Dell™ Chassis Management Controller Firmware Version 1.1 User Guide w w w. d e l l . c o m | s u p p o r t . d e l l .
Notes and Notices NOTE: A NOTE indicates important information that helps you make better use of your computer. NOTICE: A NOTICE indicates either potential damage to hardware or loss of data and tells you how to avoid the problem. ____________________ Information in this document is subject to change without notice. © 2008 Dell Inc. All rights reserved. Reproduction of these materials in any manner whatsoever without the written permission of Dell Inc. is strictly forbidden.
Contents 1 CMC Overview . . . . . . . . . . . . . . . . . . . . . CMC Management Features . . . . . . . . . . . . . . . 23 Security Features . . . . . . . . . . . . . . . . . . . . 24 Chassis Overview . . . . . . . . . . . . . . . . . . . . 25 Hardware Specifications TCP/IP Ports . . . . . . . . . . . . . . . . 25 . . . . . . . . . . . . . . . . . . . . 25 Supported Remote Access Connections Supported Platforms . . . . . . . . . 27 . . . . . . . . . . . . . . . . . .
Installing Remote Access Software on a Management Station . . . . . . . . . . . . . . . . . . . Installing RACADM on a Linux Management Station . . . . . . . . . . . . . . . . . . . . . . . . 35 . . . . . . . . 35 . . . . . . . . . . . . . . 35 . . . . . . . . . . . . . . . . . . . . ® Phishing Filter . . . . . . . . . . . . . Microsoft 36 Certificate Revocation List (CRL) Fetching 37 Uninstalling RACADM From a Linux Management Station . . . . . . . . Configuring a Web Browser . Proxy Server .
3 Planning Deployment of Redundant CMCs . . . . . 52 Obtaining Health Status of Redundant CMC . . . . 52 . . . . . 53 . . . . . 53 . . . . . . . . . 53 . . . . . . . . . . . . . . . . 54 Configuring CMC to Use Command Line Consoles . . . . . . . . . . . . . . . . Command Line Console Features on the CMC Using a Telnet Console With the CMC Using SSH With the CMC Enabling SSH on the CMC Changing the SSH Port . . . . . . . . . . . . . . 54 . . . . . . . . . . . . . . 54 . . . 55 . . . .
Using RACADM. . . . . . . . . . . . . . . . . . . . . . RACADM Subcommands . . . . . . . . . . . . . . Accessing RACADM Remotely . . . . . . . . . . . Enabling and Disabling the RACADM Remote Capability . . . . . . . . . . . . . . . . . . . 70 . . . 71 . . . . . . . . . . . . . 71 RACADM Error Messages . . . . . . . . . . . . . 72 Using RACADM to Configure the CMC. . . . . . . . . . 72 Configuring CMC Network Properties . . . . . . . . . . 72 Viewing Current Network Settings . . . . .
5 Using the CMC Web Interface . . . . . . . . . 87 . . . . . . . . . . . 87 . . . . . . . . . . . . . . . . . . . . . 88 Accessing the CMC Web Interface Logging In . Logging Out . . . . . . . . . . . . . . . . . . . . . Configuring Basic CMC Settings Setting the Chassis Name . . . . . . . . . . . . 89 . . . . . . . . . . . . . 89 . . . . . . 89 . . . . . . . . . . . . 89 Setting the Date and Time on the CMC . Monitoring System Health Status . . . 89 . . . . . 89 . . . . . . . . . .
Configuring and Managing Microsoft Active Directory Certificates . . . . . . . . . . . . . . . . . 117 Configuring Active Directory (Standard Schema and Extended Schema) . . . . . . . . . 118 Uploading an Active Directory Certificate Authority-Signed Certificate . . . . . . . Viewing an Active Directory Certificate Authority-Signed Certificate . . . . . . . . . . 122 . . . . . 122 Securing CMC Communications Using SSL and Digital Certificates . . . . . . . . . . . . . . . .
Server-Level Slot FlexAddress Configuration . . . . . . . . . . . . . . . . . . . . 146 . . . . . . . . . . . . . . 148 . . . . . . . . . . . . . . . . 150 Frequently Asked Questions . Troubleshooting the CMC 6 Using FlexAddress . Activating FlexAddress . . . . . . . . . . . . . . . . 152 . . . . . . . . . . . . . . . . . Verifying FlexAddress Activation . Deactivating FlexAddress . . . . . . . . . . 153 . . . . . . . . . . . . . . .
Active Directory Object Overview . . . . . . . . Configuring Extended Schema Active Directory to Access Your CMC . . . . . . . . . . Extending the Active Directory Schema . . . . . Installing the Dell Extension to the Active Directory Users and Computers Snap-In . . . . . Adding CMC Users and Privileges to Active Directory . . . . . . . . . . . . . . . . . . 179 180 . . 183 . . 185 . . . . 187 . . . . . . 190 Configuring the CMC With Standard Schema Active Directory and Web Interface . . .
Configuring and Managing Power . . . . . . 205 . . . . . . . . . . . 207 Viewing the Health Status of the PSUs . Viewing Power Budget Status . . . 213 . . . . . . . . 217 . . . . . . . . . . . . . 218 Configuring Power Budget and Redundancy Assigning Priority Levels to Servers Setting the Power Budget Setting the Power Warning Threshold . . . . . . . 219 Enabling Throttling to Maintain Power Budget . . . . . . . . . . . . . . . . . . . . . . .
Managing Servers With iKVM . . . . . . . . . . . . . Peripherals Compatibility and Support . 232 235 . . . . . . . . . . . . . . 240 Broadcasting to Servers . . . . . . . . . . . . . Managing iKVM From the CMC . . . . . . . . . . . . Enabling or Disabling the Front Panel . . . . . . 241 243 243 Enabling the Dell CMC Console via iKVM. . . . . 243 Viewing the iKVM Status and Properties . . . . . 244 . . . . . . . . . . 245 . . . . . . . . . . . . . . . . . . . .
11 Troubleshooting and Recovery Overview . . . . . . . . 259 . . . . . . . . . . . . . . . . . . . . . . . . Chassis Monitoring Tools . . . . . . . . . . . . . . . . Configuring LEDs to Identify Components on the Chassis . . . . . . . . . . . . . . 259 259 . . . . . 259 Configuring SNMP Alerts . . . . . . . . . . . . . . 260 Configuring E-mail Alerts . . . . . . . . . . . . . . 265 First Steps to Troubleshooting a Remote System . . . .
A RACADM Subcommands . . . . . . . . . . . . 285 . . . . . . . . . . . . . . . . . . 285 . . . . . . . . . . . . . . . . . . . . . . . . . . . 286 ? and ? arp chassisaction . . . . . . . . . . . . . . . . . . . . . 287 . . . . . . . . . . . . . . . . . . . . . . . . 288 . . . . . . . . . . . . . . . . . . . . . . . . . . 289 clrraclog clrsel cmcchangeover . . . . . . . . . . . . . . . . . . . . 289 config . . . . . . . . . . . . . . . . . . . . . . . . . . 290 deploy . . . .
getmodinfo . . . . . . . . . . . . . . . . . . . . . . . . 308 getniccfg . . . . . . . . . . . . . . . . . . . . . . . . . 309 getpbinfo . . . . . . . . . . . . . . . . . . . . . . . . . 311 getraclog . . . . . . . . . . . . . . . . . . . . . . . . . 313 getractime . . . . . . . . . . . . . . . . . . . . . . . . 314 getredundancymode . getsel . . . . . . . . . . . . . . . . . . . 315 . . . . . . . . . . . . . . . . . . . . . . . . . . 315 getsensorinfo . . . . . . . . . . . . . . . . .
setchassisname . . . . . . . . . . . . . . . . . . . . 332 setassettag . . . . . . . . . . . . . . . . . . . . . . . 333 setflexaddr . . . . . . . . . . . . . . . . . . . . . . . 333 . . . . . . . . . . . . . . . . . . . . . . . . . 335 setled . setniccfg . . . . . . . . . . . . . . . . . . . . . . . . setractime . . . . . . . . . . . . . . . . . . . . . . . setslotname setsysinfo . 339 . . . . . . . . . . . . . . . . . . . . . . . 340 . . . . . . . . . . . . . . . . . . . 340 . . . .
#idRacBuildInfo . #idRacName . . . . . . . . . . . . . . . . . . 348 . . . . . . . . . . . . . . . . . . . . 348 cfgLanNetworking . cfgNicEnable . . . . . . . . . . . . . . . . . . . 349 . . . . . . . . . . . . . . . . . . . . 349 cfgNicIpAddress . . . . . . . . . . . . . . . . . . 349 cfgNicNetmask . . . . . . . . . . . . . . . . . . . 349 cfgNicGateway . . . . . . . . . . . . . . . . . . . 350 . . . . . 350 cfgDNSServer1 (Read/Write) . . . . . . . . . . . .
# cfgUserAdminPassword . . . . . . . . . . . . 355 . . . . . . . . . . . . . 356 . . . . . . . . . . . . . . . . . . . . . 357 cfgUserAdminPrivilege . cfgEmailAlert . # cfgEmailAlertIndex . . . . . . . . . . . . . . . 357 cfgEmailAlertEnable . . . . . . . . . . . . . . . 357 # cfgEmailAlertAddress . . . . . . . . . . . . . . . . . . . . . . . . . . 358 . . . . . . . . . . . . . . . 358 cfgEmailAlertEmailName . cfgSessionManagement . cfgSsnMgtWebserverTimeout . . . . . . . . . .
cfgTraps . . . . . . . . . . . . . . . . . . . . . . . . . 364 # cfgTrapsIndex . . . . . . . . . . . . . . . . . . . 364 cfgTrapsEnable . . . . . . . . . . . . . . . . . . . 364 cfgTrapsAlertDestIpAddr . . . . . . . . . . . . . . 364 cfgTrapsCommunityName . . . . . . . . . . . . . 365 . . . . . . . . . . . . . . . . . . . . . . . 365 cfgAlerting . cfgAlertingEnable. . . . . . . . . . . . . . . . . . cfgRacTuning 365 . . . . . . . . . . . . . . . 365 . . . . . . . . . . . . . . . . .
cfgRacSecCsrCountryCode . . . . . . . . . . . . 371 . . . . . . . . . . . . . 371 . . . . . . . . . . . . . . . . . . 371 . . . . . . . . . . . . . . . . . . . 372 cfgRacSecCsrEmailAddr cfgActiveDirectory . cfgADEnable cfgADRacDomain . . . . . . . . . . . . . . . . . 372 cfgADRootDomain . . . . . . . . . . . . . . . . 372 . . . . . . . . . . . . . . . . . 372 cfgADRacName . . . . . . . . . . . . . . . . . 372 . . . . . . . . . . . . . . . . . . . .
# cfgChassisDCRedundancyReserve . . . . . . . . 377 cfgChassisDCPowerServerAllocation . . . . . . . 377 . . 377 # cfgChassisTotalDCPowerAvailable . . . . . . . . 377 # cfgChassisStandbyPowerCapacity . . . . . . . . 377 # cfgChassisInfrastructureDCPowerAllocation . # cfgChassisPowerConsumptionClear . . . 378 . . . . . . . . . . 378 . . . . . . . . . . . . . . . . . . . . . . 379 cfgChassisPowerButtonEnable cfgServerInfo. 378 . . . . . . # cfgChassisPowerConsumptionClearTimestamp.
Module Status Screen . . . . . . . . . . . . . . 387 Server Status Screen . . . . . . . . . . . . . . . 387 . . . . . . . . . . . . . . . 387 . . . . . . . . . . . . . . . . . . . . . . 387 IP Summary Screen . Diagnostics . LCD Hardware Troubleshooting . . . . . . . . . . . . 388 . . . . . . . . . . . . . . 391 . . . . . . . . . . . . . . . . . . 392 Front Panel LCD Messages LCD Error Messages LCD Module and Server Status Information . . . . . . 402 . . . . . . . . . . . . . . . . . .
CMC Overview The Dell™ Chassis Management Controller (CMC) is a hot-pluggable systems management hardware and software solution designed to provide remote management capabilities and power control functions for Dell M1000e chassis systems. You can configure the CMC to send e-mail alerts or SNMP trap alerts for warnings or errors related to temperatures, hardware misconfigurations, power outages, and fan speeds.
• Remote power management — Provides remote power management functions, such as shutdown and reset on any chassis component, from a management console • Secure Sockets Layer (SSL) encryption — Provides secure remote system management through the Web interface • Password-level security management — Prevents unauthorized access to a remote system • Role-based authority — Provides assignable permissions for different systems management tasks • Launch point for the Integrated Dell Remote Access Control
Chassis Overview Figure 1-1 shows the facing edge of a CMC (inset) and the locations of the CMC slots in the chassis. Figure 1-1. Dell M1000e Chassis and CMC Hardware Specifications TCP/IP Ports You must provide port information when opening firewalls for remote access to a CMC. Table 1-1 identifies the ports on which the CMC listens for server connections. Table 1-2 identifies the ports that the CMC uses as clients.
Table 1-1. CMC Server Listening Ports Port Number Function 22* SSH 23* Telnet 80* HTTP 161 SNMP Agent 443* HTTPS * Configurable port Table 1-2.
Supported Remote Access Connections Table 1-3 lists the connection features. Table 1-3.
For the latest information on supported Web browsers, see the Dell OpenManage Server Administrator Compatibility Guide located on the Dell Support website at support.dell.com. Table 1-4. Supported Web Browsers Operating System Supported Web Browser Windows® Internet Explorer® 6.0 (32-bit) with Service Pack 2 (SP2) for Windows XP and Windows 2003 R2 SP2 only. Internet Explorer 7.0 for Windows Vista®, Windows XP, and Windows 2003 R2 SP2 only. Linux Mozilla Firefox 1.
The data available through WS-Management is a subset of data provided by the CMC instrumentation interface mapped to the following DMTF profiles version 1.0.
For specific WS-Management support, see your management application documentation. Additional documentation is available on the Web: • www.wbemsolutions.com/ws_management.html • DMTF WS-Management Specifications: www.dmtf.org/standards/wbem/wsman • DMTF Management Profiles: www.dmtf.
• The Rack Installation Guide and Rack Installation Instructions included with your rack solution describe how to install your system into a rack. • The Hardware Owner’s Manual provides information about system features and describes how to troubleshoot the system and install or replace system components. • Systems management software documentation describes the features, requirements, installation, and basic operation of the software.
CMC Overview
Installing and Setting Up the CMC This section provides information about how to install your CMC hardware, establish access to the CMC, and configure your management environment to use the CMC.
You can install a second CMC to run as a standby to the primary CMC. For more information about a standby CMC, see "Understanding the Redundant CMC Environment" on page 51. Installing Remote Access Software on a Management Station You can access the CMC using the Telnet, Secure Shell (SSH), or serial console utilities provided on your operating system or using the Web interface. If you want to use remote RACADM from your management station, you will need to install it.
Installing RACADM on a Linux Management Station 1 Log on to the system where you want to install the management station components. 2 If necessary, mount the Dell Systems Management Consoles CD using the following command or a similar command: mount /media/cdrom 3 Navigate to the /linux/rac directory and execute the following command: rpm -ivh *.rpm For help with the RACADM command, type racadm help after issuing the previous commands.
Your CMC and the management station where you use your browser must be on the same network, which is called the management network. Depending on your security requirements, the management network can be an isolated, highly secure network. You must ensure that security measures on the management network, such as firewalls and proxy servers, do not prevent your Web browser from accessing the CMC.
3 Click Settings…. 4 In the No Proxy for field, add the addresses for CMCs and iDRACs on the management network to the comma-separated list. You can use DNS names and wildcards in your entries. Microsoft® Phishing Filter If the Microsoft Phishing Filter is enabled in Internet Explorer 7 on your management system and your CMC does not have Internet access, you may experience delays of several seconds when accessing the CMC, whether you are using the browser or another interface such as remote RACADM.
Downloading Files From CMC With Internet Explorer When you use Internet Explorer to download files from the CMC you may experience problems when the Do not save encrypted pages to disk option is not enabled. Follow these steps to enable the Do not save encrypted pages to disk option: 1 Start Internet Explorer. 2 Click Tools→ Internet Options…, then click Advanced. 3 Scroll to the Security section and check Do not save encrypted pages to disk.
chassis are connected in series and only one is connected to the management network. The basic connection type uses more ports on the management network and provides greater redundancy. The daisy-chain connection type uses fewer ports on the management network but introduces dependencies between CMCs, reducing the redundancy of the system. Basic CMC Network Connection For the highest degree of redundancy, connect each CMC to your management network.
Figure 2-1.
Follow these steps to daisy-chain up to four chassis: 1 Connect the GB1 port of the primary CMC in the first chassis to the management network. 2 Connect the GB1 port of the primary CMC in the second chassis to the GB2 port of the primary CMC in the first chassis. 3 If you have a third chassis, connect the GB1 port of its primary CMC to the GB2 port of the primary CMC in the second chassis. 4 If you have a fourth chassis, connect the GB1 port of its primary CMC to the GB2 port of the third chassis.
Configuring Networking Using the LCD Configuration Wizard NOTE: The option to configure the CMC using the LCD Configuration Wizard is available only until the CMC is deployed or the default password is changed. If the password is not changed, the LCD can continue to be used to reconfigure the CMC causing a possible security risk. The LCD is located on the bottom left corner on the front of the chassis. Figure 2-2 illustrates the LCD panel. Figure 2-2.
The LCD screen displays menus, icons, pictures, and messages. A status indicator LED on the LCD panel provides an indication of the overall health of the chassis and its components. • Solid blue indicates good health. • Blinking amber indicates that at least one component has a fault condition. • Blinking blue is an ID signal, used to identify one chassis in a group of chassis.
4 Select your network speed (10Mbps, 100Mbps, 1Gbps, or Auto) using the down arrow button. NOTE: The Network Speed setting must match your network configuration for effective network throughput. Setting the Network Speed lower than the speed of your network configuration increases bandwidth consumption and slows network communication. Determine whether your network supports the above network speeds and set it accordingly.
Static You manually enter the IP address, gateway, and subnet mask in the screens immediately following. If you have selected the Static option, press the center button to continue to the next CMC Network Settings screen, then: a Set the Static IP Address by using the right or left arrow keys to move between positions, and the up and down arrow keys to select a number for each position. When you have finished setting the Static IP Address, press the center button to continue.
NOTE: You cannot set a static IP address for the iDRAC using the LCD Configuration Wizard. To set a static IP address, use the CMC Web interface or RACADM. When you have made your selection, press the center button. The IP Summary screen displays, listing the IP addresses you provided. 9 On the IP Summary screen, review for accuracy the IP addresses you provided. To correct a setting, use the left arrow key to return to the screen for that setting. After making a correction, press the center button.
Table 2-1 describes each CMC network interface. Table 2-1. CMC Interfaces Interface Description Web interface Provides remote access to the CMC using a graphical user interface. The Web interface is built into the CMC firmware and is accessed through the NIC interface from a supported Web browser on the management station. For a list of supported Web browsers, see "Supported Web Browsers" on page 27.
To access the CMC interface using Dell Server Administrator, launch Server Administrator on your management station. From the system tree on the left pane of the Server Administrator home page, click System→ Main System Chassis→ Remote Access Controller. For more information, see your Dell Server Administrator User’s Guide. To access the CMC command line using Telnet or SSH, see "Configuring CMC to Use Command Line Consoles" on page 53.
You can use the RACADM getsysinfo command (see "getsysinfo" on page 321) or the Chassis Summary page (see "Viewing the Current Firmware Versions" on page 138) to view the current firmware versions for the CMCs installed in your chassis. If you have a standby CMC, it is recommended that you update the firmware in the standby CMC first. When the standby CMC has been updated, swap the CMCs’ roles so that the newly updated CMC becomes the primary CMC and the CMC with the older firmware becomes the standby.
Configuring Power Budgeting The CMC offers a power budgeting service that allows you to configure power budget, redundancy, and dynamic power for the chassis. The chassis ships with either three or six power supply units (PSUs). If your chassis has only three PSUs, you can add up to three more. The power management service enables optimization of power consumption and reallocation of power to different modules based on demand.
Adding SNMP and E-mail Alerts You can configure the CMC to generate SNMP and/or e-mail alerts when certain chassis events occur. For more information, see "Configuring SNMP Alerts" on page 260 and "Configuring E-mail Alerts" on page 265. Understanding the Redundant CMC Environment You can install a standby CMC that takes over if your primary CMC fails. Failovers can occur when you: • Run the RACADM cmcchangeover command. (See "cmcchangeover" on page 289.
Primary CMC Election Process There is no difference between the two CMC slots; that is, slot does not dictate precedence. Instead, the CMC that is installed or booted first assumes the role of the active CMC. If AC power is applied with two CMCs installed, the CMC installed in CMC chassis slot 1 (the left) normally assumes the active role. The active CMC is indicated by the blue LED.
Configuring CMC to Use Command Line Consoles This section provides information about the CMC command line console (or serial/Telnet/Secure Shell console) features, and explains how to set up your system so you can perform systems management actions through the console. For information on using the RACADM commands in CMC via the command line console, see "Using the RACADM Command Line Interface" on page 65.
Using SSH With the CMC SSH is a command line session that includes the same capabilities as a Telnet session, but with session negotiation and encryption to improve security. The CMC supports SSH version 2 with password authentication. SSH is enabled on the CMC by default. NOTE: The CMC does not support SSH version 1. When an error occurs during the login procedure, the SSH client issues an error message. The message text is dependent on the client and is not controlled by the CMC.
The CMC SSH implementation supports multiple cryptography schemes, as shown in Table 3-1. Table 3-1.
• Linux Telnet in an Xterm • Microsoft® Telnet Perform the steps in the following subsections to configure your type of terminal software. If you are using Microsoft Telnet, configuration is not required. Configuring Linux Minicom for Serial Console Emulation Minicom is a serial port access utility for Linux. The following steps are valid for configuring Minicom version 2.0. Other Minicom versions may differ slightly but require the same basic settings.
10 In the Modem Dialing and Parameter Setup menu, press to clear the init, reset, connect, and hangup settings so that they are blank. 11 Press to save each blank value. 12 When all specified fields are clear, press to exit the Modem Dialing and Parameter Setup menu. 13 Select Save setup as config_name and press . 14 Select Exit From Minicom and press . 15 At the command shell prompt, type minicom .
Running Telnet Using Windows XP or Windows 2003 If your management station is running Windows XP or Windows 2003, you may experience an issue with the characters in a CMC Telnet session. This issue may occur as a frozen login where the return key does not respond and the password prompt does not appear. To fix this issue, download hotfix 824810 from the Microsoft Support website at support.microsoft.com. See Microsoft Knowledge Base article 824810 for more information.
# kernel /boot/vmlinuz-version ro root= /dev/sdal # initrd /boot/initrd-version.img # #boot=/dev/sda default=0 timeout=10 #splashimage=(hd0,2)/grub/splash.xpm.gz serial --unit=1 --speed=57600 terminal --timeout=10 serial title Red Hat Linux Advanced Server (2.4.9-e.3smp) root (hd0,0) kernel /boot/vmlinuz-2.4.9-e.3smp ro root= /dev/sda1 hda=ide-scsi console=ttyS0 console= ttyS1,57600 initrd /boot/initrd-2.4.9-e.3smp.img title Red Hat Linux Advanced Server-up (2.4.9-e.3) root (hd0,00) kernel /boot/vmlinuz-2.
Enabling Login to the Console After Boot Edit the file /etc/inittab, as follows: • Add a new line to configure agetty on the COM2 serial port: co:2345:respawn:/sbin/agetty -h -L 57600 ttyS1 ansi The following example shows the file with the new line. # # inittab This file describes how the INIT process # should set up the system in a certain # run-level. # # Author: Miquel van Smoorenburg # Modified for RHS Linux by Marc Ewing and # Donnie Barnes # # Default runlevel.
l4:4:wait:/etc/rc.d/rc 4 l5:5:wait:/etc/rc.d/rc 5 l6:6:wait:/etc/rc.d/rc 6 # Things to run in every runlevel. ud::once:/sbin/update # Trap CTRL-ALT-DELETE ca::ctrlaltdel:/sbin/shutdown -t3 -r now # When our UPS tells us power has failed, assume we have a few # minutes of power left. Schedule a shutdown for 2 minutes from now. # This does, of course, assume you have power installed and your # UPS is connected and working correctly.
Edit the file /etc/securetty, as follows: • Add a new line, with the name of the serial tty for COM2: ttyS1 The following example shows a sample file with the new line.
Using a Serial or Telnet Console When you connect to the CMC command line, you are able to enter these commands: Table 3-3. CMC Command Line Commands Command Description racadm RACADM commands begin with the keyword racadm and are followed by a subcommand, such as getconfig, serveraction, or getsensorinfo. See "Using the RACADM Command Line Interface" on page 65 for details on using RACADM. connect Connects to a server or I/O module for debugging.
There are up to six IOMs on the managed system. To connect to an IOM, type: connect switch-n where n is an IOM number 1 through 6. IOMs are labeled A1, A2, B1, B2, C1, and C2. (See Table 10-1 for an illustration of the placement of IOMs in the chassis.) When you reference the IOMs in the connect command, the IOMs are mapped to switches as shown in Table 3-4. Table 3-4.
Using the RACADM Command Line Interface RACADM provides a set of commands that allow you to configure and manage the CMC through a text-based interface. RACADM can be accessed using a Telnet/SSH or serial connection, using the Dell CMC console on the iKVM, or remotely using the RACADM command line interface installed on a management station.
Using a Serial or Telnet Console You can log in to the CMC either through a serial or Telnet/SSH connection, or through Dell CMC console on iKVM. To configure the CMC for serial or remote access, see "Configuring CMC to Use Command Line Consoles" on page 53. Commonly used subcommand options are listed in Table 4-2. A complete list of RACADM subcommands is listed in "RACADM Subcommands" on page 285.
When run without options or subcommands, RACADM displays syntax information and instructions on how to access subcommands and help. To list syntax and command-line options for individual subcommands, type: racadm help RACADM Subcommands Table 4-1 provides a brief list of common subcommands used in RACADM. For a complete list of RACADM subcommands, including syntax and valid entries, see "RACADM Subcommands" on page 285.
Table 4-1. RACADM Subcommands (continued) Command Description feature Displays active features and feature deactivation. featurecard Displays feature card status information. fwupdate Executes or displays status on system firmware updates. getassettag Displays the asset tag for the chassis. getchassisname Displays the name of the chassis. getconfig Displays the current CMC configuration properties. getdcinfo Displays general I/O module and daughter card misconfiguration information.
Table 4-1. RACADM Subcommands (continued) Command Description gettracelog (Dell internal Displays the CMCtrace log. If used with the -i option, use only) the command displays the number of entries in the CMC trace log. ifconfig Displays the current CMC IP configuration. netstat Displays the routing table and the current connections. ping Verifies that the destination IP address is reachable from the CMC with the current routing-table contents.
Accessing RACADM Remotely Table 4-2 lists the options for the remote RACADM subcommands. Table 4-2. Remote RACADM Subcommand Options Option Description -r Specifies the controller’s remote IP address. -r : Use if the CMC port number is not the default port (443) -i Instructs RACADM to interactively query the user for user name and password. -u Specifies the user name that is used to authenticate the command transaction.
If the HTTPS port number of the CMC has been changed to a custom port other than the default port (443), the following syntax must be used: racadm -r : -u -p racadm -i -r : Enabling and Disabling the RACADM Remote Capability NOTE: Dell recommends that you run these commands at the chassis. The RACADM remote capability on the CMC is enabled by default.
NOTE: The RACADM remote capability is supported only on management stations through a supported browser. See "Supported Web Browsers" on page 27 for more information. NOTE: When using the RACADM remote capability, you must have write permissions on the folders where you are using the RACADM subcommands involving file operations. For example: racadm getconfig -f -r or racadm sslcertupload -t 1 -f c:\cert\cert.
This section explains how to perform the initial CMC network configuration using RACADM commands. All of the configuration described in this section can be performed using the front panel LCD. See "Configuring Networking Using the LCD Configuration Wizard" on page 42. NOTICE: Changing your CMC Network settings may disconnect your current network connection.
Configuring the Network LAN Settings NOTE: To perform the following steps, you must have Chassis Configuration Administrator privilege. NOTE: The LAN settings, such as community string and SMTP server IP address, affect both the CMC and the external settings of the chassis. NOTE: If you have two CMCs (primary and standby) on the chassis, and they are both connected to the network, the standby CMC automatically assumes the network settings in the event of failover of the primary CMC.
Setting Static DNS IP addresses NOTE: These settings are not valid unless the DCHP for DNS address feature is disabled. To set the preferred DNS IP address, type: racadm config -g cfgLanNetworking -o cfgDNSServer1 To set the secondary DNS IP address, type: racadm config -g cfgLanNetworking -o cfgDNSServer2 Configuring DNS Settings • CMC Registration.
Configuring Auto Negotiation, Duplex Mode, and Network Speed When enabled, the auto negotiation feature determines whether the CMC automatically sets the duplex mode and network speed by communicating with the nearest router or switch. Auto negotiation is enabled by default.
Configuring the Network Security Settings NOTE: To perform the following steps, you must have Chassis Configuration Administrator privilege. Enabling IP Range Checking IP filtering compares the IP address of an incoming login to the IP address range that is specified in the following cfgRacTuning properties: • cfgRacTuneIpRangeAddr • cfgRacTuneIpRangeMask The cfgRacTuneIpRangeMask property is applied to both the incoming IP address and to the cfgRacTuneIpRangeAddr properties.
To verify if a user exists, open a Telnet/SSH text console to the CMC, log in, and type: racadm getconfig -u or type the following command once for each index of 1–16: racadm getconfig -g cfgUserAdmin -i NOTE: You can also type racadm getconfig -f to view or edit the myfile.cfg file, which includes all CMC configuration parameters. Several parameters and object IDs are displayed with their current values.
Example The following example describes how to add a new user named "John" with a "123456" password and LOGIN privilege to the CMC. NOTE: See Table B-1 for a list of valid bit mask values for specific user privileges. The default privilege value is 0, which indicates the user has no privileges enabled.
The following example illustrates the command syntax that can be used to delete a CMC user: racadm config -g cfgUserAdmin -o cfgUserAdminUserName -i "" A null string of double quote characters ("") instructs the CMC to remove the user configuration at the specified index and reset the user configuration to the original factory defaults. Configuring SNMP and E-mail Alerting You can configure the CMC to send SNMP event traps and/or e-mail alerts when certain events occur on the chassis.
2 Modify the configuration file using a plain-text editor (optional). Any formatting in the configuration file may corrupt the RACADM database. 3 Use the newly created configuration file to modify a target CMC. At the command prompt, type: racadm config -f myfile.cfg 4 Reset the target CMC that was configured. At the command prompt, type: racadm reset The getconfig -f myfile.cfg subcommand (step 1) requests the CMC configuration for the primary CMC and generates the myfile.cfg file.
correctness, and all errors display. Write commands are not transmitted to the CMC if an error is found in the .cfg file. You must correct all errors before any configuration can take place. To check for errors before you create the configuration file, use the -c option with the config subcommand. With the -c option, config only verifies syntax and does not write to the CMC. Use the following guidelines when you create a .
Parsing Rules • Lines that start with a hash character (#) are treated as comments. A comment line must start in column one. A "#" character in any other column is treated as a # character. Some modem parameters may include # characters in their strings. An escape character is not required. You may want to generate a .cfg from a racadm getconfig -f .cfg command, and then perform a racadm config -f .cfg command to a different CMC, without adding escape characters.
[cfgLanNetworking] -{group name} cfgNicIpAddress=143.154.133.121 {object value} • The .cfg parser ignores an index object entry. You cannot specify which index is used. If the index already exists, it is either used or the new entry is created in the first available index for that group. The racadm getconfig -f .cfg command places a comment in front of index objects, allowing you to see the included comments.
Modifying the CMC IP Address When you modify the CMC IP address in the configuration file, remove all unnecessary = entries. Only the actual variable group’s label with [ and ] remains, including the two = entries pertaining to the IP address change. Example: # # Object Group "cfgLanNetworking" # [cfgLanNetworking] cfgNicIpAddress=10.35.10.110 cfgNicGateway=10.35.10.
Troubleshooting Table 4-3 lists common problems related to remote RACADM. Table 4-3. Using the Serial and RACADM Commands: Frequently Asked Questions Question Answer After performing a CMC reset (using the You must wait until the CMC completes RACADM racreset subcommand), I issue the reset before issuing another a command and the following message is command.
Using the CMC Web Interface The CMC provides a Web interface that enables you to configure the CMC properties and users, perform remote management tasks, and troubleshoot a remote (managed) system for problems. For everyday chassis management, use the CMC Web interface. This chapter provides information about how to perform common chassis management tasks using the CMC Web interface.
Logging In NOTE: To log in to the CMC, you must have a CMC account with Log In to CMC privilege. NOTE: The default CMC user name is root, and the password is calvin. The root account is the default administrative account that ships with the CMC. For added security, Dell strongly recommends that you change the default password of the root account during initial setup. NOTE: The CMC does not support extended ASCII characters, such as ß, å, é, ü, or other characters used primarily in non-English languages.
Configuring Basic CMC Settings Setting the Chassis Name You can set the name used to identify the chassis on the network. (The default name is "Dell Rack System.") For example, an SNMP query on the chassis name will return the name you configure. To set the chassis name: 1 Log in to the CMC Web interface. The Component Health page displays. 2 Click the Setup tab. The General Chassis Settings page displays. 3 Type the new name in the Chassis Name field, and then click Apply.
Viewing Power Budget Status The Power Budget Status page displays the power budget status for the chassis, servers, and chassis power supply units (PSUs). For instructions on viewing power budget status, see "Viewing Power Budget Status" on page 207. For more information about CMC power management, see "Power Management" on page 197. Viewing the Health Status of All Servers The Servers Status page provides overviews of the servers in the chassis.
Table 5-1. All Servers Status Information (continued) Item Description Health (continued) Name Severe Indicates at least one Failure alert has been issued. Severe status represents a system failure on the server, and corrective action must be taken immediately. No Value When the server is absent from the slot, health information is not provided. Indicates the name of the server, which by default is identified by its slot name (SLOT-01 to SLOT-16).
• • MC- • Chassis • Housing-Left • Housing-Right • Housing-Center The strings Server-1 through Server-16 may be used, but only for the corresponding slot. For example, Server-3 is a valid name for slot 3, but not for slot 4. Note that Server-03 is a valid name for any slot. NOTE: To change a slot name in the Web interface, you must have Chassis Configuration Administrator privilege. NOTE: The slot name setting in the Web interface resides on the CMC only.
Table 5-2. Boot Devices Boot Device Description PXE Boot from a Preboot Execution Environment (PXE) protocol on the network interface card. Hard Drive Boot from the hard drive on the server. Local CD/DVD Boot from a CD/DVD drive on the server. Virtual Floppy Boot from the virtual floppy drive. The floppy drive (or a floppy disk image) is on another computer on the management network, and is attached using the iDRAC GUI console viewer.
4 If you want the server to boot from the selected device every time it boots, uncheck the Boot Once checkbox for the server. If you want the server to boot from the selected device only on the next boot cycle, select the Boot Once checkbox for the server. 5 Click Apply.
Table 5-3. Individual Server Status Information (continued) Item Health Description OK Indicates that the server is present and communicating with the CMC. In the event of a communication failure between the CMC and the server, the CMC cannot obtain or display health status for the server. Informational Displays information about the server when no change in health status (OK, Warning, Severe) has occurred.
Viewing the Health Status of IOMs The I/O Modules Status page provides overviews of all IOMs associated with the chassis. For instructions on viewing IOM health through the Web interface or RACADM, see "Monitoring IOM Health" on page 254. Viewing the Health Status of the Fans NOTE: During updates of CMC or iDRAC firmware on a server, some or all of the fan units in the chassis will spin at 100%. This is normal.
Table 5-4. Item Fans Health Status Information (continued) Description Severe Indicates at least one Failure alert has been issued. Severe status represents a system failure on the IOM, and corrective action must be taken immediately to prevent overheating and system shutdown. Unknown Displayed when the chassis is first powered on. In the event of a communication failure between the CMC and the fan unit, the CMC cannot obtain or display health status for the fan unit.
To view the health status of the PSUs: 1 Log in to the CMC Web interface. 2 Select Power Supplies in the system tree. The Power Supply Status page displays. Table 5-5 provides descriptions of the information provided on the Power Supply Status page. Table 5-5. Power Supply Health Status Information Item Description Present Indicates whether the power supply is present (Yes or No). Health OK Indicates that the PSU is present and communicating with the CMC. Indicates that the health of the PSU is OK.
Viewing Status of the Temperature Sensors The Temperature Sensors Information page displays the status and readings of the temperature probes on the entire chassis (chassis, servers, IOMs, and iKVM). NOTE: The temperature probes value cannot be edited. Any change beyond the threshold will generate an alert that will cause the fan speed to vary. For example, if the CMC ambient temperature probe exceeds threshold, the speed of the fans on the chassis will increase.
Configuring CMC Network Properties Setting Up Initial Access to the CMC NOTE: You must have Chassis Configuration Administrator privilege to set up CMC network settings. 1 Log in to the Web interface. 2 Select Chassis in the system tree. The Component Health page appears. 3 Click the Network/Security tab. The Network Configuration page appears. 4 Enable or disable DHCP for the CMC by selecting or clearing the Use DHCP (For CMC NIC IP Address) check box.
Table 5-7. Network Settings Setting Description MAC Address Displays the chassis’ MAC address, which is a unique identifier for the chassis over the network. Enable NIC Enables the NIC of the CMC. Default: Enabled. If this option is checked: • The CMC communicates with and is accessible over the computer network. • The Web interface, CLI (remote RACADM), WSMAN, Telnet, and SSH associated with the CMC are available. If this option is not checked: • The CMC NIC cannot communicate over the network.
Table 5-7. Network Settings (continued) Setting Description Use DHCP (For CMC NIC IP Address) Enables the CMC to request and obtain an IP address from the Dynamic Host Configuration Protocol (DHCP) server automatically. Default: Checked (enabled) If this option is checked, the CMC retrieves IP configuration (IP address, mask, and gateway) automatically from a DHCP server on your network. The CMC will always have a unique IP address allotted over your network.
Table 5-7. Network Settings (continued) Setting Description Use DHCP to Obtain DNS Server Addresses Obtains the primary and secondary DNS server addresses from the DHCP server instead of the static settings. Default: Unchecked (disabled) by default NOTE: If Use DHCP (For NIC IP Address) is enabled, then enable the Use DHCP to Obtain DNS Server Addresses property. If this option is checked, the CMC retrieves its DNS IP address automatically from a DHCP server on your network.
Table 5-7. Network Settings (continued) Setting Description DNS CMC Name Displays the CMC name only when Register CMC on DNS is selected. The default CMC name is CMC_service_tag, where service tag is the service tag number of the chassis. Example: CMC-00002 Use DHCP for DNS Domain Name Uses the default DNS domain name. This check box is active only when Use DHCP (For NIC IP Address) is selected. Default: Disabled DNS Domain Name The default DNS Domain Name is a blank character.
Table 5-7. Network Settings (continued) Setting Description Duplex Mode Set the duplex mode to full or half to match your network environment. Implications: If Auto Negotiation is turned On for one device but not the other, then the device using auto negotiation can determine the network speed of the other device, but not the duplex mode. In this case, duplex mode defaults to the half duplex setting during auto negotiation. such a duplex mismatch will result in a slow network connection.
Table 5-8. Network Security Page Settings (continued) Settings Description IP Range Mask Defines a specific range of IP addresses that can access the CMC, a process called IP range checking. IP range checking allows access to the CMC only from clients or management stations whose IP addresses are within the userspecified range. All other logins are denied. For example: IP range mask: 255.255.255.0 (11111111.11111111.11111111.00000000) IP range address:192.168.0.255 (11000000.10101000.00000000.
Adding and Configuring CMC Users To manage your system with the CMC and maintain system security, create unique users with specific administrative permissions (or role-based authority). For additional security, you can also configure alerts that are e-mailed to specific users when a specific system event occurs. User Types There are two types of users: CMC users and iDRAC users. CMC users are also known as "chassis users." Since iDRAC resides on the server, iDRAC users are also known as "server users.
Table 5-9. User Types Privilege Description CMC Login User Users who have the CMC Login User privilege can log in to CMC. A user with only the login privilege can view all of the CMC data but cannot add or modify data or execute commands. It is possible for a user to have other privileges without the login privilege. This feature is useful when a user is temporarily disallowed to login. When that user’s login privilege is restored, the user retains all the other privileges previously granted.
Table 5-9. User Types (continued) Privilege Description User Configuration Administrator Users who have the User Configuration Administrator privilege can: • Add a new user • Delete an existing user • Change a user's password • Change a user's privileges • Enable or disable a user's login privilege but retain the user's name and other privileges in the database. Clear Logs Administrator CMC users who have the Clear Administrator privilege can clear the hardware log and CMC log.
Table 5-9. User Types (continued) Privilege Description Server Administrator The Server Administrator privilege is a blanket privilege granting a CMC user all rights to perform any operation on any servers present in the chassis. When a user with CMC Server Administrator privilege issues an action to be performed on a server, the CMC firmware sends the command to the targeted server without checking the user's privileges on the server.
Table 5-9. User Types (continued) Privilege Description Server Administrator (continued) Server Configuration Administrator: • Set IP address • Set gateway • Set subnet mask • Set first boot device User Configuration Administrator: • Set iDRAC root password • iDRAC reset Server Control Administrator: • Power on • Power off • Power cycle • Graceful shutdown • Server Reboot Test Alert User CMC users who have the Test Alert User privilege can send test alert messages.
Table 5-10. CMC Group Privileges User Group Privileges Granted CMC Group Lists pre-defined user groups with assigned privileges: Administrator, Power User, Guest User, None, and Custom. NOTE: If you select Administrator, Power User, or Guest User, and then add or remove a privilege from the pre-defined set, the CMC Group automatically changes to Custom.
Table 5-10. CMC Group Privileges (continued) User Group Privileges Granted Custom Select any combination of the following permissions: • CMC Login User • Chassis Configuration Administrator • User Configuration Administrator • Clear Logs Administrator • Chassis Control Administrator (Power Commands) • Super User • Server Administrator • Test Alert User • Debug Command Administrator • Fabric A Administrator • Fabric B Administrator • Fabric C Administrator None No assigned permissions. Table 5-11.
Table 5-11.
NOTE: For added security, Dell strongly recommends that you change the default password of the root (User 1) account. The root account is the default administrative account that ships with the CMC. To change the default password for the root account, click User ID 1 to open the User Configuration page. Help for that page is available through the Help link at the top right corner of the page.
Table 5-12. General User Settings (continued) Property Description User Name Sets or displays the unique CMC user name associated with the user. The user name can contain up to 16 characters. CMC user names cannot include forward slash (/) or period (.) characters. NOTE: If you change the user name, the new name does not appear in the user interface until your next login. Any user logging in after you apply the new user name will be able to see the change immediately.
To refresh the contents of the User Configuration page, click Refresh. To print the contents of the User Configuration page, click Print. Configuring and Managing Microsoft Active Directory Certificates NOTE: To configure Active Directory settings for the CMC, you must have Chassis Configuration Administrator privilege.
Table 5-13. Active Directory Main Menu Page Options (continued) Field Description Download Certificate Download a CMC server certificate to your management station or shared network using Windows Download Manager. When you select this option and click Next, a File Download dialog box appears. Use this dialog box to specify a location on your management station or shared network for the server certificate.
Table 5-14. Active Directory Common Settings Properties Setting Description Root Domain Name Specifies the domain name used by Active Directory. The root domain name is the fully qualified root domain name for the forest. NOTE: The root domain name must be a valid domain name using the x.y naming convention, where x is a 1–256 character ASCII string with no spaces between characters, and y is a valid domain type such as com, edu, gov, int, mil, net, or org.
7 If you selected Extended Schema, type the following required information in the Extended Schema Settings section, and then proceed directly to step 9. If you selected Standard Schema, proceed to step 8. • CMC Device Name – The name that uniquely identifies the CMC card in Active Directory. The CMC name must be the same as the common name of the new CMC object you created in your Domain Controller. The name must be a 1–256 character ASCII string with no spaces between characters. Default: null (empty).
Table 5-15. Setting Active Directory Schema Options (continued) Description Use Extended Schema Uses Extended Schema with Active Directory, which uses Dell-defined Active Directory objects. Before configuring CMC to use the Active Directory Extended Schema option, you must first configure the Active Directory software: 1 Extend the Active Directory schema. 2 Extend the Active Directory Users and Computers Snapin. 3 Add CMC users and their privileges to Active Directory.
To configure the Role Groups for Active Directory, click the individual Role Group (1–5). See Table 5-10 and Table 5-9). NOTE: To save the settings on the Active Directory Configuration and Management page, you have to click Apply before proceeding to the Custom Role Group page. Uploading an Active Directory Certificate Authority-Signed Certificate From the Active Directory Main Menu page: 1 Select Upload AD Certificate, and then click Next. The Certificate Upload page displays.
Table 5-1. Active Directory CA Certificate Information (continued) Field Description Valid From Certificate issue date. Valid To Certificate expiration date. To refresh the contents of the View Active Directory CA Certificate page, click Refresh. To print the contents of the View Active Directory CA Certificate page, click Print.
This encryption process provides a high level of data protection. The CMC employs the 128-bit SSL encryption standard, the most secure form of encryption generally available for Internet browsers in North America. The CMC Web server includes a Dell self-signed SSL digital certificate (Server ID). To ensure high security over the Internet, replace the Web server SSL certificate by submitting a request to the CMC to generate a new Certificate Signing Request (CSR).
NOTE: Any server certificate you upload must be current (not expired) and signed by a certificate authority. 1 Log in to the Web interface. 2 Click the Network/Security tab, and then click the SSL sub-tab. The SSL Main Menu page appears. Use the SSL Main Menu page options to generate a CSR to send to a certificate authority. The CSR information is stored on the CMC firmware.
To obtain a secure server certificate for the CMC, you must submit a Certificate Signing Request (CSR) to a certificate authority of your choice. A CSR is a digital request for a signed, secure server certificate containing information about your organization and a unique, identifying key.
Table 5-3. Generate Certificate Signing Request (CSR) Page Options Field Description Common Name The exact name being certified (usually the Web server's domain name, for example, www.xyzcompany.com/). Valid: Alphanumeric characters (A–Z, a–z, 0–9); hyphens, underscores, and periods. Not valid: Non-alphanumeric characters not noted above (such as, but not limited to, @ # $ % & *); characters used primarily in non-English languages, such as ß, å, é, ü.
Table 5-3. Generate Certificate Signing Request (CSR) Page Options (continued) Field Description Country The country where the organization applying for certification is located. Email Your organization's e-mail address. You may type any e-mail address you want to have associated with the CSR. The e-mail address must be valid, containing the at (@) sign (example: name@xyzcompany.com). Uploading a Server Certificate 1 From the SSL Main Menu page, select Upload Server Certificate, and then click Next.
Table 5-4. Certificate Information (continued) Field Description notBefore Issue date of the certificate notAfter Expiration date of the certificate To refresh the contents of the View Server Certificate page, click Refresh. To print the contents of the View Server Certificate page, click Print. Managing Sessions The Sessions page displays all current instances of connections to the chassis and allows you to terminate any active session.
Table 5-5. Sessions Properties (continued) Property Description Terminate Allows you to terminate any of the sessions listed, except for your own. To terminate the associated session, click the trash can icon . This column is displayed only if you have Chassis Configuration Administrator privileges. To terminate the session, click the trash can icon on the line that describes the session.
4 Configure the following services as required: • CMC serial console (Table 5-6) • Web server (Table 5-7) • SSH (Table 5-8) • Telnet (Table 5-9) • Remote RACADM (Table 5-10) 5 Click Apply Changes; update all default time outs and maximum time out limits. Table 5-6. CMC Serial Console Settings Setting Description Enabled Enables Telnet console interface on the CMC.
Table 5-6. CMC Serial Console Settings (continued) Setting Description Escape Key Allows you to specify the Escape key combination that terminates serial/text console redirection when using the connect com2 command. Default: ^\ (Hold and type a backslash (\) character) NOTE: The caret character ^ represents the key.
Table 5-7. Web Server Settings Setting Description Enabled Enables Web Server services (access through remote RACADM and the Web interface) for the CMC. Default: Checked (enabled) Max Sessions Indicates the maximum number of simultaneous Web user interface sessions allowed for the chassis. A change to the Max Sessions property takes effect at the next login; it does not affect current Active Sessions (including your own).
Table 5-7. Web Server Settings (continued) Setting Description HTTP Port Number Indicates the default port used by the CMC that listens for a server connection. NOTE: When you provide the HTTP address on the browser, the Web server automatically redirects and uses HTTPS.
Table 5-8. SSH Settings Setting Description Enabled Enables the SSH on the CMC. Default: Checked (enabled) Max Sessions The maximum number of simultaneous SSH sessions allowed for the chassis. A change to this property takes effect at the next login; it does not affect current Active Sessions (including your own).
Table 5-9. Telnet Settings Setting Description Enabled Enables Telnet console interface on the CMC. Default: Unchecked (disabled) Max Sessions Indicates the maximum number of simultaneous Telnet sessions allowed for the chassis. A change to this property takes effect at the next login; it does not affect current Active Sessions (including your own).
Table 5-10. Remote RACADM Settings Setting Description Enabled Enables the remote RACADM utility access to the CMC. Default: Checked (enabled) Max Sessions Indicates the maximum number of simultaneous RACADM sessions allowed for the chassis. A change to this property takes effect at the next login; it does not affect current Active Sessions (including your own).
Managing Firmware This section describes how to use the Web interface to update CMC firmware. When you update firmware, there is a recommended process to follow that can prevent a loss of service if the update fails. See "Installing or Updating the CMC Firmware" on page 48 for guidelines to follow before you use the instructions in this section.
The Updatable Components page displays the current version of the firmware for each listed component (CMC/iKVM) and allows you to update the firmware to the latest revision by uploading the firmware image file (package). NOTE: Be sure you have the latest firmware version. You can download the latest firmware image file from the Dell Support website.
Updating the iKVM Firmware NOTE: The iKVM resets and becomes temporarily unavailable after the firmware has been uploaded successfully. 1 Log back in to the CMC Web interface. 2 Select Chassis in the system tree. 3 Click the Update tab. The Updatable Components page appears. 4 Click the iKVM name. The Firmware Update page appears. 5 In the Value field, type the path on your management station or shared network where the firmware image file resides, or click Browse to navigate to the file location.
NOTE: If the iDRAC MAC address has been lost or corrupted, it must be set to a valid address before you can recover the iDRAC firmware using the CMC. You can use the IPMI config params command to set a MAC address. The MAC address is the fifth parameter of the command. It must be set to a 6-byte address that is unique on your management network.Refer to the documentation for your IPMI utility (for example, ipmitool or ipmish) for help executing the command. Follow these steps to update the iDRAC firmware.
NOTE: You must purchase and install the FlexAddress upgrade to have access to the configuration screens. If the upgrade has not been purchased and installed, the following text will be displayed on the Web interface: Optional feature not installed. See the Dell Chassis Management Controller Users Guide for information on the chassis-based WWN and MAC address administration feature. To purchase this feature, please contact Dell at www.dell.com.
Use the following steps to display a FlexAddress status overview for each server module: 1 Log in to the Web interface (see "Accessing the CMC Web Interface" on page 87). 2 Click Servers in the system tree. Click the Properties tab, FlexAddress subtab. 3 The FlexAddress Summary page is displayed. This page allows you to view the WWN configuration and MAC addresses for all slots in the chassis.
Use the following steps to view FlexAddress server information: 1 Log in to the Web interface (see "Accessing the CMC Web Interface" on page 87). 2 Expand Servers in the system tree. All of the servers (1–16) appear in the expanded Servers list. 3 Click the server you want to view. The Server Status page displays. 4 Click the Setup tab, and the FlexAddress sub-tab. The FlexAddress status page is displayed. This page allows you to view the WWN configuration and MAC addresses for the selected server.
Fabric Displays the type of fabric. Server-Assigned Displays the server-assigned WWN/MAC addresses that are embedded in the controller's hardware. Chassis-Assigned Displays the chassis-assigned WWN/MAC addresses that are used for the particular slot. 5 For additional information, review the online help page by clicking the Help link and review "Using FlexAddress" on page 151.
Perform the following steps to enable or disable fabrics and slots to use the FlexAddress feature: 1 Log on to the Web interface (see "Accessing the CMC Web Interface" on page 87). 2 Click Servers in the system tree. 3 Click the Setup tab. The General Setup page appears. Click Deploy FlexAddress. The Deploy FlexAddress screen is displayed. 4 The Select Fabrics for Chassis-Assigned WWN/MACs displays a check box for Fabric A, Fabric B, and Fabric C.
Use the following steps to enable or disable an individual slot to use the FlexAddress feature: 1 Log in to the Web interface (see "Accessing the CMC Web Interface" on page 87). 2 Expand Servers in the system tree. All of the servers (1–16) appear in the expanded Servers list. 3 Click the server you want to view. The Server Status page displays. 4 Click the Setup tab, and the FlexAddress sub-tab. The FlexAddress status page is displayed.
Frequently Asked Questions Table 5-11 lists frequently asked questions and answers. Table 5-11. Managing and Recovering a Remote System: Frequently Asked Questions Question Answer When accessing the CMC Web interface, I get a security warning stating the host name of the SSL certificate does not match the host name of the CMC. The CMC includes a default CMC server certificate to ensure network security for the Web interface and remote RACADM features.
Table 5-11. Managing and Recovering a Remote System: Frequently Asked Questions (continued) Question Answer Why are the remote RACADM and Web-based services unavailable after a property change? It may take a minute for the remote RACADM services and the Web interface to become available after the CMC Web server resets.
Table 5-11. Managing and Recovering a Remote System: Frequently Asked Questions (continued) Question Answer The following message is displayed for unknown reasons: As part of discovery, IT Assistant attempts to verify the device’s get and set community names. In IT Assistant, you have the get community name = public and the set community name = private. By default, the community name for the CMC agent is public.
Using FlexAddress The FlexAddress feature is an optional upgrade in CMC 1.1 that allows server modules to replace the factory assigned World Wide Name/Media Access Control (WWN/MAC) ID with a WWN/MAC ID provided by the chassis. Every server module is assigned a unique WWN/MAC ID as part of the manufacturing process.
Activating FlexAddress FlexAddress is delivered on a Secure Digital (SD) card that must be inserted into the CMC to provide the chassis-assigned WWN/MAC IDs. To activate the FlexAddress feature there are several required updates; if you are not activating FlexAddress these updates are not required. The updates include server module BIOS, I/O mezzanine BIOS or firmware, and CMC firmware. You must apply these updates before you enable FlexAddress.
See the Chassis Management Controller (CMC) Secure Digital (SD) Card Technical Specification document for SD card installation instructions. NOTE: The SD card contains a FlexAddress feature. Data contained on the SD card is encrypted and may not be duplicated or altered in any way as it may inhibit system function and cause the system to malfunction. NOTE: Your use of the SD card is limited to one chassis only. If you have multiple chassis, you must purchase additional SD cards.
The following table lists the status messages returned by the command. Table 6-1. Status Messages Returned by featurecard -s Command Status Message Actions No feature card inserted. Check the CMC to verify that the SD card was properly inserted. In a redundant CMC configuration, make sure the CMC with the SD feature card installed is the active CMC and not the standby CMC. The feature card inserted is valid and No action required.
If there are no active features on the chassis, the command will return an error message: racadm feature -s No features are activated on this chassis. Once you have run both commands, FlexAddress feature activation is verified. For further information on the RACADM commands, see "feature" on page 294 and "featurecard" on page 295. Deactivating FlexAddress The FlexAddress feature can be deactivated and the SD card returned to a pre-installation state using a RACADM command.
Viewing FlexAddress Status Using the CLI You can use the command line interface to view FlexAddress status information. You can view status information for the entire chassis or for a particular slot. The information displayed includes: • Fabric configuration • FlexAddress enabled/disabled • Slot number and name • Chassis-assigned and server-assigned addresses • Addresses in use.
Enabled slots will be FlexAddress enabled for all fabrics that are enabled. For example, it is not possible to enable Fabric-A and B, and have Slot 1 be FlexAddress enabled on Fabric-A but not on Fabric-B. Use the following RACADM command to enable or disable fabrics: racadm setflexaddr [-f ] = = A, B, C 0 or 1 Where 0 is disable and 1 is enable.
needs to be operational which requires the server module to be powered up. Once the power-down and power-up sequence completes, the FlexAddress feature is available for Wake-On-LAN (WOL) function. Troubleshooting FlexAddress This section contains troubleshooting information for FlexAddress. 1 If a feature card is removed, what will happen? Nothing will happen. Feature cards can be removed and stored or may be left in place.
4 If the chassis service tag is reprogrammed, what happens if there is a feature card bound to that chassis? The Web interface will display an error that states: This feature card was activated with a different chassis. It must be removed before accessing the FlexAddress feature. Current Chassis Service Tag = XXXXXXXX Feature Card Chassis Service Tag = YYYYYYYY Dell Service will need to program the original chassis service tag back into the chassis and reset the CMC.
9 What will happen if a chassis with a single CMC is downgraded with firmware prior to 1.10? The FlexAddress feature and configuration will be removed. Once the CMC firmware is upgraded to 1.10 or later, the FlexAddress feature will need to be reactivated and configured by the user. 10 In a chassis with redundant CMCs, if you are replacing a CMC unit with one that has firmware prior to 1.10, the following procedure must be used to ensure the current FlexAddress feature and configuration will NOT be removed.
Table 6-2. Situation FlexAddress Commands and Output Command SD card in the active $racadm featurecard -s CMC module is bound to another service tag. Output The feature card inserted is valid and contains the following feature(s) FlexAddress: The feature card is bound to another chassis, svctag = J310TF1 SD card SN =0188BFFE03A SD card in the active $racadm featurecard -s CMC module that is bound to the same service tag.
Table 6-2.
FlexAddress DELL SOFTWARE LICENSE AGREEMENT This is a legal agreement between you, the user, and Dell Products L.P or Dell Global B.V. ("Dell"). This agreement covers all software that is distributed with the Dell product, for which there is no separate license agreement between you and the manufacturer or owner of the software (collectively the "Software"). This agreement is not for the sale of Software or any other intellectual property.
The Software is protected by United States copyright laws and international treaties. You may make one copy of the Software solely for backup or archival purposes or transfer it to a single hard disk provided you keep the original solely for backup or archival purposes.
DELL, ON BEHALF OF ITSELF AND ITS SUPPLIERS, DISCLAIMS ALL OTHER WARRANTIES, EXPRESS OR IMPLIED, INCLUDING, BUT NOT LIMITED TO, IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE, FOR THE SOFTWARE AND ALL ACCOMPANYING WRITTEN MATERIALS. This limited warranty gives you specific legal rights; you may have others, which vary from jurisdiction to jurisdiction.
(INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILTIY OF SUCH DAMAGE. .U.S. GOVERNMENT RESTRICTED RIGHTS The software and documentation are "commercial items" as that term is defined at 48 C.F.R. 2.101, consisting of "commercial computer software" and "commercial computer software documentation" as such terms are used in 48 C.F.R. 12.212. Consistent with 48 C.F.R. 12.212 and 48 C.F.R. 227.7202-1 through 227.7202-4, all U.S.
Using the CMC With Microsoft Active Directory A directory service maintains a common database of all information needed for controlling network users, computers, printers, and so on. If your company uses the Microsoft® Active Directory® service software, you can configure the software to provide access to the CMC. This allows you to add and control CMC user privileges to your existing users in your Active Directory software.
Extended Schema Overview There are two ways to enable Extended Schema Active Directory: • Using the CMC Web interface. For instructions, see "Configuring the CMC With Extended Schema Active Directory and the Web Interface" on page 183. • Using the RACADM CLI tool. For instructions, see "Configuring the CMC With Extended Schema Active Directory and RACADM" on page 185. Active Directory Schema Extensions The Active Directory data is a distributed database of Attributes and Classes.
The Association property links together users or groups with a specific set of privileges to one or more RAC devices. This model provides an Administrator maximum flexibility over the different combinations of users, RAC privileges, and RAC devices on the network without adding too much complexity.
Figure 7-1. Typical Setup for Active Directory Objects Association Object User(s) Group(s) Privilege Object RAC Device Object(s) RAC Privilege Object The Association Object allows for as many or as few users and/or groups as well as RAC Device Objects. However, the Association Object only includes one Privilege Object per Association Object. The Association Object connects the "Users" who have "Privileges" on the RACs (CMCs).
Figure 7-2. Setting Up Active Directory Objects in a Single Domain AO1 Group1 User1 User2 AO2 Priv1 User3 Priv2 RAC1 RAC2 To configure the objects for the single domain scenario: 1 Create two Association Objects. 2 Create two RAC Device Objects, RAC1 and RAC2, to represent the two CMCs. 3 Create two Privilege Objects, Priv1 and Priv2, in which Priv1 has all privileges (administrator) and Priv2 has login privilege. 4 Group user1 and user2 into Group1.
Domain1, and user2 and user 3 are in Domain2. In this scenario, configure user1 and user 2 with administrator privileges to both CMCs and configure user3 with login privileges to the RAC2 card. Figure 7-3. Setting Up Active Directory Objects in Multiple Domains Domain1 Domain2 AO1 Group1 User1 User2 AO2 Priv1 User3 Priv2 RAC1 RAC2 To configure the objects for the multiple domain scenario: 1 Ensure that the domain forest function is in Native or Windows 2003 mode.
6 Add Group1 as Members in Association Object 1 (A01), Priv1 as Privilege Objects in A01, and RAC1, RAC2 as RAC Devices in A01. 7 Add User3 as Members in Association Object 2 (A02), Priv2 as Privilege Objects in A02, and RAC2 as RAC Devices in A02. Configuring Extended Schema Active Directory to Access Your CMC Before using Active Directory to access your CMC, configure the Active Directory software and the CMC: 1 Extend the Active Directory schema (see "Extending the Active Directory Schema" on page 173).
The LDIF files and Dell Schema Extender are located on your Dell Systems Management Consoles CD in the following respective directories: • CD drive:\support\OMActiveDirectory Tools\RAC4-5\LDIF_Files • CD drive:\support\OMActiveDirectory Tools\RAC4-5\Schema_Extender To use the LDIF files, see the instructions in the readme included in the LDIF_Files directory. For instructions on using the Dell Schema Extender to extend the Active Directory Schema, see "Using the Dell Schema Extender.
Table 7-1. Class Definitions for Classes Added to the Active Directory Schema (continued) Class Name Assigned Object Identification Number (OID) dellRACPrivileges 1.2.840.113556.1.8000.1280.1.1.1.3 dellPrivileges 1.2.840.113556.1.8000.1280.1.1.1.4 dellProduct 1.2.840.113556.1.8000.1280.1.1.1.5 Table 7-2. dellRacDevice Class OID 1.2.840.113556.1.8000.1280.1.1.1.1 Description Represents the Dell RAC device. The RAC device must be configured as dellRacDevice in Active Directory.
Table 7-4. dellRAC4Privileges Class OID 1.2.840.113556.1.8000.1280.1.1.1.3 Description Defines Authorization Rights (privileges) for the CMC device. Class Type Auxiliary Class SuperClasses None Attributes dellIsLoginUser dellIsCardConfigAdmin dellIsUserConfigAdmin dellIsLogClearAdmin dellIsServerResetUser dellIsTestAlertUser dellIsDebugCommandAdmin dellPermissionMask1 dellPermissionMask2 Table 7-5. dellPrivileges Class OID 1.2.840.113556.1.8000.1280.1.1.1.
Table 7-7. List of Attributes Added to the Active Directory Schema Assigned OID/Syntax Object Identifier Single Valued Attribute: dellPrivilegeMember Description: List of dellPrivilege objects that belong to this attribute. OID: 1.2.840.113556.1.8000.1280.1.1.2.1 FALSE Distinguished Name: (LDAPTYPE_DN 1.3.6.1.4.1.1466.115.121.1.12) Attribute: dellProductMembers Description: List of dellRacDevices objects that belong to this role.
Table 7-7. List of Attributes Added to the Active Directory Schema (continued) Assigned OID/Syntax Object Identifier Single Valued Attribute: dellIsUserConfigAdmin Description: TRUE if the user has User Configuration Administrator rights on the device. OID: 1.2.840.113556.1.8000.1280.1.1.2.5 TRUE Boolean (LDAPTYPE_BOOLEAN 1.3.6.1.4.1.1466.115.121.1.7) Attribute: delIsLogClearAdmin Description: TRUE if the user has Clear Logs Administrator rights on the device. OID: 1.2.840.113556.1.8000.1280.1.1.2.
Table 7-7. List of Attributes Added to the Active Directory Schema (continued) Assigned OID/Syntax Object Identifier Single Valued Attribute: dellRacType Description: This attribute is the Current Rac Type for the dellRacDevice object and the backward link to the dellAssociationObjectMembers forward link. OID: 1.2.840.113556.1.8000.1280.1.1.2.13 TRUE Case Ignore String(LDAPTYPE_CASEIGNORESTRING 1.2.840.113556.1.4.
For more information about the Active Directory User’s and Computers Snap-In, see your Microsoft documentation. Installing the Administrator Pack You must install the Administrator Pack on each system that is managing the Active Directory CMC Objects. If you do not install the Administrator Pack, you cannot view the Dell RAC Object in the container.
Creating a RAC Device Object 1 In the MMC Console Root window, right-click a container. 2 Select New→ Dell RAC Object. The New Object window appears. 3 Type a name for the new object. The name must be identical to the CMC Name that you will type in step 8a of "Configuring the CMC With Extended Schema Active Directory and the Web Interface" on page 183. 4 Select RAC Device Object. 5 Click OK.
For example, if you select Universal, the association objects are only available when the Active Directory Domain is functioning in Native Mode or above. 1 In the Console Root (MMC) window, right-click a container. 2 Select New→ Dell RAC Object. This opens the New Object window. 3 Type a name for the new object. 4 Select Association Object. 5 Select the scope for the Association Object. 6 Click OK.
Adding RAC Devices or RAC Device Groups To add RAC devices or RAC device groups: 1 Select the Products tab and click Add. 2 Type the RAC device or RAC device group name and click OK. 3 In the Properties window, click Apply and click OK. Configuring the CMC With Extended Schema Active Directory and the Web Interface 1 Log in to the CMC Web interface. 2 Select Chassis in the system tree. 3 Click the Network/Security tab, and then click the Active Directory subtab.
7 Select the Use Extended Schema radio button in the Active Directory Schema Selection area. 8 In the Extended Schema Settings section: a Type the CMC Name. The CMC Name uniquely identifies the CMC card in Active Directory. The CMC Name must be the same as the common name of the new CMC object you created in your Domain Controller. The CMC Name must be a 1–256 character ASCII string with no spaces between characters. b Type the CMC Domain Name (example: cmc.com).
16 If Use DHCP (for NIC IP Address) is enabled (checked), do one of the following: • Select Use DHCP to Obtain DNS Server Addresses to enable the DNS server addresses to be obtained automatically by the DHCP server., or • Manually configure a DNS server IP address by leaving the Use DHCP to Obtain DNS Server Addresses check box unchecked and then typing your primary and alternate DNS server IP addresses in the fields provided. 17 Click Apply Changes.
Optional: If you want to specify an LDAP or Global Catalog server instead of using the servers returned by the DNS server to search for a user name, type the following command to enable the Specify Server option: racadm config -g cfgActiveDirectory -o cfgADSpecifyServerEnable 1 NOTE: When you use the Specify Server option, the host name in the certificate authority-signed certificate is not matched against the name of the specified server.
• If DHCP is disabled on the CMC, or if DHCP is enabled but you want to specify your DNS IP address manually, type following commands: racadm config -g cfgLanNetworking -o cfgDNSServersFromDHCP 0 racadm config -g cfgLanNetworking -o cfgDNSServer1 racadm config -g cfgLanNetworking -o cfgDNSServer2 The Extended Schema feature configuration is complete.
Figure 7-4.
Table 7-8.
NOTE: The bit mask values are used only when setting Standard Schema with the RACADM. NOTE: For more information about user privileges, see "User Types" on page 107. There are two ways to enable Standard Schema Active Directory: • With the CMC Web interface. See "Configuring the CMC With Standard Schema Active Directory and Web Interface" on page 190. • With the RACADM CLI tool. See "Configuring the CMC With Standard Schema Active Directory and RACADM" on page 193.
5 In the Common Settings section: a Select the Enable Active Directory check box. b Type the ROOT Domain Name. The ROOT Domain Name is the fully qualified root domain name for the forest. NOTE: The ROOT domain name must be a valid domain name using the x.y naming convention, where x is a 1–256 character ASCII string with no spaces between characters, and y is a valid domain type such as com, edu, gov, int, mil, net, or org. c Type the Timeout time in seconds. Configuration range: 15–300 seconds.
13 Click Apply to save the Role Group settings. 14 Click Go Back To Active Directory Configuration and Management. 15 Click Go Back To Active Directory Main Menu. 16 Upload your domain forest Root certificate authority-signed certificate into the CMC. a Select the Upload Active Directory CA Certificate check box and then click Next. b In the Certificate Upload page, type the file path of the certificate or browse to the certificate file.
Configuring the CMC With Standard Schema Active Directory and RACADM To configure the CMC Active Directory Feature with Standard Schema using the RACADM CLI, use the following commands: 1 Open a Telnet/SSH text console to the CMC, log in, and type: racadm config -g cfgActiveDirectory -o cfgADEnable 1 racadm config -g cfgActiveDirectory -o cfgADType 2 racadm config -g cfgActiveDirectory -o cfgADRootDomain racadm config -g cfgStandardSchema -i -o cfgSSADRoleGroupName
• If DHCP is disabled on the CMC or you want manually to input your DNS IP address, type the following commands: racadm config -g cfgLanNetworking -o cfgDNSServersFromDHCP 0 racadm config -g cfgLanNetworking -o cfgDNSServer1 racadm config -g cfgLanNetworking -o cfgDNSServer2 Frequently Asked Questions Table 7-9 lists frequently asked questions and answers about using Active Directory with the CMC. Table 7-9.
Table 7-9. Using CMC With Active Directory: Frequently Asked Questions (continued) Question Answer Can these Dell-extended objects (Dell Association Object, Dell RAC Device, and Dell Privilege Object) be in different domains? The Association Object and the Privilege Object must be in the same domain. The Dellextended Active Directory Users and Computers Snap-In forces you to create these two objects in the same domain. Other objects can be in different domains.
Table 7-9. Using CMC With Active Directory: Frequently Asked Questions (continued) Question Answer What can I do if I cannot log into the CMC using Active Directory authentication? How do I troubleshoot the issue? 1 Ensure that you use the correct user domain name during a login and not the NetBIOS name. 2 If you have a local CMC user account, log into the CMC using your local credentials.
Power Management Overview The M1000e chassis ships with either three power supply units (PSUs) or six, the maximum. If your chassis has three PSUs, you can add up to three more. The PSUs supply power to the chassis and all the modules in the chassis: CMC, IOM, iKVM, fans, front panel LCD and servers. The CMC manages the power budget for all the chassis modules.
Figure 8-1. Chassis With Six-PSU Configuration PSUs Dynamic PSU Engagement Dynamic PSU engagement is a configurable option that enables the CMC to conserve power by powering-off unused PSUs and keeping them in standby mode in case more power is required. This saves power by increasing the utilization of the PSUs that remain active so that they are used more efficiently.
• The redundancy policy • The capabilities and maximum efficiency point of the PSU configuration Table 8-1. Power Allocation in Compute vs.
Table 8-2. Default Redundancy Configuration PSU Configuration Default Redundancy Policy Default Dynamic PSU Engagement Setting Six PSUs AC Redundancy Disabled Three PSUs No Redundancy Disabled AC Redundancy For AC Redundancy mode to operate at optimal power, you must have six PSUs in your chassis. You can set your chassis to operate in AC Redundancy mode with fewer than six PSUs, but it will operate in a degraded state. In AC Redundancy mode, all six PSUs will be active.
No Redundancy Power from up to three PSUs is used to power on the entire chassis, including the servers, IOMs, iKVM, front panel LCD, fans, and primary CMC. NOTICE: The No Redundancy mode uses only three PSUs at a time, without backup. Failure of one of the three PSUs being used could cause servers to lose power and data. Power Conservation and Power Budget Changes The CMC can perform power conservation when the user-configured maximum power limit is reached. Power conservation is disabled by default.
Figure 8-2.
Figure 8-3. No Redundancy Power Grid #1 Power Supply #1 Power Supply #2 Power Supply #3 Blank Slot #4 Blank Slot #5 Blank Slot #6 Chassis DC Power Bus Single Power Grid: No protection against grid or power supply failure New Server Engagement Policy When a new server is powered on, the CMC may need to decrease power to lower priority servers to allow more power for the new server if adding the new server exceeds the power available for the system.
Table 8-3 describes the actions taken by the CMC when a new server is powered on in the scenario described above. Table 8-3.
PSU Power-downs and Removals With a No Redundancy Policy The CMC may begin conserving power when you power-down or gracefully extract a PSU. The CMC decreases power to the lower priority servers until power consumption is supported by the remaining PSUs in the chassis. If you power-down or remove more than one PSU, the CMC evaluates power needs again when the second PSU is removed to determine the firmware response.
Using the Web Interface To view the health status of the PSUs: 1 Log in to the CMC Web interface. 2 Select Power Supplies in the system tree. The Power Supply Status page displays. Table 8-5 provides descriptions of the information provided on the Power Supply Status page. Table 8-5. Power Supply Health Status Information Item Description Present Indicates whether the PSU is Present or Absent. Health OK Indicates that the PSU is present and communicating with the CMC.
Viewing Power Budget Status The CMC provides power status overviews of the power subsystem on the Power Budget Status page. Using the Web Interface NOTE: To perform power management actions, you must have Chassis Control Administrator privilege. 1 Log in to the CMC Web interface. 2 Select Chassis in the system tree. 3 Click the Power Management tab. The Power Budget Status page displays. Table 8-6 through Table 8-11 describe the information displayed on the Power Budget Status page.
Table 8-6. Real-Time Power Statistics (continued) Item Description Peak System Power Consumption Timestamp Displays the date and time recorded when the peak system power consumption value occurred over the time period being recorded. The timestamp is displayed in the format hh:mm:ss MM/DD/YYYY, where hh is hours (0–24), mm is minutes (00–60), ss is seconds (00–60), MM is the month (1–12), DD is the day, 1–31, and YYYY is the year.
Table 8-8. System Power Policy Configuration Item Description System Max AC Displays the user-defined maximum power consumption limit for Power Limit the entire system (chassis, CMCs, servers, I/O modules, PSUs, iKVM, and fans). The CMC enforces this limit by throttling (if enabled) or by powering off lower priority servers (if throttling is not enabled). System AC Displays the maximum amount of power, in watts, beyond which Power Warning the CMC takes action to reduce power consumption.
Table 8-8. System Power Policy Configuration (continued) Item Description Redundancy Policy Indicates the current redundancy configuration: AC Redundancy, Power Supply Redundancy, and No Redundancy. AC Redundancy — Power input is load-balanced across all PSUs. Three of the PSUs are connected to one AC grid and the other three are connected to another grid. When the system is running optimally in AC Redundancy mode, power is load-balanced across all active supplies.
Table 8-9. Power Budgeting Item Description System DC Max Power Capacity Displays the Maximum DC power, in watts, the available PSUs can supply to the system. DC Redundancy Reserve Indicates the amount of redundant power (in watts) in reserve that can be utilized in the event of an AC grid or PSU failure. When the chassis is configured to operate in AC Redundancy mode, the DC Redundancy Reserve is the amount of reserve power that can be utilized in the event of an AC grid failure.
Table 8-10. Server Modules Item Description Slot # Displays the location of the server module. The Slot # is a sequential number (1–16) that identifies the server module by its location within the chassis. Name Displays the server name. The server name can be redefined by the user. Type Displays the type of the server. Priority Indicates the priority level allotted to the server slot in the chassis for power budgeting.
Configuring Power Budget and Redundancy The CMC’s power management service optimizes power consumption for the entire chassis (the chassis, servers, IOMs, iKVM, CMC, and PSUs) and reallocates power to different modules based on the demand. Using the Web Interface NOTE: To perform power management actions, you must have Chassis Control Administrator privilege. 1 Log in to the CMC Web interface. 2 Select Chassis in the system tree. 3 Click the Power Management tab. The Power Budget Status page displays.
Table 8-12. Configurable Power Budget/Redundancy Properties Item Description System Max AC Power Limit Indicates the user-defined maximum power consumption limit for the entire system (chassis, CMC, servers, I/O modules, power supply units, iKVM, and fans). The CMC will enforce this limit when power conservation mode is enabled (by checking Server Power Throttling Enabled), or by powering off lower priority server modules if power conservation mode is not enabled.
Table 8-12. Configurable Power Budget/Redundancy Properties (continued) Item Description Redundancy Policy Specifies a redundancy configuration: No Redundancy, Power Supply Redundancy, or AC Redundancy. Default: No Redundancy. NOTE: The No Redundancy mode uses only three PSUs at a time. If 3 PSUs are installed, then no backup is available. Failure of one of the three PSUs in use could cause the servers to lose power or data.
For example, the following command: racadm config -g cfgChassisPower -o cfgChassisMaxACPowerLimit 5400 sets the maximum power budget to 5400 watts. • To set the power warming threshold, type: racadm config -g cfgChassisPower -o cfgChassisACPowerWarningThreshold where is a number between 2768–7928 (inclusive) representing the power consumption limit in watts beyond which a warning is issued. The default is 7928.
For example, the following command: racadm config -g cfgChassisPower -o cfgChassisRedundancyPolicy 1 sets the redundancy policy to 1. • To enable or disable dynamic PSU engagement, type: racadm config -g cfgChassisPower -o cfgChassisDynamicPSUEngagementEnable where is 0 (disable), 1 (enable). The default is 1. For example, the following command: racadm config -g cfgChassisPower -o cfgChassisDynamicPSUEngagementEnable 0 disables dynamic PSU engagement.
3 Click the Power Management tab. The Server Priority page appears, listing all of the servers in your chassis. 4 Select a priority level (1–9, with 1 holding the highest priority) for one, multiple, or all servers. You can assign the same priority level to multiple servers. 5 Click Apply to save your changes.
5 Type a budget value of up to 7928 watts in the Enclosure Max Power Limit text field. NOTE: The power budget is limited to a maximum of three PSUs out of a total of six PSUs. If you attempt to set a AC power budget value that exceeds the power capacity of your chassis, the CMC will display a failure message. 6 Click Apply to save your changes.
Using RACADM Open a Telnet/SSH text console to the CMC, log in, and type: racadm config -g cfgChassisPower -o cfgChassisACPowerWarningThreshold where is the upper wattage limit beyond which a warning is generated by the CMC. This value should be less than that of the Power Budget (see previous steps). Enabling Throttling to Maintain Power Budget NOTE: To perform power management actions, you must have Chassis Control Administrator privilege.
5 Select the Server Power Throttling Enabled check box. 6 Click Apply to save your changes. Using RACADM Open a Telnet/SSH text console to the CMC, log in, and type: racadm config -g cfgChassisPower -o cfgChassisServerPowerThrottling
6 Click Apply. A dialog box appears requesting confirmation. 7 Click OK to perform the power management action (for example, cause the system to reset). Using RACADM Open a Telnet/SSH text console to the CMC, log in, and type: racadm chassisaction -m chassis where is powerup, powerdown, powercycle, or reset. Executing Power Control Operations on an IOM You can remotely execute a reset or power cycle on an individual IOM.
Executing Power Control Operations on a Server NOTE: To perform power management actions, you must have Chassis Control Administrator privilege. The CMC enables you to remotely perform several power management actions, for example, an orderly shutdown, on an individual server in the chassis. Using the Web Interface 1 Log in to the CMC Web interface. 2 Expand Servers in the system tree, and then select the server on which you want to execute a power control operation. The Server Status page displays.
Using RACADM Open a Telnet/SSH text console to the CMC, log in, and type: racadm serveraction -m where specifies the server by its slot number (1–16) in the chassis, and indicates the operation you want to execute: powerup, powerdown, powercycle, or hardreset.
Using the iKVM Module Overview The local access KVM module for your Dell™ M1000e server chassis is called the Avocent® Integrated KVM Switch Module, or iKVM. The iKVM is an analog keyboard, video, and mouse switch that plugs into your chassis. It is an optional, hot-pluggable module to the chassis that provides local keyboard, mouse, and video access to the servers in the chassis, and to the active CMC’s command line.
The CMC identifies a slot by assigning it a unique name. To change slot names using the CMC Web interface, see "Editing Slot Names" on page 91. To change a slot name using RACADM, see "setslotname" on page 339. Video The iKVM video connections support video display resolutions ranging from 640 x 480 at 60 Hz up to 1280 x 1024 at 60 Hz. Plug and Play The iKVM supports Display Data Channel (DDC) Plug and Play, which automates video monitor configuration, and is compliant with the VESA DDC2B standard.
For example, if you have iKVM connections in the front panel and ACI, the front panel connection remains active while the ACI connection is disabled. If you have ACI and rear connections, the ACI connection takes precedence. Tiering Through the ACI Connection The iKVM allows tiered connections with servers and the iKVM’s CMC command line console, either locally through a Remote Console Switch port or remotely through the Dell RCS® software.
Table 9-1. OSCAR Keyboard and Mouse Navigation (continued) Key or Key Sequence Result Closes the current dialog box without saving changes and returns to the previous dialog box. In the Main dialog box, closes the OSCAR interface and returns to selected server. In a message box, it closes the pop-up box and returns to the current dialog box.
Configuring OSCAR Table 9-2 describes the features available from the OSCAR Setup menu for configuring your servers. Table 9-2. OSCAR Setup Menu Features Feature Purpose Menu Changes the server listing between numerically by slot or alphabetically by name. Security • Sets a password to restrict access to servers. • Enables a screen saver and set an inactivity time before the screen saver appears and set the screen save mode. Flag Changes display, timing, color, or location of the status flag.
To choose the default display order of servers in the Main dialog box: 1 Select Name to display servers alphabetically by name. or Select Slot to display servers numerically by slot number. 2 Click OK. To assign one or more key sequences for OSCAR activation: 1 Select a key sequence from the Invoke OSCAR menu. 2 Click OK. The default key to invoke OSCAR is .
To access the Flag dialog box: 1 Press . The Main dialog box appears. 2 Click Setup and then Flag. The Flag dialog box appears. To specify how the status flag displays: 1 Select Displayed to show the flag all the time or Displayed and Timed to display the flag for only five seconds after switching. NOTE: If you select Timed by itself, the flag is not displayed. 2 Select a flag color from the Display Color section. Options are black, red, blue, and purple.
• Standard USB pointing devices. • Self-powered USB 1.1 hubs connected to the local USB port on the iKVM. • Powered USB 2.0 hubs connected to the Dell M1000e chassis’ front panel console. NOTE: You can use multiple keyboards and mice on the iKVM local USB port. The iKVM aggregates the input signals. If there are simultaneous input signals from multiple USB keyboards or mice, it may have unpredictable results. NOTE: The USB connections are solely for supported keyboard, mouse, and USB hubs.
Viewing the Status of Your Servers The status of the servers in your chassis is indicated in the right columns of the Main dialog box. The following table describe the status symbols. Table 9-4. OSCAR Interface Status Symbols Symbols Description (Green dot.) Server is online. (Red X.) Server is offline or absent from chassis. (Yellow dot.) Server is not available. (Green A or B.) Server is being accessed by the user channel indicated by the letter: A=rear panel, B=front panel.
• To disconnect the user from a server: Press to access OSCAR and then click Disconnect. or Press and then <0>. This leaves you in a free state, with no server selected. The status flag on your desktop, if active, displays Free. See "Controlling the Status Flag" on page 230. Soft Switching Soft switching is switching between servers using a hotkey sequence.
Video Connections The iKVM has video connections on the front and rear panels of the chassis. The front panel connection signals take precedence over that of the rear panel. When a monitor is connected to the front panel, the video connection does not pass through to the rear panel, and an OSCAR message displays stating that the rear panel KVM and ACI connections are disabled.
Use the Security dialog box to lock your console with password protection, set or change your password, or enable the screen saver. NOTE: If the iKVM password is lost or forgotten, you can reset it to the iKVM factory default using the CMC Web interface or RACADM. See "Clearing a Lost or Forgotten Password" on page 238. Accessing the Security Dialog Box 1 Press . The Main dialog box appears. 2 Click Setup and the Security. The Security dialog box appears.
CAUTION: Monitor damage may result from the use of Energy mode with monitors not compliant with Energy Star. 5 Optional: To activate the screen saver test, click Test. The Screen Saver Test dialog box displays. Click OK to start the test. The test takes 10 seconds. When it concludes, you are returned to the Security dialog box. Logging In 1 Press to launch OSCAR. The Password dialog box appears. 2 Type your password and then click OK. The Main dialog box appears.
Enabling Screen Saver Mode With No Password Protection NOTE: If your console is password protected, you must first remove password protection. Follow the steps in the previous procedure before following the steps below. 1 Select Enable Screen Saver. 2 Type the number of minutes (1 through 99) that you want to delay activation of the screen saver. 3 Select Energy if your monitor is ENERGY STAR compliant; otherwise select Screen.
To reset a lost or forgotten iKVM password using the CMC Web interface: 1 Log in to the CMC Web interface. 2 Select iKVM from the Chassis submenu. 3 Click the Setup tab. The iKVM Configuration page displays. 4 Click Restore Default Values. You can then change the password from the default using OSCAR. See "Setting or Changing the Password" on page 236.
To display version information: 1 Press . The Main dialog box appears. 2 Click Commands and then Display Versions. The Version dialog box appears. The top half of the Version dialog box lists the subsystem versions in the appliance. 3 Click or press to close the Version dialog box. Scanning Your System In scan mode, the iKVM automatically scans from slot to slot (server to server).
or Click the Clear button to remove all servers from the Scan list. 2 Click the Add/Remove button, and then click OK. To start Scan mode: 1 Press . The Main dialog box appears. 2 Click Commands. The Command dialog box appears. 3 Select the Scan Enable box. 4 Click OK. A message appears indicating that the mouse and keyboard have been reset. 5 Click to close the message box. To cancel scan mode: 1 If OSCAR is open and the Main dialog box is displayed, select a server in the list.
To broadcast to servers: 1 Press . The Main dialog box appears. 2 Click Setup and then Broadcast. The Broadcast dialog box appears. NOTE: Broadcasting keystrokes: When using keystrokes, the keyboard state must be identical for all servers receiving a broadcast for the keystrokes to be interpreted identically. Specifically, the and modes must be the same on all keyboards.
Managing iKVM From the CMC Enabling or Disabling the Front Panel To enable or disable access to the iKVM from the front panel using RACADM, open a Telnet/SSH text console to the CMC, log in, and type: racadm config -g cfgKVMInfo -o cfgKVMFrontPanelEnable where is 1 (enable) or 0 (disable). For more information about the config subcommand, see "config" on page 290. To enable or disable access to the iKVM from the front panel using the Web interface: 1 Log in to the CMC Web interface.
Viewing the iKVM Status and Properties The local access KVM module for your Dell M1000e server chassis is called the Avocent® Integrated KVM Switch Module, or iKVM. For more information about iKVM, see "Using the iKVM Module" on page 225. To view the status of the iKVM: 1 Log in to the CMC Web interface. 2 Select iKVM in the system tree. 3 Click the Properties tab. 4 Click the Status sub-tab. The iKVM Status page displays. Table 9-5 provides descriptions of the information provided on the iKVM Status page.
Table 9-5. iKVM Status Information (continued) Item Description Rear Panel Connected Indicates whether the monitor is connected to the rear panel VGA connector (Yes or No). This information is provided to the CMC so it can determine whether a local user has rearpanel access to the chassis. Tiering Port Connected The iKVM supports seamless tiering with external KVM appliances from Dell and Avocent using built-in hardware.
To update the iKVM firmware using RACADM, open a Telnet/SSH text console to the CMC, log in, and type: racadm fwupdate -g -u -a -d -m kvm For example: racadm fwupdate -gua 192.168.0.10 -d ikvm.bin -m kvm For more information about the fwupdate subcommand, see "fwupdate" on page 296.
Table 9-6. Troubleshooting iKVM Problem Likely Cause and Solution The message "User has been disabled by CMC control" appears on the monitor connected to the front panel. The front panel connection has been disabled by the CMC. You can enable the front panel using either the CMC Web interface or RACADM. To enable the front panel using the Web interface: 1 Log in to the CMC Web interface. 2 Select iKVM in the system tree. 3 Click the Setup tab. 4 Select the Front Panel USB/Video Enabled check box.
Table 9-6. Troubleshooting iKVM (continued) Problem Likely Cause and Solution The message "User has been disabled as another appliance is currently tiered" appears on the monitor connected to the rear panel. A network cable is connected to the iKVM ACI port connector and to a secondary KVM appliance. The iKVM’s amber LED is blinking. There are three possible causes: Only one connection is allowed at a time. The ACI tiering connection has precedence over the rear panel monitor connection.
Table 9-6. Troubleshooting iKVM (continued) Problem Likely Cause and Solution My iKVM is tiered through the ACI port to an external KVM switch, but all of the entries for the ACI connections are unavailable. The front panel connection is enabled and has a monitor connected. Because the front panel has precedence over all other iKVM connections, the ACI and rear panel connectors are disabled. All of the states are showing a yellow dot in the OSCAR interface.
Table 9-6. Troubleshooting iKVM (continued) Problem Likely Cause and Solution In the OSCAR menu, the Dell CMC connection is displaying a red X, and I cannot connect to the CMC. There are two possible causes: The Dell CMC console has been disabled. In this case, you can enable it using either the CMC Web interface or RACADM. To enable the Dell CMC console using the Web interface: 1 Log in to the CMC Web interface. 2 Select iKVM in the system tree. 3 Click the Setup tab.
I/O Fabric Management The chassis can hold up to six I/O modules (IOMs), each of which can be pass-through or switch modules. The IOMs are classified into three groups: A, B, and C. Each group has two slots: Slot 1 and Slot 2. The slots are designated with letters, from left to right, across the back of the chassis: A1 | B1 | C1 | C2 | B2 | A2. Each server has slots for two mezzanine cards (MCs) to connect to the IOMs. The MC and the corresponding IOM must have the same fabric.
Figure 10-1 shows the location of IOMs in the chassis. The location of each IOM in the chassis is indicated by its group number (A, B, or C) and slot number (1 or 2). On the chassis, the IOM slot names are marked A1, A2, B1, B2, C1, or C2. Figure 10-1. Rear View of a Chassis, Showing the Location of the IOMs Slots A1, B1, C1 Slots C2, B2, A2 The CMC creates entries in both the hardware log and CMC logs for invalid hardware configurations.
NOTE: Fabric verification for server MCs is performed only when the chassis is powered on. When the chassis is on standby power, the iDRACs on the server modules remain powered off and thus are unable to report the server's MC fabric type. The MC fabric type may not be reported in the CMC user interface until the iDRAC on the server is powered on.
For information about the CMC and hardware logs, see "Viewing the Event Logs" on page 273. Fresh Power-up Scenario When the chassis is plugged in and powered up, the I/O modules have priority over the servers. The first IOM in each group is allowed to power up before the others. At this time, no verification of their fabric types is performed. If there is no IOM on the first slot of a group, the module on the second slot of that group powers up.
Table 10-1 provides descriptions of the information provided on the I/O Modules Status page. Table 10-1. I/O Modules Health Status Information Item Description Present Indicates whether the IOM is Present or Absent. Health OK Indicates that the IOM is present and communicating with the CMC. In the event of a communication failure between the CMC and the server, the CMC cannot obtain or display health status for the IOM.
Table 10-1. I/O Modules Health Status Information (continued) Item Description Power Status Indicates the power status of the IOM: On, Off, or N/A (Absent). Service Tag Displays the service tag for the IOM. The service tag a unique identifier provided by Dell for support and maintenance. Any change in health is logged to both the hardware and CMC log. For more information, see "Viewing the Event Logs" on page 273. NOTE: Passthroughs do not have service tags. Only switches have service tags.
Table 10-2. Item Health I/O Module Health Status Information (continued) Description OK Indicates that the IOM is present and communicating with the CMC. In the event of a communication failure between the CMC and the server, the CMC cannot obtain or display health status for the IOM. Informational Displays information about the IOM when no change in health status (OK, Warning, Severe) has occurred.
Table 10-2. I/O Module Health Status Information (continued) Item Description Location Indicates the location of the IOM in the chassis by group number (A, B, or C) and slot number (1 or 2). Slot names: A1, A2, B1, B2, C1, or C2. Power Status Indicates the power status of the IOM: On, Off, or N/A (Absent). Service Tag Displays the service tag for the IOM. The service tag a unique identifier provided by Dell for support and maintenance.
Troubleshooting and Recovery Overview This section explains how to perform tasks related to recovering and troubleshooting a problems on the remote system using the CMC Web interface.
5 Select the component or components for which you want to enable LED blinking. 6 Click Apply. Using RACADM Open a Telnet/SSH text console to the CMC, log in, and type: racadm setled -m [-l ] where specifies the module whose LED you want to configure. Configuration options: • server-n where n=1–16 • switch-n where n=1–6 • cmc-active and specifies whether the LED should blink.
Table 11-1. Chassis Events That Can Generate SNMP and E-mail Alerts (continued) Event Description Temperature Probe Failure The temperature is either too high or too low for proper operation. Redundancy Degraded Redundancy for the fans and/or power supplies has been reduced. Redundancy Lost No redundancy remains for the fans and/or power supplies. Power Supply Warning The power supply is approaching a failure condition. Power Supply Failure The power supply has failed.
3 Click the Alert Management tab. The Chassis Events page appears. 4 Enable alerting: a Select the check boxes of the events for which you want to enable alerting. To enable all events for alerting, select the Select All check box. b Click Apply to save your settings. 5 Click the Traps Settings sub-tab. The Chassis Event Alert Destinations page displays. 6 Type a valid IP address in an empty Destination IP Address field.
2 Enable alerting by typing: racadm config -g cfgAlerting -o cfgAlertingEnable 1 3 Specify the events for which you want the CMC to generate by typing: racadm config -g cfgAlerting -o cfgAlertingFilterMask where is a hex value between 0x0 and 0x003fffdf. To obtain the mask value, use a scientific calculator in hex mode and add the second values of the individual masks (1, 2, 4, etc.) using the key.
Table 11-2. Event Traps Filter Masks (continued) Event Filter Mask Value Server Failure 0x20000 KVM Absent 0x40000 KVM Failure 0x80000 IOM Absent 0x100000 IOM Failure 0x200000 4 Enable traps alerting by typing: racadm config -g cfgTraps -o cfgTrapsEnable 1 -i where is a value 1–4. The index number is used by the CMC to distinguish up to four configurable IP destinations for traps alerts.
To test an event trap for an alert destination: racadm testtrap -i where is a value 1–4 representing the alert destination you want to test. If you are unsure of the index number, type: racadm testtrap -i Configuring E-mail Alerts When the CMC detects a chassis event, such as an environmental warning or a component failure, it can be configured to send an e-mail alert to one or more e-mail addresses. Table 11-1 provides an overview of the events that trigger e-mail and SNMP alerts.
7 Click the Network/Security tab. The Network Configuration page appears. 8 Specify the SMTP server IP address: a Locate the SMTP (Email) Server IP Address field, and then type the SMTP address. NOTE: You must configure the SMTP e-mail server to accept relayed e-mails from the CMC's IP address, a feature which is normally turned off in most mail servers due to security concerns. For instructions as to how to accomplish this in a secure manner, refer to the documentation that came with your SMTP server.
where is a hex value between 0x0 and 0x003fffdf. Table 11-2 provides filter masks for each event type. For instructions on calclulating the hex value for the filter mask you want to enable, see step 3 on "Using RACADM" on page 262. 4 Enable e-mail alerting by typing: racadm config -g cfgEmailAlert -o cfgEmailAlertEnable 1 -i where is a value 1–4. The index number is used by the CMC to distinguish up to four configurable destination e-mail addresses.
First Steps to Troubleshooting a Remote System The following questions are commonly used to troubleshoot high-level problems in the managed system: 1 Is the system powered on or off? 2 If powered on, is the operating system functioning, crashed, or just frozen? 3 If powered off, did the power turn off unexpectedly? Monitoring Power and Executing Power Control Commands on the Chassis You can use the Web interface or RACADM to: • View the system’s current power status.
Using the Web Interface To view summaries of the chassis, CMCs, iKVM, and IOMs: 1 Log in to the CMC Web interface. 2 Select Chassis in the system tree. 3 Click the Properties tab. The Chassis Summary page displays. Table 11-3, Table 11-4, Table 11-5, and Table 11-6 describe the information provided. Table 11-3. Chassis Summary Item Description Name Displays the name of the chassis. The name identifies the chassis on the network.
Table 11-4. CMC Summary (continued) Item Description CMC Firmware Version Indicates the firmware version of the active or primary CMC. Firmware Last Updated Indicates when the firmware was last updated. If no updates have occurred, this property displays as N/A. CMC Hardware Version Indicates the hardware version of the active or primary CMC. IP Address Indicates the IP address of the CMC NIC. Gateway Indicates the gateway of the CMC NIC. Subnet Mask Indicates the subnet mask of the CMC NIC.
Table 11-5. iKVM Summary (continued) Item Description Part Number Displays the part number for the iKVM. The part number is a unique identifier provided by the vendor. Part number naming conventions differ from vendor to vendor. Firmware Version Indicates the firmware version of the iKVM. Hardware Version Indicates the hardware version of the iKVM. Power Status Indicates the power status of the iKVM: On, Off, N/A (Absent).
To view the IOM summary, type: racadm getioinfo Viewing Chassis and Component Health Status Using the Web Interface To view chassis and component health summaries: 1 Log in to the CMC Web interface. 2 Select Chassis in the system tree. The Component Health page displays. Health status for each component is indicated with an icon. Table 11-7 provides descriptions of each icon. Table 11-7.
Table 11-7. Item Health Status Indicators (continued) Description No Value Indicates that the component is absent from the slot, or the CMC cannot communicate with the component. NOTE: It is not possible for the chassis to be absent. Using RACADM Open a Telnet/SSH text console to the CMC, log in, and type: racadm modinfo Viewing the Event Logs The Hardware Log and CMC Log pages display system-critical events that occur on the managed system.
Using the Web Interface You can view, save a text file version of, and clear the hardware log in the CMC Web interface. Table 11-8 provides descriptions of the information provided on the Hardware Log page in the CMC Web interface. To view the hardware log: 1 Log in to the CMC Web interface. 2 Click Chassis in the system tree. 3 Click the Logs tab. 4 Click the Hardware Log sub-tab. The Hardware Log page displays. To save a copy of the hardware log to your managed station or network: Click Save As.
Table 11-8. Hardware Log Information Item Description Severity OK Indicates a normal event that does not require corrective actions. Informational Indicates an informational entry on an event in which the Severity status has not changed. Unknown Indicates a noncritical event for which corrective actions should be taken soon to avoid system failures. Warning Indicates a critical event requiring immediate corrective actions to avoid system failures.
Using the Web Interface You can view, save a text file version of, and clear the CMC log in the CMC Web interface. You can re-sort the log entries by Source, Date/Time, or Description by clicking the column heading. Subsequent clicks on the column headings reverse the sort. Table 11-9 provides descriptions of the information provided on the CMC Log page in the CMC Web interface. To view the CMC log: 1 Log in to the CMC Web interface. 2 Click Chassis in the system tree. 3 Click the Logs tab.
Using the Diagnostic Console The Diagnostic Console page enables an advanced user, or a user under the direction of technical support, to diagnose issues related to the chassis hardware using CLI commands. NOTE: To modify these settings, you must have Debug Command Administrator privilege. To access the Diagnostic Console page: 1 Log in to the CMC Web interface. 2 Click Chassis in the system tree. 3 Click the Troubleshooting tab. 4 Click the Diagnostics sub-tab. The Diagnostic Console page displays.
Table 11-10. Supported Diagnostic Commands (continued) Command Result gettracelog Displays the trace log (may take a few seconds to display the log). The gettracelog -i command returns the number of records in the trace log. The gettracelog -A command returns the trace log without the record numbers. NOTE: This command is for Dell internal use only. NOTE: For more information about the gettracelog command, see "gettracelog" on page 322.
Table 11-11.
Table 11-11.
Troubleshooting a Non-responsive CMC NOTE: It is not possible to log in to the standby CMC using a serial console. If you cannot log in to the CMC using any of the interfaces (the Web interface, Telnet, remote RACADM, or serial), you can verify CMC functionality by observing the LEDs on the CMC, obtaining recovery information using the DB-9 serial port, or recovering the CMC firmware image.
To obtain recovery information: 1 Install a NULL modem cable between the CMC and a client machine. 2 Open a terminal emulator of your choice (such as HyperTerminal or Minicom). Set up: 8 bits, no parity, no flow control, baud rate 115200. A core memory failure will display an error message every 5 seconds. 3 Press . If a recovery prompt appears, additional information is available. The prompt will indicate the CMC slot number and failure type.
recover ping 192.168.0.100 recover fwupdate -g -a 192.168.0.100 NOTE: Connect the network cable to the left most RJ45 NOTE: In recover mode, you cannot ping the CMC normally because there is no active network stack. The recover ping command allows you to ping to the TFTP server to verify the LAN connection. You may need to use the recover reset command after setniccfg on some systems.
Troubleshooting and Recovery
RACADM Subcommands ? and ? NOTE: To use this subcommand, you must have CMC Login User privilege. Description ? lists all of the subcommands you can use with the racadm command and a one-line description of each subcommand. ? displays the syntax for the specified command. NOTE: You can also use the help and help commands to obtain the same information.
clrraclog -- clear the CMC log clrsel -- clear the System Event Log (SEL) cmcchangeover -- Changes the redundant state of the CMC from active to standby and vice versa config -- modify CMC configuration properties LEDs on a module ...
Example • racadm arp Address HWtype HWaddress Flags Mask Iface 143.166.152.3 ether 00:07:84:A7:CE:BC C eth0 143.166.152.2 ether 00:07:84:7B:9F:FC C eth0 143.166.152.1 ether 00:00:0C:07:AC:0A C eth0 143.166.152.113 ether 00:15:C5:48:9C:1D C eth0 chassisaction NOTE: To use this subcommand, you must have Chassis Control Administrator privilege. Description Executes a power action on the chassis, iKVM, or a server.
Table A-1. chassisaction Subcommand Options (continued) Option Description Specifies the action you want to execute on the specified module. may be one of the following: • powerdown — (Chassis only) Powers down the chassis. • powerup — (Chassis only) Powers up the chassis. • powercycle — Power cycles the module. • nongraceshutdown — (Chassis only) Shutdown the chassis non-gracefully. • reset — Performs a hard reset of the module.
clrsel NOTE: To use this subcommand, you must have Clear Logs Administrator privilege. Description Removes all existing records from the system events log (SEL, or hardware log). A new log entry is added to record the date and time when the log was cleared, and the user who cleared the log. NOTE: To view the hardware log, use getsel. For information about the hardware log, see "Viewing the Hardware Log" on page 273. Usage racadm clrsel Output The SEL was cleared successfully.
config NOTE: To use this subcommand, you must have Chassis Configuration Administrator privilege. Description Sets the CMC configuration parameters individually or in a batch as part of a configuration file. If the data is different, that CMC object is written with the new value. Usage racadm config -g -o
Property Groups NOTE: Appendix B, "CMC Property Database Group and Object Definitions" on page 347, provides details about the property groups. See also "getconfig" on page 299. Table A-3 lists the property groups that can be specified with the -g option. . Table A-3.
Output The config subcommand generates error output when it encounters any of the following: • Invalid syntax, group name, object name, index, or other invalid database members • Insufficient user privileges • RACADM CLI failures • The config subcommand returns an indication of how many configuration objects were written out of how many total objects were in the .cfg file. Examples • racadm config -g cfgLanNetworking -o cfgNicIpAddress 10.35.10.
NOTE: This subcommand is valid only if the DHCP option is disabled for the specified server. When DHCP is enabled, the server automatically obtains an IP address, subnet mask, and gateway from the DHCP server. To determine whether DHCP is enabled for the server, use getniccfg (see "getniccfg" on page 309). To enable or disable DCHP, use setniccfg (see "setniccfg" on page 335).
Example • racadm deploy server-8 -s 192.168.0.20 255.255.255.0 192.168.0.1 The server was deployed successfully. feature NOTE: To use this subcommand, you must have Chassis Configuration Administrator privilege. Description Displays all active chassis features. The information displayed includes feature name, date activated, and the serial number of the SD card used to activate the feature.
• racadm feature -s Feature = FlexAddress Date Activated = 8 April 2008 - 10:39:40 Feature installed from SD card SN = 01122334455 featurecard NOTE: To use this subcommand, you must have Chassis Configuration Administrator privilege. Description Verifies proper SD card installation and displays SD card status. The table below lists the status messages returned by the command. Table A-6. Status Messages Returned by featurecard -s Command Status Message Actions No feature card inserted.
Usage racadm featurecard -s Options Table A-7 describes the featurecard subcommand options. Table A-7. featurecard Subcommand Options Option Description -s Lists active SD card features and SD card status. Example racadm featurecard -s • racadm featurecard -s The feature card inserted is valid and contains the following feature(s) FlexAddress: The feature card is bound to this chassis fwupdate NOTE: To use this subcommand, you must have Chassis Configuration Administrator privilege.
Usage racadm fwupdate -g -u -a -d [-m ] racadm fwupdate -s Options Table A-8 describes the fwupdate subcommand options. Table A-8. fwupdate Subcommand Options Option Description -d Specifies the source path where the firmware image resides. Default: local directory on CMC if '-g' option is absent. If '-g' is used, defaults to directory configured on the TFTP server -g Downloads the firmware update using the TFTP server.
TFTP firmware update has been initiated. This update process may take several minutes to complete. Firmware update complete. • racadm fwupdate -s -m cmc-active Firmware update in progress. getassettag NOTE: To use this subcommand, you must have CMC Login User privilege. Description Displays the asset tag for the chassis. Usage racadm getassettag [-m ] Options Table A-9 describes the getassettag subcommand options. Table A-9.
getchassisname NOTE: To use this subcommand, you must have CMC Login User privilege. Description Displays the name of the chassis. Usage racadm getchassisname Example • racadm getchassisname PowerEdge 2955 getconfig NOTE: To use this subcommand, you must have Chassis Configuration Administrator privilege. Description Displays CMC configuration parameters and allows you to save CMC configuration groups to a .cfg file.
Options Table A-10 describes the getconfig subcommand options. Table A-10. getconfig Subcommand Options Option Description -g Specifies the group containing the object that is to be set. Must be used with the -o option.Table A-11 lists the groups you can specify. -o Specifies the object name that is written with the string . Must be used with the -g option. -i Specifies a unique group name. Only valid for indexed groups.
Table A-11. Property Groups for the getconfig Subcommand (continued) Property Group Description cfgUserAdmin Configures CMC users. cfgEmailAlert Configures SMTP e-mail alerts. cfgSessionManagement Sets the maximum number of remote sessions allowed to connect to CMC at a time. cfgSerial Enables/disables and configures serial console. cfgNetTuning Configures CMC network tuning. cfgOobSnmp Enables/disables and configures SNMP traps for the CMC.
Examples: • racadm getconfig -g cfgLanNetworking Displays all of the configuration properties (objects) that are contained in the group cfgLanNetworking (see "cfgLanNetworking" on page 349). • racadm getconfig -f myrac.cfg Saves all group configuration objects from the CMC to myrac.cfg. • racadm getconfig -h Displays a list of the available configuration groups on the CMC. • racadm getconfig -u root Displays the configuration properties for the user named root.
switch-2 None OK switch-3 switch-4 None None OK OK switch-5 switch-6 None None OK OK server-1 server-2 server-3 server-4 server-5 server-6 server-7 server-8 server-9 server-10 server-11 server-12 server-13 server-14 server-15 server-16 Unsupported None None None None None None None None None None None None None None None Invalid OK OK OK OK OK OK OK OK OK OK OK OK OK OK OK Unsupported None None None None None None None None None None None None None
Options Table A-12 describes the getflexaddr subcommand options. Table A-12.
• Fabric-A ethernet disabled Fabric-B iSCSI enabled Fabric-C fiber channel enabled racadm getflexaddr -i 1 Slot-1 flexaddress enabled = 1 slot1-A1 00:1A:A0:FF:CE:8C 00:18:8B:FF:D9:BB(active) 00:1A:A0:FF:CE:8D 00:18:8B:FF:D9:BC(active) slot1-A2 00:1A:A0:FF:CE:8E 00:18:8B:FF:D9:BD(active) 00:1A:A0:FF:CE:8F 00:18:8B:FF:D9:BE(active) slot1-B1 00:1D:09:71:AF:20 00:18:8B:FF:D9:BF(active) 00:1D:09:71:AF:21 00:18:8B:FF:D9:C0(active) slot1-B2 00:1
OK switch-2 ON N/A N/A switch-3 None Not Present None Not Present None Not Present None Not Present None Not Present N/A N/A N/A switch-4 N/A N/A N/A switch-5 N/A N/A N/A switch-6 N/A N/A N/A N/A getkvminfo NOTE: To use this subcommand, you must have CMC Login User privilege. Description Displays iKVM module information. Usage racadm getkvminfo Example racadm getkvminfo KVM Present Avocent iKVM Switch 00.05.00.
Table A-13 describes the getled subcommand options. Table A-13. getled Subcommand Options Option Description -m Specifies the module whose LED settings you want to view.
Table A-14. getmacaddress Subcommand Options Option Description -m Specifies the module whose MAC address you want to view. may be one of the following: • chassis • server-n where n=1–16 • switch-n where n=1–6 Example racadm getmacaddress -m server-1 server1 00:01:44:56:22:CC 00:18:8B:FC:60:40 00:18:8B:FC:60:42 getmodinfo NOTE: To use this subcommand, you must have CMC Login User privilege.
Table A-15. getmodinfo Subcommand Options Option Description -m Specifies the module whose configuration and status information you want to view. The default command (no options) displays information about all major components in the chassis. may be any of the following values: • server-n where n=1–16 • switch-n where n=1–6 • CMC-n where n=1 (primary), 2 (standby) • fan-n where n=1–9 • ps-n where n=1–6 • kvm • chassis -A Suppresses headers and labels in the output.
Usage racadm getniccfg [-m ] Options Table A-16 describes the getniccfg subcommand options. Table A-16. getniccfg Subcommand Options Option Description -m Specifies the module whose network settings you want to view.
getpbinfo NOTE: To use this subcommand, you must have CMC Login User privilege. Description Displays power budget status information.
DC Power Allocated to Servers 1315 watts DC Power Allocated to Chassis Infrastructure 1439 watts Total DC Power Available for Allocation 4326 watts Standby DC Power Capacity 0 watts [Chassis Power Supply Status Table] PS1 Present Online PS2 Present Online PS3 Present Online PS4 Not Present Slot Empty PS5 Present Failed(No AC) PS6 Not Present Slot Empty = = = = 2360 watts 2360 watts 2360 watts N/A 2360 watts N/A [Server Module Power Allocation Table]
getraclog NOTE: To use this subcommand, you must have CMC Login User privilege. Description Displays the CMC log entries. The timestamp begins at midnight, January 1 and increases until the system boots. After the system boots, the system’s timestamp is used. Usage racadm getraclog [-i] racadm getraclog [-s ] [-c ] [-m] Options Table A-17 describes the getraclog subcommand options. Table A-17.
Apr 23 23:59:11 cmc : session close PID 3291 succeeds • racadm getraclog -i Total Records: 171 getractime NOTE: To use this subcommand, you must have CMC Login User privilege. Description Displays the date and time as currently set on the CMC. Usage racadm getractime [-d] [-z] Options Table A-18 describes the getractime subcommand options. Table A-18.
• racadm getractime -d 0051208201542.000000 getredundancymode NOTE: To use this subcommand, you must have CMC Login User privilege. Description Displays the redundancy status (Redundant or Non-Redundant) of the CMC. Usage racadm getredundancymode Example racadm getredundancymode Redundant getsel NOTE: To use this subcommand, you must have CMC Login User privilege. Description Displays the system event log (SEL, also called the hardware log) entries.
Options Table A-19 describes the getsel subcommand options. Table A-19. getsel Subcommand Options Option Description -s Specifies the starting record used for the display -c Provides the maximum count of entries to be returned. -i Displays the number of entries in the CMC log. -m Displays one screen of information at a time and prompts the user to continue to next screen (similar to the UNIX more command).
FanSpeed FanSpeed 1 2 Fan-1 Fan-2 OK OK 4768 4873 rpm rpm 2344 14500 2344 14500 FanSpeed FanSpeed 3 4 Fan-3 Fan-4 OK OK 4832 4704 rpm rpm 2344 14500 2344 14500 FanSpeed FanSpeed 5 6 Fan-5 Fan-6 OK OK 4833 4829 rpm rpm 2344 14500 2344 14500 FanSpeed FanSpeed 7 8 Fan-7 Fan-8 4719 1 rpm rpm 2344 14500 2344 14500 FanSpeed 9 Fan-9 4815 rpm 2344 14500 OK Not OK OK
Table A-20. getslotname Subcommand Options Option Description -i Specifies the ID of the slot. Legal values: 1–16 Example racadm getslotname -i 1 Webserver-1 getssninfo NOTE: To use this subcommand, you must have CMC Login User privilege. Description Displays information about an active user session, including user name, IP address (if applicable), and session type (for example, serial, SSH, or Telnet), and login date and time.
Table A-21. getssninfo Subcommand Options Option Description -u Limits the printed output to detailed session records for the specified user. -u * If an asterisk (*) is given as the user name, all users are listed. Summary information is not displayed when this option is specified. -A Suppresses headers and labels in the output.
Description Displays the service tag information, if present, for one or all modules on the chassis. Usage racadm getsvctag [-m ] Options Table A-22 describes the getsvctag subcommand options. Table A-22. getsvctag Subcommand Options Option Description (none) Displays service tags for all modules on the chassis (including the chassis). -m Displays the service tag for the specified module.
server-6 server-7 server-8 server-9 server-10 server-11 server-12 server-13 server-14 server-15 server-16 • N/A 0000014 N/A N/A N/A N/A 1234567 N/A racadm getsvctag -m switch-1 switch-1 ABC1234 getsysinfo NOTE: To use this subcommand, you must have CMC Login User privilege. Description Displays information related to the CMC. Usage racadm getsysinfo [-d] [-c] [-A] Options Table A-23. getsysinfo Subcommand Options Option Description -d Displays CMC information.
Example • racadm getsysinfo -c CMC Information: CMC Date/Time Tue, 01 May 2007 02:33:47 Primary CMC Version Standby CMC Version Last Firmware Update Thu, 01 May 2007 02:12:43 Hardware Version Current IP Address Current IP Gateway Current IP Netmask DHCP enabled MAC Address Current DNS Server 1 Current DNS Server 2 DNS Servers from DHCP Register DNS CMC Name DNS CMC Name Current DNS Domain • = = 1.3 (Build 06.12) = = = = = = = = = = = = = = 15 143.166.152.39 143.166.152.1 255.255.255.
Description Displays the diagnostic trace log for the CMC. The default output display shows the record number, timestamp, source, and description. The timestamp begins at midnight, January 1 and increases until the system boots. During system boot, the timestamp displays as . After the system boots, the system’s timestamp is used. Usage racadm gettracelog [-i] racadm gettracelog [-s ] [-c ] [-m] Options Table A-24 describes the gettracelog subcommand options. Table A-24.
rc = 10, file size = 0 Nov 28 04:40:52 cmc fupmuxd[150]: Start Status Op: priv=0x00000000 ID:[01 01 0x00] • racadm gettracelog -i Total Records: 275 help and help NOTE: To use this subcommand, you must have CMC Login User privilege. Description The help command lists all of the subcommands you can use with the racadm command and a one-line description of each subcommand. help displays the syntax for the specified command.
ifconfig NOTE: To use this subcommand, you must have Administrator privilege. Description Display network interface information. Usage racadm ifconfig Examples racadm ifconfig eth0 0F Link encap:Ethernet HWaddr 00:55:AB:39:10: inet addr:10.35.155.160 Bcast:10.35.155.25 Mask:255.255.255.0 UP BROADCAST RUNNING MULTICAST MTU:1500 M etric:1 RX packets:457405 errors:0 dropped:0 overru ns:0 frame:0 TX packets:16321 errors:0 dropped:0 overrun s:0 carrier:0 collisions:0 txqueuelen:0 RX bytes:51383270 (49.
Examples racadm netstat Kernel IP routing table Destination Gateway MSS Window irtt Iface 10.35.155.0 * 0 0 0 eth0 default 10.35.155.1 0 0 0 eth0 Genmask Flags 255.255.255.0 U 0.0.0.0 UG ping NOTE: To use this subcommand, you must have Administrator privilege. Description Send ICMP echo packets to a destination on the network. Usage racadm ping Examples racadm ping 10.9.72.252 PING 10.9.72.252 (10.9.72.252): 56 data bytes 64 bytes from 10.9.72.252: icmp_seq=0 ttl=121 time=2.
Description Displays diagnostic information for the CMC. Usage racadm racdump Example racadm racdump ===================================================== ========================== General System/RAC Information ===================================================== ========================== CMC Information: CMC Date/Time = Wed, 28 Nov 2007 11:55:49 PM Primary CMC Version = X08 Standby CMC Version = N/A Last Firmware Update = Wed Nov 21 21:37:56 2007 Hardware Version = 2 Current IP Address = 10.35.155.
Service Tag Chassis Name Chassis Location Power Status = = Dell Rack System = [UNDEFINED] = ON ===================================================== ========================== Session Information ===================================================== ========================== Type SSH User root IP Address 10.9.72.252 Login Date/Time 11/28/2007 23:40:53 KVM root 169.254.31.
PWR 1 PS-1 Online OK PWR PWR 2 3 PS-2 PS-3 Online Online OK OK PWR PWR 4 5 PS-4 PS-5 PWR 6 PS-6 Slot Empty Failed Slot Empty N/A OK N/A racreset NOTE: To use this subcommand, you must have Administrator privilege. Description Issues a soft or hard reset to the CMC. The reset event is written into the CMC log. When this command is executed without the hard option, racreset executes a soft reset. A hard reset performs a deep reset operation on the CMC.
Example • racadm racreset Executes a soft reset sequence on the CMC. • racadm racreset soft Executes a soft reset sequence on the CMC. • racadm racreset hard Executes a hard reset sequence on the CMC. racresetcfg NOTE: To use this subcommand, you must have Administrator privilege. NOTE: Power off the chassis before running this command. Description Removes all database property entries on the CMC or iKVM and restores the default factory configuration.
Table A-26. racreset Subcommand Options Option Description -m Specifies the module whose database properties you want to reset. may be any of the following: • chassis • kvm Default: chassis Example racadm racresetcfg -m kvm The configuration has initiated restoration to factory defaults. serveraction NOTE: To use this subcommand, you must have Administrator privilege. Description Executes a server reset, power-up, power-down, or powercycle on the specified server.
Table A-27. serveraction Subcommand Options (continued) Option Description Specifies the action. may be one of the following: • powerdown — Powers down the server. • powerup — Powers up the server. • powercycle — Issues a power-cycle operation on the server. The -w option can be used with powercycle. • graceshutdown — Shuts down the server gracefully. • hardreset — Performs a reset (reboot) operation on the server.
setassettag NOTE: To use this subcommand, you must have Administrator privilege. Description Sets the N-byte ASCII asset tag for the chassis. Usage racadm setassettag -m chassis Options Table A-28 describes the setassettag subcommand options. Table A-28. setassettag Subcommand Options Option Command -m Specifies the module whose asset tag you want to set.
NOTE: If the fabric type is determined to be Infiniband, the operation is canceled and the command returns an error. If the FlexAddress feature is not activated, the command will return an error. NOTE: The server must be powered off to change the slot state. All servers must be powered off to change the fabric state.
setled NOTE: To use this subcommand, you must have Administrator privilege. Description Sets the state (blinking or not blinking) of the LED on the specified module. Usage racadm setled -m -l Options Table A-30 describes the setled subcommand options. Table A-30. setled Subcommand Options Option -m Description Specifies the module whose LED you want to configure.
Description Sets the IP configuration for the specified module. Usage racadm setniccfg [-m ] [-d] [-o] [-s ] [-k ] racadm setniccfg [-m ] -d racadm setniccfg [-m ] -s racadm setniccfg [-m ] -o racadm setniccfg [-m ] -k [ ] Options Table A-31 describes the setniccfg subcommand options. Table A-31.
Table A-31. setniccfg Subcommand Options (continued) Option Description -o Disables the Ethernet management port completely. -k Specifies the speed and duplex for the NIC. • Speed: 10, 100, 1000 • Duplex: half, full • (no value supplied): Autonegotiate Examples • racadm setniccfg -s 143.166.152.39 143.166.152.1 255.255.255.0 OK • racadm setniccfg -k 100 full Speed and Duplex settings modified successfully. setractime NOTE: To use this subcommand, you must have Administrator privilege.
Table A-32. setractime Subcommand Options Option Description -d Sets the time in the string yyyymmddhhmmss.mmmmmmsoff where: • yyyy is a the year • mm is the month • dd is the day • hh is the hour • mm is the minutes • ss is the seconds • mmmmmm is the number of microseconds • s is a + (plus) sign or a - (minus) sign, which indicates the sign of the offset • off is the offset in minutes NOTE: The off is the offset in minutes from GMT and must be in 15minute increments. -z Sets the time zone.
Example The setractime subcommand supports dates ranging from 1/1/1970 00:00:00 through 12/31/2030 23:59:59. To set the date to October 24, 2007 at 3:02:30 PM PST: racadm setractime -l 20071024150230 -z PST8PDT The time was set successfully. setslotname NOTE: To use this subcommand, you must have Administrator privilege. NOTE: See "Editing Slot Names" on page 91 for rules for selecting slot names. Description Sets the name of a slot in the chassis.
setsysinfo NOTE: To use this subcommand, you must have Administrator privilege. Description Sets the name or location of the chassis. Usage racadm setsysinfo [-c chassisname|chassislocation] Option Table A-34 describes the setsysinfo subcommand options. Table A-34. setsysinfo Subcommand Options Option Description Indicates the N-byte ASCII chassis name or location. Example racadm setsysinfo -c chassisname "Dell Rack System" The chassis name was set successfully.
Options Table A-35 describes the sslcertdownload subcommand options. Table A-35. sslcertdownload Subcommand Options Option Description -t Specifies the type of certificate you want to download: 1 — server certificate 2 — Microsoft Active Directory certificate -f Specifies the local file path and file name where you want to save the certificate. Restrictions The sslcertdownload subcommand can only be executed from a remote client. Example racadm sslcertdownload -t 1 -f c:\cert\cert.
Options Table A-36 describes the sslcertupload subcommand options. Table A-36. sslcertupload Subcommand Options Option Description -t Specifies the type of certificate to upload: 1 — Server certificate 2 — Certificate authority-signed certificate -f Specifies the file name of the certificate to be uploaded. Restrictions The sslcertupload subcommand can only be executed from a local client. Example racadm sslcertupload -t 1 -f c:\cert\cert.
Table A-37. sslcertview Subcommand Options Option Description -t Specifies the type of certificate to view, either the Microsoft Active Directory certificate or server certificate. 1 — server certificate 2 — Microsoft Active Directory certificate -A Suppresses headers and labels in the output. Restrictions The sslcertupload subcommand can only be executed from a local client.
sslcsrgen NOTE: To use this subcommand, you must have Chassis Configuration Administrator privilege. Description Generates and downloads an SSL certificate signing request (CSR) from the CMC to your management station or shared network. You can use the CSR to create a custom SSL certificate for transactions on the CMC. Usage racadm sslcsrgen [-g] racadm sslcsrgen [-g] [-f ] racadm sslcsrgen [-s] Options Table A-38 describes the sslcsrgen subcommand options. Table A-38.
Restrictions The sslcsrgen subcommand can only be executed from a local client and cannot be used in the serial, Telnet, or SSH interface. Example • racadm sslcsrgen -s CSR generation in progress. • racadm sslcsrgen -g -f c:\csr\csrtest.txt The csr was generated successfully. testemail NOTE: To use this subcommand, you must have Test Alert User privilege. Description Sends a test e-mail from the CMC to a specified destination. NOTE: This command is valid only if e-mail alerts are enabled on the CMC.
testtrap NOTE: To use this subcommand, you must have Test Alert User privilege. Description Tests the CMC SNMP trap alerting feature by sending a test trap from the CMC to a specified destination trap listener on the network. NOTE: This command is valid only if SNMP alerts are enabled on the CMC. For more information about SNMP alerts, see "Configuring SNMP Alerts" on page 260. Usage racadm testtrap -i Options Table A-40 describes the testtrap subcommand options. Table A-40.
CMC Property Database Group and Object Definitions The CMC property database contains the configuration information for the CMC. Data is organized by associated object, and objects are organized by object group. The IDs for the groups and objects that the property database supports are listed in this section. Use the group and object IDs with the RACADM subcommands config (see "config" on page 290) and getconfig (see "getconfig" on page 299) to configure the CMC.
Synopsis racadm getconfig -g idRacInfo #idRacType Identifies the remote access controller type as the CMC. #idRacProductInfo Uses a text string to identify the product, for example, Chassis Management Controller. #idRacDescriptionInfo A text description of the RAC type. #idRacVersionInfo A string containing the current product firmware version. #idRacBuildInfo The current RAC firmware build version. #idRacName A user-assigned name that identifies the CMC.
cfgLanNetworking NOTE: Use this object with the config or getconfig subcommands. NOTE: To use this object property, you must have Chassis Configuration Administrator privilege. NOTE: You can configure any setting that is not preceded by the hash sign (#) in the output. To modify a configurable object, use the -o option. Description Displays information for and configures network related properties. Synopsis racadm getconfig -g cfgLanNetworking cfgNicEnable Enables or disables the CMC NIC.
cfgNicGateway Assigns a static gateway for the CMC IP address. This property is used only if cfgNicUseDhcp is set to 0 (false). • Legal value: A string representing a valid gateway. For example, 192.168.0.1. cfgDNSServersFromDHCP (Read/Write) NOTE: To modify this property, you must have Configure DRAC 5 permission. Specifies that the DNS server IP addresses should be assigned from the DHCP server on the network.
cfgDNSRacName Displays the CMC name. This parameter is used only if cfgDNSRegisterRac is set to 1 (true). • Configuration options: String of up to 63 alphanumeric characters and hyphens; must begin with a letter. For example: cmc-1, d-345. • Default: cmc- cfgDNSDomainName Displays the DNS domain name. This parameter displays only if cfgDNSDomainNameFromDHCP is set to 0 (false). • Configuration options: String of up to 254 alphanumeric characters and hyphens; must begin with a letter.
cfgDNSServer1=192.168.0.5 cfgDNSServer2=192.168.0.6 cfgDNSRacName=d-345 cfgDNSDomainName=dcfgDNSDomainNameFromDHCP=0 cfgDNSRegisterRac=0 cfgCurrentLanNetworking (read only) NOTE: Use this object with the getconfig subcommand. Description Displays the current CMC NIC properties.
# cfgDNSCurrentServer1 Displays the IP address for DNS server 1. # cfgDNSCurrentServer1 Displays the IP address for DNS server 2. # cfgDNSCurrentDomainName Displays the DNS domain name. Example racadm getconfig -g cfgCurrentLanNetworking # cfgNicCurrentIpAddress=143.166.152.116 # cfgNicCurrentNetmask=255.255.255.0 # cfgNicCurrentGateway=143.166.152.1 # cfgNicCurrentDhcpWasUsed=0 # cfgDNSCurrentServer1=192.168.0.5 # cfgDNSCurrentServer2=192.168.0.
cfgRhostsFwUpdateIpAddr The IP address of the network SMTP server. The SMTP server transmits e-mail alerts from the CMC (if the alerts are configured and enabled). Configuration options: A string representing a valid SMTP server IP address. For example, 192.168.0.55. Default: 0.0.0.0 cfgRhostsFwUpdatePath Specifies the TFTP path where the CMC firmware image file exists on the TFTP server. The TFTP path is relative to the TFTP root path on the TFTP server.
value of UserAdminEnable to 1, the right most digit of the UserAdminPrivilege will also become 1. On the other hand, if you change the right most digit of the UserAdminPrivilege to 0, the value of UserAdminEnable will become 0. NOTE: Use this object with the config or getconfig subcommands. NOTE: To use this object property, you must have Chassis Configuration Administrator privilege. NOTE: You can configure any setting that is not preceded by the hash sign (#) in the output.
cfgUserAdminPrivilege Specifies the role-based authority privileges for the user. The value is represented as a bitmask that allows for any combination of privileges values. Table B-1 describes the allowed bit masks. Table B-2 provides sample privileges bit masks for users with one or more privileges.
Table B-2. Sample Bit Masks for User Privileges User Privilege Privilege Bit Mask The user is not allowed to access the CMC. 0x00000000 The user can only log in to the CMC and view CMC and server configuration information. 0x00000001 The user can log in to and configure the CMC. 0x00000001 + 0x00000002 = 0x00000003 cfgEmailAlert NOTE: Use this object with the config or getconfig subcommands. NOTE: To use this object property, you must have Chassis Configuration Administrator privileges.
# cfgEmailAlertAddress Read only. Indicates the destination e-mail address for the e-mail alerts. Configuration options: E-mail address format, with a maximum length of 64 ASCII characters. Default: [null] cfgEmailAlertEmailName Specifies the name or other identifier associated with the destination e-mail address. The e-mail name can refer to an individual, group, location, department, etc. Configuration options: String of up to 32 characters.
Objects cfgSsnMgtWebserverTimeout Specifies the number of seconds after which an idle connection to the Web server is automatically terminated. Configuration range: 60–1920 seconds Default: 300 seconds cfgSsnMgtTelnetIdleTimeout Specifies the number of seconds after which an idle Telnet session is automatically terminated.
cfgSerial NOTE: Use this object with the config or getconfig subcommands. NOTE: To use this object property, you must have Chassis Configuration Administrator privilege. Description Displays information for and configures serial parameters. Objects cfgSerialBaudRate Sets the baud rate on the CMC serial port. Configuration options: 9600, 19200, 28800, 38400, 57600, 115200 Default: 115200 cfgSerialConsoleEnable Enables or disables the CMC serial console interface.
cfgSerialConsoleIdleTimeout The maximum number of seconds to wait before an idle serial session is disconnected. Configuration options: 0 (no timeout), 60–1920 Default: 300 cfgSerialConsoleNoAuth Enables or disables the CMC serial console login authentication. Configuration options: 0 (enabled), 1 (disabled) Default: 0 cfgSerialConsoleCommand Specifies a serial command that is executed after a user logs in to the serial console interface.
Example racadm getconfig -g cfgSerial cfgSerialBaudRate=115200 cfgSerialConsoleEnable=1 cfgSerialConsoleQuitKey=^\ cfgSerialConsoleIdleTimeout=1920 cfgSerialConsoleNoAuth=0 cfgSerialConsoleCommand="connect server-1" cfgSerialHistorySize=1000 cfgSerialTelnetEnable=0 cfgSerialSshEnable=1 cfgNetTuning NOTE: Use this object with the config or getconfig subcommands. NOTE: To use this object property, you must have Chassis Configuration Administrator privilege.
cfgNetTuningNicMtu Specifies the size in bytes of the maximum transmission unit used by the CMC NIC. Configuration range: 576–1500 Default: 1500 cfgNetTuningNicAutoneg Enables auto-negotiation of physical link speed and duplex. When enabled, auto-negotiation takes priority over values set in the cfgNetTuningNicSpeed and cfgNetTuningNicFullDuplex objects.
cfgOobSnmpAgentCommunity Sets the community string (identical to the community name) used for authentication. The community string acts as a password shared between different hosts over the network. This community string value must match with that of the other hosts for any kind of communication through SNMP. Example racadm getconfig -g cfgOobSnmp cfgOobSnmpTrapsEnable=1 cfgOobSnmpAgentCommunity=public cfgTraps NOTE: Use this object with the config or getconfig subcommands.
cfgTrapsCommunityName Sets the community string (identical to the community name) used for authentication. The community string acts as a password shared between different hosts over the network. This community string value must match with that of the other hosts for any kind of communication through SNMP.
• racadm config -g cfgAlerting -o cfgAlertingEnable 1 Object value modified successfully. cfgRacTuning NOTE: Use this object with the config or getconfig subcommands. NOTE: To use this object property, you must have Chassis Configuration Administrator privilege. NOTE: You can configure any setting that is not preceded by the hash sign (#) in the output. To modify a configurable object, use the -o option. Description Configures CMC tuning parameters.
cfgRacTuneHttpsPort Specifies the port number to use for HTTPS network communication with the CMC. Configuration range: 10–65535 Default: 443 cfgRacTuneTelnetPort Specifies the port number used for the CMC telnet interface. Configuration range: 10–65535 Default: 23 cfgRacTuneSshPort Specifies the port number used for the CMC SSH interface. Configuration range: 10–65535 Default: 22 cfgRacTuneIpRangeEnable Enables or disables the IP address Range validation feature of the CMC.
cfgRacTuneIpRangeMask Specifies the IP range mask property. Configuration options: A bitmask value that is applied left-justified bits. For example, 255.255.255.0. Default: 255.255.255.0 cfgRacTuneIpBlkEnable Enables or disables the IP address blocking feature of the CMC. Configuration options: 1 (true), 0 (false) Default: 0 cfgRacTuneIpBlkFailCount Sets the maximum number of login failures to occur in the window before the login attempts from the IP address are rejected.
cfgRacTuneTimezoneOffset Specifies the number of seconds’ difference from Coordinated Universal Time (UTC)/Greenwich Mean Time (GMT). This value is negative if current time zone is west of Greenwich. cfgRacTuneDaylightOffset Specifies the number of seconds of Daylight Savings included in the current time zone. This value is 0 if the time zone is not a Daylight Saving time zone.
NOTE: You must configure the properties in this group before you can generate a CSR from the CMC. For more information on generating certificate signing requests using RACADM, see "sslcsrgen" on page 344. cfgRacSecCsrKeySize Specifies the SSL asymmetric key size for the CSR. Configuration options: 512, 1024, 2048 Default: 1024 cfgRacSecCsrCommonName Specifies the CSR Common Name (CN). Configuration options: String of up to 254 characters.
Legal value: String of up to 254 characters. Default: [null] cfgRacSecCsrCountryCode Specifies the CSR Country Code (CC). Legal value: String of up to 254 characters. Default: [null] cfgRacSecCsrEmailAddr Specifies the CSR e-mail address. Legal value: String of up to 254 characters.
cfgADEnable Enables or disables Active Directory user authentication on the CMC. If this property is disabled, local CMC authentication is used for user logins instead. Configuration options: 1 (true), 0 (false) Default: 0 cfgADRacDomain Specifies the Active Directory domain on which the CMC resides. Configuration options: String of up to 254 characters with no spaces. Default: [null] cfgADRootDomain Specifies the root domain of the domain forest.
cfgADSpecifyServerEnable Allows you to enable/disable and specify an LDAP server or a global catalog server. Use cfgADDomainController or cfgADGlobalCatalog to specify the IP address. Configuration options: 1 (enabled), 0 (disabled) Default: 0 (disabled) cfgADDomainController Specifies the LDAP server from which you want the CMC to obtain user names. Must be used with cfgADSpecifyServerEnable. Legal value: Valid IP address or fully qualified domain name (FQDN).
NOTE: You can configure any setting that is not preceded by the hash sign (#) in the output. To modify a configurable object, use the -o option. Description Configures the Standard Schema settings for Active Directory. # cfgSSADRoleGroupIndex Read only. Displays the index of the Role Group as recorded in the Active Directory. Configuration range: 1–5 cfgSSADRoleGroupName Specifies the name of the Role Group as recorded in the Active Directory forest.
cfgChassisPower NOTE: Use this object with the config or getconfig subcommands. NOTE: To use this object property, you must have Chassis Configuration Administrator privilege. NOTE: You can configure any setting that is not preceded by the hash sign (#) in the output. To modify a configurable object, use the -o option. Description Displays information for and configures power for the chassis. # cfgChassisActualACPowerConsumption Read only.
# cfgChassisRedundantState Read only. Enables or disables power redundancy for the chassis. Values: 0 (none), 1 (full) cfgChassisMaxACPowerLimit Indicates the maximum power consumption limit (in watts) for the entire chassis. Configuration range: 2768–7928 watts Default: 7928 watts cfgChassisACPowerWarningThreshold Indicates the maximum amount of power (in watts) beyond which the CMC takes action to reduce power consumption.
# cfgChassisDCMaxPowerCapacity Read only. Indicates the total chassis power budget (in watts) available for chassis operation. # cfgChassisDCRedundancyReserve Read only. Indicates the amount of redundant power (in watts) in reserve that can be utilized in the event of an AC grid or PSU failure. This value is 0 if the Redundancy Policy is set to 0 (no redundancy). cfgChassisDCPowerServerAllocation Read only. Indicates (in watts) the cumulative power allocated to servers.
# cfgChassisPowerConsumptionClear Write only. To reset cfgChassisMinPowerConsumption and cfgChassisMAXPowerConsumption, set this object to 1. # cfgChassisPowerConsumptionClearTimestamp Read only. cfgChassisPowerButtonEnable Indicates if the chassis power button is enabled or disabled.
# cfgChassisPowerConsumptionClearTimestamp= 18:00:00 12/31/1969 cfgChassisPowerButtonEnable=1 • racadm config -g cfgChassisPower -o cfgChassisPowerConsumptionClear 1 Clears cfgChassisMinPowerConsumption and cfgChassisPeakPowerConsumption. cfgServerInfo NOTE: Use this object with the config or getconfig subcommands. NOTE: To use this object property, you must have Chassis Configuration Administrator privilege. NOTE: You can configure any setting that is not preceded by the hash sign (#) in the output.
Read only. Displays the BMC MAC address of the specified server. # cfgServerNic1MacAddress Read only. Displays the MAC address of the server NIC. # cfgServerNic2MacAddress Read only. Displays the MAC address of the server NIC. cfgServerPriority Sets the priority level allotted to the server in the chassis for power budgeting purposes. Configuration range: 1–9 in descending priority, where 1 holds the highest priority Default: 1 cfgServerNicEnable Enables or disables LAN channel.
cfgServerPriority=9 cfgServerNicEnable=1 cfgServerIPMIOverLanEnable=1 cfgKVMInfo NOTE: Use this object with the config or getconfig subcommands. NOTE: To use this object property, you must have Chassis Configuration Administrator privilege. NOTE: You can configure any setting that is not preceded by the hash sign (#) in the output. To modify a configurable object, use the -o option. Description Displays information for and configures the iKVM.
CMC Property Database Group and Object Definitions
Using the LCD Panel Interface You can use the LCD panel to perform configuration and diagnostics, and to obtain status information about the chassis and its contents. LCD Navigation Use the buttons to the right of the LCD screen to operate the LCD panel. The up, down, left, and right arrow buttons change the selected menu items or icons on the screen. The selected item is shown with a light blue background or border. The center button activates the selected item.
• Server — displays status information for servers. • Enclosure — displays status information for the chassis. 1 Use the up and down arrow buttons to highlight an item. 2 Press the center button to activate your selection. LCD Setup Menu The LCD Setup menu displays a menu of items that can be configured: • Language Setup — choose the language you want to use for LCD screen text and messages. • Default Screen — choose the screen that displays when there is no activity on the LCD panel.
The currently active default screen is highlighted in light blue. 1 Use the up and down arrow buttons to highlight the screen you want to set to the default. 2 Press the center button. The Accept icon is highlighted. 3 Press the center button again to confirm the change. The LCD Setup menu is displayed. Graphical Server Status Screen The Graphical Server Status screen displays icons for each server installed in the chassis and indicates the general health status for each server.
Graphical Module Status Screen The Graphical Module Status screen displays all modules installed in the rear of the chassis and provides summary health information for each module.
Module Status Screen The Module Status screen displays information and error messages about a module. See "LCD Module and Server Status Information" on page 402 and "LCD Error Messages" on page 392 for messages that can appear on this screen. Use the up and down arrow keys to move through messages. Use the left and right arrow keys to scroll messages that do not fit on the screen. Highlight the Back icon and press the center button to return to the Graphical Module Status screen.
By following the blinking amber icons down through the LCD menu system, you can display the status screen and error messages for the item that has the problem. Error messages on the LCD panel can be removed by removing the module or server that is the cause of the problem or by clearing the hardware log for the module or server. For server errors, use the iDRAC Web interface or command line interface to clear the server’s System Event Log (SEL).
Figure C-1.
Symptom Issue Recovery Action Alert screen message "CMC Not Responding" and LED is blinking amber Loss of communication from CMC to the LCD front panel Check that the CMC is booting; then, reset the CMC using GUI or RACADM commands Alert screen message LCD front panel stuck in "CMC Not Responding" boot block during a CMC and LED is solid amber or failover is off Disconnect and reconnect the front panel circuit board to the I/O panel cable from front panel.
Symptom Issue Recovery Action Blank LCD and LED off The front panel circuit board cable or the I/O panel cable are not connected properly, or one or both are faulty. Review the hardware log using the GUI or RACADM commands.
LCD Error Messages Table C-2. CMC Status Screens Severity Message Cause Critical CMC Battery: Battery CMC CMOS battery is missing or sensor for CMC, failed was no voltage. asserted Critical CMC CPU Temp: Temperature sensor for CMC, failure event Critical CMC Ambient Temp: CMC Ambient temperature Temperature sensor for CMC, exceeded the critical threshold. failure event CMC CPU temperature exceeded the critical threshold. Table C-3.
Table C-3. Enclosure/Chassis Status Screen (continued) Severity Message Cause Critical CMC Standalone: CMC no longer redundant. Micro Controller sensor for CMC, NOTE: This will only show if the non-redundant was asserted standby CMC was removed or has failed. Critical Chassis Eventlog CEL: Event Log The CMC cannot log events.
Table C-6. iKVM Status Screen Severity Message Cause Warning Local KVM Health: Module sensor Minor failure, such as corrupted for Local KVM, transition to non- firmware. critical from OK was asserted Critical Local KVM Health: Module sensor USB host enumeration failure or for Local KVM, transition to OSCAR failure. critical from less severe was asserted NonLocal KVM Health: Module sensor Serial RIP failure or USB host chip Recoverable for Local KVM, transition to non- failure.
Table C-8. Server Status Screen (continued) Severity Message Cause Warning System Board System Level: Current sensor for System Board, warning event Current crossed a warning threshold. Critical System Board System Level: Current sensor for System Board, failure event Current crossed a failing threshold. Critical CPU : Voltage sensor for CPU , state asserted was asserted Critical System Board
Table C-8. Server Status Screen (continued) Severity Message Cause Critical Mezz B Status: Add-in Card sensor for Mezz B , install error was asserted Incorrect Mezzanine card installed for I/O fabric. Critical Mezz C Status: Add-in Card sensor for Mezz C , install error was asserted Incorrect Mezzanine card installed for I/O fabric. Critical Backplane Drive : Drive Slot sensor for Backplane, drive removed Storage Drive was removed.
Table C-8. Server Status Screen (continued) Severity Message Cause Critical System Board SEL: Event Log sensor for System Board, log full was asserted The SEL device detects that only one entry can be added to the SEL before it is full. Warning ECC Corr Err: Memory sensor, correctable ECC () was asserted Correctable ECC errors reach a critical rate. Critical ECC Uncorr Err: Memory sensor, uncorrectable ECC () was asserted An uncorrectable ECC error was detected.
Table C-8. Server Status Screen (continued) Severity Message Cause NonCPU Machine Chk: Processor Recoverable sensor, transition to nonrecoverable was asserted The processor machine check entered a non-recoverable state. Critical Memory Spared: Memory sensor, redundancy lost () was asserted Memory spare is no longer redundant. Critical Memory Mirrored: Memory sensor, Mirrored Memory is no longer redundancy lost (
Table C-8. Server Status Screen (continued) Severity Message Cause Critical Mem ECC Warning: Memory sensor, transition to critical from less severe () was asserted Correctable ECC errors have reached a rate. Critical System Board POST Err: POST sensor for System Board, POST fatal error was asserted See Hardware Service Manual for BIOS POST addition error information.
Table C-8.
Table C-8.
LCD Module and Server Status Information The tables in this section describe status items that are displayed on the front panel LCD for each type of component in the chassis. Table C-9. CMC Status Item Description Name/Location Example: CMC1, CMC2 Error Messages If no error then "No Errors" is shown; otherwise error messages are listed, critical errors first, then warnings. IP Address Only shows on active CMC. MAC Address Only shows on active CMC. Firmware Version Only shows on active CMC.
Table C-11. Fan Status Item Description Name/Location Example: Fan1, Fan2, etc. Error Messages If no error then "No Errors" is shown; otherwise error messages are listed, critical errors first, then warnings. RPM Current fan speed in RPM Table C-12. PSU Status Item Description Name/Location Example: PSU1, PSU2, etc. Error Messages If no error then "No Errors" is shown; otherwise error messages are listed, critical errors first, then warnings.
Table C-14. iKVM Status Item Description Name iKVM Error Messages If no error then "No Errors" is shown; otherwise error messages are listed, critical errors first, then warnings. Status Off or On Model/Manufacture A description of the iKVM model. Service Tag The factory-assigned service tag. Part Number The manufacturer part number. Firmware Version The iKVM firmware version. Table C-15. Server Status Item Description Name/Location Example: Server 1, Server 2.
Table C-15. Server Status (continued) Item Description FlexAddress enabled Only shows if feature is installed.
Using the LCD Panel Interface
Glossary Active Directory Active Directory is a centralized and standardized system that automates network management of user data, security, and distributed resources, and enables interoperation with other directories. Active Directory is designed especially for distributed networking environments. ARP Address resolution protocol, a method for finding a host’s Ethernet address from its Internet address.
applicant that uniquely identifies that applicant for transactions over networks and on the Internet. CD Compact disc Certificate Signing Request (CSR) A digital request to a certificate authority for a secure server certificate. CLI Command Line interface DHCP Dynamic host configuration protocol, a means of dynamically allocating IP addresses to computers on a local area network.
FQDN Fully qualified domain name, a domain name that specifies a module’s absolute position in the DNS tree hierarchy. Microsoft® Active Directory® only supports an FQDN of 64 bytes or fewer. FSMO Flexible single master operation, a Microsoft Active Directory domain controller task that guarantees atomicity of an extension operation. GMT Greenwich Mean Time. GMT is the standard time common to every place in the world.
IPMB Intelligent platform management bus, which is used in systems management technology. Kbps Kilobits per second, a data transfer rate. LAN Local area network LDAP Lightweight directory access protocol LED Light-emitting diode LOM Local area network on motherboard MAC Media access control, a network sublayer between a network node and the network physical layer. MAC address Media access control address, a unique address embedded in the physical components of a NIC.
NIC Network interface card, an adapter circuit board installed in a computer to provide a physical connection to a network. OID Object identifier OSCAR On Screen Configuration and Reporting, a graphical user interface used for iKVM access. PCI Peripheral component interconnect, a standard interface and bus technology for connecting peripherals to a system and for communicating with those peripherals.
SEL System event log SMTP Simple mail transfer protocol, used to transfer electronic mail between systems— usually over an Ethernet. SNMP Simple network management protocol, designed to manage nodes on an IP network. iDRACs are SNMP-managed devices (nodes). SNMP trap A notification (event) generated by the CMC that contains information about state changes on the managed system or about potential hardware problems.
UTC Universal Coordinated Time. See GMT. vKVM Virtual keyboard-video-mouse console VLAN Virtual local area network VNC Virtual network computing VT-100 Video Terminal 100, which is used by the most common terminal emulation programs.
Glossary
Index A cfgAlerting, 365 ACI, 227 CMC configuring, 183, 190 creating a configuration file, 81 downloading firmware, 48 feature sets, 23 installing, 33 log, 275 redundant environment, 51 setting up, 33 Active Directory, 167-194 adding CMC users, 180 configuring access to the CMC, 173 configuring and managing certificates, 117 extending schemas, 173 objects, 169 schema extensions, 168 using with standard schema, 187 command line console features, 53 adding SNMP alerts, 260 configuration file creating,
firmware downloading, 48 managing, 138 FlexAddress, 151 activating, 152 activation verification, 153 configuring using CLI, 156 deactivating, 155 license agreement, 163 Linux configuration, 157 troubleshooting, 158 viewing status using CLI, 156 Wake-On-LAN, 157 frequently asked questions managing and recovering a remote system, 148 using the CMC with Active Directory, 194 H hardware log, 273 iKVM, 225 installing CMC, 33 L LDC panel configuring CMC from, 48 logs CMC, 275 hardware, 273 M managed system ac
P parsing rules, 83 power budgeting configuring, 48 power conservation, 201 property database groups cfgActiveDirectory, 371 cfgChassisPower, 375 cfgCurrentLanNetworking, 352 cfgEmailAlert, 357 cfgKVMInfo, 381 cfgLanNetworking, 349 cfgNetTuning, 362 cfgOobSnmp, 363 cfgRacSecurity, 369 cfgRacTuning, 366 cfgRemoteHosts, 353 cfgSerial, 360 cfgServerInfo, 379 cfgSessionManagement, 358 cfgStandardSchema, 373 cfgTraps, 364 cfgUserAdmin, 354 displayable characters, 347 idRacInfo, 347 proxy server, 36 R RAC see Re
RACADM subcommands (continued) getsysinfo, 321 gettracelog, 322 help, 324 ifconfig, 325 racdump, 326 racreset, 329 racresetcfg, 330 serveraction, 331 setchassisname, 332 setflexaddr, 333 setled, 335 setniccfg, 335 setractime, 337 setslotname, 339 setsysinfo, 340 sslcertdownload, 340 sslcertupload, 341 sslcertview, 342 sslcsrgen, 344 testemail, 345 testtrap, 346 racadm utility configuring network properties, 72 parsing rules, 83 subcommands, 285 Red Hat Enterprise Linux configuring for serial console redirec
T telnet console using, 63 W web browser configuring, 35 supported browsers, 27 web interface accessing, 87 configuring email alerts, 265 WS-Management, 28 Index 419
Index