Dell Chassis Management Controller Version 1.
Notes, cautions, and warnings NOTE: A NOTE indicates important information that helps you make better use of your product. CAUTION: A CAUTION indicates either potential damage to hardware or loss of data and tells you how to avoid the problem. WARNING: A WARNING indicates a potential for property damage, personal injury, or death. © 2016 Dell Inc. All rights reserved. This product is protected by U.S. and international copyright and intellectual property laws.
Contents 1 Overview.........................................................................................................................11 Key Features......................................................................................................................................................................11 What is new in this release..........................................................................................................................................12 Management features.
Configuring chassis management at server mode.............................................................................................................31 Configuring chassis management at server using CMC web interface........................................................................31 Configuring chassis management at server mode using RACADM..............................................................................31 3 Logging into CMC..........................................................
Viewing chassis summary.................................................................................................................................................53 Viewing chassis controller information and status............................................................................................................ 53 Viewing information and health status of all servers.........................................................................................................
Applying Chassis Configuration Profiles......................................................................................................................67 Exporting Chassis Configuration Profiles....................................................................................................................67 Editing Chassis Configuration Profiles........................................................................................................................
Clearing Boot Identity Profiles.................................................................................................................................... 87 Viewing Stored Boot Identity Profiles......................................................................................................................... 87 Importing Boot Identity Profiles..................................................................................................................................
Configuring the generic LDAP directory to access CMC.......................................................................................... 103 Configuring generic LDAP directory service using CMC web interface.................................................................... 103 Configuring generic LDAP directory service using RACADM.................................................................................... 104 11 Configuring CMC for Single Sign-On or Smart Card login........................
Viewing basic WWN/MAC address information using web interface..............................................................................122 Viewing advanced WWN/MAC address information using web interface.......................................................................122 Viewing WWN/MAC address information using RACADM............................................................................................. 123 14 Managing Fabrics................................................................
Executing Power Control Operations........................................................................................................................137 Executing Power Control Operations for Multiple Servers Using CMC Web Interface..............................................137 Executing Power Control Operations on the IOM.....................................................................................................138 17 Configuring PCIe slots.................................................
1 Overview The Dell Chassis Management Controller (CMC) for PowerEdge FX2/FX2s is a Systems Management hardware and software solution for managing the PowerEdge FX2/FX2s chassis. The CMC has its own microprocessor and memory and is powered by the modular chassis into which it is plugged. The CMC enables an IT administrator to: • View inventory. • Perform configuration and monitoring tasks. • Remotely turn on and turn off chassis and servers.
What is new in this release This release of CMC for Dell PowerEdge FX2/FX2s supports: • Performing racresetcfg from CMC GUI. • Enabling Federal Information Processing Standards (FIPS) 140-2 cryptography. • Disabling AC Power Recovery. • Updating the OpenSSL open source package to version 1.0.2f. • Updating the OpenSSH open source package to version 7.1p1. • Updating glibc to version 2.23 to address new security vulnerabilities. • TLS 1.2 and TLS 1.1 by default.
• iDRAC IO Identity feature support for enhanced WWN/MAC Address Inventory. • FlexAddress feature — Replaces the factory-assigned World Wide Name/Media Access Control (WWN/MAC) IDs with chassis-assigned WWN/MAC IDs for a particular slot, an optional upgrade. • Graphical display of chassis component status and health. • Support for single and multi-slot servers. • iDRAC single sign-on. • Network time protocol (NTP) support. • Enhanced server summary, power reporting, and power control pages.
Item Indicator, Button, or Connector 3 Ethernet connector STK/Gb2 (stack) 4 System identification button 5 Low-profile PCIe expansion slots 6 Power supply (PSU1) 7 Power supply (PSU2) 8 I/O module (2) 9 I/O module ports 10 I/O module indicators A Front Panel view of the chassis is given here with a table that lists the parts and devices available in the CMC. Figure 2.
Table 1. Supported remote access connections Connection Features CMC Network Interface ports • Gb ports: Dedicated network interface for the CMC web interface. The CMC has two RJ-45 Ethernet ports: – Gb1 (the uplink port) – Gb2 (the stacking or cable consolidation port). The STK/Gb2 port can also be used for CMC NIC failover. NOTE: Ensure that the CMC setting is changed from default Stacking to Redundant to implement NIC failover.
NOTE: By default, TLS 1.1 and TLS 1.2 are supported in this release. However, to enable TLS 1.0 use the following racadm command: $ racadm config -g cfgRacTuning -o cfgRacTuneTLSProtocolVersionEnable TLSv1.0+ Supported firmware versions The following table lists the firmware versions for BIOS, iDRAC, and Lifecycle Controller that support the servers listed: Table 2. Latest Firmware Versions for BIOS, iDRAC, and Lifecycle Controller Servers BIOS iDRAC Lifecycle Controller PowerEdge FC830 2.2.5 2.40.
Table 4.
Storage sled licenses can be used for one or two RAID controllers. If a license is assigned to RAID on a single controller, the license is applicable only to the first controller. Deleting a storage sled license may result in loss of RAID data. Storage sled licenses are specific to a storage sled and are associated to the Service Tag of the storage sled. For example, if you move a storage sled from one chassis to another, the license is also moved along with the storage sled.
For storage sleds, the new license overwrites the existing license in the CMC license manager and the storage sled persistent store. Power off the storage sleds before replacing the license. The licensed features are available only after the RAID controller is reset at the next host reboot. • An evaluation license may be replaced with an upgraded evaluation license or with a purchased license. • A purchased license may be replaced with an updated license or with an upgraded license.
License/Component state or condition Import Export Delete Replace Learn More Non-administrator login No Yes No No Yes Active license Yes Yes Yes Yes Yes Expired license No Yes Yes Yes Yes License installed but component missing No Yes Yes No Yes Viewing localized versions of the CMC web interface To view localized versions of the CMC web interface, read through your web browser's documentations. To view the localized versions, set the browser to the desired language.
• The setup placemat shipped with your system provides information about the initial system setup and configuration. • The server module's Owner's Manual provides information about the server module's features and describes how to troubleshoot the server module and install or replace the server module's components. This document is available online at dell.com/poweredgemanuals. • The rack documentation included with your rack solution describes how to install your system into a rack, if required.
2 Installing and setting up CMC This section provides information about how to install your CMC hardware, establish access to CMC, configure your management environment to use CMC, and guides you through the tasks for configuring a CMC: • Set up initial access to CMC. • Access CMC through a network. • Add and configure CMC users. • Update CMC firmware. Installing CMC hardware The CMC is pre-installed on your chassis and hence no installation is required.
You can also power on the chassis using the command line interface, use racadm chassisaction powerup command to accomplish it. NOTE: Do not turn on the servers. 7. The default CMC network configuration is Static with the CMC IP address 192.168.0.120. If you want to change the network configuration to DHCP, connect a serial cable to serial port on the CMC. For more information on serial connection, refer to Serial interface/protocol setup in Using Remote Access Software From a Management Station section.
1 Management Network 2 Active CMC The following figure illustrates an example of incorrect cabling of CMC in stacking mode.
Following are the steps to daisy-chain four FX2 CMC modules: 1. Connect the GB port of the FX2 CMC in the first chassis to the management network. 2. Connect the GB port of the FX2 CMC in the second chassis to the STK port of the FX2 CMC in the first chassis. 3. If you have a third chassis, connect the GB port of its FX2 CMC to the STK port of the FX2 CMC in the second chassis. 4. If you have a fourth chassis, connect the GB port of its FX2 CMC to the STK port of the FX2 CMC in the third chassis.
browser on the management station. For a list of supported Web browsers, see the Supported Browsers section in the Dell System Software Support Matrix at dell.com/support/ manuals. Telnet Provides command line access to CMC through the network. The RACADM command line interface and the connect command, which is used to connect to the serial console of a server or IO module, are available from the CMC command line. NOTE: Telnet is not a secure protocol and is disabled by default.
Launching CMC using other systems management tools You can also launch CMC from the Dell Server Administrator or Dell OpenManage Essentials. To access CMC interface using Dell Server Administrator, launch Server Administrator on your management station. In the left pane of the Server Administrator home page, click System → Main System Chassis → Remote Access Controller. For more information, see the Dell Server Administrator User’s Guide at dell.com/support/manuals.
NOTE: When using the RACADM remote capability, you must have the 'write' permission on the folders where you are using the RACADM subcommands, involving the file operations. For example, racadm getconfig -f . Uninstalling remote RACADM from a Linux management station 1. Log in as root to the system where you want to uninstall the management station features. 2. Run the following rpm query command to determine which version of the DRAC tools is installed: rpm -qa | grep mgmtst-racadm 3.
To configure Internet Explorer to play animations: 1. Start Internet Explorer. 2. Click Tools → Internet Options → Advanced. 3. Go to the Multimedia section, and then select the Play animations in web pages option. Downloading and updating CMC firmware To download the CMC firmware, see Downloading CMC Firmware. To update the CMC firmware, see Updating CMC Firmware.
Configuring LEDs to identify components on the chassis You can enable the LEDs of components (chassis, servers, storage sleds, and I/O Modules) to blink so that you can identify the component on the chassis. NOTE: To modify these settings, you must have the Debug Administrator privilege on a CMC. When a compute sled is performing an identify action, the front LED of the connected storage sled also flashes the identify pattern.
Configuring power button To configure the chassis power button: 1. In the left pane, click Chassis Overview → Front Panel → Setup. 2. On the Front Panel Configuration page, under the Power Button Configuration section, select the Disable Chassis Power Button option, and then click Apply. The chassis power button is disabled. Accessing a server using KVM To map a Server to KVM from web interface: 1.
• 32 To change Chassis Management at server mode to manage and monitor, use: racadm config –g cfgRacTuning – cfgRacTuneChassisMgmtAtServer 2
3 Logging into CMC You can log in to CMC as a CMC local user, as a Microsoft Active Directory user, or as an LDAP user. You can also log in using Single Sign-On or a Smart Card. Configure public key authentication over SSH You can configure up to six public keys that can be used with the service username over an SSH interface. Before adding or deleting public keys, make sure to use the view command to see what keys are already set up, so that a key is not accidentally overwritten or deleted.
3. Click Generate and move the mouse in the window as directed. After the key is created, you can modify the key comment field. You can also enter a passphrase to make the key secure. Ensure that you save the private key. 4. You have two options for using the public key: • Save the public key to a file to upload later. • Copy and paste the text from the Public key for pasting window when adding the account using the text option.
To log in as a local user, Active Directory user, or LDAP user. 1. In the Username field, type your user name: • CMC user name: NOTE: The CMC user name can contain only alphanumeric characters and certain special characters. The at (@) symbol and following special characters are not supported: – Forward slash (/) – Backward slash (/) – Semicolon (;) – Backward Quote (`) – Quotations (“) • Active Directory user name: \, / or @.
NOTE: If you changed the default HTTPS port number (port 80), access the CMC web page using :, where cmcname is the CMC host name for CMC, domain-name is the domain name, and port number is the HTTPS port number. 2. Insert the smart card and click Login. 3. Type the PIN and click Submit. The PIN dialog box is displayed. NOTE: If the smart card user is present in Active Directory, an Active Directory password is not required.
• Logging in: ssh service@ or ssh service@, where IP_address is the CMC IP address. • Sending RACADM commands: ssh service@ racadm getversion and ssh service@ racadm getsel When you log in using the service account, if a passphrase was set up when creating the public or private key pair, you may be prompted to enter that passphrase again. If the passphrase is used with the keys, client systems running Windows and Linux provide methods to automate the method.
4 Updating firmware You can update firmware for: • The CMC • Chassis infrastructure • I/O Module You can update firmware for the following server components: • BIOS • iDRAC7 • iDRAC8 • Lifecycle Controller • 32–bit diagnostics • Operating system Drivers Pack • Network Interface Controllers • RAID controllers Signed CMC firmware image The CMC firmware includes a signature. The CMC firmware performs a signature verification step to ensure the authenticity of the uploaded firmware.
• Chassis Overview → Chassis Controller → Update • Chassis Overview → Server Overview → Server Component Update The Firmware Update page displays the current version of the firmware for each listed component and allows you to update the firmware to the latest version. If the chassis contains an earlier generation server, whose iDRAC is in recovery mode or if CMC detects that iDRAC has corrupted firmware, then the earlier generation iDRAC is also listed on the Firmware Update page.
5. For the CMC, during the final phases of the firmware update process, the browser session and connection with CMC is lost temporarily because the CMC is not connected to the network. You must log in after a few minutes, when the CMC has restarted. After CMC resets, the new firmware version is displayed on the Firmware Update page. NOTE: After the firmware update, delete the files from the web browser cache. For instructions about clearing the browser cache, see the web browser’s online help.
2. • Chassis Overview → Chassis Controller → Update. On the Firmware Update page, in the Chassis Infrastructure Firmware section, in the Update Targets column, select the option, and then click Apply Chassis Infrastructure Firmware. 3. On the Firmware Update page, click Browse, and then select the appropriate chassis infrastructure firmware. 4. Click Begin Firmware Update, and then click Yes. The Firmware Update Progress section provides firmware update status information.
Updating server component firmware The one-to-many update feature in CMC enables you to update server component firmware across multiple servers. You can update the server components using the Dell Update Packages available on the local system or on a network share. This operation is enabled by leveraging the Lifecycle Controller functionality on the server. The Lifecycle Controller service is available on each server and is facilitated by iDRAC.
NOTE: The Single Click all blade update method has the following benefits: • Enables you to update all the components on all the blade servers with minimal clicks. • All the updates are packaged in a directory. This avoids individual upload of each component’s firmware. • Faster and consistent method of updating the server components.
Enabling Lifecycle Controller You can enable the Lifecycle Controller service when turning on a server: • For iDRAC servers, on the boot console, to access System Setup, press the key. • On the System Setup Main Menu page, go to iDRAC Settings → Lifecycle Controller, click Enabled. Go to the System Setup Main Menu page and click Finish to save the settings. • Cancelling System Services enables you to cancel all scheduled jobs that are pending and remove them from the queue.
• Automatic filtering is important for firmware updates of Network Interface Controllers (NIC) and RAID Controllers. These device categories have different types and models. Similarly, the firmware update images (DUP) may be available in optimized forms, where a single DUP may be programmed to update multiple types or models of devices of a given category.
Field Description Component/ Device Displays a description of the component or device on the server. If the column width is too narrow, the mouse-over tool provides a view of the description. Current Version Displays the current version of component or device on the server. Rollback Version Displays the rollback version of component or device on the server. Job Status Displays the job status of any operations that are scheduled on the server. The job status is continuously updated dynamically.
• User Name • Password For more information, see the CMC for Dell PowerEdge FX2/FX2s Online Help. 3. Click Test Directory to verify whether the directories are readable and writeable. 4. Click Test Network Connection to verify if the network share location is accessible. 5. Click Apply to apply the changes to the network share properties. NOTE: Click Back to return to the Server Component Update page.
5. Click Reinstall. The firmware version is reinstalled for the selected component or device. Rolling back server component firmware You can install the firmware image of the previously installed firmware for selected components or devices across one or more servers. The firmware image is available within the Lifecycle Controller for a rollback operation. The availability is subject to the version compatibility logic of the Lifecycle Controller.
A second table is displayed that lists the selected type of component or device and a selector for the firmware image file. For each type of component, one selector for the firmware image file is displayed. Few devices such as Network Interface Controllers (NICs) and RAID Controllers contain many types and models. The update selection logic automatically filters the relevant device type or model based on the initially selected devices.
5. Click Check for Updates to view the firmware updates available in the network share. The Component/Device Firmware Inventory section displays the current firmware versions of the components and devices across all the servers present in the chassis and firmware versions of the DUPs available in the Network Share. NOTE: Click Collapse against a slot to collapse the component and device firmware details for the specific slot. Alternatively, to view all the details again, click Expand. 6.
5 Viewing chassis information and monitoring chassis and component health You can view information and monitor the health of the following: • CMC • All severs and individual servers • IO Modules • Fans • Power Supply Units (PSUs) • Temperature sensors • PCIe devices • Storage sleds Viewing chassis and component summaries When you log in to the CMC web interface, the Chassis Health page displays the health of the chassis and its components.
The following table lists the component properties and information displayed on the Chassis Health page in web interface.
Component Fans IOM Slot Heath and Performance Properties Properties Quick Links • Speed • Warning Threshold • Fans Status • PWM (% of Max) • Critical Threshold • Fan Configuration • Fan Offset • Power State • Model • Role • Service Tag IOM Status Viewing server model name and Service Tag You can view the model name and Service Tag of each server instantly using the following steps: 1.
The Storage Array Status page displays the storage sled properties and the list of storage nodes connected to the compute sled. For more information, see Online Help. Viewing information and health status of the IOMs To view health status of the IOMs, in the CMC Web interface, do any of the following: 1. Click Chassis Overview. The Chassis Health page is displayed. The graphics in the left pane displays the rear, front, and top view of the chassis and contains the health status for the IOM.
NOTE: The following message is displayed when both the fans are not present in the slots or if a fan is rotating at a low speed: Fan is less than the lower critical threshold. For more information, see the Online Help. Configuring fans Fan Offset — This feature allows you to increase the airflow delivery to the PCIe card slots. An example usage of the Fan Offset is when you use high-power or custom PCIe cards that require more cooling than normal.
6 Configuring CMC Chassis Management Controller enables you to configure properties, set up users, and alerts to perform remote management tasks. Before you begin configuring the CMC, you must first configure the CMC network settings to allow CMC to be managed remotely. This initial configuration assigns the TCP/IP networking parameters that enable access to the CMC. You can configure CMC using Web interface or Setting up Initial Access to CMC RACADM.
NOTE: If you disable CMC network interface, the disable operation performs the following actions: • Disables the network interface access to out-of-band chassis management, including iDRAC and IOM management. • Prevents the down link status detection. To disable only CMC network access, disable both CMC IPv4 and CMC IPv6. NOTE: The CMC NIC is enabled by default.
For IPv4, to set the preferred primary and secondary DNS IP server addresses, type: racadm config -g cfgLanNetworking -o cfgDNSServer1 racadm config -g cfgLanNetworking -o cfgDNSServer2 For IPv6, to set the preferred and secondary DNS IP Server addresses, type: racadm config -g cfgIPv6LanNetworking -o cfgIPv6DNSServer1 racadm config -g cfgIPv6LanNetworking -o cfgIPv6DNSServer2 Viewing and modifying CMC network LAN settings The LAN settings, such as
where < name > is a string of up to 63 alphanumeric characters and hyphens. For example: cmc-1, d-345. NOTE: If a DNS Domain name is not specified then the maximum number of characters is 63. If a domain name is specified then the number of characters in CMC name plus the number of characters in the DNS Domain Name must be less than or equal to 63 characters. • DNS Domain Name — The default DNS domain name is a single blank character.
• When Management Port 2 is set for Stacking but is cabled for Redundant (two connections to the TOR switch), routing loops could cause a network storm. Configuring Management Port 2 using RACADM To specify Redundant operation, use racadm config –g cfgNetTuning –o cfgNetTuningNicRedundant 1 command. To specify Stacking operation, use racadm config –g cfgNetTuning –o cfgNetTuningNicRedundant 0 command. By default, the Management Port 2 is set for Stacking.
3. Under the Federal Information Processing Standards (FIPS) section, from the FIPS Mode drop-down menu, select Enabled. A message is displayed that enabling FIPS resets CMC to the default settings. 4. Click OK to proceed. Enabling FIPS Mode Using RACADM To enable FIPS mode, run the following command: racadm config –g cfgRacTuning –o cfgRacTuneFipsModeEnable 1 . Disabling FIPS Mode To disable FIPS mode, reset CMC to the default factory settings.
• cfgRacTuning • cfgRacTuneRemoteRacadmEnable For more information about these objects, see the Chassis Management Controller for PowerEdge FX2/FX2s RACADM Command Line Reference Guide available at dell.com/support/manuals. If the firmware on the server does not support a feature, configuring a property related to that feature displays an error. For example, using RACADM to enable remote syslog on an unsupported iDRAC displays an error message.
To set up the Chassis Group using the CMC web interface: 1. Log in with chassis administrator privileges to the leader chassis. 2. Click Setup → Group Administration. 3. On the Chassis Group page, under Role, select Leader. A field to add the group name is displayed. 4. Type the group name in the Group Name field, and then click Apply. NOTE: The same rules that apply for a domain name apply to the group name. When the chassis group is created, the GUI automatically switches to the Chassis Group page.
3. Click Setup → Group Administration. 4. In the Chassis Group page, under Role, select None, and then click Apply. The lead chassis then communicates to all the members that they have been removed from the group. The lead chassis can be assigned as a leader or member of a new group. If a network issue prevents contact between the leader and the member, the member chassis may not receive the message. In this case, disable the member from the member chassis to complete the removal process.
Select only those setting categories that you want identically configured, across all members of the chassis group. For example, select Logging and Alerting Properties category, to enable all chassis in the group to share the logging and alerting configuration settings of the lead chassis. 6. Click Save. If On-Change Propagation is selected, the member chassis take on the properties of the leader.
Chassis Configuration Profiles The Chassis Configuration Profiles feature enables you to configure the chassis with the chassis configuration profiles stored in the network share or local management station, and also restore configuration of the chassis. To access the Chassis Configuration Profiles page in the CMC web interface, in the system tree, go to Chassis Overview and click Setup → Profiles. The Chassis Configuration Profiles page is displayed.
To restore the chassis configuration, perform the following tasks: 1. Go to the Chassis Configuration Profiles page. In the Restore Configuration → Restore Chassis Configuration section, click Browse and select the backup file to import the saved chassis configuration. 2. Click Restore Configuration to upload an encrypted backup file (.bak) or a .xml stored profile file to the CMC. The CMC web interface returns to the login page after a successful restore operation. NOTE: If the backup files (.
Editing Chassis Configuration Profiles You can edit chassis configuration profile name of a chassis. To edit a chassis configuration profile name, perform the following tasks: 1. Go to the Chassis Configuration Profiles page. In the Chassis Configuration Profiles → Stored Profiles section, select the required profile and then click Edit Profile. The Edit Profile window is displayed. 2. Enter a desired profile name in the Profile Name field and click Edit Profile.
1. To export the chassis configuration profiles as clone.xml file, type the following: racadm –r xx.xx.xx.xx –u USERNAMECMC –p PASSWORDCMC get –f clone.xml –t xml Importing Chassis Configuration profiles You can import chassis configuration profiles from network share to another chassis by using the set command. 1. To import the chassis configuration profiles from CIFS network share, type the following: racadm set –f clone.xml –t xml –l //xx.xx.xx.xx/PATH –u USERNAME –p PASSWORDCMC 2.
When you query a specific CMC card using its group ID and object ID, RACADM creates the racadm.cfg configuration file from the retrieved information. By exporting the file to one or more CMCs, you can configure your controllers with identical properties in a minimal amount of time. NOTE: Some configuration files contain unique CMC information (such as the static IP address) that must be modified before you export the file to other CMCs. 1.
• • All parameters are specified as "object=value" pairs with no white space between the object, =, or value. White spaces that are included after the value are ignored. A white space inside a value string remains unmodified. Any character to the right of the = (for example, a second =, a #, [, ], and so on) is taken as-is. These characters are valid modem chat script characters. [cfgLanNetworking] -{group name} cfgNicIpAddress=143.154.133.121 {object value} The .cfg parser ignores an index object entry.
# comment, the rest of this line is ignored cfgNicGateway=10.35.9.1 The command racadm config -f .cfg parses the file and identifies any errors by line number. A correct file updates the proper entries. Additionally, you can use the same getconfig command from the previous example to confirm the update. Use this file to download company-wide changes or to configure new systems over the network with the command, racadm getconfig -f .cfg.
7 Configuring servers You can configure the following settings of a server: • Slot Names • iDRAC Network Settings • DRAC VLAN Tag Settings • First Boot Device • Server FlexAddress • Remote File Share • BIOS Settings Using Server Clone Configuring slot names Slot names are used to identify individual servers. When choosing slot names, the following rules apply: • Names may contain a maximum of 15 non-extended ASCII characters (ASCII codes 32 through 126).
For more information about the OMSA agent, see the Dell OpenManage Server Administrator User's Guide available at dell.com/support/manuals. 4. To use the iDRAC DNS name as slot name, select Use iDRAC DNS Name for Slot Name option. This option replaces the static slot names with the respective iDRAC DNS names, if it is available. If iDRAC DNS names are not available, the default or edited slot names are displayed.
Setting Description Confirm iDRAC Root Password Allows you to retype the password provided in the Password field. Enable iDRAC LAN Enables or disables the iDRAC LAN channel. By default, this option is cleared. Enable iDRAC IPv4 Enables or disables IPv4 on iDRAC. By default, this option is selected. Enable iDRAC IPMI over LAN Enables or disables the IPMI over LAN channel for each iDRAC present in the chassis. By default, this option is selected.
3. Setting Description iDRAC IPv6 Gateway Specifies the default IPv6 gateway to be assigned to the iDRACs. The default value is "::". iDRAC IPv6 Prefix Length Specifies the prefix length to be assigned for the IPv6 addresses on the iDRAC. The default value is 64. Use CMC DNS Settings Enables the CMC DNS Server settings ( IPv4 and IPv6) that are propagated to iDRAC when a blade server is inserted in the chassis. Click Save QuickDeploy Settings to save the settings.
• Top row contains only full-width sleds and bottom row contains only half-width sleds: • Top row contains full-width sleds and bottom row contains only quarter-width sleds: NOTE: The Reserved QuickDeploy IPAddresses must be set to a minimum of 8. Modifying iDRAC Network Settings for individual server iDRAC Using this feature, you can configure the iDRAC network configurations settings for each installed server.
NOTE: The iDRAC VLAN settings from CMC are effective only when iDRAC NIC selection is set on the iDRAC for Chassis (dedicated) LOM mode. Configuring iDRAC VLAN tag settings using web interface To configure VLAN for server: 1. Go to any of the following pages: • In the left pane, click Chassis Overview → Network → VLAN. 2. • In the left pane, click Chassis Overview → Server Overview and click Setup → VLAN.
Table 10. Boot Devices Boot Device Description PXE Boot from a Preboot Execution Environment (PXE) protocol on the Network Interface Card. Hard Drive Boot using a Hard disk drive. Local CD/DVD Boot from a CD or DVD drive on the server. BIOS Setup Boot during the BIOS setup. Virtual Floppy Boot from a virtual floppy disk. Virtual CD/DVD Boot from a Virtual CD or DVD drive. Local SD Card Boot from the local SD (Secure Digital) card. Remote File Share Boot from remote file share.
Configuring sled network uplink You can configure the Sled Network Uplink only on the PowerEdge FM120x4 sleds that contain an internal network switch. To configure the Sled Network Uplink, go to Chassis Overview → Server Overview → Setup → Sled Network Uplink Select one of the following values for Sled network uplink configuration Property: • Standard (aggregated): Uplink configuration where all four IOM uplink ports are configured in a single trunk group and all LOMs are mapped to that group.
Configuring profile settings using server configuration replication The server configurations replicating feature allows you to apply all profile settings from a specified server to one or more servers. Profile settings that can be replicated are those profile settings which can be modified and are intended to be replicated across servers. The following three profile groups for servers are displayed and can be replicated: • BIOS — This group includes only the BIOS settings of a server.
Adding or saving profile Before copying the properties of a server, first capture the properties to a stored profile. Create a stored profile and provide a name and optional description for each profile. You can save a maximum of 16 stored profiles on the CMC nonvolatile extended storage media. NOTE: If a remote share is available, you can store a maximum of 100 profiles using the CMC extended storage and remote share.
A warning message is displayed that applying a new server profile overwrites the current settings and also reboots the selected servers. You are prompted to confirm if you want to continue the operation. NOTE: To perform server cloning operations on servers, the CSIOR option must be enabled for the servers. If CSIOR option is disabled, a warning message is displayed that CSIOR is not enabled for the servers. To complete the blade cloning operation, make sure to enable CSIOR option on the servers. 4.
To edit a stored profile: 1. Go to the Server Profiles page. In the Stored Profiles section, select the required profile and then click Edit Profile. The Edit BIOS Profile — section is displayed. 2. Edit the profile name and description of the server profile as required and then click Edit Profile. NOTE: You can edit the profile description only for profiles stored on SD cards. For more information, see the Online Help.
Quick Deploy of profiles The Quick Deploy feature enables you to assign a stored profile to a server slot. Any server supporting server configuration replication that is inserted into a slot is configured using the profile assigned to that slot. You can perform the Quick Deploy action only if the Action When Server is Inserted option in the Deploy iDRAC page is set to Server Profile or Quick Deploy and Server Profile.
• Initial setup – Create a range of virtual MAC addresses. To create a MAC address, you must have Chassis Configuration Administrator and Server Administrator privileges. – Save boot identity profile templates and customize the boot identity profiles on the network share by editing and including the SAN boot parameters that are used by each server. – Prepare the servers that use initial configuration before applying their Boot Identity profiles.
To apply a profile to a server, perform the following tasks: 1. Go to the Server Profiles page. In the Boot Identity profiles section, select the server on which you want to apply the selected profile. The Select Profile drop-down menu gets enabled. NOTE: The Select Profile drop-down menu displays all available profiles that are sorted by type from the network share. 2. From the Select Profile drop-down menu, select the profile that you want to apply. The Apply Identity option is enabled. 3.
To export a stored profile, perform the following tasks: 1. Go to the Server Profiles page. In the Boot Identity Profiles → Stored Profiles section, select the required profile and then click Export Profile. A File Download message is displayed prompting you to open or save the file. 2. Click Save or Open to export the profile to the required location. Deleting Boot Identity Profiles You can delete a boot identity profile that is stored on the network share.
NOTE: You cannot add a MAC address that exists in the MAC address pool. An error is displayed indicating that the newly added MAC address exists in the pool. To add MAC addresses to the network share: 1. Go to the Server Profiles page. In the Boot Identity Profiles → Manage Virtual MAC Address Pool section, click Add MAC Addresses. 2. Enter the starting MAC address of the MAC address pool in the Starting MAC Address field. 3.
NOTE: The term "the same account" in this context means that the user has the same login name with a matching password for CMC and for iDRAC. The user who has the same login name without a matching password, is considered to have the same account. NOTE: Users may be prompted to log in to iDRAC (see the third Single Sign-on policy bullet above). NOTE: If the iDRAC network LAN is disabled (LAN Enabled = No), single sign-on is not available.
8 Configuring storage sleds Half-width storage sleds that are used in the FX2s chassis contain the following: • One or two RAID controllers • Maximum of 16 disk drives You can configure individual storage sleds containing two RAID controllers to operate in the following modes: • Split-single • Split-dual • Joined NOTE: Do not insert a storage sled in slot 1 of the chassis as it is not a valid location for storage sleds. NOTE: This section is applicable only to dual-controller storage modules.
3. Under Components, select one of the following options: • Split Dual Host • Split Single Host • Joined NOTE: Power off the compute sled before configuring the storage sled. Click Server Power Control at the top of the page to power off the compute sled. For more information, see the Online Help. 4. Click Apply. Configuring storage sleds using RACADM You can connect storage sleds with compute sleds using the config or getconfig RACADM command with the cfgStorageModule option.
9 Configuring CMC to send alerts You can set alerts and actions for certain events that occur on the chassis. An event occurs when the status of a system component is greater than the pre-defined condition. If an event matches an event filter and you have configured this filter to generate an alert message (email alert or SNMP trap), then an alert is sent to one or more configured destinations such as email address, IP address, or an external server. To configure CMC to send alerts: 1.
NOTE: For more information on configuring SNMP protocol and trap format, see the Dell Chassis Management Controller for PowerEdge FX2/FX2s RACADM Command Line Reference Guide. Configuring SNMP Trap Alert Destinations Using CMC Web Interface To configure IPv4 or IPv6 alert destination settings using CMC Web interface: 1. In the system tree, go to Chassis Overview, and then click Alerts → Trap Settings. The Chassis Event Alert Destinations page is displayed. 2.
NOTE: The commands in steps 2–5 overwrites any existing settings configured for the index specified (1–4). To determine whether an index has previously configured values, type: racadm getconfig -g cfgTraps -i . If the index is configured, values appear for the cfgTrapsAlertDestIPAddr and cfgTrapsCommunityName objects. 6. To test an event trap for an alert destination, type: racadm testtrap -i where is a value 1–4 representing the alert destination you want to test.
where is the name of the person or group receiving the email alert, and is the index value specified in step 4 and step 5. The email name can contain up to 32 alphanumeric characters, dashes, underscores, and periods. Spaces are not valid. 6. Setup the SMTP host: racadm config -g cfgRemoteHosts -o cfgRhostsSmtpServerIpAddr host.domain where host.domain is the FQDN. You can configure up to four destination email addresses to receive email alerts.
10 Configuring user accounts and privileges You can setup user accounts with specific privileges (role-based authority) to manage your system with CMC and maintain system security. By default, CMC is configured with a default root account. As an administrator, you can set up user accounts to allow other users to access the CMC. You can set up a maximum of 16 local users, or use directory services such as Microsoft Active Directory or LDAP to setup additional user accounts.
Privilege Description NOTE: CMC users with the Chassis Configuration Administrator privilege can configure power settings. However, the Chassis Control Administrator privilege is required to perform chassis power operations, including power on, power off, and power cycle. User Configuration Administrator User can: • • • • Add a new user. Change the password of a user. Change the privileges of a user.
Privilege Description • • • • • Power on Power off Power cycle Graceful shutdown Server Reboot Test Alert User User can send test alert messages. Debug Command Administrator User can execute system diagnostic commands. Fabric A Administrator User can set and configure the Fabric A IOM. The CMC user groups provide a series of user groups that have pre-assigned user privileges.
Table 13.
Configure local users using RACADM NOTE: You must be logged in as a root user to execute RACADM commands on a remote Linux system. You can configure up to 16 users in the CMC property database. Before you manually enable a CMC user, verify if any current users exist. If you are configuring a new CMC or if you have used the racadm racresetcfg command, the only current user account is default root account. The racresetcfg subcommand resets all configuration parameters to the default values.
In Active Directory, a standard group object is used as a role group. A user who has CMC access is a member of the role group. To give this user access to a specific CMC card, the role group name and its domain name need to be configured on the specific CMC card. The role and the privilege level is defined on each CMC card and not in the Active Directory. You can configure up to five role groups in each CMC. The following table shows the default role group privileges. Table 14.
Configuring extended schema Active Directory To configure Active Directory to access CMC: 1. Extend the Active Directory schema. 2. Extend the Active Directory Users and Computers Snap-in. 3. Add CMC users and their privileges to Active Directory. 4. Enable SSL on each of your domain controllers. 5. Configure CMC Active Directory properties using CMC web interface or RACADM.
4. Click Apply to save the settings. NOTE: You must apply the settings before continuing. If you do not apply the settings, the settings are lost when you navigate to the next page. 5. In the Group Settings section, click a Role Group. 6. On the Configure LDAP Role Group page, specify the group domain name and privileges for the role group. 7. Click Apply to save the role group settings, click Go Back To Configuration page, and then select Generic LDAP. 8.
11 Configuring CMC for Single Sign-On or Smart Card login This section provides information to configure CMC for Smart Card login and Single Sign-On (SSO) login for Active Directory users. SSO uses Kerberos as an authentication method allowing users, who have signed in as an automatic- or single sign-on to subsequent applications such as Exchange.
Prerequisites for Single Sign-On or Smart Card login The pre-requisites to configure SSO or Smart Card logins are: • Setup the Kerberos realm and Key Distribution Center (KDC) for Active Directory (ksetup). • A robust NTP and DNS infrastructure to avoid issues with clock drift and reverse lookup. • Configure CMC with Active Directory standard schema role group with authorized members.
4. In the Proxy server section, select the Use a proxy server for your LAN (These settings will not apply to dial-up or VPN connections) option, and then click Advanced. 5. In the Exceptions section, add the addresses for CMCs and iDRACs on the management network to the semicolon-separated list. You can use DNS names and wildcards in your entries. Mozilla Firefox To edit the exception list in Mozilla Firefox version 19.0: 1. Start Mozilla Firefox. 2.
A command success indicates that CMC is able to acquire Kerberos credentials and access the user's Active Directory account. If the command is not successful, resolve the error and run the command again. For more information, see the Dell Chassis Management Controller for PowerEdge FX2/FX2s RACADM Command Line Reference Guide on dell.com/support/manuals.
12 Configuring CMC to use Command Line consoles This section provides information about the CMC command line console (or serial/Telnet/Secure Shell console) features, and explains how to set up the system so that you can perform systems management actions through the console. For information about using the RACADM commands in CMC through the command line console, see Chassis Management Controller for PowerEdge FX2/FX2s RACADM Command Line Reference Guide.
Using SSH with CMC SSH is a command line session that includes the same capabilities as a Telnet session, but with session negotiation and encryption to improve security. CMC supports SSH version 2 with password authentication. SSH is enabled on the CMC by default. NOTE: CMC does not support SSH version 1. When an error occurs during the CMC login, the SSH client issues an error message. The message text is dependent on the client and is not controlled by CMC.
NOTE: There is no GUI support for managing this feature, you can use only the RACADM. When adding new public keys, make sure that the existing keys are not already at the index, where the new key is added. CMC does not perform checks to ensure previous keys are deleted before a new one is added. As soon as a new key is added, it is automatically in effect as long as the SSH interface is enabled.
CAUTION: When run from the CMC serial console, the connect -b option stays connected until the CMC resets. This connection is a potential security risk. NOTE: The connect command provides the –b (binary) option. The –b option passes raw binary data, and cfgSerialConsoleQuitKey is not used. Additionally, when connecting to a server using the CMC serial console, transitions in the DTR signal (for example, if the serial cable is removed to connect a debugger) will not result in you exiting the application.
NOTE: Make sure that the On with console redirection via COM1 option is selected. 4. Enable Redirection After Boot (default value is disabled). This option enables BIOS console redirection across subsequent reboots. 5. Save the changes and exit. The managed system restarts. Configuring Windows for serial console redirection There is no configuration necessary for servers running the Microsoft Windows Server versions, starting with Windows Server 2003.
When you edit the /etc/grub.conf file, follow these guidelines: • • Disable GRUB's graphical interface and use the text-based interface. Else, the GRUB screen is not displayed in console redirection. To disable the graphical interface, comment out the line starting with splashimage. To start multiple GRUB options to start console sessions through the serial connection, add the following line to all options: console=ttyS1,57600 The example shows console=ttyS1,57600 added to only the first option.
3:2345:respawn:/sbin/mingetty 4:2345:respawn:/sbin/mingetty 5:2345:respawn:/sbin/mingetty 6:2345:respawn:/sbin/mingetty tty3 tty4 tty5 tty6 # Run xdm in runlevel 5 # xdm is now a separate service x:5:respawn:/etc/X11/prefdm -nodaemon Edit the /etc/securettyfile as follows: Add a new line, with the name of the serial tty for COM2: ttyS1 The following example shows a sample file with the new line.
13 Using FlexAddress and FlexAddress Plus cards This section provides information about FlexAddress and how to use FlexAddress Plus card to configure FlexAddress. NOTE: The FlexAddress feature is licensed. This feature license is included in the Enterprise License. About FlexAddress FlexAddress allows CMC to assign WWN/MAC IDs to a particular slot and override the factory IDs. Hence, if the server module is replaced, the slot based WWN/MAC IDs remain the same.
Verifying FlexAddress activation To view the FlexAddress feature activation status, run the following RACADM command: racadm featurecard -s Feature Name = FlexAddress Date/time Activated = 05 Oct 2013 - 11:50:49 Feature installed from SD-card serial number = CN0H871T1374036T00MXA00 Feature Name = FlexAddressPlus Date/time Activated = 05 Oct 2013 - 11:50:49 Feature installed from SD-card serial number = CN0H871T1374036T00MXA00 Feature Name = ExtendedStorage Current Status = redundant, active Date/time Activa
Deactivating FlexAddress The FlexAddress feature can be deactivated and the SD card returned to a pre-installation state by using a RACADM command. There is no deactivation function within the Web interface. Deactivation returns the SD card to its original state where it can be installed and activated in another chassis. The term FlexAddress, in this context, implies both FlexAddress and FlexAddressPlus.
Command messages The following table lists the RACADM commands and output for common FlexAddress situations. Table 20. FlexAddress commands and output Situation Command Output SD card in the CMC module is bound to another service tag.
FlexAddress DELL SOFTWARE LICENSE AGREEMENT This is a legal agreement between you, the user, and Dell Products L.P. or Dell Global B.V. ("Dell"). This agreement covers all software that is distributed with the Dell product, for which there is no separate license agreement between you and the manufacturer or owner of the software (collectively the "Software"). This agreement is not for the sale of Software or any other intellectual property.
A portion of this CD may contain open source software, which you can use under the terms and conditions of the specific license under which the open source software is distributed. THIS OPEN SOURCE SOFTWARE IS DISTRIBUTED IN THE HOPE THAT IT WILL BE USEFUL, BUT IS PROVIDED "AS IS" WITHOUT ANY EXPRESSED OR IMPLIED WARRANTY; INCLUDING BUT NOT LIMITED TO THE IMPLIED WARRANTY OF MERCHANTABILITY OR FITNESS FOR A PARTICULAR PURPOSE.
• Basic Mode — In this mode you can view Server Slot, Fabric, Protocol, WWN/MAC addresses, and Partition Status. Only Active MAC addresses are displayed in WWN/MAC address field. You can filter using any or all of the fields displayed. • Advanced Mode — In this mode you can view all the fields displayed in the basic mode and all the MAC types (Server Assigned, Flex Address, and IO Identity). You can filter using any or all of the fields displayed.
4. Click the against a slot or click Expand/Collapse All to expand or collapse the attributes listed for a specific slot or all the slots in the WWN/MAC Addresses table. 5. From the Server Slot drop-down menu, select All Servers or a specific Slot to view the WWN/MAC Addresses attributes for all servers or servers in specific slots only respectively. 6.
For more information on the getflexaddr and getmacaddress subcommand, see the Dell Chassis Management Controller for PowerEdge FX2/FX2s RACADM Command Line Reference Guide.
14 Managing Fabrics The chassis supports two fabric types: Fabric A1 and Fabric A2, which are used by the two I/O Modules, and are always connected to the on-board Ethernet adapters of the servers. NOTE: In the PowerEdge FX2s chassis, fabrics B and C are the PCIe connection to the PCIe Extension cards. Following IO Modules are supported: • 1GbE pass-through • 10GbE pass-through • I/O Aggregator Both the Fabrics support only Ethernet.
NOTE: The IP address set on the IOM from CMC is not saved to the permanent startup configuration of the switch. To permanently save the IP address configuration, you must run the connect switch command, or racadm connect switch RACADM command, or use a direct interface to the IOM GUI to save this address to the startup configuration file. NOTE: The length of the SNMP community string can be in the ASCII value range of 33–125 characters. 3. Click Apply. The network settings are configured for the IOM.
NOTE: This feature is supported on PowerEdge M I/O Aggregator IOM only. Other IOMs including MXL 10/40GbE are not supported. To reset the selected IOMs to factory default settings using the CMC Web interface: 1. In the system tree, go to I/O Module Overview and click Setup or expand I/O Module Overview in the system tree, select the IOM, and click Setup. The Deploy I/O Modules page displays the IOM(s) that are powered on. 2. For the required IOM(s), click Reset. A warning message is displayed. 3.
Launching IOA/MXL GUI from the I/O Module Overview page In the directory tree, go to I/O Module Overview. On the I/O Module Status page, click Launch I/O Module GUI. The IOA/MXL login page is displayed. Launching IOA/MXL GUI from the I/O Module Status page In the directory tree, under the I/O Module Overview, click an IOA/MXL switch. On the I/O Module Status page, click Launch I/O Module GUI. The IOA/MXL login page is displayed.
15 Using VLAN Manager You can assign or view the VLAN settings on the IOMs by using the VLAN Manager option. NOTE: This feature is supported only on Dell PowerEdge I/O Aggregator. After the mode of the I/O Aggregator is changed to standalone from stacking, remove the startup configuration and reload the I/O Aggregator. You need not save the system configuration while reloading the I/O Aggregator.
The network settings are configured for the IOM(s). Viewing the VLAN settings on IOMs using CMC web interface To view the VLAN settings on IOM(s) using the CMC Web interface: 1. Go to I/O Module Overview, and click Setup → VLAN Manager. The VLAN Manager page is displayed. The Summary VLANs of All Ports section displays information about the current VLAN settings for the IOMs. 2. Click Save to save the VLAN settings to a file.
An Operation Successful message is displayed. The current VLAN settings that are assigned to the IOMs are displayed in the VLAN Assignment Summary field. Resetting VLANs for IOMs using CMC web interface To reset VLANs for IOM(s) to default configurations using the CMC Web interface: 1. Go to I/O Module Overview, and click Setup → VLAN Manager. The VLAN Manager page is displayed. 2. In the Select I/O Module section, select the required IOMs. 3.
16 Managing and monitoring power The PowerEdge FX2/FX2s chassis is the most power-efficient server enclosure. It is designed to include highly efficient power supplies and fans, has an optimized layout for the air to flow more easily through the system, and contains power-optimized components throughout the enclosure.
Grid Redundancy policy The Grid Redundancy policy is also knows as 1+1 policy, for one active and one spare PSU. The purpose of the Grid Redundancy policy is to enable an enclosure system to operate in a mode in which the enclosure can tolerate AC power failures. These failures may originate in the AC power grid, the cabling and delivery, or a Power Supply Unit (PSU) itself. When you configure a system for Grid Redundancy, connect PSUs 1 and 2 to separate power grids.
Viewing power consumption status using CMC web interface In the left pane, click Chassis Overview → Power → Power Monitoring. The Power Monitoring page displays the power health, system power status, real-time power statistics, and real-time energy statistics. For more information, see the Online Help. NOTE: You can also view the power redundancy status under Power Supplies.
Table 21. SEL events for power supply changes Power Supply Event System Event Log (SEL) Entry Insertion Power supply is present. Removal Power supply is absent. AC input received The power input for power supply has been restored. AC input lost The power input for power supply is lost. DC output produced Power supply is operating normally. DC output lost Power supply failed.
Configuring power budget and Redundancy using RACADM NOTE: To perform power management actions, you must have the Chassis Configuration Administrator privilege. To enable and set the redundancy policy: 1. Open a serial/Telnet/SSH text console to CMC and log in. 2. Set properties as needed: • To select a redundancy policy, type: racadm config -g cfgChassisPower -o cfgChassisRedundancyPolicy where is 0 (No Redundancy), 1 (Grid Redundancy), and 3 (Redundancy Alerting Only).
For information about RACADM commands for chassis power, see the config, getconfig, getpbinfo, and cfgChassisPower sections in the Dell Chassis Management Controller for PowerEdge FX2/FX2s RACADM Command Line Reference Guide. Executing Power Control Operations You can execute the following power control operation for the chassis, servers, and IOM. NOTE: Power control operations affect the entire chassis.
4. Click OK to perform the power management action (for example, reset the server). Executing Power Control Operations on the IOM You can remotely reset or turn on an IOM. NOTE: To perform power management actions, you must have the Chassis Control Administrator privilege. Executing Power Control Operations on IOM Using CMC Web Interface To execute power control operations on the I/O Module: 1. In the left pane, click Chassis Overview → I/O Module Overview → Power. 2.
17 Configuring PCIe slots The PowerEdge FX2/FX2s chassis optionally contain eight PCIe slots where each PCIe slot is assigned to a specific sled. By default, all PCIe slots are mapped. You can enable or disable the assignment of PCIe slots to the servers using the CMC web interface or RACADM commands. The following tables list the PCIe mapping for full-width, half-width, and quarter-width compute sleds. Table 22.
PCIe Slot Mapping for quarter-width sleds (PowerEdge FC430) PCIe slot-7 1b PCIe slot-8 1a NOTE: PCIe management is supported only for PowerEdge FX2s and not PowerEdge FX2. For more information about mapping PCIe slots, see the Dell PowerEdge FD332 Owner’s Manual. For more information about managing PCIe slots, see the CMC for Dell PowerEdge FX2/FX2s Online Help. NOTE: The Agent-free monitoring feature is not available for the PCIe PERC and Network cards in the Chassis PCIe slots.
to the compute sleds in the lower bay earlier, are mapped to corresponding compute sleds in the upper bay. Following are some examples for PCIe reassignment: • PCIe reassignment in full-width (FW) FC830: – PCIe slots mapped to FW sled-3 (PCIe slots 1 through 4) are reassigned to sled–1. Sled-1 now maps to PCIe slots 1 though 8. • PCIe reassignment in half-width (HW) FC630: – PCIe slots mapped to HW sled-3 (PCIe slots 5 and 6) are reassigned to sled-1. Sled-1 now maps to PCIe slots 5 through 8.
18 Troubleshooting and recovery This section explains how to perform tasks related to recovering and troubleshooting problems on the remote system using the CMC web interface. • Viewing chassis information. • Viewing the event logs. • Gathering configuration information, error status, and error logs. • Using the diagnostic console. • Managing power on a remote system. • Managing Lifecycle Controller jobs on a remote system. • Reset components.
Subsystem RACADM Command General System/RAC information getsysinfo Session information getssninfo Sensor information getsensorinfo Switches information (IO Module) getioinfo Mezzanine card information (Daughter card) getdcinfo All modules information getmodinfo Power budget information getpbinfo NIC information (CMC module) getniccfg Trace log information gettracelog RAC event log getraclog System event log getsel Downloading SNMP Management Information Base (MIB) file The CMC SNMP M
• Problem: Inserted a new server into the enclosure with sufficient power supplies, but the server does not power on. – Resolution A: Check for the system input power cap setting—it might be configured too low to allow any additional servers to be powered up. • Problem: Available power keeps changing, even when the enclosure configuration has not changed.
The Diagnostic Console page displays. 2. In the Command text box, type a command and click Submit. For information about the commands, see the Online Help. The diagnostic results page appears. Resetting Components You can reset the CMC, or to virtually reset servers making them to behave as if they were removed and reinserted. NOTE: To reset components, you must have Debug Command Administrator privilege. NOTE: Virtual reseat is not available for the individual nodes of the PowerEdge FM120x4.
If the ‘*’ is not displayed for one of the configured servers, the settings may not be configured correctly. The output of this command contains detailed NTP statistics that may be useful in debugging the problem. If you attempt to configure a Windows-based NTP server, it may help to increase the MaxDist parameter for ntpd. Before changing this parameter, understand all the implications, since the default setting must be large enough to work with most NTP servers.
Component IOM (Common) IOM (Pass through) Fan PSU PCI LED Color, Blinking Pattern Status Blue, glowing steadily Server is selected on the KVM Blue, blinking User-enabled module identifier Amber, glowing steadily Not used Amber, blinking Fault Blue, dark No fault Green, glowing steadily Turned on Green, blinking Firmware is being uploaded Green, dark Turned off Blue, glowing steadily Normal/stack master Blue, blinking User-enabled module identifier Amber, glowing steadily Not use
Component Storage sled LED Color, Blinking Pattern Status Blue, blinking PCI identification is in progress. Amber, blinking Fault Amber, blinking Fault Solid Blue No fault Troubleshooting Non-responsive CMC If you cannot log in to CMC using any of the interfaces (the web interface, Telnet, SSH, remote RACADM, or serial), you can verify the CMC functionality observing the LEDs on CMC, obtaining recovery information using the DB-9 serial port, or recovering the CMC firmware image.
NOTE: Connect the network cable to the left most RJ45. NOTE: In recover mode, you cannot ping CMC normally because there is no active network stack. The recover ping command allows you to ping to the TFTP server to verify the LAN connection. You may need to use the recover reset command after setniccfg on some systems. Troubleshooting Network Problems The internal CMC trace log allows you to debug CMC alerts and networking.
Resolution: Chassis configuration privilege is required to import, export, and delete storage module licenses. Resetting Forgotten Administrator Password CAUTION: Many repairs may only be done by a certified service technician. Perform troubleshooting and simple repairs as authorized in your product documentation, or as directed by the online or telephone service and support team. Damage due to servicing that is not authorized by Dell is not covered by your warranty.
Table 26. CMC Password Jumper Settings J_PWORD (default) The password reset feature is disabled. The password reset feature is enabled. 3. Slide the CMC module into the enclosure. Reattach any cables that were disconnected. NOTE: Make sure that the CMC module is active until the remaining steps are completed. 4. Wait for the CMC to finish rebooting. In the web interface, in the system tree, go to Chassis Overview and click Power → Control, select the Reset CMC (warm boot), and click Apply. 5.
19 Frequently asked questions This section lists the frequently asked questions about the following: • • • • RACADM Managing and Recovering a Remote System Active Directory IOM RACADM After performing a CMC reset (using the RACADM racreset subcommand), when a command is entered, the following message is displayed: racadm Transport: ERROR: (RC=-1) What does this message mean? Another command must be issued only after CMC completes the reset.
To ensure that the CSR matches the registered DNS CMC name: 1. In the left pane, click Chassis Overview. 2. Click Network. The Network Configuration page appears. 3. Select the Register CMC on DNS option. 4. Type a CMC name in the DNS CMC Name field. 5. Click Apply Changes. Why are the remote RACADM and Web-based services unavailable after a property change? It may take a minute for the remote RACADM services and the web interface to become available after the CMC Web server resets.
Yes. The domain forest function level must be in Native mode or Windows 2003 mode. In addition, the groups among Association Object, RAC user objects, and RAC Device Objects (including Association Object) must be universal groups. Can these Dell-extended objects (Dell Association Object, Dell RAC Device, and Dell Privilege Object) be in different domains? The Association Object and the Privilege Object must be in the same domain.