialog box is displayed. 2. Click Commands and then Display Versions. The Version dialog box is displayed. The top half of the Version dialog box lists the subsystem versions. 3. Click or press to close the Version dialog box. Scanning the System In scan mode, the iKVM automatically scans from slot to slot (server to server).
The Main dialog box is displayed. 2. Click Commands. The Command dialog box is displayed. 3. Select the Scan Enable option. 4. Click OK. A message is displayed indicating that the mouse and keyboard have been reset. 5. Click to close the message box. Cancelling Scan Mode To cancel the scan mode: 1. If OSCAR is open and the Main dialog box is displayed, select a server in the list. or If OSCAR is not open, move the mouse or press any key on the keyboard The Main dialog box is displayed.
Press the up or down arrow keys to move the cursor to a target server. Then, press to select the keyboard box and/or to return to the Main dialog box. The Commands dialog box is displayed. 7. Click the Broadcast Enable box to activate broadcasting. The Broadcast Warning dialog box is displayed. 8.
where is 1 (enable) or 0 (disable). For more information about the config subcommand, see Chassis Management Controller for Dell PowerEdge M1000e RACADM Command Line Reference Guide. Enabling Access to iKVM from the Dell CMC Console To enable access to the CMC CLI from iKVM using the CMC Web interface, in the system tree, go to Chassis Overview → iKVM and click Setup tab. Select the Allow access to CMC CLI from iKVM option, and click Apply to save the setting.
Managing and Monitoring Power 15 The Dell PowerEdge M1000e server enclosure is the most power-efficient modular server enclosure. It is designed to include highly-efficient power supplies and fans, has an optimized layout for the air to flow more easily through the system, and contains power-optimized components throughout the enclosure.
Dynamic Power Supply Engagement Default Redundancy Configuration Power Budgeting For Hardware Modules Viewing Power Consumption Status Viewing Power Budget Status Redundancy Status and Overall Power Health Configuring Power Budget and Redundancy Executing Power Control Operations Redundancy Policies Redundancy policy is a configurable set of properties that determine how CMC manages power to the chassis.
Figure 5. PSUs per grid and a power failure on grid 1 In the event of a single PSU failure in this configuration, the remaining PSUs in the failing grid are marked as Online. In this state, the PSUs in the Redundant Grid if not in failed state, help in functioning of the system without interruption. If a PSU fails, the chassis health is marked non-critical.
status of the chassis always indicates no redundancy. The figure below illustrates no redundancy mode is the factory default setting for three PSU configuration. CMC does not require the PSU units to be present in any specific PSU slot positions when No Redundancy is configured. NOTE: All PSUs in the chassis are Online if DPSE is disabled when in No Redundancy mode.
six 2700W AC PSU configuration, the additional power available in standard fan configurations mode, is 1023W. The EPP additional power available is 2700W, which can be used to increase server performance only.
• Enables delivery of the total power allocation of the chassis through fewer PSUs. • Increases the efficiency of the online PSUs as they run at higher utilization. • Improves the efficiency and durability of the standby PSUs. To operate remaining PSUs at their maximum efficiency: • No Redundancy mode with DPSE is highly power efficient, with optimal PSUs online. PSUs that are not needed are placed in standby mode. • PSU Redundancy mode with DPSE also provides power efficiency.
Table 37. Default Redundancy Configuration PSU Configuration Default Redundancy Policy Default Dynamic PSU Engagement Setting Six PSUs Grid Redundancy Disabled Three PSUs No Redundancy Disabled Grid Redundancy In Grid Redundancy mode with six PSUs, all six PSUs are active. The three PSUs on the left must connect to one input power grid, while the three PSUs on the right connect to another power grid.
Figure 8. Chassis With Six-PSU Configuration CMC maintains a power budget for the enclosure that reserves the necessary wattage for all installed servers and components. CMC allocates power to the CMC infrastructure and the servers in the chassis. CMC infrastructure consists of components in the chassis, such as fans, I/O modules, and iKVM (if present). The chassis may have up to 16 servers that communicate to the chassis through the iDRAC. For more information, see the iDRAC User’s Guide at support.dell.
Infrastructure. Following Chassis Infrastructure, the servers in an enclosure are powered up. Any attempt to set a System Input Power Cap less than the actual consumption fails. If necessary for the total power budget to stay below the value of the System Input Power Cap, CMC allocates servers a value less than their maximum requested power.
NOTE: I/O modules, fans, and iKVM (if present) are given the highest priority. CMC reclaims power only from lower priority devices to meet the power needs of a higher priority module or server. Assigning Priority Levels to Servers Server priority levels determine which servers the CMC draws power from when additional power is required. NOTE: The priority you assign to a server is linked to the slot and not to the server itself.
Open a serial/Telnet/SSH text console to CMC, log in, and type: racadm getpminfo Viewing Power Budget Status You can view the power budget status using the CMC Web interface or RACADM. Viewing Power Budget Status Using CMC Web Interface To view power budget status using CMC Web interface, in the system tree go to Chassis Overview and click Power → Budget Status.
PSU Removals With Degraded or No Redundancy Policy CMC may begin conserving power when you remove a PSU or a PSU AC cable. CMC decreases power to the lower priority servers until power allocation is supported by the remaining PSUs in the chassis. If you remove more than one PSU, CMC evaluates power needs again when the second PSU is removed to determine the firmware response. If power requirements are still not met, CMC may turn off the lower priority servers.
If the subsequent power capacity or the user power capacity is greater than the server allocations, servers have degraded performance or, in a worse case, servers may be powered down. Both conditions are in reverse-priority order, that is, the lower priority servers are powered down first. The following table provides the firmware response to a PSU power down or removal as it applies to various PSU redundancy configurations. Table 39.
Input over-current An over current fault detected on power supply . Input under-current An undercurrent fault detected on power supply . DC output under-voltage An output under voltage fault detected on power supply DC output over-current An output over current fault detected on power supply . DC output under-current An output under current fault detected on power supply . Communication failure Cannot communicate with power supply .
You can configure the following: • System Input Power Cap • Redundancy Policy • Extended Power Performance • Server Performance Over Power Redundancy • Dynamic Power Supply Engagement • Disable Chassis Power Button • Allow 110 VAC Operation • Max Power Conservation Mode • Remote Power Logging • Remote Power Logging Interval • Server Based Power Management Related Concepts Power Conservation and Power Budget Maximum Power Conservation Mode Server Power Reduction to Maintain Power Budget
• An automated command line script, issued by a UPS device, enables maximum conservation mode. In maximum power conservation mode, all servers start functioning at their minimum power levels, and all subsequent server power allocation requests are denied. In this mode, the performance of powered on servers may be degraded. Additional servers cannot be powered on, regardless of server priority. The system is restored to full performance when the maximum conservation mode is cleared.
sufficient power, both for redundancy, as well as full performance, then to preserve redundancy, some servers may not be: • Granted sufficient power for full performance • Powered on Remote Logging Power consumption can be reported to a remote syslog server. Total chassis power consumption, minimum, maximum, and average power consumption over a collection period can be logged.
NOTE: When Dell OpenManage Power Center management is disabled, CMC does not revert to the earlier setting of the maximum chassis power. See the CMC log for the earlier setting to manually restore the value. Configuring Power Budget and Redundancy Using CMC Web Interface NOTE: To perform power management actions, you must have Chassis Configuration Administrator privilege. To configure power budget using the Web interface: 1.
• To set the System Input Power Cap value, type: racadm config -g cfgChassisPower -o cfgChassisPowerCap where is a number between 2715–16685 representing the maximum power limit in Watts. The default is 16685. For example, the following command sets the System Input Power Cap to 5400 watts: racadm config -g cfgChassisPower -o cfgChassisPowerCap 5400 .
• To restore CMC power management, type: racadm config -g cfgChassisPower -o cfgChassisServerBasedPowerMgmtMode 0 For information about RACADM commands for chassis power, see the config, getconfig, getpbinfo, and cfgChassisPower sections in the Chassis Management Controller for Dell PowerEdge M1000e RACADM Command Line Reference Guide. Executing Power Control Operations You can execute the following power control operation for the chassis, servers, and IOMs.
power state before the AC power loss. In case, the blade servers are not configured to automatic powerup, you may have to power them on manually. Executing Power Control Operations on a Server You can remotely perform power management actions for multiple servers at a time or an individual server in the chassis. NOTE: To perform power management actions, you must have Chassis Configuration Administrator privilege.
Executing Power Control Operations on a Server Using RACADM To execute power control operations on a server using RACADM, open a serial/Telnet/SSH text console to CMC, log in, and type: racadm serveraction -m where specifies the server by its slot number (server-1 through server-16) in the chassis, and is the operation you want to execute: powerup, powerdown, powercycle, graceshutdown, or hardreset.
Troubleshooting and Recovery 16 This section explains how to perform tasks related to recovering and troubleshooting problems on the remote system using the CMC Web interface. • Viewing chassis information. • Viewing the event logs. • Gathering configuration information, error status, and error logs. • Using the Diagnostic Console. • Managing power on a remote system. • Managing Lifecycle Controller jobs on a remote system. • Resetting components.
Racdump includes the following subsystems and aggregates the following RACADM commands. For more information on racdump, see the Chassis Management Controller for Dell PowerEdge M1000e RACADM Command Line Reference Guide.
Power Troubleshooting The following information helps you to troubleshoot power supply and power-related issues: • Problem: Configured the Power Redundancy Policy to Grid Redundancy, and a Power Supply Redundancy Lost event was raised. – Resolution A: This configuration requires at least one power supply in side 1 (the left three slots) and one power supply in side 2 (the right three slots) to be present and functional in the modular enclosure.
– Resolution: The enclosure has 2000 W of surplus power available in the current configuration, and the System Input Power Cap can be safely reduced by this amount being reported without impacting server performance. • Problem: A subset of servers lost power after an AC Grid failure, even when the chassis was operating in the Grid Redundancy configuration with six power supplies.
Examples of hardware log entries critical System Software event: redundancy lost Wed May 09 15:26:28 2007 normal System Software event: log cleared was asserted Wed May 09 16:06:00 2007 warning System Software event: predictive failure was asserted Wed May 09 15:26:31 2007 critical System Software event: log full was asserted Wed May 09 15:47:23 2007 unknown System Software event: unknown event Related Concepts Viewing Event Logs Viewing Hardware Logs Using CMC Web Interface You can view, save, and clear t
Viewing CMC Logs Using the Web Interface You can view, save, and clear the CMC log. You can sort the log entries based on Source, Date/Time, or Description by clicking the column heading. Subsequent clicks on the column headings reverse the sort. To view the CMC log using the CMC Web interface, in the system tree, go to Chassis Overview and click Logs → CMC Log. The CMC Log page is displayed.
The Diagnostic Console page is displayed. 2. In the Command text box, enter a command and click Submit. For information about the commands, see the CMC Online Help. A diagnostic results page is displayed. Resetting Components You can reset the active CMC, reset iDRAC without rebooting the operating system, or to virtually reseat servers causing them to behave as if they were removed and reinserted.
NOTE: The default backup file name contains the Chassis' service tag. This backup file can be used later, to restore the settings and certificates for this chassis only. To restore the chassis configuration, click Choose File, specify the backup file, and click Restore. NOTE: • CMC does not reset upon restoring configuration, however CMC services may take some time to effectively impose any changed or new configuration. After successful completion, all current sessions are closed.
To disable NTP, type: racadm config –g cfgRemoteHosts –o cfgRhostsNtpEnable 0 To enable NTP, type: racadm config –g cfgRemoteHosts –o cfgRhostsNtpEnable 1 If the NTP servers are configured correctly and this entry is present in the trace log, then this confirms that CMC is not able to synchronize with any of the configured NTP servers.
Component Server IOM (Common) IOM (Pass through) Fan LED Color, Blinking Pattern Status Amber, glowing steadily Not used Amber, blinking Fault Amber, dark No fault Green, glowing steadily Powered on Green, blinking Firmware is being uploaded Green, dark Powered off Blue, glowing steadily Normal Blue, blinking User-enabled module identifier Amber, glowing steadily Not used Amber, blinking Fault Blue, dark No fault Green, glowing steadily Powered on Green, blinking Firmware is
Component PSU LED Color, Blinking Pattern Status Amber, dark Not used (Oval) Green, glowing steadily AC OK (Oval) Green, blinking Not used (Oval) Green, dark AC Not OK Amber, glowing steadily Not used Amber, blinking Fault Amber, dark No fault (Circle) Green, glowing steadily DC OK (Circle) Green, dark DC Not OK Troubleshooting Non-responsive CMC If you cannot log in to CMC using any of the interfaces (the Web interface, Telnet, SSH, remote RACADM, or serial), you can verify the CMC fu
To obtain recovery information: 1. Install a NULL modem cable between the CMC and a client machine. 2. Open a terminal emulator of your choice (such as HyperTerminal or Minicom). Set up 8 bits, no parity, no flow control, and baud rate 115200. A core memory failure displays an error message every 5 seconds. 3. Press . If a recovery prompt appears, additional information is available. The prompt indicates the CMC slot number and failure type.
• DDNS — Traces dynamic DNS update requests and responses. • Configuration changes to the network interfaces. The trace log may also contain CMC firmware-specific error codes that are related to the internal CMC firmware, not the managed system’s operating system. Resetting Administrator Password CAUTION: Many repairs may only be done by a certified service technician.
cfgSerialConsoleCommand="" cfgSerialConsoleColumns=0 1. Press the CMC release latch on the handle and move the handle away from the module front panel. Slide the CMC module out of the enclosure. NOTE: Electrostatic discharge (ESD) events can damage CMC. Under certain conditions, ESD may build up on your body or an object, and then discharge into your CMC. To prevent ESD damage, you must take precautions to discharge static electricity from your body while handling and accessing CMC outside the Chassis. 2.
5. Log into the active CMC using the default administrator username:root and password: calvin, and restore any necessary user account settings. The existing accounts and passwords are not disabled and are still active. 6. Perform the required management actions, including creating a new administrator password. 7. Remove the 2-pin PASSWORD_RST jumper and replace the jumper plug. a. Press in the CMC release latch on the handle and move the handle away from the module front panel.
Using LCD Panel Interface 17 You can use the LCD panel on the chassis to perform configuration and diagnostics, and to obtain status information about the chassis and its contents. The following figure illustrates the LCD panel. The LCD screen displays menus, icons, pictures, and messages. Figure 10.
LCD Navigation The right side of the LCD panel contains five buttons: four arrow buttons (up, down, left, and right) and a center button. • To move between screens, use the right (next) and left (previous) arrow buttons. At any time while using the panel, you can return to a previous screen. • To scroll through options on a screen, use the down and up arrow buttons. • To select and save an item on a screen and move to the next screen, use the center button.
NOTE: There is a blinking blue rectangle around this icon when Component Identify is enabled. A status indicator LED on the LCD panel provides an indication of the overall health of the chassis and its components. • Solid blue indicates good health. • Blinking amber indicates that at least one component has a fault condition. • Blinking blue is an ID signal, used to identify one chassis in a group of chassis.
Language Setup Screen The Language Setup screen allows you to select the language used for LCD panel messages. The currently active language is highlighted with a light blue background. 1. Use the up, down, left, and right arrow buttons to highlight the desired language. 2. Press the center button. The Accept icon appears and is highlighted. 3. Press the center button to confirm the change. The LCD Setup menu is displayed.
Graphical Module Status Screen The Graphical Module Status screen displays all modules installed in the rear of the chassis and provides summary health information for each module.
Highlight the Back icon and press the center button to return to the Enclosure Status screen. IP Summary Screen The IP Summary screen shows IP information for CMC and iDRAC of each installed server. Use the up and down arrow buttons to scroll through the list. Use the left and right arrow buttons to scroll selected messages that are longer than the screen. Use the up and down arrow buttons to select the Back icon and press the center button to return to the Enclosure menu.
Figure 11. Removing and Installing LCD Module 1 cable cover 2 LCD module 3 ribbon cable 4 hinges (2) 5 screws (2) Table 45. LCD Hardware Troubleshooting Items Symptom Issue Recovery Action Alert screen message CMC Not Loss of communication from CMC to the LCD front panel. Responding and LED is blinking amber. Check that CMC is booting; then, reset CMC using GUI or RACADM commands.
faulty; or the LCD module is faulty. • • The LCD module cable is not connected, or is improperly connected. The control panel cable is not connected, or is improperly connected. Reseat cables. LCD screen message No CMC Found. No CMC is present in the chassis. Insert a CMC into the chassis or reseat existing CMC if present. Front Panel LCD Messages This section contains two subsections that list error and status information that is displayed on the front panel LCD.
Table 47. Enclosure/Chassis Status Screen Severity Message Cause Critical Fan is removed. This fan is required for proper cooling of the enclosure/chassis. Warning Power supply redundancy is degraded. One or more PSU have failed or removed and the system can no longer support full PSU redundancy. Critical Power supply redundancy is lost. One or more PSU have failed or removed and the system is no longer redundant. Critical The power supplies are not redundant.
Severity Message Cause Critical A failure is detected on I/O module . The I/O module has a fault. The same error can also happen if the I/O module is thermaltripped. Table 50. iKVM Status Screen Severity Message Cause Warning Console is not available for Local KVM. Minor failure, such as corrupted firmware. Critical Local KVM can not detect any hosts. USB host enumeration failure. Critical OSCAR, on screen display is not functional for the Local KVM. OSCAR failure.
Severity Message Cause Warning The storage battery is low. ROMB battery is low. Critical The storage battery failed. CMOS battery is not present or has no voltage. Critical The CPU voltage is outside of the allowable range. Critical The system board voltage is outside of the allowable range. Critical The mezzanine card voltage is outside of the allowable range.
Severity Message Cause no response was received from Host) and the action is set to power off. Critical The watchdog timer power cycled the system. The iDRAC watchdog detected that the system has crashed (timer expired because no response was received from Host) and the action is set to power cycle. Critical Log is full. The SEL device detects that only one entry can be added to the SEL before it is full.
Severity Message Cause NonRecoverable CPU machine check detected. The processor machine check entered a non-recoverable state. Critical Memory redundancy is lost. Critical A bus fatal error was detected on a component at bus device function . Fatal error is detected on the PCIe bus. Critical A software NMI was detected on a component at bus device function . Chip error is detected.
IP6 Global Address:
Only displays if IPv6 is enabled only on an active CMC. MAC: Displays the CMC's MAC address. Table 54. Chassis or Enclosure Status Item Description User Define Name Example: “Dell Rack System”. You can set this option through the CMC Command Line Interface (CLI) or Web interface. Error Messages If there are no errors then the message “No Errors” is displayed, else error messages are listed. Critical errors are listed first, followed by warnings.Table 57. IOM Status Item Description Name/Location Example: IOM A1, IOM B1. and so on. Error Messages If there are no errors then the message “No Errors” is displayed, else error messages are listed. Critical errors are listed first, followed by warnings. For more information see LCD Error Messages. Status Off or On. Model Model of the IOM. Fabric Type Networking type. IP address Only shows if IOM is On. This value is zero for a pass through type IOM.
NOTE: You can set this table through the CMC CLI or Web interface. Name Name of the server, which the user can set through Dell OpenManage. The name is displayed only if iDRAC has finished booting, and the server supports this feature, else iDRAC booting messages are displayed. Model Number Displays if iDRAC finished booting. Service Tag Displays if iDRAC finished booting. BIOS Version Server BIOS firmware version. Last POST Code Displays the last server BIOS POST code messages string.
Frequently Asked Questions 18 This section lists the frequently asked questions for the following: • RACADM • Managing and Recovering a Remote System • Active Directory • FlexAddress and FlexAddressPlus • iKVM • IOM RACADM After performing a CMC reset (using the RACADM racreset subcommand), when a command is entered, the following message is displayed: racadm Transport: ERROR: (RC=-1) This message indicates that another command must be issued only after CMC completes the reset.
Managing and Recovering a Remote System While accessing the CMC Web interface, a security warning stating that the host name of the SSL certificate does not match the host name of CMC is displayed. CMC includes a default CMC server certificate to ensure network security for the Web interface and remote RACADM features.
Why is the following message displayed for unknown reasons? Remote Access: SNMP Authentication Failure As part of discovery, IT Assistant attempts to verify the device’s get and set community names. In IT Assistant, the get community name = public and the set community name = private. By default, the community name for the CMC agent is public. When IT Assistant sends out a set request, the CMC agent generates the SNMP authentication error because it only accepts requests from community = public.
Yes. All SSL certificates for Active Directory servers in the forest must be signed by the same root certificate authority-signed certificate, because CMC only allows upload of one trusted certificate authority-signed SSL certificate. The Web interface does not launch after a new RAC certificate is created and uploaded. If Microsoft Certificate Services is used to generate the RAC certificate, the User Certificate option may have been used instead of Web Certificate when creating the certificate.
This feature card was activated with a different chassis. It must be removed before accessing the FlexAddress feature. Current Chassis Service Tag = XXXXXXXX Feature Card Chassis Service Tag = YYYYYYYY The original feature card is no longer eligible for deactivation on that or any other chassis, unless Dell Service re-programs the original chassis service tag back into a chassis, and CMC that has the original feature card is made active on that chassis.
• Remove the standby CMC and insert the new CMC in its place. • From the Active CMC, upgrade the standby CMC firmware to 1.10 or later. NOTE: If the standby CMC firmware is not updated to 1.10 or later and a failover occurs, the FlexAddress feature is not configured. The feature must be reactivated and reconfigured again.
Only one connection is allowed at a time. The front panel connection has precedence over ACI and the rear panel. For more information about connection precedence, see iKVM Connection Precedences. The message "User has been disabled as another appliance is currently tiered" appears on the monitor connected to the rear panel. Why? A network cable is connected to the iKVM ACI port connector and to a secondary KVM appliance. Only one connection is allowed at a time.
Initially, wait for 60 seconds. If the server is still initializing, the slot name appears as soon as initialization is complete, and the server can be selected. If, after 60 seconds, OSCAR still indicates that the slot is initializing, remove and then re-insert the server in the chassis. This action allows iDRAC to reinitialize. IOM After a configuration change, sometimes CMC displays the IP address as 0.0.0.0. Click the Refresh icon to see if the IP address is set correctly on the switch.
Use Case Scenarios 19 This section helps you in navigating to specific sections in the guide to perform typical use case scenarios. Chassis Basic Configuration and Firmware Update This scenario guides you to perform the following tasks: • Bring up the chassis with basic configurations. • Verify that hardware is being detected by CMC without any errors. • Update firmware for CMC, IOMs, and server components. 1. CMC is pre-installed on your chassis and hence no installation is required.
Backup the CMC Configurations and Server Configurations. 1. To back up Chassis configuration, see Saving or Restoring Chassis Configuration section. 2. To save the configurations of a server, use the Server Cloning feature of CMC. For information, see the Configuring Profile Settings Using Server Clone. 3. Save the existing configurations of a server to an external storage card, using the CMC Web interface. For information, see the Adding or Saving Profile section. 4.
• • Changing the System Input Power Cap value to less than or equal to 13300 W, displays the following message: System Input Power Cap cannot be set to less than or equal to 13300 W (45381 BTU/h) while Extended Power Performance is enabled. Selecting the check box to enable Max Power Conservation Mode (MPCM) displays the following message: Enabling Max Power Conservation Mode will deactivate Extended Power Performance.
Available Power in EPP Pool Used Power in EPP Pool EPP Percent - Available = 3167 W (10806 BTU/h) = 0 W (0 BTU/h) = 100.
• Enabling EPP on a 3000W AC PSU when SBPM is Enabled racadm config -g cfgChassisPower -o cfgChassisEPPEnable 1 This feature is not supported while Server Based Power Management is enabled. • Enabling EPP on a 3000W AC PSU when MPCM is Enabled racadm config -g cfgChassisPower -o cfgChassisEPPEnable 1 This feature is not supported while Max Power Conservation Mode is enabled.