Dell Lifecycle Controller GUI Version 3.00.00.00 User's Guide October 2018 Rev.
Notes, cautions, and warnings NOTE: A NOTE indicates important information that helps you make better use of your product. CAUTION: A CAUTION indicates either potential damage to hardware or loss of data and tells you how to avoid the problem. WARNING: A WARNING indicates a potential for property damage, personal injury, or death. © 2018 - 2019 Dell Inc. or its subsidiaries. All rights reserved. Dell, EMC, and other trademarks are trademarks of Dell Inc. or its subsidiaries.
Contents Chapter 1: Introduction................................................................................................................. 7 Why use Lifecycle Controller?..........................................................................................................................................7 Benefits of using iDRAC with Lifecycle Controller...................................................................................................... 7 What's new in this release?..............
Viewing Lifecycle Log history...................................................................................................................................25 Exporting Lifecycle Log............................................................................................................................................. 26 Adding a work note to the Lifecycle Log...............................................................................................................28 Chapter 5: Firmware update..
Copying repository to a local FTP server from the Dell EMC server Updates DVD................................... 50 Using Dell Repository Manager to create the repository and copy it to a local FTP server.....................50 Configuring NFS and CIFS servers............................................................................................................................... 50 Configuring NFS servers..................................................................................................
iDRAC settings utility........................................................................................................................................................79 Entering the iDRAC settings utility......................................................................................................................... 79 Chapter 10: Troubleshooting and frequently asked questions...................................................... 80 Error messages.............................................
1 Introduction Dell Lifecycle Controller provides advanced embedded systems management to perform systems management tasks such as deploy, configure, update, maintain, and diagnose using a graphical user interface (GUI). It is delivered as part of integrated Dell Remote Access Controller (iDRAC) out-of-band solution and embedded Unified Extensible Firmware Interface (UEFI) applications in the latest Dell servers.
● Improved productivity and lower Total Cost of Ownership (TCO) — Extending the reach of administrators to larger number of distant servers can make the IT staff more productive while driving down operational costs such as travel. ● Secure environment — By providing secure access to remote servers, administrators can perform critical management functions while maintaining server and network security.
Table 1.
● The Lifecycle Controller Online Help provides detailed information about the fields available on the GUI and the descriptions for the same. To view the online help information, click Help in the upper-right corner of all Lifecycle Controller pages, or press . ● The Lifecycle Controller Release Notes is available from within the product. To read through the Release Notes within Lifecycle Controller, click About in the upper-right corner, and then click View Release Notes.
Accessing documents using the product search 1. Go to https://www.dell.com/support. 2. In the Enter a Service Tag, Serial Number... search box, type the product name. For example, PowerEdge or iDRAC. A list of matching products is displayed. 3. Select your product and click the search icon or press enter. 4. Click DOCUMENTATION. 5. Click MANUALS AND DOCUMENTS. Accessing documents using product selector You can also access documents by selecting your product. 1. 2. 3. 4. Go to https://www.dell.com/support.
2 Using Lifecycle Controller This section provides information about starting, enabling, and disabling Lifecycle Controller. Before using Lifecycle Controller, make sure that the network and iDRAC are configured. For more information, see the Integrated Dell Remote Access Controller User’s Guide at https://www.dell.com/esmmanuals.
Table 3. Start messages during POST, cause, and resolution (continued) Message Cause Resolution ○ 3 consecutive unsuccessful attempts to complete inventory collection. ○ 3 consecutive unsuccessful attempts to perform tasks in Automated Task applications. Lifecycle Controller not available Another process is using iDRAC. Wait for 30 minutes for the current process to complete, restart the system, and then retry. You can use the iDRAC GUI to check the job queue and the status.
5. On the System Setup Main Menu page, select Finish to save the settings. 6. Select Yes to restart the system. Using Lifecycle Controller for the first time After you start Lifecycle Controller for the first time, by default the Initial Setup Wizard page is launched. Use this wizard to set up the Language ,Keyboard Type, Network Settings, and iDRAC Network and Credentials.
● Static IP — indicates that the NIC must be configured by using a static IP. Type the IP Address Properties — IP Address, Subnet Mask, Default Gateway, and DNS Address. If you do not have this information, contact your network administrator. 7. Click Enabled and type the VLAN ID and Priority under Lifecycle Controller VLAN Settings to configure the VLAN settings of a NIC. 8. Click Next. NOTE: If Lifecycle Controller settings are not correctly configured, an error message is displayed.
NOTE: To improve security, it is recommended to use complex passwords that have 8 or more characters and include lower-case alphabets, upper-case alphabets, numbers, and special characters. It is also recommended to regularly change the passwords, if possible. Table 6. Recommended characters while accessing network shares Characters Length 0-9 User name: 1-16 A-Z Password: 1-20 a-z -*/:?@\_| Viewing summary of network settings This page provides a summary of the Lifecycle Controller and iDRAC IP con
NOTE: You can use only one NIC at a time to communicate with the network. 5. From the IPV4 Network Settings→ IP Address Source drop-down menu, select one of the following options: ● DHCP — indicates that the NIC must be configured by using an IP address from a DHCP server. DHCP is the default option and the DHCP IP address is displayed on the Network Settings page. ● Static IP — indicates that the NIC must be configured by using a static IP.
3 Operating system deployment The OS Deployment feature allows you to deploy standard and custom operating systems on the managed system. You can also configure RAID before installing the operating system if it is not already configured. Lifecycle Controller allows deploying the operating system using the following options: ● Manual installation ● Unattended installation. For more information on unattended installation, see Unattended installation ● UEFI Secure Boot.
● Secure Boot — Allows you to enable or disable the Secure Boot option. Click Enabled to secure the boot process by checking if the drivers are signed with an acceptable digital signature. This option is available only for the UEFI boot mode. For more information on Secure Boot, see UEFI Secure Boot NOTE: The Secure Boot option is available only if the Load Legacy Video Option ROM setting is set to disabled.
Configuring RAID using the operating system deployment wizard To configure RAID using the OS Deployment page: NOTE: If the system has a RAID controller, you can configure a virtual disk as the boot device. Create boot virtual disk only from disk drives populated across 0–3 of the system. For slot information, see the system Owner’s Manual at https:// www.dell.com/support. 1. Start Lifecycle Controller. For more information, see Starting Lifecycle Controller. 2. In the left pane, click OS Deployment. 3.
○ Custom — BIOS uses the specific set of certificates that you import or delete from the standard certificates to validate the drivers and operating system loaders during the boot process. NOTE: The secure boot policy settings made on BIOS can also be changed on the Lifecycle Controller GUI. NOTE: For more information on UEFI, go to uefi.org. Driver access Lifecycle Controller provides a local repository for drivers that are required for installing the operating system.
4 Monitor Using Lifecycle Controller, you can monitor the hardware inventory and events of a server throughout its life cycle.
Viewing hardware inventory — current or factory shipped NOTE: For factory-shipped inventory, the status of few parameters for the installed components is displayed as Unknown. To view the currently installed or factory-installed hardware components and their configuration details: 1. Start Lifecycle Controller. For more information, see Starting Lifecycle Controller 2. In the left pane, click Hardware Configuration. 3. In the right pane, click Hardware Inventory. 4.
1. From the Select Device drop-down menu, select a USB drive. 2. In the File Path box, type a valid directory or subdirectory path on the device. For example, 2015\Nov. If the path is not provided, the file is stored in the root location of the device. NOTE: Lifecycle Controller allows 256 characters in a path that includes the file name and file extension. For example, if 56 characters are used for file name and extension, only 200 characters can be used for the path.
Viewing or exporting hardware inventory after part replacement To view or export the hardware inventory after part replacement: 1. Start Lifecycle Controller. For more information, see Starting Lifecycle Controller 2. In the left pane, click Hardware Configuration. 3. In the right pane, click Hardware Inventory. 4. Click View Current Inventory. Lifecycle Controller displays the old hardware inventory. 5. Restart the server and relaunch Lifecycle Controller. 6.
● User work notes You can use the filtering and sorting options to view the Lifecycle Log. NOTE: As the system events are generated by various systems management tools, you may not view the events in log immediately after they were logged. To view the Lifecycle Log history and use the filtering options: 1. Start Lifecycle Controller. For more information, see Starting Lifecycle Controller 2. In the left pane, click Lifecycle Log. 3. In the right pane, click View Lifecycle Log History.
When you select Network Share, to verify connection, click Test Network Connection. Lifecycle Controller pings the Gateway IP, DNS server IP, and host IP. NOTE: Lifecycle Controller cannot ping the domain name and cannot display the IP address if the DNS is not able to resolve the domain name. Make sure that the issue with DNS is resolved and retry. 5. Click Finish. The Lifecycle Log is exported to the specified location. Exporting Lifecycle Log to a USB drive To export the Lifecycle Log to a USB drive: 1.
HTTP For HTTP, type the following details: ● Share Name/Address—Type the IP address of the local HTTP server. Examples: \\192.168.0.120\ or IP address ● File Path—Type the subdirectories path, if any. NOTE: Lifecycle Controller allows 256 characters in a path that includes the file name and file extension. For example, if 56 characters are used for filename and extension, only 200 characters can be used for the path. Lifecycle Controller does not support these characters -:, *,?,”,<,>,|,#,%, ^, and SPACE.
5 Firmware update Using Lifecycle Controller, the system can be updated using the repositories accessible through FTP, a network share or on a locally attached USB drive or a DVD. Use the Firmware Update page to: ● View the current version of the installed applications and firmware. ● View a list of available updates. ● Select the required updates, downloads (automatic), and then apply the updates to the following components listed in the table.
• Firmware rollback Firmware update methods The following table lists the various locations or media and methods to perform the updates: NOTE: If the FTP server or network share is used for updates, configure the network card using the Settings wizard before accessing the updates. Table 9.
Updating firmware You can update to the latest version of Lifecycle Controller using the Firmware Update wizard. It is recommended that you run the Firmware Update wizard regularly to access the latest updates. You can update the component firmware by either using update repositories or individual DUPs (single component DUP). NOTE: The firmware for iDRAC and Lifecycle Controller is combined in a single package. NOTE: Make sure that the file name for the single component DUPs does not have any blank space.
NOTE: After the CPLD firmware is updated on the modular servers, on the View Current Versions page, under Firmware Update, the firmware update date is displayed as 2000-01-01, regardless of the actual update date. The updated date and time are displayed based on the time zone that is configured on the server. NOTE: On a PowerEdge server, if you use Lifecycle Controller to update the Intel Network Card firmware from version 15.0.xx to 16.5.xx or vice versa, reboot the server to view the updated firmware.
Using a USB drive You can download the repository from the SUU DVD or from an FTP location to a USB drive, and then access the updates from this drive. Before downloading the repository to the USB drive, make sure that the following prerequisites are met: ● The updates are downloaded using the Dell Repository Manager and the repository is created on a USB drive. NOTE: To download the complete repository, make sure that the USB drive has 8 GB free space. ● Connect the USB drive to the system.
Using a proxy FTP server Using Lifecycle Controller, you can update the firmware by using downloads.dell.com, or by using an internal FTP server or service provider’s FTP server, when you are connected to the Internet through a proxy server. Before performing an update using a proxy FTP server, make sure that the following prerequisites are met: ● ● ● ● The network settings are configured (Settings > Network Settings).
NOTE: If the catalog file is located in the root folder, do not enter the filename in the File Path or Update package path field. However, if the catalog file is located in a subdirectory, enter the subdirectory name. NOTE: If the catalog file and DUP are downloaded from downloads.dell.com, do not copy them to a subdirectory. NOTE: Lifecycle Controller allows 256 characters in a path that includes the file name and file extension.
By default, Lifecycle Controller selects the components for which the current updates or higher version of the current installed version is available. 2. Click Apply. The system may restart after the update process is complete. When applying more than one update, the system may restart between the updates and launch back to Lifecycle Controller, and continue with the other selected updates. NOTE: The system does not restart after updating the operating system driver pack and hardware diagnostics.
Updating or rolling back devices that affect Trusted Platform Module settings Enabling Trusted Platform Module (TPM) with pre-boot measurement enables the BitLocker protection on the system. When BitLocker protection is enabled, updating or rolling back the components such as RAID controller, NIC, and BIOS require that a recovery password is entered or a USB drive that contains a recovery key is inserted during the next system restart.
6 Configure Lifecycle Controller provides various system configuration wizards. Use the configuration wizards to configure system devices. The Configuration Wizards has: ● System Configuration Wizards — This wizard includes LCD Panel Security, iDRAC Settings, System Date and Time Configuration, and vFlash SD card Configuration. ● Storage Configuration Wizards — This wizard includes RAID Configuration, Key Encryption, and Break Mirror.
Configuring iDRAC To configure iDRAC parameters applicable to the system, such as LAN, common IP settings, IPv4, IPv6, Virtual Media, and LAN user configuration use the iDRAC Settings wizard. NOTE: You can also use the System Setup utility during startup for configuring iDRAC. For more information about the System Setup utility, see Using the System Setup Program and Boot Manager. To configure and manage the iDRAC parameters: 1. Start Lifecycle Controller.
Use the vFlash SD card configuration feature to: ● Enable or disable vFlash SD card. ● Determine the vFlash SD card properties: ○ Name—Displays the name of the vFlash SD card. ○ Health—Displays health states such as OK, Warning, and Critical. ○ Size—Indicates the total size of the vFlash SD card. NOTE: In Lifecycle Controller GUI, size of the vFlash SD card is in MB/ 1000, which may not match with the size displayed on the other interfaces.
4. Under Storage Configuration Wizards, click RAID Configuration to launch the wizard. The View Current RAID Configuration and Select Controller page is displayed. 5. Select the controller and click Next. The Select RAID Level page is displayed. 6. Select the RAID level and click Next. The Select Physical Disks page is displayed. 7. Select the physical disk's properties and click Next. The Virtual Disk Attributes page is displayed. 8. Select the virtual disk parameters and click Next.
● RAID 1 — Mirrors or duplicates data from one physical disk to another. If a physical disk fails, data can be rebuilt using the data from the other side of the mirror. RAID 1 offers good read performance and average write performance with good data redundancy. ● RAID 5 — Stripes data across the physical disks, and uses parity information to maintain redundant data. If a physical disk fails, the data can be rebuilt using the parity information.
○ 4K — indicates that the 4K block size hard disk drives (HDD) are selected. 4K block HDDs allow the faster data transfer with fewer commands. ● T10 Protection Information (T10 PI) Capability— It is known as DIF (Data Integrity Fields) and the supporting HDDs are referred to DIF drives. The T10 enabled HDDs validates and stores the data integrity fields for each block. It performs this action when you write the data on the disk and return these values on a read request.
NOTE: The secure virtual drive is created only if the controller security key is created and the selected disks are Self-Encrypting Drives (SEDs). Viewing summary The Summary page displays the virtual disk attributes based on selections. CAUTION: Clicking Finish deletes all existing virtual drives except any foreign configurations that you specified. All data residing on the virtual drives is lost. To return to a previous page to review or change selections, click Back.
Creating a secure virtual disk on a RAID controller Make sure that the controller is encrypted with a local key. For more information on encrypting with a local key, see Key Encryption. To create a secure virtual disk on a RAID controller: 1. Start Lifecycle Controller. For more information, see Starting Lifecycle Controller 2. In the left pane, click Hardware Configuration. 3. In the right pane, click Configuration Wizards. 4.
NOTE: The controller uses the passphrase to encrypt the disk drive data. A valid passphrase contains 8–32 characters. It must include a combination of uppercase and lowercase letters, numbers, and symbols without spaces. 9. In the Confirm Passphrase field, re-enter the passphrase, and then click Finish.
Removing encryption and deleting data To remove the encryption and delete the data on the virtual disks: CAUTION: The existing encryption, virtual drives, and all the data are permanently deleted. 1. Start Lifecycle Controller. For more information, see Starting Lifecycle Controller 2. In the left pane, click Hardware Configuration. 3. In the right pane, click Configuration Wizards and click Key Encryption. 4. Select the controller on which you must remove the key that was applied and click Next. 5.
● Enabled with PXE to use the NIC for PXE boot. ● Enabled with iSCSI to use the NIC to boot from an iSCSI target. Modifying device settings To modify device settings using the Advanced Hardware Configuration: NOTE: You can also modify the device settings by using the System Setup utility during startup. For more information about the System Setup utility, see Using the system setup program and boot manager. 1. Start Lifecycle Controller. For more information, see Starting Lifecycle Controller 2.
Requirements for a local FTP server The following requirements apply when configuring a local FTP server. ● The local FTP server must use the default port (21). ● You must use the Settings wizard to configure the network card on your system before accessing updates from the local FTP server. Copying repository to a local FTP server from the Dell EMC server Updates DVD To copy the repository: 1. Download the Dell EMC server Updates ISO image to your system from https://www.dell.com/support. 2.
Configuring a local USB drive If you are using a private network that does not have access to external sites such as downloads.dell.com, you can provide updates from a locally configured USB drive. The USB drive used as a repository must have at least 8 GB free space. NOTE: A USB drive is not required for users, who have access to downloads.dell.com through a proxy server. For the latest updates, download the most recent Dell EMC server Updates ISO images for your system from https:// www.dell.com/support.
Configuring CIFS servers To configure an CIFS server, perform the following tasks: 1. Right-click the folder that you want to configure as CIFS share and select Properties > Sharing. 2. Click the Advanced Sharing tab and select Share this folder. 3. Click the Permissions tab. 4. Click Add to add names of the users for whom you want to provide access to the CIFS share. 5. Type the names and click OK. 6. In the Permissions section under Allow column, select Full Control.
7 Maintain Using Lifecycle Controller, you can maintain the health of a system throughout its life cycle using the features such as Part Replacement Configuration and Platform Restore.
The server profile backup image file does not contain: ● Operating system or any data stored on hard-disk drives or virtual drives. ● vFlash SD card partition information. ● Lifecycle log. ● Dell diagnostics. ● Dell OS Driver Pack. ● A Local Key Management (LKM) passphrase, if the LKM–based storage encryption is enabled. However, you must provide the LKM passphrase after performing the restore operation.
Table 12. Supported Components (continued) Component Firmware Configuration Security Information* OS Collector NA NA NA HHHL NVMe Adapter NA NA NA * The security information refers to the user credentials that are used to access the components. ** PSU firmware will be extracted from the backup file, but will not be applied as it can interrupt the restore process.
● A partition with a label name SRVCNF is automatically created on the vFlash SD card to store the backup image file. If a partition with the label name SRVCNF exists, it is overwritten. ● Takes up to 45 minutes depending on the server configuration. ● Takes a backup of all configuration information. ● Does not back up diagnostics and driver pack information. ● Backup fails if an AC power cycle is performed.
Importing server profile from a vFlash SD card, network share, or USB drive Before importing the server profile, make sure that the following prerequisites are met: ● The Service Tag of the server is same as when the backup was taken. ● If you are restoring from a vFlash SD card, the vFlash SD card must be installed and must contain the backup image in a folder labeled SRVCNF. This image must be from the same server that you are trying to restore.
7. In the File Path field, enter the directory or subdirectory path, where the backup image file is stored on the selected device and click Next. 8. Select either Preserve or Delete. ● Preserve — Preserves the RAID level, virtual disk, and controller attributes. ● Delete — Deletes the RAID level, virtual disk, and controller attributes. 9. If you have secured the backup image file with a passphrase, enter the passphrase (entered during backup) in the Backup File Passphrase field, and then click Finish.
1. Press during POST to launch Lifecycle Controller. 2. Click Yes on Do you want to restore the service tag? dialog box. 3. On the Restore Service Tag dialog box: ● To import a server profile that is stored on a vFlash SD card, click Import Server Profile. For more information about importing a server profile, see Import Server Profile. NOTE: To import a server profile, you must have an administrator-level right. ● To manually enter a Service Tag, click Manually configure service tag.
1. Start Lifecycle Controller. For more information, see Starting Lifecycle Controller 2. In the left pane, click Platform Restore. 3. In the right pane, click Import Server License. 4. On the Import Server License page, click Network Share. 5. Click Yes, if the following message appears: Network is not configured. Do you want to configure now?. For more information about setting up a network connection, see Configuring Network Settings for a NIC.
1. Start Lifecycle Controller. For more information, see Starting Lifecycle Controller 2. In the left pane, click Platform Restore. 3. In the right pane, click Part Replacement. The Part Replacement Configuration page is displayed. 4. From the part firmware update drop-down menu, select one of the following: ● Disabled — Firmware update on replaced parts is not performed.
3. On the Select Components page, select the features and components to delete from Server Features and Storage Components. NOTE: Storage disk erase may take a longer time depending on the disk size and speed. 4. Click Next. A summary of the features and components selected for deletion is displayed. 5. Read the information about the Summary page and click Finish. 6. The host server turns off when the operation is completed, iDRAC will reset.
. ● Debug Logs SupportAssist Collection is exported in the standard ZIP format.
For information about the fields on this page, see the Online Help by clicking Help in the upper-right corner of the Lifecycle Controller application. 8. On the Summary page, verify your selections and click Finish.
8 Easy-to-use system component names The following is the list of most commonly used Fully Qualified Device Descriptors (FQDD) used in all the interfaces including GUI, Redfish, WSMAN, and RACADM. ● ● ● ● ● ● ● ● ● ALL iDRAC System LifecycleController EventFilters BIOS NIC FC RAID The following table lists the FQDD of the system components and the equivalent easy-to-use names. Table 13. Easy-to-use Names of System Components FQDD of System Component Name Easy-to-use Name RAID.Integrated.
Table 13. Easy-to-use Names of System Components (continued) FQDD of System Component Name Easy-to-use Name P2PBridge.Embedded.1-1 Embedded P2P Bridge 3 P2PBridge.Mezzanine.2B-1 Embedded Host Bridge in Mezzanine 1 (Fabric B) USBUHCI.Embedded.1-1 Embedded USB UHCI 1 USBOHCI.Embedded.1-1 Embedded USB OHCI 1 USBEHCI.Embedded.1-1 Embedded USB EHCI 1 Disk.SATAEmbedded.A-1 Disk on Embedded SATA Port A Optical.SATAEmbedded.B-1 Optical Drive on Embedded SATA Port B TBU.SATAExternal.
Table 13. Easy-to-use Names of System Components (continued) FQDD of System Component Name Easy-to-use Name Fan.Slot. 5 Fan 5 Fan.Slot. 6 Fan 6 Fan.Slot. 7 Fan 7 Fan.Slot. 8 Fan 8 Fan.Slot. 9 Fan 9 MC.Chassis.1 Chassis Management Controller 1 MC.Chassis.2 Chassis Management Controller 2 KVM.Chassis.1 KVM IOM.Slot.1 IO Module 1 IOM.Slot.2 IO Module 2 IOM.Slot.3 IO Module 3 IOM.Slot.4 IO Module 4 IOM.Slot.5 IO Module 5 IOM.Slot.6 IO Module 6 PSU.Slot.1 Power Supply 1 PSU.Slot.
9 Using the system setup and boot manager System Setup enables you to manage your system hardware and specify BIOS-level options. The following keystrokes provide access to system features during startup: Table 14. System setup keystrokes Keystroke Description Opens the System Setup page. Opens and starts Lifecycle Controller, which supports systems management features such as operating system deployment, hardware diagnostics, firmware updates, and platform configuration, using a GUI.
● Unified Extensible Firmware Interface (UEFI) (the default) boot mode is an enhanced 64-bit boot interface. If you have configured your system to boot to UEFI mode, it replaces the system BIOS. NOTE: The system supports only BIOS boot mode. 1. From the System Setup Main Menu, click Boot Settings, and select Boot Mode. 2. Select the UEFI boot mode you want the system to boot into.
System Setup options System Setup Main screen NOTE: Press to reset the BIOS or UEFI settings to their default settings. Menu item Description System BIOS This option is used to view and configure BIOS settings. iDRAC Settings This option is used to view and configure iDRAC settings. Device Settings This option is used to view and configure device settings. System BIOS screen NOTE: The options for System Setup change based on the system configuration.
Menu Item Description System Model Name Displays the system model name. System BIOS Version Displays the BIOS version installed on the system. System Service Tag Displays the system Service Tag. System Manufacturer Displays the name of the system manufacturer. System Manufacturer Contact Information Displays the contact information of the system manufacturer. Memory Settings screen Menu Item Description System Memory Size Displays the amount of memory installed in the system.
Menu Item Description set to Disabled, the BIOS only displays one logical processor per core. By default, the Logical Processor option is set to Enabled. QPI Speed Allows you to set the QuickPath Interconnect (QPI) data rate settings. By default, the QPI Speed option is set to Maximum data rate. NOTE: QPI Speed displays only when both the processors are installed.
SATA Settings Screen Menu Item Description Embedded SATA Allows the embedded SATA to be set to Off, ATA, AHCI, or RAID mode. By default, Embedded SATA is set to AHCI Mode. Port A Auto enables BIOS support for the device attached to SATA port A. By default, Port A is set to Auto. Port B Auto enables BIOS support for the device attached to SATA port B. By default, Port B is set to Auto. Port C Auto enables BIOS support for the device attached to SATA port C. By default, Port C is set to Auto.
Menu Item Description NOTE: This option is displayed only if IDSDM is installed on the system board. Internal SD Card Redundancy If set to Mirror mode, data is written on both SD cards. If any one of the SD card fails, data is written to the active SD card. Data from this card is copied to the replacement SD card at the next boot. By default, Internal SD Card Redundancy option is set to Mirror. NOTE: This option is displayed only if IDSDM is installed on the system board.
To view the System Profile Settings screen, click System Setup Main Menu > System BIOS > System Profile Settings. The System Profile Settings screen details are explained as follows: Option Description System Profile Sets the system profile. If you set the System Profile option to a mode other than Custom, the BIOS automatically sets the rest of the options. You can only change the rest of the options if the mode is set to Custom. This option is set to Performance Per Watt Optimized (DAPC) by default.
Menu Item Description TPM Activation Allows you to change the operational state of the TPM. By default, the TPM Activation option is set to No Change. TPM Status Displays the TPM status. TPM Clear CAUTION: Clearing the TPM results in the loss of all keys in the TPM. The loss of TPM keys may affect booting to the operating system. Allows you to clear all the contents of the TPM. By default, the TPM Clear option is set to No.
System and setup password features You can create a system password and a setup password to secure your system. To enable creation of the system and setup password, the password jumper must be set to enabled. For more information on the password jumper settings, see System Board Jumper Settings. System password This is the password that you must enter before you can boot your system.
3. In the System BIOS Screen, select System Security and press . The System Security screen is displayed. 4. In the System Security screen, verify that Password Status is Unlocked. 5. Select System Password, alter or delete the existing system password and press or . 6. Select Setup Password, alter or delete the existing setup password and press or . NOTE: If you change the System and/or Setup password a message prompts you to re-enter the new password.
1. Turn on or restart your system. 2. Press after you see the following message: = UEFI Boot Manager If your operating system begins to load before you press , allow the system to finish booting, and then restart your system and try again. Using the boot manager navigation keys Key Description Up arrow Moves to the previous field. Down arrow Moves to the next field. Allows you to type in a value in the selected field (if applicable) or follow the link in the field.
Menu Item Description Delete Boot Option Deletes an existing boot option. Boot From File Sets a one-time boot option not included in the boot option list. Embedded systems management The Lifecycle controller provides advanced embedded systems management throughout the system’s lifecycle. The Lifecycle controller can be started during the boot sequence and can function independently of the operating system.
10 Troubleshooting and frequently asked questions This section describes the error messages commonly generated by Lifecycle Controller and provides suggestions for resolving the issues. This section also lists the questions that are frequently asked by Lifecycle Controller users. Topics: • • Error messages Frequently asked questions Error messages Each error message that is generated from Lifecycle Controller has a Message ID, Message Description, and Recommended Response Action in a single dialog box.
No, only drivers and firmware downloaded from the Dell EMC server Updates DVD are supported. For more information, see Configuring Local USB Drive. 9. Can I delete Lifecycle Controller? No. 10. Can I use a virtual media for the operating system media source during installation? Yes. For more information about iDRAC, see iDRAC User's Guide available at https://www.dell.com/idracmanuals . 11. Can I use a virtual USB drive to update the repository? Yes.