Chassis Management Controller Version 1.
Notes, Cautions, and Warnings NOTE: A NOTE indicates important information that helps you make better use of your computer. CAUTION: A CAUTION indicates either potential damage to hardware or loss of data and tells you how to avoid the problem. WARNING: A WARNING indicates a potential for property damage, personal injury, or death. Copyright © 2014 Dell Inc. All rights reserved. This product is protected by U.S. and international copyright and intellectual property laws.
Contents 1 Overview............................................................................................................... 13 What Is New In This Release............................................................................................................... 14 Key Features.........................................................................................................................................14 Management Features.................................................................
Configuring Initial CMC Network................................................................................................. 30 Interfaces and Protocols to Access CMC.......................................................................................... 34 Launching CMC Using Other Systems Management Tools........................................................ 36 Downloading and Updating CMC Firmware......................................................................................
Enabling or Disabling Warning Message to Change Default Login Password Using RACADM........................................................................................................................................ 48 4 Updating Firmware............................................................................................ 49 Downloading CMC Firmware.............................................................................................................
Viewing Information and Health Status of All Servers....................................................................... 65 Viewing Health Status and Information for Individual Server............................................................65 Viewing Information and Health Status of the IOM.......................................................................... 66 Viewing Information and Health Status For Individual I/O Module..................................................
Chassis Group Inventory and Firmware Version..........................................................................84 Viewing Chassis Group Inventory ............................................................................................... 84 Viewing Selected Chassis Inventory Using Web Interface.......................................................... 84 Viewing Selected Server Component Firmware Versions Using Web Interface........................ 84 Configuring Multiple CMCs Using RACADM.......
Configuring CMC To Send Alerts.................................................................. 104 Enabling Or Disabling Alerts............................................................................................................. 104 Enabling Or Disabling Alerts Using CMC Web Interface........................................................... 104 Enabling Or Disabling Alerts Using RACADM.............................................................................104 Filtering Alerts.............
Configuring CMC SSO Or Smart Card Login For Active Directory Users Using RACADM.......138 11 Configuring CMC to Use Command Line Consoles................................. 139 CMC Command Line Console Features.......................................................................................... 139 CMC Command Line Interface Commands.............................................................................. 139 Using Telnet Console With CMC.............................................................
Managing Power Control Operation for I/O Modules.................................................................... 164 Enabling or Disabling LED Blinking for I/O Modules....................................................................... 164 14 Managing and Monitoring Power................................................................165 Redundancy Policies.........................................................................................................................
Executing Power Control Operations on IOM Using CMC Web Interface...............................180 Executing Power Control Operations on the IOM Using RACADM..........................................180 15 Managing Chassis Storage............................................................................ 181 Viewing Status of the Storage Components.................................................................................... 181 Viewing the Storage Topology..........................................
Supported Interfaces...................................................................................................................195 Downloading SNMP Management Information Base (MIB) File................................................196 First Steps to Troubleshoot a Remote System.................................................................................196 Power Troubleshooting..............................................................................................................
Overview 1 The Dell Chassis Management Controller (CMC) for Dell PowerEdge VRTX is a Systems Management hardware and software solution for managing the PowerEdge VRTX chassis. The CMC has its own microprocessor and memory and is powered by the modular chassis into which it is plugged.
– I/O fabric consistency checks between the I/O module and servers. CMC also disables components, if necessary, to protect the system hardware. – User access security. – Storage components, including the fault-tolerant mode for the storage controllers. – PCIe slots. You can configure CMC to send email alerts or SNMP trap alerts for warnings or errors such as temperature, hardware misconfiguration, power outage, fan speed, and blowers.
• • • • • • • • • • • FlexAddress feature — Replaces the factory-assigned World Wide Name/Media Access Control (WWN/ MAC) IDs with chassis-assigned WWN/MAC IDs for a particular slot, an optional upgrade. Graphical display of chassis component status and health. Support for single and multi-slot servers. LCD iDRAC configuration wizard supports for iDRAC network configuration. iDRAC single sign-on. Network time protocol (NTP) support. Enhanced server summary, power reporting, and power control pages.
Item Indicator, Button, or Connector 1 Status/identification indicator (CMC 1) 2 Power indicator (CMC 1) 3 CMC connector ports (2) 4 Power indicator (CMC 2) 5 Status/identification indicator (CMC 2) A Back Panel view of the chassis is given here with a table that lists the parts and devices available in the CMC.
Item Indicator, Button, or Connector 4 CMC GB Ethernet port (CMC-1) 5 Serial Connector 6 Blower modules (4) 7 I/O module ports 8 PSU 4 9 PSU 3 10 PSU 1 11 PSU 2 A Front Panel view of the chassis is given here with a table that lists the parts and devices available in the CMC. Figure 1. Front-Panel Features And Indicators—3.
Ite m Indicator, Button, or Connector Description 1 USB connectors (2) Allows a keyboard and mouse to be connected to the system. 2 LCD panel Provides system information and status, and error messages to indicate when the system is operating correctly or when the system needs attention. 3 LCD menu scroll buttons (4) Moves the cursor in one-step increments. 4 Selection ("check") button Selects and saves an item on the LCD screen and moves to the next screen.
Connection Features • • • Support for binary interchange for applications specifically designed to communicate with a binary protocol to a particular type of I/O Module. Serial port can be connected internally to the serial console of a server, or I/O module, using the connect (or racadm connect) command. Provides access only to the active CMC. Supported Platforms CMC supports modular servers designed for the PowerEdge VRTX platform.
Acquiring Licenses Use any of the following methods to acquire the licenses: • E-mail — License is attached to an e-mail that is sent after requesting it from the technical support center. • Self-service portal — A link to the Self-Service Portal is available from CMC. Click this link to open the licensing Self-Service Portal on the internet from where you can purchase licenses. For more information, see the online help for the self-service portal page.
License/ Component state or condition Import Export Delete Replace Learn More Non-administrator login Yes No No No Yes Active license Yes Yes Yes Yes Yes Expired license No Yes Yes Yes Yes License installed but component missing No Yes Yes No Yes Managing Licenses Using CMC Web Interface To manage the licenses using the CMC Web interface, go to Chassis Overview → Setup → Licenses.
WS-MAN Yes Yes SNMP Yes Yes Telnet Yes Yes SSH Yes Yes Web-based Interface Yes Yes Email Alerts Yes Yes LCD Deployment Yes Yes Extended iDRAC Management Yes Yes Remote Syslog No Yes Directory Services No* Yes iDRAC Single Sign-On No Yes Two-Factor Authentication No Yes PK Authentication No Yes Remote File Share Yes Yes Slot Resource Management No Yes Enclosure-level power capping No* Yes *For non-default power cap setting, only Restore Power Cap is allowed wit
FlexAddress Enablement No* Yes *For non-default FlexAddress settings, only Restore Default is allowed with Express license. Restore Default will reset the FlexAddress settings to the factory default. PCIe Adapter Mapping Yes* Yes *A maximum of two PCIe Adapters can be assigned per Server with Express License. Virtual Adapter to Slot Mapping No* Yes *For non-default mapping of Virtual Adapters, only Default mapping is allowed with an Express license.
• The Chassis Management Controller Version 1.0 for Dell PowerEdge VRTX RACADM Command Line Reference Guide provides information about using the VRTX–related RACADM features. • The Dell Chassis Management Controller (CMC) for Dell PowerEdge VRTX Version 1.00 Release Notes provides last-minute updates to the system or documentation or advanced technical reference material intended for experienced users or technicians.
• Using the following links: – For all Systems Management documents — dell.com/softwaresecuritymanuals – For Remote Enterprise Systems Management documents — dell.com/esmmanuals – For Enterprise Systems Management documents — dell.com/openmanagemanuals – For Client Systems Management documents — dell.com/clientsystemsmanagement – For Serviceability Tools documents — dell.com/serviceabilitytools – For OpenManage Connections Enterprise Systems Management documents — dell.
Installing and Setting Up CMC 2 This section provides information about how to install your CMC hardware, establish access to CMC, configure your management environment to use CMC, and guides you through the tasks for configuring a CMC: • • • • Set up initial access to CMC. Access CMC through a network. Add and configure CMC users. Update CMC firmware. For more information about installing and setting up redundant CMC environments, see Understanding Redundant CMC Environment.
8. Provide each iDRAC with an IP address in the CMC web interface, and enable the LAN and IPMI interface. NOTE: iDRAC LAN interface on some servers are disabled by default. This information can be found on the CMC web interface under Server Overview → Setup. This might be an advanced license option; in which case you must use the SetUp feature for each server). 9. Provide the IO module with an IP address in the CMC web interface.
5. For help about the RACADM command, type racadm help after you run the previous commands. For more information about RACADM, see the Chassis Management Controller for Dell PowerEdge VRTX RACADM Command Line Reference Guide. NOTE: When using the RACADM remote capability, you must have the 'write' permission on the folders where you are using the RACADM subcommands, involving the file operations. For example, racadm getconfig -f . Uninstalling RACADM From a Linux Management Station 1.
5. In the Exceptions section, add the addresses for CMCs and iDRACs on the management network to the semicolon-separated list. You can use DNS names and wildcards in your entries. Mozilla FireFox To edit the exception list in Mozilla Firefox version 19.0: 1. Start Mozilla Firefox. 2. Click Tools → Options (for systems running on Windows), or click Edit → Preferences (for systems running on Linux). 3. Click Advanced, and then click the Network tab. 4. Click Settings. 5.
Enabling Animations In Internet Explorer When transferring files to and from the web interface, a file transfer icon spins to show transfer activity. While using Internet explorer, you have to configure the browser to play animations. To configure Internet Explorer to play animations: 1. Start Internet Explorer. 2. Click Tools → Internet Options → Advanced. 3. Go to the Multimedia section, and then select the Play animations in web pages option.
• Command line interfaces (CLIs) such as a serial console, Telnet, SSH, or the Dell CMC console. • Remote RACADM • CMC web interface • LCD Panel interface CMC supports both IPv4 and IPv6 addressing modes. The configuration settings for IPv4 and IPv6 are independent of each other. Configuring CMC Network Using LCD Panel Interface You can use the LCD panel interface to set up the CMC network.
NOTE: To skip the CMC configuration navigate to the ‘X’ icon and then press the center button. 3. If you are asked to select an appropriate network speed, select a network speed (Auto (1Gb), 10Mb, or 100Mb) using appropriate buttons. For effective network throughput, the network speed setting must match your network configuration. Setting the network speed lower than the speed of your network configuration increases bandwidth consumption and slows down the network communication.
• Yes: Select the check icon then press the center button. You can also configure iDRAC from the CMC web interface. 12. On the Protocol panel, select the IP type that you want to use for the servers: • IPv4 — The options DHCP or Static are displayed. • Both — The options DHCP or Static are displayed. • IPv6 — The iDRAC Configuration panel is displayed. Go to step 15. 13. Select DHCP or Static.
to automatically deploy the server using the previously-configured network settings policies. If you do not want to apply the iDRAC network settings to newly-installed servers, select the ‘X’ icon and press the center button. When a new server is inserted in the chassis, the iDRAC network settings do not get configured. 17. On the iDRAC Configuration panel, the following message is displayed. Apply All Enclosure Settings? To apply all enclosure settings, select the check icon and press the center button.
Interface Description • • • Telnet View alerts and CMC IP. Set DHCP. Configure CMC static IP settings. Provides command line access to CMC through the network. The RACADM command line interface and the connect command, which is used to connect to the serial console of a server or IO module, are available from the CMC command line. NOTE: Telnet is not a secure protocol and is disabled by default. Telnet transmits all data, including passwords in plain text.
Interface Description For client connection using Microsoft WinRM, the minimum required version is 2.0. For more information, refer to the Microsoft article, . NOTE: The default values of CMC user name and password are root and calvin respectively. Launching CMC Using Other Systems Management Tools You can also launch CMC from the Dell Server Administrator or Dell OpenManage Essentials.
Setting Date and Time on CMC Using CMC Web Interface To set the date and time on CMC: 1. In the left pane, click Chassis Overview → Setup → Date/Time. 2. To synchronize the date and time with a Network Time Protocol (NTP) server, on the Date/Time page, select Enable NTP and specify up to three NTP servers. To manually set the date and time, clear the Enable NTP option, and then edit the Date and Time fields. 3. Select the Time Zone from the drop-down menu, and then click Apply.
• switch-1 • cmc-active and specifies whether or not the LED should blink. Configuration options: • 0 — not blinking (default) • 1 — blinking racadm raid , where the operation value is blink or unblink, and the FQDD is for the component's physical disk drive and virtual disk. Configuring CMC Properties You can configure CMC properties such as power budgeting, network settings, users, and SNMP and email alerts using the web interface or RACADM commands.
The Log in Security page is displayed. 3. To enable the user blocking or IP blocking feature, in the Login Lockout Policy section, select Lockout by User Name or Lockout by IP Address (IPV4) . The options to set the other login lockout policy attributes are activated. 4. Enter the required values for login lockout policy attributes in the activated fields — Lockout Fail Count, Lockout Fail Window , and Lockout Penalty Time. For more information, see the CMC Online Help. 5.
• • • • Remove the network cable from the active CMC. Remove the active CMC from the chassis. Initiate a CMC firmware flash on the active CMC. Have an active CMC that is no longer functional. NOTE: In the event of a CMC failover, all iDRAC connections and all active CMC sessions are logged off. Users with logged-off sessions must reconnect to the new active CMC. About Standby CMC The standby CMC is identical to and is maintained as a mirror of the active CMC.
CMCs installed, CMC installed in CMC chassis slot 1 normally assumes the active role. The active CMC is indicated by a blue LED. If two CMCs are inserted into a chassis that is already turned on, automatic active- or standby negotiation can take upto two minutes. Normal chassis operation resumes when the negotiation is complete. Obtaining Health Status of Redundant CMC You can view the health status of the standby CMC in the web interface.
Mapping a Server to KVM Using CMC Web Interface Make sure the KVM console is connected to the chassis. To map a server to a KVM: 1. In the left pane, click Chassis Overview → Front Panel → Setup . 2. On the Front Panel Configuration page, under the KVM Configuration section, from the KVM Mapped list, select the slot that must be mapped to a KVM, and then click Apply. NOTE: The KVM allows mapping to all the server slots.
Logging in to CMC 3 You can log in to CMC as a CMC local user, as a Microsoft Active Directory user, or as an LDAP user. The default user name and password is root and calvin respectively. You can also log in using Single SignOn or a Smart Card. Accessing CMC Web Interface Before you log in to CMC using the web interface, make sure that you have configured a supported web browser (Internet Explorer or Firefox) and the user account is created with the required privileges.
To log in as a local user, Active Directory user, or LDAP user. 1. In the Username field, type your user name: • CMC user name: • Active Directory user name: \, / or @. • LDAP user name: NOTE: This field is case-sensitive. 2. In the Password field, type the user password. NOTE: For Active Directory user, the Username field is case-sensitive. 3. Optionally, select a session timeout.
NOTE: If the smart card user is present in Active Directory, an Active Directory password is not required. Else, you have to log in by using an appropriate username and password. You are logged in to CMC with your Active Directory credentials. Logging in to CMC Using Single Sign-on When Single Sign-On (SSO) is enabled, you can log in to CMC without providing your domain user authentication credentials, such as user name and password. To use this feature, you must have an Enterprise License.
console on the KVM, or remotely using the RACADM command line interface installed on a management station. The RACADM interface is classified as: • Remote RACADM — Allows you to run RACADM commands on a management station with the -r option and the DNS name or IP address of the CMC. NOTE: Remote RACADM is included on the Dell Systems Management Tools and Documentation DVD and is installed on a management station.
Interface Number of Sessions Telnet 4 SSH 4 Changing Default Login Password The warning message that prompts you to change the default password is displayed if: • • • You log in to CMC with Configure Users privilege. Default password warning feature is enabled. Default user name and password for any currently enabled account are root and calvin respectively. The same warning message is displayed if you log in using Active Directory or LDAP.
For more information, see the Chassis Management Controller for PowerEdge VRTX RACADM Command Line Reference Guide available at dell.com/support/manuals. Enabling or Disabling Default Password Warning Message You can enable or disable the display of the default password warning message. To do this, you must have Configure Users privilege.
Updating Firmware 4 You can update firmware for: • CMC — active and standby • Chassis infrastructure • I/O Module • iDRAC7 You can update firmware for the following server components: • iDRAC • BIOS • Lifecycle Controller • 32–bit diagnostics • Operating System Drivers Pack • Network Interface Controllers • RAID controllers Downloading CMC Firmware Before beginning the firmware update, download the latest firmware version from support.dell.com, and save it to your local system.
If the chassis contains an earlier generation server, whose iDRAC is in recovery mode or if CMC detects that iDRAC has corrupted firmware, then the earlier generation iDRAC is also listed on the Firmware Update page. Viewing Currently Installed Firmware Versions Using RACADM To view the IP information for iDRAC and CMC, and the CMC service- or asset tag using RACADM, run the racadm getsysinfo sub-command.
When transferring files to and from CMC, the file transfer icon spins during the transfer. If your icon is not animated, make sure that your browser is configured to allow animations. For more information about allowing animations in the browser, see Allow Animations in Internet Explorer. Updating CMC Firmware Using RACADM To update CMC firmware using RACADM, use the fwupdate subcommand.
NOTE: To update the chassis infrastructure firmware, make sure the chassis is turned on and the servers are turned off. Updating Chassis Infrastructure Firmware Using CMC Web Interface 1. Go to any of the following pages: • 2. Chassis Overview → Update. • Chassis Overview → Chassis Controller → Update. On the Firmware Update page, in the Chassis Infrastructure Firmware section, in the Update Targets column, select the option, and then click Apply Chassis Infrastructure Firmware. 3.
• Chassis Overview → Chassis Controller → Update. • Chassis Overview → I/O Module Overview → Update. The Firmware Update page is displayed. NOTE: You can also update server iDRAC firmware using Chassis Overview → Server Overview → Update. For more information, see Updating Server Component Firmware. 2. To update the iDRAC7 firmware, in the iDRAC7 Firmware section, click the Update link of the server for which you want to update the firmware. The Server Component Update page is displayed.
NOTE: Before using the Lifecycle Controller–based update feature, server firmware versions must be updated. You must also update the CMC firmware before updating the server component firmware modules. Always update the server component firmware modules in the following order: • BIOS • Lifecycle Controller • iDRAC To update the server component firmware, using the CMC Web interface, click Chassis Overview → Server Overview → Update → Server Component Update.
The Server Component Update page enables you to update various firmware components on the server. To use the features and functions on this page, you must have: • For CMC: The Server Administrator privilege. • For iDRAC: The Configure iDRAC privilege and Log in to iDRAC privilege. In case of insufficient privileges, you can only view the firmware inventory of components and devices on the server. You cannot select any components or devices for any type of Lifecycle Controller operation on the server.
• OS Driver Pack • Network I/F Controller • RAID Controller The Firmware Inventory section displays only the associated components or devices across all servers present in the chassis. After you select an item from the drop-down menu, only the components or devices associated with the ones in the are list displayed. After the filtered set of components and devices is displayed in the inventory section, further filtering may occur when a component or device is selected for update.
to refresh the internal components and devices information and allows you to verify the currently-installed components and devices. This occurs when: – The server iDRAC firmware is updated to newly introduce the Lifecycle Controller functionality to the server management. – The new devices are inserted into the server. To automate this action or the iDRAC Settings Utility (for iDRAC7) provides an option that can be accessed through the boot console: • 1.
racadm getversion -l [-m ] [-f ] For more information, see the Chassis Management Controller for PowerEdge VRTX RACADM Command Line Reference Guide available at dell.com/support/manuals. Lifecycle Controller Job Operations NOTE: To use this feature, you must have an Enterprise License. You can perform Lifecycle Controller operations such as: • Re-install • Rollback • Update • Delete Jobs Only one type of operation can be performed at a time.
Re-installing Server Component Firmware Using Web Interface To reinstall a server component firmware: 1. In the left pane, click Server Overview → Update. 2. On the Server Component Update page, filter the component or device (optional). 3. In the Current Version column, select the option for the component or device for which you want to reinstall the firmware. 4. Select one of the following options: • 5. Reboot Now — Restart the server immediately.
BIOS updates are specific to the model of the server. Sometimes, even though a single Network Interface Controller (NIC) device is selected for firmware update on a server, the update may get applied to all the NIC devices on the server. This behavior is inherent in the Lifecycle Controller functionality and particularly the programming contained with the Dell Update Package (DUP). Currently, Dell Update Packages (DUP) that are less than 48 MB in size are supported.
Deleting Scheduled Server Component Firmware Jobs NOTE: To use this feature, you must have an Enterprise License. You can delete jobs scheduled for the selected components and/or devices across one or more servers. Deleting Scheduled Server Component Firmware Jobs Using the Web Interface To delete scheduled server component firmware jobs: 1. In the left pane, click Server Overview, and then click Update. 2. On the Server Component Update page, filter the component or device (optional). 3.
Early generations of servers can have corrupted firmware recovered using the new update iDRAC firmware process. When CMC detects corrupted iDRAC firmware, it lists the server on the Firmware Update page. Complete the tasks mentioned in the Updating Server iDRAC Firmware.
Viewing Chassis Information and Monitoring Chassis and Component Health 5 You can view information and monitor the health of the following: • Active and standby CMCs • All severs and individual servers • IO Module • Fans • Power Supply Units (PSUs) • Temperature sensors • Hard disk drives • LCD assembly • Storage controllers • PCIe devices Viewing Chassis and Component Summaries When you log in to the CMC web interface, the Chassis Health page displays the health of the chassis and its
is displayed when you click that component. In addition, the latest events in the CMC Hardware Log are also displayed. For more information, see the Online Help. If your chassis is configured as a Group Lead, the Group Health page is displayed after login. It displays the chassis level information and alerts. All active, critical, and non-critical alerts are displayed. Chassis Graphics The chassis is represented by the front and back views (the upper and lower images respectively).
Selected Component Information Information for the selected component is displayed in three independent sections: • • • Health and Performance, and Properties — Displays the active, critical, and non-critical events as displayed by the hardware logs and the performance data that vary with time. Properties — Displays the component properties that do not vary with time, or that change only infrequently.
over an individual server subgraphic. A corresponding text hint or screen tip provides additional information for that server. Click the server subgraphic to view the I/O Module information on the right. For more information, see the Online Help. 2. Go to Chassis Overview and expand Server Overview in the left pane. All the servers (1–4) appear in the expanded list. Click the server (slot) you want to view.
To set up the properties of fans by using RACADM commands, type the following command at the CLI interface. racadm fanoffset [-s ] NOTE: The CMC monitors the temperature sensors in the chassis and automatically adjust the fan speed as needed. However, you can override to maintain a minimum fan speed by the racadm fanoffset command.
With any of the Fan Offset options enabled, the power consumption will be increased. The system will be louder with the Low offset, noticeably louder with the Medium offset, and significantly louder with the High offset. When the Fan Offset option is not enabled, the fan speeds will be reduced to the default speeds required for system cooling for the installed hardware configuration. To set the offset feature, go to Chassis Overview → Fans → Setup.
Viewing KVM Information and Health Status To view the health status of the KVMs associated with the chassis, do any of the following: 1. Click Chassis Overview. The Chassis Health page is displayed. The left pane displays the front view of the chassis and contains the health status of a KVM. KVM health status is indicated by the overlay of the KVM subgraphic. Move the pointer over an KVM sub-graphic and a corresponding text hint or screen tip is displayed.
The Chassis Health page is displayed. The Storage capacity details, the Fault Tolerant Mode (Active/ Passive), and Fault Tolerant Status (Enabled) information is displayed on the right pane. This faulttolerance information is displayed only if the fault tolerant feature is enabled for the storage components. The lower section of chassis graphics provides the left view of the chassis. Move the cursor over the storage component sub-graphic.
Configuring CMC 6 Chassis Management Controller enables you to configure properties, set up users, and alerts to perform remote management tasks. Before you begin configuring the CMC, you must first configure the CMC network settings to allow CMC to be managed remotely. This initial configuration assigns the TCP/IP networking parameters that enable access to the CMC. For more information, see Setting Up Initial Access to CMC. You can configure CMC using Web interface or RACADM.
for more than 12 seconds in which the IPv6 router solicitations are sent. In such cases, there may be a period when IPv6 connectivity is limited, until router advertisements are gratuitously sent by the IPv6 routers. NOTE: Changing the CMC network settings may disconnect your current network connection. NOTE: You must have Chassis Configuration Administrator privilege to set up CMC network settings.
NOTE: Note the following: • There is a 30 seconds delay between changing a network setting and actually applying it. • The CMC IPv6 addressing is disabled by default. By default, for IPv4, the CMC requests and automatically obtains a CMC IP address from the Dynamic Host Configuration Protocol (DHCP) server. You can disable the DHCP feature and specify static CMC IP address, gateway, and subnet mask.
Setting Static DNS IP addresses NOTE: The static DNS IP addresses settings are not valid unless the DCHP for DNS address feature is disabled.
where: is 10 or 100 (default). Setting the Maximum Transmission Unit (MTU) (IPv4 and IPv6) The MTU property allows you to set a limit for the largest packet that can be passed through the interface. To set the MTU, type: racadm config -g cfgNetTuning -o cfgNetTuningMtu where is a value between 576–1500 (inclusive; default is 1500). NOTE: IPv6 requires a minimum MTU of 1280. If IPv6 is enabled, and cfgNetTuningMtu is set to a lower value, the CMC uses an MTU of 1280.
Configuring IP Range Attributes Using RACADM You can configure the following IP Range attributes for CMC using RACADM: • IP range checking feature • Range of IP addresses that you want to block from accessing CMC • IP Range Mask that you want to block from accessing CMC IP filtering compares the IP address of an incoming login to the IP address range that is specified.
For example: racadm config -g cfgLanNetworking -o cfgNicVLanPriority 7 You can also specify both the VLAN ID and the VLAN priority with a single command: racadm setniccfg -v For example: racadm setniccfg -v 1 7 4.
If the web server resets, wait at least one minute for the services to become available again. A web server reset usually happens as a result of any of the following events: • • • • Network configuration or network security properties are changed through the CMC web user interface or RACADM. Web server port configuration is changed through the web user interface or RACADM. CMC is reset. A new SSL server certificate is uploaded.
For example: $ # # # # # # # # # racadm getconfig -g cfgSessionManagement -m server-1 cfgSsnMgtWebServerMaxSessions=N/A cfgSsnMgtWebServerActiveSessions=N/A cfgSsnMgtWebServerTimeout=N/A cfgSsnMgtSSHMaxSessions=N/A cfgSsnMgtSSHActiveSessions=N/A cfgSsnMgtSSHTimeout=N/A cfgSsnMgtTelnetMaxSessions=N/A cfgSsnMgtTelnetActiveSessions=N/A cfgSsnMgtTelnetTimeout=N/A Configuring CMC Extended Storage Card You can enable or repair the optional Removable Flash Media for use as an extended non-volatile storage.
To set up the Chassis Group using the CMC web interface: 1. Log in with chassis administrator privileges to the leader chassis. 2. Click Setup → Group Administration. 3. On the Chassis Group page, under Role, select Leader. A field to add the group name is displayed. 4. Type the group name in the Group Name field, and then click Apply. NOTE: The same rules that apply for a domain name apply to the group name. When the chassis group is created, the GUI automatically switches to the Chassis Group page.
Disbanding a Chassis Group To disband a chassis group from the lead chassis: 1. Log in with administrator privileges to the leader chassis. 2. Select the lead chassis in the left pane. 3. Click Setup → Group Administration. 4. In the Chassis Group page, under Role, select None, and then click Apply. The lead chassis then communicates to all the members that they have been removed from the group. The lead chassis can be assigned as a leader or member of a new group.
• On-Change Propagation — Select this option for automatic propagation of the selected chassis property settings. The property changes are propagated to all current group members, whenever lead properties are changed. • 5. Manual Propagation — Select this option for manual propagation of the chassis group leader properties with its members. The lead chassis property settings are propagated to group members only when a lead chassis administrator clicks Propagate.
• In Chassis Power State Off state • Turned off NOTE: If a server is inserted while the chassis is turned off, the model number is not displayed anywhere in the web interface until the chassis is turned on again. The following table lists the specific data fields and specific requirements for fields to be reported for each server: Table 6. Server Module Inventory Field Descriptions Data Field Example Chassis Name Data Center Chassis Leader Chassis IP Address 192.168.0.
Chassis Group Inventory and Firmware Version The Chassis Group Firmware Version page displays the group inventory and firmware versions of the servers and the server components in the chassis. This page also enables you to organize the inventory information and filter the firmware versions view.
Configuring Multiple CMCs Using RACADM Using RACADM, you can configure one or more CMCs with identical properties. When you query a specific CMC card using its group ID and object ID, RACADM creates the racadm.cfg configuration file from the retrieved information. By exporting the file to one or more CMCs, you can configure your controllers with identical properties in a minimal amount of time.
number that detected the error, and a message explains the problem. The entire file is parsed for correctness, and all errors display. If an error is found in the .cfg file, write commands are not transmitted to the CMC. You must correct all errors before any configuration can take place. To check for errors before you create the configuration file, use the -c option with the config subcommand. With the -c option, config only verifies syntax and does not write to the CMC.
[cfgUserAdmin] cfgUserAdminPageModemInitString= • All group entries must be surrounded by open- and close-brackets ([ and ]). The starting [ character that denotes a group name must be in column one. This group name must be specified before any of the objects in that group. Objects that do not include an associated group name generate an error.
– cfgEmailAlert — cfgEmailAlertAddress – cfgTraps — cfgTrapsAlertDestIPAddr – cfgStandardSchema — cfgSSADRoleGroupName – cfgServerInfo — cfgServerBmcMacAddress Modifying the CMC IP Address When you modify the CMC IP address in the configuration file, remove all unnecessary = entries. Only the actual variable group’s label with [ and ] remains, including the two = entries pertaining to the IP address change.
Viewing and Ending CMC Sessions Using RACADM You must have administrator privileges to end CMC sessions using RACADM. To view the current user sessions, use the getssninfo command. To end a user session, use the closessn command. For more information about these commands, see the Chassis Management Controller for PowerEdge VRTX RACADM Command Line Reference Guide available at dell.com/support/manuals.
Configuring Servers 7 You can configure the following settings of a server: • Slot Names • iDRAC Network Settings • DRAC Virtual LAN Tag Settings • First Boot Device • Server FlexAddress • Remote File Share • BIOS Settings Using Server Clone Configuring Slot Names Slot names are used to identify individual servers. When choosing slot names, the following rules apply: • Names may contain a maximum of 15 non-extended ASCII characters (ASCII codes 32 through 126).
To edit a slot name using the CMC Web interface: 1. In the left pane, go to Chassis Overview → Server Overview → Setup → Slot Names. 2. On the Slot Names page, edit the slot name, in the Slot Name field. 3. To use a server’s host name as slot name, select the Use Host Name for the Slot name option. This overrides the static slot names with the server’s Host Name (or system name), if available. This requires the OMSA agent to be installed on the server.
Setting Description selected, this password value is assigned to a server's iDRAC root user password when the server is inserted into a chassis. The password can have 1 to 20 printable (including white spaces) characters. Confirm iDRAC Root Password Allows you to retype the password provided in the Password field. Enable iDRAC LAN Enables or disables the iDRAC LAN channel. By default, this option is cleared. Enable iDRAC IPv4 Enables or disables IPv4 on iDRAC. By default, this option is selected.
3. Setting Description iDRAC IPv4 Gateway Specifies the QuickDeploy default gateway that is assigned to all the DRAC present in the chassis. Enable iDRAC IPv6 Enables IPv6 addressing for each iDRAC present in the chassis that is IPv6 capable. Enable iDRAC IPv6 Autoconfiguration Enables the iDRAC to obtain IPv6 settings (address and prefix length) from a DHCPv6 server and also enables stateless address auto configuration. By default, this option is enabled.
NOTE: You must select the Enable LAN option to specify the IPv4 or IPv6 settings. For information about the fields, see the Online Help. 3. To deploy the setting to iDRAC, click Apply iDRAC Network Settings. Any changes made to the QuickDeploy Settings are also saved. The iDRAC Network Settings table reflects future network configuration settings; the values shown for installed servers may or may not be the same as the currently installed iDRAC network configuration settings.
For example: • To remove a server VLAN, disable the VLAN capabilities of the specified server's network: racadm setniccfg -m server- -v The valid values for are 1–4. For example: racadm setniccfg -m server-1 -v Configuring iDRAC Virtual LAN Tag Settings Using Web Interface To configure Vitual LAN(VLAN) for server: 1. Go to any of the following pages: • In the left pane, click Chassis Overview → Network → VLAN. 2.
Boot Device Description Virtual Floppy Boot from the virtual floppy drive. The floppy drive (or a floppy disk image) is on another computer on the management network, and is attached using the iDRAC GUI console viewer. Virtual CD/DVD Boot from a virtual CD or DVD drive or CD or DVD ISO image. The optical drive or ISO image file is located on another computer or boot disk available on the management network and is attached using the iDRAC GUI console viewer.
For more information about these objects, see the Chassis Management Controller for PowerEdge VRTX RACADM Command Line Reference Guide available at dell.com/support/manuals. Configuring Server FlexAddress For information about configuring FlexAddress for servers, see Configuring FlexAddress for Chassis-Level Fabric and Slots Using CMC Web Interface. To use this feature, you must have an Enterprise License.
• All Settings — This version includes all the settings of the server and components on that server. These profiles are generated from CMC for PowerEdge VRTX version 1.00 and later and 12G servers with iDRAC7 and Lifecycle Controller 2 version 1.1 or greater. The server configurations replication feature supports iDRAC7 servers. Earlier generation RAC servers are listed but are grayed out on the main page, and are not enabled to use this feature.
CMC communicates with the LC to get the available server profile settings and store them as a named profile. A progress indicator indicates that the Save operation is in progress. After the action is complete, a message, "Operation Successful" is displayed. NOTE: The process to gather the settings runs in the background. Hence, it may take some time before the new profile is displayed.
Exporting Profile You can export a stored server profile saved on the CMC nonvolatile media (SD Card) to a specified path on a remote file share. To export a stored profile: 1. Go to the Server Profiles page. In the Profiles on SD Card section, select the required profile, and then click Export Profile. 2. Click Save or Open to export the profile to the required location. A File Download message is displayed prompting you to open or save the file. For more information, see the Online Help.
available entries, click Go to Profile Log. The Profile Log page is displayed. For more information, see the Online Help. Completion Status And Troubleshooting To check the completion status of an applied BIOS profile: 1. In the left pane, click Chassis Overview → Server Overview → Setup → Profiles. 2. On the BIOS Profiles page, note down the Job ID (JID) of the submitted job from the Recent Profile Log section. 3. In the left pane, click Server Overview → Troubleshooting → Lifecycle Controller Jobs.
A user may be able to launch iDRAC web interface without having to login a second time, as this feature utilizes single sign-on. Single sign-on policies are: • A CMC user who has server administrative privilege, is automatically logged into iDRAC using single sign-on. Once on the iDRAC site, this user is automatically granted Administrator privileges. This is true even if the same user does not have an account on iDRAC, or if the account does not have the Administrator’s privileges.
• The browser on host system allows pop-up windows (pop-up blocking is disabled). Remote Console can also be launched from the iDRAC Web interface. For more details, see the iDRAC User’s Guide available at dell.com/support/manuals. Launching Remote Console from Chassis Health Page To launch a remote console from the CMC Web interface: 1. In the left pane, click Chassis Overview, and then click Properties. 2. On the Chassis Health page, click the specified server in the chassis graphic. 3.
Configuring CMC To Send Alerts 8 You can set alerts and actions for certain events that occur on the chassis. An event is generated when a device or service’s status has changed or an error condition is detected. If an event matches an event filter and you have configured this filter to generate an alert message (email alert or SNMP trap), then an alert is sent to one or more configured destinations such as email address, IP address, or an external server. To configure CMC to send alerts: 1.
NOTE: To apply chassis events configuration changes, you must have the Alert Configuration privilege. 1. In the left pane, click Chassis Overview → Alerts. 2. On the Chassis Events page, under the Alerts Filter section, select one or more of the following categories: 3.
Choose a format that is consistent with the networking technology or infrastructure. The Test Trap functionality cannot detect incorrect choices based on the current network configuration (example, use of an IPv6 destination in an IPv4-only environment). • In the Community String field, enter a valid community name to which the destination management station belongs. This community string differs from the community string on the Chassis Overview → Network → Services page.
6. Specify the community name: racadm config -g cfgTraps -o cfgTrapsCommunityName -i where is the SNMP community to which the chassis belongs, and is the index value specified in steps 4 and 5. You can configure up to four destinations to receive traps alerts. To add more destinations, do the tasks in steps 2–6. NOTE: The commands in steps 2–6 overwrites any existing settings configured for the index specified (1–4).
Configuring EMail Alert Settings Using RACADM To send a test email to an email alert destination using RACADM: 1. Open a serial/Telnet/SSH text console to CMC and log in. 2. Enable alert generation: racadm config -g cfgAlerting -o cfgAlertingEnable 1 NOTE: Only one filter mask may be set by both SNMP and email alerting. If you have already set a filter mask, do not perform the task in step 3. 3.
9 Configuring User Accounts and Privileges You can set up user accounts with specific privileges (role-based authority) to manage your system with CMC and maintain system security. By default, CMC is configured with a local administrator account. The default user name is rootand the password is calvin. As an administrator, you can set up user accounts to allow other users to access the CMC.
Privilege Description • • Provides services to the chassis, such as date and time, firmware update, and CMC reset. Is associated with the chassis, such as slot name and slot priority. Although these properties apply to the servers, they are strictly chassis properties relating to the slots rather than the servers themselves. For this reason, slot names and slot priorities can be added or changed whether or not servers are present in the slots.
Privilege Description password. If the user does not exist on the server, or if the password does not match, the user is denied the ability to perform the action. If the user exists on the target server and the password matches, the server responds with the privileges of which the user was granted on the server. Based on the privileges responding from the server, CMC firmware decides if the user has the right to perform the action.
Table 10.
Privilege Set Administrator Permissions Power User Permissions Guest User Permissions Chassis Control Administrator (Power commands) Yes Yes No Server Administrator Yes Yes No Test Alert User Yes Yes No Debug Command Administrator Yes No No Fabric A Administrator Yes Yes No Modifying Root User Administrator Account Settings For added security, it is strongly recommended that you change the default password of the root (User 1) account.
Configure Local Users Using RACADM NOTE: You must be logged in as a root user to execute RACADM commands on a remote Linux system. You can configure up to 16 users in the CMC property database. Before you manually enable a CMC user, verify if any current users exist. If you are configuring a new CMC or if you have used the racadm racresetcfg command, the only current user is root with the password calvin. The racresetcfg subcommand resets all configuration parameters to the default values.
NOTE: For a list of valid bit mask values for specific user privileges, see the Chassis Management Controller for PowerEdge VRTX RACADM Command Line Reference Guide. The default privilege value is 0, which indicates that the privileges of a user are not enabled.
Configuring Active Directory Users If your company uses the Microsoft Active Directory software, you can configure the software to provide access to CMC, allowing you to add and control CMC user privileges to your existing users in your directory service. This is a licensed feature. NOTE: On the following Operating Systems, you can recognize the users of CMC users by using Active Directory.
Role Group Default Privilege Level Permissions Granted • • • 2 None • • • • • • Bit Mask Test Alert User Debug Command Administrator Fabric A Administrator CMC Login User 0x00000ed9 Clear Logs Administrator Chassis Control Administrator (Power Commands) Server Administrator Test Alert User Fabric A Administrator 3 None CMC Login User 0x00000001 4 None No assigned permissions 0x00000000 5 None No assigned permissions 0x00000000 NOTE: The Bit Mask values are used only when setting Standard S
– User Domain from Login — to perform the DNS lookup with the domain name of the login user. – Specify a Domain — enter the domain name to use for the DNS lookup • 4. To enable CMC to use the specified Active Directory Domain Controller server addresses, select Specify Domain Controller Addresses . These server addresses are the addresses of the domain controllers where the user accounts and the role groups are located. Click Apply to save the settings.
racadm config -g cfgStandardSchema -i -o cfgSSADRoleGroupPrivilege racadm config -g qualified domain racadm config -g qualified domain racadm config -g qualified domain cfgActiveDirectory name or IP address cfgActiveDirectory name or IP address cfgActiveDirectory name or IP address -o of -o of -o of cfgADDomainController1 cfgADDomainController2 cfgADDomainController3
NOTE: If certificate validation is enabled, specify the Domain Controller Server addresses and the Global Catalog FQDN. Make sure that DNS is correctly configured. Extended Schema Active Directory Overview Using the extended schema solution requires the Active Directory schema extension. Active Directory Schema Extensions The Active Directory data is a distributed database of attributes and classes.
NOTE: The RAC privilege object applies to CMC. You can create as many or as few association objects as required. However, you must create at least one Association Object, and you must have one RAC device object for each RAC (CMC) on the network that you want to integrate with Active Directory. The Association Object allows as many or as few users and/or groups as well as RAC Device Objects. However, the Association Object only includes one Privilege Object per Association Object.
3. Add CMC users and their privileges to Active Directory. 4. Enable SSL on each of your domain controllers. 5. Configure CMC Active Directory properties using CMC web interface or RACADM. Extending Active Directory Schema Extending your Active Directory schema adds a Dell organizational unit, schema classes and attributes, and example privileges and association objects to the Active Directory schema.
Class Name Assigned Object Identification Number (OID) dellRAC4Privileges 1.2.840.113556.1.8000.1280.1.1.1.3 dellPrivileges 1.2.840.113556.1.8000.1280.1.1.1.4 dellProduct 1.2.840.113556.1.8000.1280.1.1.1.5 Table 14. dellRacDevice Class OID 1.2.840.113556.1.8000.1280.1.7.1.1 Description Represents the Dell RAC device. The RAC must be configured as delliDRACDevice in Active Directory. This configuration enables CMC to send Lightweight Directory Access Protocol (LDAP) queries to Active Directory.
OID 1.2.840.113556.1.8000.1280.1.1.1.3 dellIsServerResetUser dellIsTestAlertUser dellIsDebugCommandAdmin dellPermissionMask1 dellPermissionMask2 Table 17. dellPrivileges Class OID 1.2.840.113556.1.8000.1280.1.1.1.4 Description Used as a container Class for the Dell Privileges (Authorization Rights). Class Type Structural Class SuperClasses User Attributes dellRAC4Privileges Table 18. dellProduct Class OID 1.2.840.113556.1.8000.1280.1.1.1.
Assigned OID/Syntax Object Identifier Single Valued OID: 1.2.840.113556.1.8000.1280.1.1.2.2 Distinguished Name: (LDAPTYPE_DN 1.3.6.1.4.1.1466.115.121.1.12) Attribute: dellIsCardConfigAdmin TRUE Description: TRUE if the user has Card Configuration rights on the device. OID: 1.2.840.113556.1.8000.1280.1.1.2.4 Boolean (LDAPTYPE_BOOLEAN 1.3.6.1.4.1.1466.115.121.1.7) Attribute: dellIsLoginUser TRUE Description: TRUE if the user has Login rights on the device. OID: 1.2.840.113556.1.8000.1280.1.1.2.
Assigned OID/Syntax Object Identifier Single Valued OID: 1.2.840.113556.1.8000.1280.1.1.2.10 Boolean (LDAPTYPE_BOOLEAN 1.3.6.1.4.1.1466.115.121.1.7) Attribute: dellIsDebugCommandAdmin TRUE Description: TRUE if the user has Debug Command Admin rights on the device. OID: 1.2.840.113556.1.8000.1280.1.1.2.11 Boolean (LDAPTYPE_BOOLEAN 1.3.6.1.4.1.1466.115.121.1.7) Attribute: dellSchemaVersion TRUE Description: The Current Schema Version is used to update the schema. OID: 1.2.840.113556.1.8000.1280.1.1.2.
Installing Dell Extension to the Active Directory Users and Computers Snap-In When you extend the schema in Active Directory, you must also extend the Active Directory Users and Computers Snap-in so the administrator can manage RAC (CMC) devices, users and user groups, RAC associations, and RAC privileges.
choose the Association Scope that applies to the type of objects you intend to add. For example, if you select Universal, the association objects are only available when the Active Directory Domain is functioning in Native Mode or above. To create association object: 1. In the Console Root (MMC) window, right-click a container. 2. Select New → Dell Remote Management Object Advanced. 3. On the New Object page, type a name for the new object and select Association Object. 4.
NOTE: For information about the various fields, see the Online Help. 1. In the left pane, click, Chassis Overview → User Authentication → Chassis Overview → Directory Services. 2. Select Microsoft Active Directory (Extended Schema). The settings to be configured for extended schema is displayed on the same page. 3. In the Common Settings section, specify the following: • Select Enable Active Directory and enter the timeout value for Active Directory in the AD Timeout field.
• Manually configure a DNS server IP address by leaving the Use DHCP to Obtain DNS Server Addresses check box unchecked and then typing your primary and alternate DNS server IP addresses in the fields provided. 12. Click Apply Changes. The Active Directory settings for extended schema is configured.
on CMC for authorization similar to the working of the Standard Schema setup with Active Directory support. To enable the LDAP user to access a specific CMC card, the role group name and its domain name must be configured on the specific CMC card. You can configure a maximum of five role groups in each CMC. A user has the option to be added to multiple groups within the directory service. If a user is a member of multiple groups, then the user obtains the privileges of all their groups.
– Static server — Specify the FQDN or IP address and the LDAP port number. – DNS server — Specify the DNS server to retrieve a list of LDAP servers by searching for their SRV record within the DNS. The following DNS query is performed for SRV records: _[Service Name]._tcp.[Search Domain] where is the root level domain to use within the query and is the service name to use within the query. For example: _ldap._tcp.dell.com where ldap is the service name and dell.
cfgLDAPSRVLookupDomainName is configured to be domainname.com. For more information about the RACADM commands, see the Chassis Management Controller for PowerEdge VRTX RACADM Command Line Reference Guide available at dell.com/support/manuals.
10 Configuring CMC For Single Sign-On Or Smart Card Login This section provides information to configure CMC for Smart Card login and Single Sign-On (SSO) login for Active Directory users. SSO uses Kerberos as an authentication method allowing users, who have signed in as an automatic- or single sign-on to subsequent applications such as Exchange.
Client Systems • For only Smart Card login, the client system must have the Microsoft Visual C++ 2005 redistributable. For more information see www.microsoft.com/downloads/details.aspx?FamilyID= 32BC1BEEA3F9-4C13-9C99-220B62A191EE&displaylang=en • For Single Sign-On or smart card login, the client system must be a part of the Active Directory domain and Kerberos Realm. CMC • Each CMC must have an Active Directory account. • CMC must be a part of the Active Directory domain and Kerberos Realm.
NOTE: The keytab contains an encryption key and must be kept secure. For more information about the ktpass utility, see the Microsoft Website. Configuring CMC For Active Directory Schema For information about configuring CMC for Active Directory standard schema, see Configuring Standard Schema Active Directory. For information about configuring CMC for Extended Schema Active Directory, see Extended Schema Active Directory Overview.
Configuring CMC SSO Or Smart Card Login For Active Directory Users You can use CMC web interface or RACADM to configure CMC SSO or smart card login. Configuring CMC SSO Or Smart Card Login For Active Directory Users Using Web Interface To configure Active Directory SSO or smart card login for CMC: NOTE: For information about the options, see the Online Help. 1. 2. While configuring Active Directory to set up user account, perform the following additional steps: • Upload the keytab file.
Configuring CMC SSO Or Smart Card Login For Active Directory Users Using RACADM In addition to the steps performed while configuring Active Directory, run the following command to enable SSO: racadm -g cfgActiveDirectory -o cfgADSSOEnable 1 In addition to the steps performed while configuring Active Directory, use the following objects to enable smart card login: • cfgSmartCardLogonEnable • cfgSmartCardCRLEnable 138
11 Configuring CMC to Use Command Line Consoles This section provides information about the CMC command line console (or serial/Telnet/Secure Shell console) features, and explains how to set up the system so that you can perform systems management actions through the console. For information about using the RACADM commands in CMC through the command line console, see Chassis Management Controller for PowerEdge VRTX RACADM Command Line Reference Guide.
Command Description exit, logout, and quit All the commands perform the same action. They end the current session and return to a login commond line interface. Using Telnet Console With CMC You can have up to four Telnet sessions with CMC at a time. If your management station is running Microsoft Windows XP or Microsoft Windows Server 2003, you may experience an issue with the characters in a CMC Telnet session.
Table 21.
For more information about the sshpkauth, see the Chassis Management Controller for PowerEdge VRTX RACADM Command Line Reference Guide. Generating Public Keys for Systems Running Windows Before adding an account, a public key is required from the system that accesses the CMC over SSH. There are two ways to generate the public/private key pair: using PuTTY Key Generator application for clients running Windows or ssh-keygen CLI for clients running Linux.
Viewing Public Keys To view the public keys that you have added to the CMC, type: racadm sshpkauth –i svcacct –k all –v To view one key at a time, replace all with a number from 1 – 6.
Configuring Minicom Version 2.0 NOTE: For best results, set the cfgSerialConsoleColumns property to match the number of columns. Be aware that the prompt consumes two characters. For example, for an 80-column terminal window: racadm config –g cfgSerial –o cfgSerialConsoleColumns 80. 1. If you do not have a Minicom configuration file, go to the next step. If you have a Minicom configuration file, type minicom, and then go to step 12. 2.
For servers, serial console redirection can be accomplished using: • CMC command line interface (CLI) or the RACADM connect command. For more information about running the RACADM commands, see the Chassis Management Controller for PowerEdge VRTX RACADM Command Line Reference Guide. • iDRAC Web interface serial console redirection feature. • iDRAC Serial Over LAN (SOL) functionality.
NOTE: All keys do not work on the BIOS setup pages. Therefore, provide appropriate keyboard shortcuts for and others. The initial redirection screen displays the necessary keyboard shortcuts. Configuring the Managed Server BIOS for Serial Console Redirection You can use a Remote Console session to connect to the managed system using the iDRAC7 web interface (see the iDRAC7 User’s Guide on dell.com/support/manuals). By default, the Serial communication in the BIOS is turned off.
The following example shows the changes described in this procedure. # grub.conf generated by anaconda # # Note that you do not have to rerun grub after making changes # to this file # NOTICE: You do not have a /boot partition. This means that # all kernel and initrd paths are relative to /, e.g. # root (hd0,0) # kernel /boot/vmlinuz-version ro root= /dev/sdal # initrd /boot/initrd-version.img # #boot=/dev/sda default=0 timeout=10 #splashimage=(hd0,2)/grub/splash.xpm.
# Donnie Barnes # # Default runlevel. The runlevels used by RHS are: # 0 - halt (Do NOT set initdefault to this) # 1 - Single user mode # 2 - Multiuser, without NFS (The same as 3, if you # do not have networking) # 3 - Full multiuser mode # 4 - unused # 5 - X11 # 6 - reboot (Do NOT set initdefault to this) # id:3:initdefault: # System initialization. si::sysinit:/etc/rc.d/rc.sysinit l0:0:wait:/etc/rc.d/rc 0 l1:1:wait:/etc/rc.d/rc 1 l2:2:wait:/etc/rc.d/rc 2 l3:3:wait:/etc/rc.d/rc 3 l4:4:wait:/etc/rc.
vc/4 vc/5 vc/6 vc/7 vc/8 vc/9 vc/10 vc/11 tty1 tty2 tty3 tty4 tty5 tty6 tty7 tty8 tty9 tty10 tty11 ttyS1 149
Using FlexAddress and FlexAdress Plus Cards 12 This section provides information about FlexAddress, FlexAddress Plus Cards, and configuring and using these the cards. NOTE: An Enterprise License must be installed on the CMC to use the Flexaddress feature. About FlexAddress The FlexAddress feature is an optional upgrade that allows server modules to replace the factoryassigned World Wide Name and Media Access Control (WWN/MAC) network IDs with WWN/MAC IDs provided by the chassis.
. NOTE: Lock the SD card prior to inserting in the USB Memory Card Reader to prevent accidently modifying any of the contents. You must unlock the SD card before inserting into CMC. About FlexAddress Plus The FlexAddress Plus is a new feature added to the feature card version 2.0. It is an upgrade from FlexAddress feature card version 1.0. FlexAddress Plus contains more MAC addresses than the FlexAddress feature.
NOTE: The SD card contains a FlexAddress feature. Data contained on the SD card is encrypted and may not be duplicated or altered in any manner, because it may inhibit system function and cause the system to not function properly. NOTE: The use of a SD card is limited to one chassis only. If you have multiple chassis, you must purchase additional SD cards. Activation of the FlexAddress feature is automatic on restart of CMC with the SD feature card installed.
Table 25. Status Messages Returned by the featurecard -s Command Status Message Actions No feature card inserted. Check CMC to verify that the SD card was properly inserted. In a redundant CMC configuration, ensure that the CMC with the SD feature card installed is the active CMC and not the standby CMC. The feature card inserted is valid and contains the following feature(s) FlexAddress: bound. No action required.
NOTE: The SD card must be physically installed in CMC, and the chassis must be turned off before running the deactivation command. If you run the deactivation command without installing an SD card, or with a card from a different chassis installed, the feature is deactivated and change is not made to the card.
• MAC addresses for all the slots in the chassis Fabric Configuration Fabric A displays the type of the Input/Output fabric installed. iDRAC displays the server management MAC address. NOTE: If Fabric A is enabled, unpopulated slots display chassis-assigned MAC addresses for Fabric A. WWN/MAC Addresses Displays FlexAddress configuration for each slot in the chassis. Information displayed includes: • Slot number and location. • FlexAddress is active or not active. • Fabric type.
You must purchase and install the FlexAddress upgrade to configure the FlexAddress. If the upgrade is not purchased and installed, the following text is displayed on the Web interface: Optional feature not installed. See the Dell Chassis Management Controller Users Guide for information on the chassis-based WWN and MAC address administration feature. To purchase this feature, please contact Dell at www.dell.com.
NOTE: Note the following: 4. • If a slot is not selected, FlexAddress is not enabled for the selected fabric. • When none of the fabrics are selected and a server slot is selected and applied, the following message is displayed No fabrics selected! FlexAddress will not be used on this chassis. Select both the fabric and the slot to successfully configure FlexAddress. • Configuring Flexaddress for slave slot is not allowed. The option is greyed out in the CMC Web interface.
NOTE: For more information about the FlexAddress feature, see About FlexAddress. Command Messages The following table lists the RACADM commands and output for common FlexAddress situations. Table 26. FlexAddress Commands and Output Situation Command Output SD card in the active CMC module is bound to another service tag.
Situation Command Output $racadm setflexaddr -i 1 Changing the slot/fabric 1 FlexAddress settings while the server modules are powered ON. ERROR: Unable to perform the set operation because it affects a powered ON server Changing the Flexaddress settings of slot or fabric, when the CMC Enterprise License is not installed. ERROR: SWC0242 : A required license is missing or expired. Obtain an appropriate license and try again, or contact your service provider for additional details.
Using FlexAddress and FlexAdress Plus Cards or copy the written materials accompanying the Software, but you may transfer the Software and all accompanying materials on a permanent basis as part of a sale or transfer of the Dell product if you retain no copies and the recipient agrees to the terms hereof. Any transfer must include the most recent update and all prior versions. You may not reverse engineer, decompile or disassemble the Software.
WHETHER IN CONTRACT, STRICT LIABITLY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILTIY OF SUCH DAMAGE. U.S. GOVERNMENT RESTRICTED RIGHTS The software and documentation are "commercial items" as that term is defined at 48 C.F.R. 2.101, consisting of "commercial computer software" and "commercial computer software documentation" as such terms are used in 48 C.F.R. 12.212. Consistent with 48 C.F.R. 12.212 and 48 C.F.R. 227.
Managing Fabrics 13 The chassis supports a fabric type, which is Fabric A. Fabric A is used by the single I/O Module, and is always connected to the on-board Ethernet adapters of the servers. The chassis has only one I/O module (IOM), where the IOM is a pass-through or switch module. The I/O Module is classified as group A. Chassis IOM uses a discrete data path called Fabric, and it is named A. The Fabric A supports only Ethernet.
Monitoring IOM Health For information about monitoring IOM health, see Viewing Information and Health Status of the IOM. Configuring Network Settings for IOM You can specify the network settings for the interface used to manage the IOM. For Ethernet switches, the out-of-band management port (IP address) is configured. The in-band management port (that is, VLAN1) is not configured using this interface. Before configuring the network settings for the IOM, make sure the IOM is turned on.
You can set the user name, password, and SNMP string for the IOM using the RACADM deploy command: racadm deploy -m switch -u -p racadm deploy -m switch -u -p -v SNMPv2 ro racadm deploy -a [server|switch] -u -p Managing Power Control Operation for I/O Modules For information to set the power control operation for I/O Module(s), see Executing Power Control Operations on the IOM.
Managing and Monitoring Power 14 The Dell PowerEdge VRTX chassis is the most power-efficient modular server enclosure. It is designed to include highly-efficient power supplies and fans, has an optimized layout for the air to flow more easily through the system, and contains power-optimized components throughout the enclosure.
Redundancy Policies Redundancy policy is a configurable set of properties that determine how CMC manages power to the chassis. The following redundancy policies are configurable with or without dynamic PSU engagement: • Grid redundancy • Power supply redundancy Grid Redundancy Policy The purpose of the Grid redundancy policy is to enable a modular enclosure system to operate in a mode in which it can tolerate AC power failures.
PSUs beyond those required for power and redundancy are still available and is added to the pool in the event of a failure. Unlike Grid redundancy, when power supply redundancy is selected, CMC does not require the PSU units to be present in any specific PSU slot positions. NOTE: Dynamic Power Supply Engagement (DPSE) allows PSUs to be placed in standby. The standby state indicates a physical state of PSUs that are not supplying power.
An increase in power demand in the Grid Redundancy configuration cause the engagement of PSUs from the Standby state. This maintains the mirrored configuration needed for dual-grid redundancy. NOTE: With DPSE in enabled state, if power demand increases in both the two Power Redundancy policy modes, the standby PSUs are brought Online to reclaim power.
CMC allocates power to the CMC infrastructure and the servers in the chassis. CMC infrastructure consists of components in the chassis, such as fans, I/O module, and storage adapters, PCIe cards, physical disk, main board. The chassis may have up to four servers that communicate to the chassis through an iDRAC. For more information, see the iDRAC7 User’s Guide at dell.com/support/manuals. iDRAC provides CMC with its power envelope requirements before powering up the server.
Additional servers can be powered up in the modular enclosure only if sufficient power is available. The System Input Power Cap can be increased any time up to a maximum value of 5000 Watt to allow the power up of additional servers.
Assigning Priority Levels To Servers Using CMC Web Interface To assign priority levels: 1. In the left pane, click Server Overview → Power → Priority. The Server Priority page lists all the servers in the chassis. 2. From the Priority drop-down menu, select a priority level (1–9, where 1 is the highest priority) for one, multiple, or all servers. The default value is 1. You can assign the same priority level to multiple servers. 3. Click Apply to save your changes.
Viewing Power Budget Status Using RACADM Open a serial/Telnet/SSH text console to CMC, log in, and type: racadm getpbinfo For more information about getpbinfo, including output details, see the getpbinfo command section in the Chassis Management Controller for PowerEdge VRTX RACADM Command Line Reference Guide. Redundancy Status and Overall Power Health The redundancy status is a factor in determining the overall power health.
the chassis that is below what would be required for full power allocation to the servers, or if insufficient power is available in case higher power requirements by all servers in the chassis. If enough power cannot be freed by reducing the allocated power of the low-priority servers, the new server is not allowed to turn on.
Power Supply and Redundancy Policy Changes in System Event Log Changes in the power supply state and power redundancy policy are recorded as events. Events related to the power supply that record entries in the system event log (SEL) are power supply insertion and removal, power supply input insertion and removal, and power supply output assertion and de-assertion. The following table lists the SEL entries that are related to power supply changes: Table 30.
Power Conservation and Power Budget CMC conserves power when the user-configured maximum power limit is reached. When the demand for power exceeds the user configured System Input Power Cap, CMC reduces power to servers in reverse-priority order to free power for higher priority servers and other modules in the chassis. If all or multiple slots in the chassis are configured with the same priority level, CMC decreases power to servers in the order of increasing slot number.
those power supplies connected to the other voltage level are turned off and indicated as not functioning. Remote Logging Power consumption can be reported to a remote syslog server. Total chassis power consumption, minimum, maximum, and average power consumption over a collection period can be logged. For more information about enabling this feature and configuring the collection or logging interval, see Managing and Monitoring Power.
To configure power budget: 1. In the left pane, click Chassis Overview → Power → Configuration. 2. On the Budget/Redundancy Configuration page, select any or all of the following properties as appropriate. For information about the field descriptions, see the Online Help. 3.
• To enable the maximum power consumption mode, type: racadm config -g cfgChassisPower -o cfgChassisMaxPowerConservationMode 1 • To restore normal operation, type: racadm config -g cfgChassisPower -o cfgChassisMaxPowerConservationMode 0 • To enable the power remote logging feature, enter the following command: racadm config -g cfgRemoteHosts -o cfgRhostsSyslogPowerLoggingEnabled 1 • To specify the desired logging interval, enter the following command: racadm config -g cfgRemoteHosts -o cfgRhostsSyslo
Executing Power Control Operations on the Chassis Using Web Interface To execute power control operations on the chassis using the CMC web interface: 1. In the left pane, click Chassis Overview → Power → Control. The Chassis Power Control page is displayed. 2. Select one of the following power control operations. For information about each option, see the Online Help. 3.
• Power Cycle Server (cold boot) For information about the options, see the Online Help. 3. Click Apply. A dialog box appears requesting for confirmation. 4. Click OK to perform the power management action (for example, reset the server). Executing Power Control Operations on the IOM You can remotely reset or turn on an IOM. NOTE: To perform power management actions, you must have the Chassis Configuration Administrator privilege.
Managing Chassis Storage 15 On the Dell PowerEdge VRTX, you can perform the following operations: • View the status of physical disks drives and storage controllers. • View the properties of controllers, physical disk drives, virtual disks, and enclosures. • Set up controllers, physical disk drives, and virtual disks. • Assign virtual adapters. • Troubleshoot controller, physical disk drives, and virtual disks. • Update storage components.
Viewing Fault-tolerant Troubleshooting Information of SPERC Using CMC Web Interface To view the attributes that indicate the correct functioning of fault-tolerant features of a SPERC: 1. In the left pane, click Chassis Overview → Storage → Troubleshooting → Setup Troubleshooting. The Storage Setup Troubleshooting page is displayed. 2. On the Storage Setup Troubleshooting page, you can: • View the following attributes when the controller is in fault-tolerant mode: – Two Shared PERCs detected.
• Virtual disks are created and they are assigned as Virtual Adapter 1, Virtual Adapter 2, Virtual Adapter 3, or Virtual Adapter 4. For more information, see Applying Virtual Adapter Access Policy to Virtual Disks. NOTE: • You can map only one virtual adapter to one server at a time. • Without an appropriate license, you can unmap a VA–server assignment, or map the VA to the default serve, only. • The default mapping is VA1–Server Slot 1, VA2–Server Slot 2, VA3–Server Slot 3, and VA4–Server Slot 4.
failover process since the redundant components(controllers) are not used during normal operating conditions. High Availability with fault-tolerance provides the following benefits: • Provides uptime for all storage applications even when a controller stops functioning. • Provides access to critical functions of the chassis at all times. • Enables server to handle situations when controller stops functioning are becomes faulty.
To import or clear the foreign configuration: 1. In the left pane, click Chassis Overview → Storage → Controllers → Setup. 2. On the Controller Setup page, in the Foreign Configuration section, for the respective controller, click: • Clear Foreign Configuration to clear the existing configuration of the disk. • Import/Recover to import the disk with the foreign configuration.
Enabling or Disabling RAID Controller Using CMC Web Interface For a VRTX chassis with two Shared PERC8 controllers, the Integrated 2 PERC adapter can be disabled or enabled when the Integrated 1 PERC adapter is active and all server modules are turned off. Both adapters must be enabled for fault-tolerance. The Controllers Troubleshooting page allows you to enable or disable the peer controller.
Enabling or Diasabling RAID Controller Using RACADM To enable a peer controller using RACADM, open a serial/Telnet/SSH text console to CMC, log in, and enter: racadm raid enableperc: To disable a peer controller, enter: racadm raid disableperc: NOTE: For more information on this feature using the RACADM interface see the RACADM Command Line Reference Guide for iDRAC and CMC.
Assigning Global Hot Spares Using CMC Web Interface To assign or unassign a global hot spare: 1. In the left pane, click Chassis Overview → Storage → Physical Disk → Setup. The Setup Physical Disks page is displayed. 2. Under the Global Hotspares Assignment section, from the Hotspare Action drop-down menu, select Unassigned or Global Hotspare for each of the physical disk drives, and then click Apply.
NOTE: Deleting a virtual disk removes the virtual disk from the controller's configuration. To create a virtual disk: 1. In the left pane, click Chassis Overview → Storage → Virtual Disks → Create. 2. On the Create Virtual Disk page, under the Settings section, type appropriate data, and from the Select Physical Disks section, select the number of physical disk drives on the basis of RAID level selected earlier, and then click Create Virtual Disk.
Viewing Enclosure Properties Using CMC Web Interface To view the enclosure properties: 1. In the left pane, click Chassis Overview → Storage → Enclosures → Properties. 2. On the Properties page, under the Enclosure section, click the to get a graphical view of the physical disk drives and their states, summary of physical disk drive slots, and advanced properties.
Managing PCIe Slots 16 By default, all slots are unmapped. You can do the following: • View the status of all PCIe Slots in the chassis. • Assign or remove an assigned PCIe slot from the servers. Consider the following before assigning a PCIe slot to a server: • An empty PCIe slot cannot be assigned to a server that is turned on. • A PCIe slot with an adapter assigned to a server cannot be assigned to another server if the currentlyassigned server (source) is turned on.
• Without a license, the maximum number of PCIe slots that maybe mapped to a half-height server is two. If a full-height server is installed you can map two PCIe slots to the upper server slot and two to the lower (extended) server slot, for a total of four PCIe slots per full-height server. • You can map the server slots to any of the 8 PCIe slots. • A full-height server has both upper and lower mezzanines populated.
All these processes require few seconds to complete which causes a delay in initialization of the PCIe cards. The PCIe Ride-through feature in CMC VRTX reduces this process cycle time. The PCIe Ridethrough feature enables the following: • The Server nodes are turned on quickly, thus turning on the PCIe cards quickly. • The powered state of PCIe cards is extended for a pre-defined time period in the following scenarios: – After the associated server is turned off. – After a CMC stops functioning.
3. In the Timeout field, enter the time for which the Ride-through feature to be enabled. Type either zero (0) or a value from 60–1800 seconds. Zero indicates an infinite timeout. 4. Click Apply.
Troubleshooting and Recovery 17 This section explains how to perform tasks related to recovering and troubleshooting problems on the remote system using the CMC web interface. • Viewing chassis information. • Viewing the event logs. • Gathering configuration information, error status, and error logs. • Using the diagnostic console. • Managing power on a remote system. • Managing Lifecycle Controller jobs on a remote system. • Reset components.
racdump includes the following subsystems and aggregates the following RACADM commands. For more information about racdump, see the RACADM Command Line Reference Guide for CMC in PowerEdge VRTX.
– Resolution A: This configuration requires at least one power supply in side 1 (the left two slots) and one power supply in side 2 (the right two slots) to be present and functional in the modular enclosure. Additionally the capacity of each side must be enough to support the total power allocations for the chassis to maintain Grid redundancy. (For full Grid Redundancy operation, make sure that a full PSU configuration of four power supplies is available.
• Problem: The least priority servers lost power after a PSU failure. – Resolution: To avoid a future power supply failure causing servers to power off, make sure that the chassis has at least three power supplies and is configured for the Power Supply Redundancy policy to prevent PSU failure from impacting server operation. • Problem: Overall server performance decreases when the ambient temperature increases in the data center.
To view the hardware logs using CMC Web interface, in the left pane, click Chassis Overview → Logs. The Hardware Log page is displayed. To save a copy of the hardware log to your managed station or network, click Save Log, and then specify a location for a text file of the log. NOTE: Since the log is saved as a text file, the graphical images used to indicate severity in the user interface do not appear. In the text file, severity is indicated with the words OK, Informational, Unknown, Warning, and Severe.
NOTE: To modify these settings, you must have the Debug Command Administrator privilege. To access the Diagnostic Console: 1. In the left pane, click Chassis Overview → Troubleshooting → Diagnostics. The Diagnostic Console page displays. 2. In the Command text box, type a command and click Submit. For information about the commands, see the Online Help. The diagnostic results page appears.
Troubleshooting Network Time Protocol (NTP) Errors After configuring CMC to synchronize the clock with a remote time server over the network, it may take 2-3 minutes before a change in the date and time occurs. If after this time there is still no change, it may be necessary to troubleshoot a problem. CMC may not be able to synchronize the clock for the following reasons: • Problem with the NTP Server 1, NTP Server 2, and NTP Server 3 settings.
If an NTP server setting was configured with an invalid host name, you may see a trace log entry as follows: Aug 21 14:34:27 cmc ntpd_initres[1298]: host name not found: blabla Aug 21 14:34:27 cmc ntpd_initres[1298]: couldn't resolve `blabla', giving up on it For information on how to enter the gettracelog command to review the trace log using the CMC Web interface, see Using Diagnostic Console.
Component IOM (Pass through) Blower PSU LED Color, Blinking Pattern Status Blue, glowing steadily Normal/stack master Blue, blinking User-enabled module identifier Amber, glowing steadily Not used Amber, blinking Fault Blue, dark No fault/stack slave Green, glowing steadily Turned on Green, blinking Not used Green, dark Powered off Blue, glowing steadily Normal Blue, blinking User-enabled module identifier Amber, glowing steadily Not used Amber, blinking Fault Blue, dark No fa
NOTE: It is not possible to log in to the standby CMC using a serial console. Observing LEDs to Isolate the Problem There are two LEDs on the left of the card: • Upper-left LED — Indicates power status. If it is not ON: – Verify that you have AC present to at least one power supply. – Verify that the CMC card is seated properly. You can release or pull the ejector handle, remove the CMC, reinstall the CMC making sure that the board is inserted all the way and the latch closes correctly.
firmware update file, firmimg.cmc. This is the same firmware image file used for normal firmware updates. The recovery process displays its current activity and boots to the CMC OS upon completion. When you type recover and then press at the recovery prompt, the recover reason and available sub-commands display. An example recover sequence may be: recover getniccfg recover setniccfg 192.168.0.120 255.255.255.0 192.168.0.1 recover ping 192.168.0.100 recover fwupdate -g -a 192.168.0.
NOTE: For a disabled PERC, none of the other options Reset Configuration, Export TTY Log, Discard Pinned Cache, and Disable RAID Controller are available in the drop-down menu.
Using LCD Panel Interface 18 You can use the LCD panel on the chassis to perform configuration and diagnostics, and to obtain status information about the chassis and its contents. The following figure illustrates the LCD panel. The LCD screen displays menus, icons, pictures, and messages. Figure 2. LCD Display 1. LCD screen 3. Scroll buttons (4) 2.
Table 32. LCD Panel Navigational Icons Icon Normal Icon Highlighted Icon Name and Description Back — Highlight and press the center button to return to the previous screen. Accept/Yes — Highlight and press the center button to accept a change and return to the previous screen. Skip/Next — Highlight and press the center button to skip any changes and go to the next screen. No — Highlight and press the center button to answer "No" to a question and go to the next screen.
DVD Mapping By using this page, you can view the DVD to server mapping information, map another server to the DVD drive on the chassis, or unmap the existing connection. To give a server access to the DVD, select DVD mapping from the main menu, navigate to the required server, and then press the center Check button. The DVD drive can be mapped to the server slot only if the DVD is enabled for that server slot. DVD drive can also be unmapped to prevent the use by any of the server slots.
LCD Language The LCD Language screen allows you to select the language used for LCD panel messages. The currently active language is highlighted with a light blue background. 1. Use the up, down, left, and right arrow buttons to highlight the desired language. 2. Press the center button. The Accept icon appears and is highlighted. 3. Press the center button to confirm the change. The LCD Setup menu is displayed.
The tables in the error section list the error and warning messages that are displayed on the various LCD screens and the possible cause of the message. Text enclosed in angled brackets (< >) indicates that the text may vary. Status information on the LCD includes descriptive information about the modules in the chassis. The tables in this section describe the information that is displayed for each component.
Item Description PSU redundancy mode Non-Redundant, Grid Redundant, or DC Redundant. Table 35. Fan Status Item Description Name/Location Example: Fan1, Fan2, and so on. Error Messages If there are no errors, No Errors is displayed. Else, error messages are listed where critical ones are first listed, and then the warning-related. RPM Current fan speed in RPM. Table 36. PSU Status Item Description Name/Location Example: PSU1, PSU2, and so on.
Item Description Slot Indicates the server slot to which the KVM is mapped to. Possible values are SLOT-<01 to 04>. Unmapped Displayed if the KVM is not mapped to any of the servers. Table 39. DVD Mapping Status Item Description Server Displays a list of servers to which the DVD can be mapped. Error Messages If there are no errors, No Errors is displayed. Else, error messages are listed where critical ones are first listed, and then the warningrelated.
Item Description State Offline, Online, or Standby — Indicates the power status of a SPERC. Table 42. PCIe Card Status Item Description PCIe Card Displays the PCIe Card name in the format PCIe Card , where 'n' is the PCIe Card number. Example: PCIe Card 1, PCIe Card 2, and so on. Error Messages If there are no errors, No Errors is displayed. Else, error messages are listed where critical ones are first listed, and then the warning-related.
Item Description NOTE: You can set this table through the CMC CLI or CMC Web interface. Name Name of the server, which the user can set through Dell OpenManage. The name is displayed only if iDRAC has finished booting, and the server supports this feature, else iDRAC booting messages are displayed. Model Number Displays if iDRAC finished booting. Service Tag Displays if iDRAC finished booting. BIOS Version Server BIOS firmware version.
Frequently Asked Questions 19 This section lists the frequently asked questions about the following: • RACADM • Managing and Recovering a Remote System • Active Directory • FlexAddress and FlexAddressPlus • IOM RACADM After performing a CMC reset (using the RACADM racreset subcommand), when a command is entered, the following message is displayed: racadm Transport: ERROR: (RC=-1) What does this message mean? Another command must be issued only after CMC completes the reset.
Managing and Recovering a Remote System Why are the remote RACADM and Web-based services unavailable after a property change? It may take a minute for the remote RACADM services and the web interface to become available after the CMC Web server resets. The CMC web server is reset after the following occurrences: • Changing the network configuration or network security properties using the CMC web user interface.
When accessing the CMC Web interface, a security warning stating that the host name of the SSL certificate does not match the host name of CMC is displayed. CMC includes a default CMC server certificate to ensure network security for the web interface and remote RACADM features. When this certificate is used, the web browser displays a security warning if the default certificate does not match the host name of CMC (for example, the IP address).
Are there any restrictions on Domain Controller SSL configuration? Yes. All SSL certificates for Active Directory servers in the forest must be signed by the same root certificate authority-signed certificate, because CMC only allows upload of one trusted certificate authority-signed SSL certificate. The Web interface does not launch after a new RAC certificate is created and uploaded.
If the chassis service tag is reprogrammed, what happens if there is a feature card bound to that chassis? • If the original feature card is present in the active CMC on that or any other chassis, the Web interface displays the following error message: This feature card was activated with a different chassis. It must be removed before accessing the FlexAddress feature.
What happens to FlexAddress if I need to reset my chassis configuration using the RACADM command, racresetcfg? The FlexAddress feature will still be activated and ready to use. All fabrics and slots are selected as default. NOTE: It is highly recommended that you turn off your chassis before running the RACADM command racresetcfg.