Dell™ Chassis Management Controller Firmware Version 2.
Notes, Cautions and Warnings NOTE: A NOTE indicates important information that helps you make better use of your computer. CAUTION: A CAUTION indicates a potential for property damage, personal injury, or death. ____________________ Information in this document is subject to change without notice. © 2009 Dell Inc. All rights reserved. Reproduction of these materials in any manner whatsoever without the written permission of Dell Inc. is strictly forbidden.
Other trademarks and trade names may be used in this document to refer to either the entities claiming the marks and names or their products. Dell Inc. disclaims any proprietary interest in trademarks and trade names other than its own.
Contents 1 CMC Overview . . . . . . . . . . . . . . . . . . . . . CMC Management Features . . . . . . . . . . . . . . . 17 Security Features . . . . . . . . . . . . . . . . . . . . 19 Chassis Overview . . . . . . . . . . . . . . . . . . . . 19 . . . . . . . . . . . . . . . . 20 . . . . . . . . . . . . . . . . . . . . 20 . . . . . . . . 21 . . . . . . . . . . . . . . . . . . 22 Hardware Specifications TCP/IP Ports Supported Remote Access Connections Supported Platforms .
Uninstalling RACADM From a Linux Management Station . . . . . . . . Configuring a Web Browser . . . . . . . . . 29 . . . . . . . . . . . . . . 29 . . . . . . . . . . . . . . . . . . . . 30 Microsoft® Phishing Filter . . . . . . . . . . . . . 31 . . . . . 31 Proxy Server Certificate Revocation List (CRL) Fetching Downloading Files From CMC With Internet Explorer 31 . . . . . . . 32 . . . . . . . . . .
3 Configuring CMC to Use Command Line Consoles 49 . . . . . 49 Using a Serial, Telnet, or SSH Console . . . . . . . . . 49 Using a Telnet Console With the CMC . . . . . . . . . 50 . . . . . . . . . . . . . . . . 50 . . . . . . . . . . . . . 51 . . . . . . . . . . . . . . 51 . . . 52 Configuring Terminal Emulation Software . . . . . . . 52 Configuring Linux Minicom for Serial Console Emulation . . . . . . . . . . . . . . . . .
Enabling and Disabling the RACADM Remote Capability . . . . . . . . . . . . . . . . . . 69 Using RACADM Remotely. . . . . . . . . . . . . . 70 RACADM Error Messages . . . . . . . . . . . . . 70 Using RACADM to Configure the CMC. . . . . . . . . . 70 Configuring CMC Network Properties . . . . . . . . . . 71 Setting Up Initial Access to the CMC . Viewing Current Network Settings . . . . . . . 71 . . . . . . . . . 72 Configuring the Network LAN Settings . . . . . . .
. . . . . . . . . . . . 89 . . . . . . . . . . . . . 89 Configuring Basic CMC Settings Setting the Chassis Name Setting the Date and Time on the CMC . Monitoring System Health Status . . . . . . 89 . . . . . . . . . . . . 90 . . . 90 . . . . 90 . . . . . . . . . . . 91 Viewing Chassis and Component Summaries Viewing Chassis Graphics and Component Health Status . . . . . . . . . . . . . . . . Viewing Power Budget Status Viewing Server Model Name and Service Tag .
Configuring Active Directory (Standard Schema and Extended Schema) . . . . . . . . . . . . . . . . 127 Uploading an Active Directory Certificate Authority-Signed Certificate . . . . . . . Viewing an Active Directory Certificate Authority-Signed Certificate . . . . . . . . . . 131 . . . . . 131 Securing CMC Communications Using SSL and Digital Certificates . . . . . . . . . . . . . . . . Secure Sockets Layer (SSL) . . . 132 . . . . . . . . . . . 132 . . . . . . . . 133 . . . . . . . . . 133 .
. . . 168 . . . . . . . . . . . . . . 169 . . . . . . . . . . . . . . . . 171 Server-Level Slot FlexAddress Configuration Frequently Asked Questions . Troubleshooting the CMC 6 Using FlexAddress . Activating FlexAddress . . . . . . . . . . . . . . . . . Verifying FlexAddress Activation . Deactivating FlexAddress . 174 . . . . . . . . . 175 . . . . . . . . . . . . . . . 177 . . . . . . . . . . . . . 177 Deactivating FlexAddress Viewing FlexAddress Status Using the CLI . . . . . . .
Configuring Extended Schema Active Directory to Access Your CMC . . . . . . . . . . . . . . . . . 195 Extending the Active Directory Schema . . . . . 195 Installing the Dell Extension to the Active Directory Users and Computers Snap-In . . . . . . . . . . 201 Adding CMC Users and Privileges to Active Directory 202 Configuring the CMC With Extended Schema Active Directory and the Web Interface . . . . . . . . . 205 Configuring the CMC With Extended Schema Active Directory and RACADM . . . . . . . . . . .
Power Conservation and Power Budget Changes . 227 Power Supply and Redundancy Policy Changes in System Event Log . . . . . . . . . . . . . . . . . . 231 Configuring and Managing Power . . . . . . . . . . . Viewing the Health Status of the PSUs . . . . . . . 233 . . . . . . . 235 . . . . . . . . . . . 240 . . . 245 . . . . . . . . 250 . . . . . . . . . . . . . 251 Viewing Power Consumption Status .
Configuring OSCAR . . . . . . . . . . . . . . . . Managing Servers With iKVM . . . . . . . . . . . . . Peripherals Compatibility and Support . Viewing and Selecting Servers . . . . . . 263 . . . . . . . . . 264 . . . . . . . . . . . . . 267 272 . . . . . . . . . . . . . 273 . . . . . . . . . . . . 275 . . . . . . 275 Broadcasting to Servers Managing iKVM From the CMC Enabling or Disabling the Front Panel Enabling the Dell CMC Console via iKVM. . . . .
11 Troubleshooting and Recovery Overview . 297 . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 297 . . . . . . . . . . . . . . . . 297 Chassis Monitoring Tools Configuring LEDs to Identify Components on the Chassis . . . . . . . . . . . . . . . . . . . . . 297 Configuring SNMP Alerts . . . . . . . . . . . . . . 298 Configuring E-mail Alerts . . . . . . . . . . . . . . 303 . . . .
Obtain Recovery Information From the DB-9 Serial Port . . . . . . . . . . . . . . . . . . . . . 329 Recovering the Firmware Image . . . . . . . . . 330 Troubleshooting Network Problems . . . . . . . . . . 330 . . . . . . . . . . . 331 . . . . . . . . . . . . . . . 333 . . . . . . . . . . . . . . . . . . . . . . . . . . . . 335 . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 343 Disabling a Forgotten Password .
1 CMC Overview The Dell™ Chassis Management Controller (CMC) is a hot-pluggable systems management hardware and software solution designed to provide remote management capabilities and power control functions for Dell PowerEdge™ M1000e chassis systems. You can configure the CMC to send e-mail alerts or SNMP trap alerts for warnings or errors related to temperatures, hardware misconfigurations, power outages, and fan speeds.
• Dell OpenManage™ software integration — Enables you to launch the CMC Web interface from Dell OpenManage Server Administrator or IT Assistant • CMC alert — Alerts you to potential managed node issues through an e-mail message or SNMP trap • Remote power management — Provides remote power management functions, such as shutdown and reset on any chassis component, from a management console • Power usage reporting • Secure Sockets Layer (SSL) encryption — Provides secure remote system management
Security Features The CMC provides the following security features: • User authentication through Active Directory (optional), or hardwarestored user IDs and passwords • Role-based authority, which enables an administrator to configure specific privileges for each user • User ID and password configuration through the Web interface • Web interface supports 128-bit SSL 3.0 encryption and 40-bit SSL 3.
Figure 1-1. Dell M1000e Chassis and CMC Hardware Specifications TCP/IP Ports You must provide port information when opening firewalls for remote access to a CMC. Table 1-1 identifies the ports on which the CMC listens for server connections. Table 1-2 identifies the ports that the CMC uses as clients. Table 1-1.
Table 1-1. CMC Server Listening Ports (continued) (continued) Port Number Function 80* HTTP 161 SNMP Agent 443* HTTPS * Configurable port Table 1-2. CMC Client Port Port Number Function 25 SMTP 53 DNS 68 DHCP-assigned IP address 69 TFTP 162 SNMP trap 636 LDAPS 3269 LDAPS for global catalog (GC) Supported Remote Access Connections Table 1-3 lists the connection features. Table 1-3.
Table 1-3.
Table 1-4. Supported Web Browser (continued) Operating System Supported Web Browser Linux Mozilla Firefox® 1.5 (32-bit) for SUSE® Enterprise Linux (version 10) only. Mozilla Firefox 2.0 (32-bit). To view localized versions of the CMC Web interface: 1 Open the Windows Control Panel. 2 Double-click the Regional Options icon. 3 Select the required locale from the Your locale (location) drop-down menu.
• Computer System Profile • Modular System Profile • Physical Asset Profile • Dell Power Allocation Profile • Dell Power Supply Profile • Dell Power Topology Profile • Power State Management Profile • Profile Registration Profile • Record Log Profile • Resource Allocation Profile • Role Based Authorization Profile • Sensors Profile • Service Processor Profile • Simple Identity Management Profile For updates to this list or information, refer to WS-Management release notes or read
• The CMC online help provides information about using the Web interface. • The Chassis Management Controller (CMC) Secure Digital (SD) Card Technical Specification provides minimum BIOS and firmware version, installation and usage information. • The Integrated Dell Remote Access Controller 6 (iDRAC6) Enterprise for Blade Servers Version 2.0 User Guide provides information about installation, configuration and maintenance of the iDRAC on managed systems.
• Updates are sometimes included with the system to describe changes to the system, software, and/or documentation. NOTE: Always read the updates first because they often supersede information in other documents. 26 • Release notes or readme files may be included to provide last-minute updates to the system or documentation or advanced technical reference material intended for experienced users or technicians.
2 Installing and Setting Up the CMC This section provides information about how to install your CMC hardware, establish access to the CMC, configure your management environment to use the CMC, and guides you through the next steps for configuring the CMC: • Set up initial access to the CMC • Access the CMC through a network • Add and configure CMC users • Update the CMC firmware Additionally, you can find information about installing and setting up redundant CMC environments at "Understanding the
Installing Remote Access Software on a Management Station You can access the CMC from a management station using remote access software, such as the Telnet, Secure Shell (SSH), or serial console utilities provided on your operating system or using the Web interface. If you want to use remote RACADM from your management station, you will need to install it using the Dell Systems Management Tools and Documentation DVD. Your system includes the Dell Systems Management Tools and Documentation DVD.
4 Navigate to the SYSMGMT/ManagementStation/linux/rac directory. To install the RAC software, enter the following command: rpm -ivh *.rpm 5 For help with the RACADM command, type racadm help after issuing the previous commands. For more information about RACADM, see "Using the RACADM Command Line Interface" on page 63.
You must ensure that security measures on the management network, such as firewalls and proxy servers, do not prevent your Web browser from accessing the CMC. Also, be aware that some browser features can interfere with connectivity or performance, especially if the management network does not have a route to the Internet.
Microsoft® Phishing Filter If the Microsoft Phishing Filter is enabled in Internet Explorer 7 on your management system and your CMC does not have Internet access, you may experience delays of several seconds when accessing the CMC, whether you are using the browser or another interface such as remote RACADM. Follow these steps to disable the phishing filter: 1 Start Internet Explorer. 2 Click Tools Phishing Filter, and then click Phishing Filter Settings. 3 Check the Disable Phishing Filter check box.
3 Scroll to the Security section and check Do not save encrypted pages to disk. Allow Animations in Internet Explorer When transferring files to and from the Web interface, a file transfer icon spins to show transfer activity. For Internet Explorer, this requires that the browser be configured to play animations, which is the default setting. Follow these steps to configure Internet Explorer to play animations: 1 Start Internet Explorer. 2 Click Tools Internet Options, then click Advanced.
Basic CMC Network Connection For the highest degree of redundancy, connect each CMC to your management network. If a chassis has just one CMC, make one connection on the management network. If the chassis has a redundant CMC in the secondary CMC slot, make two connections to the management network. Each CMC has two RJ-45 Ethernet ports, labeled GB1 (the uplink port) and STK (the stacking port). With basic cabling, you connect the GB1 port to the management network and leave the STK port unused.
Figure 2-1.
Follow these steps to daisy-chain up to four chassis: 1 Connect the GB1 port of the primary CMC in the first chassis to the management network. 2 Connect the GB1 port of the primary CMC in the second chassis to the STK port of the primary CMC in the first chassis. 3 If you have a third chassis, connect the GB1 port of its primary CMC to the STK port of the primary CMC in the second chassis. 4 If you have a fourth chassis, connect the GB1 port of its primary CMC to the STK port of the third chassis.
• The CMC Web interface Configuring Networking Using the LCD Configuration Wizard NOTE: The option to configure the CMC using the LCD Configuration Wizard is available only until the CMC is deployed or the default password is changed. If the password is not changed, the LCD can continue to be used to reconfigure the CMC causing a possible security risk. The LCD is located on the bottom left corner on the front of the chassis. Figure 2-2 illustrates the LCD panel. Figure 2-2.
The LCD screen displays menus, icons, pictures, and messages. A status indicator LED on the LCD panel provides an indication of the overall health of the chassis and its components. • Solid blue indicates good health. • Blinking amber indicates that at least one component has a fault condition. • Blinking blue is an ID signal, used to identify one chassis in a group of chassis.
4 Select your network speed (10Mbps, 100Mbps, Auto (1 Gbps)) using the down arrow button. NOTE: The Network Speed setting must match your network configuration for effective network throughput. Setting the Network Speed lower than the speed of your network configuration increases bandwidth consumption and slows network communication. Determine whether your network supports the above network speeds and set it accordingly.
Static You manually enter the IP address, gateway, and subnet mask in the screens immediately following. If you have selected the Static option, press the center button to continue to the next CMC Network Settings screen, then: a Set the Static IP Address by using the right or left arrow keys to move between positions, and the up and down arrow keys to select a number for each position. When you have finished setting the Static IP Address, press the center button to continue.
iDRAC retrieves IP configuration (IP address, mask, and Dynamic Host gateway) automatically from a DHCP server on your Configuration Protocol (DHCP) network. The iDRAC will be assigned a unique IP address allotted over your network.Press the center button. Static You manually enter the IP address, gateway, and subnet mask in the screens immediately following.
d On the Enclosure screen, to apply all enclosure settings highlight the Accept/Yes icon and press the center button. To not apply the enclosure settings, highlight the No icon and press the center button. 9 On the IP Summary screen, review the IP addresses you provided to make sure the addresses are accurate. To correct a setting, navigate to the left arrow button and then press the center key to return to the screen for that setting. After making a correction, press the center button.
Table 2-1 describes each CMC network interface. Table 2-1. CMC Interfaces Interface Description Web interface Provides remote access to the CMC using a graphical user interface. The Web interface is built into the CMC firmware and is accessed through the NIC interface from a supported Web browser on the management station. For a list of supported Web browsers, see "Supported Web Browsers" on page 22.
To access the CMC interface using Dell Server Administrator, launch Server Administrator on your management station. From the system tree on the left pane of the Server Administrator home page, click System Main System Chassis Remote Access Controller. For more information, see your Dell Server Administrator User’s Guide. To access the CMC command line using Telnet or SSH, see "Configuring CMC to Use Command Line Consoles" on page 49.
You can use the RACADM getsysinfo command (see the getsysinfo command section in the Dell Chassis Management Controller Firmware Version 2.0 Administrator Reference Guide) or the Chassis Summary page (see "Viewing the Current Firmware Versions" on page 147) to view the current firmware versions for the CMCs installed in your chassis. If you have a standby CMC, it is recommended that you update the firmware in the standby CMC first.
Configuring Power Budgeting The CMC offers a power budgeting service that allows you to configure power budget, redundancy, and dynamic power for the chassis. The chassis ships with either three or six power supply units (PSUs). If your chassis has only three PSUs, you can add up to three more. The power management service enables optimization of power consumption and reallocation of power to different modules based on demand.
Adding SNMP and E-mail Alerts You can configure the CMC to generate SNMP and/or e-mail alerts when certain chassis events occur. For more information, see "Configuring SNMP Alerts" on page 298 and "Configuring E-mail Alerts" on page 303. Understanding the Redundant CMC Environment You can install a standby CMC that takes over if your primary CMC fails. Failovers can occur when you: • Run the RACADM cmcchangeover command.
NOTE: For information about installing a standby CMC, see the Hardware Owner’s Manual. For instructions on installing the CMC firmware on your standby CMC, follow the instructions in "Installing or Updating the CMC Firmware" on page 43. Primary CMC Election Process There is no difference between the two CMC slots; that is, slot does not dictate precedence. Instead, the CMC that is installed or booted first assumes the role of the active CMC.
Installing and Setting Up the CMC
3 Configuring CMC to Use Command Line Consoles This section provides information about the CMC command line console (or serial/Telnet/Secure Shell console) features, and explains how to set up your system so you can perform systems management actions through the console. For information on using the RACADM commands in CMC via the command line console, see "Using the RACADM Command Line Interface" on page 63.
Table 3-1. CMC Command Line Commands Command Description racadm RACADM commands begin with the keyword racadm and are followed by a subcommand, such as getconfig, serveraction, or getsensorinfo. See "Using the RACADM Command Line Interface" on page 63 for details on using RACADM. connect Connects to the serial console of a server or I/O module. See "Connecting to Servers or I/O Modules With the Connect Command" on page 59 for help using the connect command.
Four simultaneous SSH sessions are supported at any given time. The session timeout is controlled by the cfgSsnMgtSshIdleTimeout property (see the database property chapter of the Dell Chassis Management Controller Firmware Version 2.0 Administrator Reference Guide) or from the Services Management page in the Web interface (see "Configuring Services" on page 139). Enabling SSH on the CMC SSH is enabled by default. If SSH is disabled, then you can enable it using any other supported interface.
Table 3-2.
Perform the steps in the following subsections to configure your type of terminal software. If you are using Microsoft Telnet, configuration is not required. Configuring Linux Minicom for Serial Console Emulation Minicom is a serial port access utility for Linux. The following steps are valid for configuring Minicom version 2.0. Other Minicom versions may differ slightly but require the same basic settings.
12 When all specified fields are clear, press to exit the Modem Dialing and Parameter Setup menu. 13 Select Save setup as config_name and press . 14 Select Exit From Minicom and press . 15 At the command shell prompt, type minicom . To expand the Minicom window to 80 x 25, drag the corner of the window. 16 Press , , to exit Minicom. Ensure that the Minicom window displays a login prompt.
Configuring Linux for Server Serial Console Redirection During Boot The following steps are specific to the Linux GRand Unified Bootloader (GRUB). Similar changes would be necessary for using a different boot loader. NOTE: When you configure the client VT100 emulation window, set the window or application that is displaying the redirected console to 25 rows x 80 columns to ensure proper text display; otherwise, some text screens may be garbled. Edit the /etc/grub.
terminal --timeout=10 serial title Red Hat Linux Advanced Server (2.4.9-e.3smp) root (hd0,0) kernel /boot/vmlinuz-2.4.9-e.3smp ro root= /dev/sda1 hda=ide-scsi console=ttyS0 console= ttyS1,57600 initrd /boot/initrd-2.4.9-e.3smp.img title Red Hat Linux Advanced Server-up (2.4.9-e.3) root (hd0,00) kernel /boot/vmlinuz-2.4.9-e.3 ro root=/dev/sda1 s initrd /boot/initrd-2.4.9-e.3.im When you edit the /etc/grub.
# Modified for RHS Linux by Marc Ewing and # Donnie Barnes # # Default runlevel. The runlevels used by RHS are: # 0 - halt (Do NOT set initdefault to this) # 1 - Single user mode # 2 - Multiuser, without NFS (The same as 3, if you # do not have networking) # 3 - Full multiuser mode # 4 - unused # 5 - X11 # 6 - reboot (Do NOT set initdefault to this) # id:3:initdefault: # System initialization. si::sysinit:/etc/rc.d/rc.sysinit l0:0:wait:/etc/rc.d/rc l1:1:wait:/etc/rc.d/rc l2:2:wait:/etc/rc.
pf::powerfail:/sbin/shutdown -f -h +2 "Power Failure; System Shutting Down" # If power was restored before the shutdown kicked in, cancel it.
tty4 tty5 tty6 tty7 tty8 tty9 tty10 tty11 ttyS1 Connecting to Servers or I/O Modules With the Connect Command The CMC can establish a connection to redirect the serial console of server or I/O modules. For servers, serial console redirection can be accomplished in several ways: • using the CMC command line and the connect, or racadm connect command • using the iDRAC Web interface serial console redirection feature • using the iDRAC Serial Over LAN (SOL) functionality.
There are up to six IOMs on the managed system. To connect to an IOM, type: connect switch-n where n is an IOM label a1, a2, b1, b2, c1, and c2. IOMs are labeled A1, A2, B1, B2, C1, and C2. (See Figure 10-1 for an illustration of the placement of IOMs in the chassis.) When you reference the IOMs in the connect command, the IOMs are mapped to switches as shown in Table 3-4. Table 3-4.
NOTE: Not all keys will work in the BIOS setup screens, so the user has to provide appropriate escape sequences for CTRL+ALT+DEL, and other escape sequences. The initial redirection screen displays the necessary escape sequences. For details on how to connect through a serial connection, see "Configuring CMC to Use Command Line Consoles" on page 49.
Configuring CMC to Use Command Line Consoles
4 Using the RACADM Command Line Interface RACADM provides a set of commands that allow you to configure and manage the CMC through a text-based interface. RACADM can be accessed using a Telnet/SSH or serial connection, using the Dell CMC console on the iKVM, or remotely using the RACADM command line interface installed on a management station.
Using a Serial, Telnet, or SSH Console You can log in to the CMC either through a serial or Telnet/SSH connection, or through Dell CMC console on iKVM. To configure the CMC for serial or remote access, see "Configuring CMC to Use Command Line Consoles" on page 49. Commonly used subcommand options are listed in Table 4-2. A complete list of RACADM subcommands is listed in the RACADM Subcommands chapter of the Dell Chassis Management Controller Firmware Version 2.0 Administrator Reference Guide.
When run without options or subcommands, RACADM displays syntax information and instructions on how to access subcommands and help. To list syntax and command-line options for individual subcommands, type: racadm help RACADM Subcommands Table 4-1 provides a brief list of common subcommands used in RACADM. For a complete list of RACADM subcommands, including syntax and valid entries, see the RACADM Subcommands chapter of the Dell Chassis Management Controller Firmware Version 2.
Table 4-1. RACADM Subcommands (continued) Command Description connect Connects to the serial console of a server or I/O module. See "Connecting to Servers or I/O Modules With the Connect Command" on page 59 for help using the connect subcommand config Configures the CMC. deploy Deploys a server by specifying required properties. feature Displays active features and feature deactivation. featurecard Displays feature card status information.
Table 4-1. RACADM Subcommands (continued) Command Description getsensorinfo Displays information about system sensors. getslotname Displays the name of a slot in the chassis. getssninfo Displays information about active sessions. getsvctag Displays service tags. getsysinfo Displays general CMC and system information. gettracelog (Dell internal Displays the CMCtrace log. If used with the -i option, use only) the command displays the number of entries in the CMC trace log.
Table 4-1. RACADM Subcommands (continued) Command Description setsysinfo Sets the name and location of the chassis. sslcertdownload Downloads a certificate authority-signed certificate. sslcertupload Uploads a certificate authority-signed certificate or server certificate to the CMC. sslcertview Views a certificate authority-signed certificate or server certificate in the CMC. sslcsrgen Generates and downloads the SSL CSR.
To access RACADM remotely, type the following commands: racadm -r -u -p racadm -i -r NOTE: The -i option instructs RACADM to interactively prompt for user name and password. Without the -i option, you must provide the user name and password in the command using the -u and -p options. For example: racadm -r 192.168.0.120 -u root -p calvin getsysinfo racadm -i -r 192.168.0.
Using RACADM Remotely NOTE: Configure the IP address on your CMC before using the RACADM remote capability. For more information about setting up your CMC, see "Installing and Setting Up the CMC" on page 27. The RACADM console’s remote option (-r) allows you to connect to the managed system and execute RACADM subcommands from a remote console or management station. To use the remote capability, you need a valid user name (-u option) and password (-p option), and the CMC IP address.
The CMC Web interface is the quickest way to configure the CMC (see "Using the CMC Web Interface" on page 87). However, if you prefer CLI or script configuration or need to configure multiple CMCs, use RACADM, which is installed with the CMC agents on the management station. Configuring CMC Network Properties Setting Up Initial Access to the CMC Before you can begin configuring the CMC, you must first configure the CMC network settings to allow the CMC to be managed remotely.
racadm config -g cfgLanNetworking -o cfgNicGateway racadm config -g cfgLanNetworking -o cfgNicNetmask Viewing Current Network Settings To view a summary of NIC, DHCP, network speed, and duplex settings, type: racadm getniccfg or racadm getconfig -g cfgCurrentLanNetworking To view IP address and DHCP, MAC address, and DNS information for the chassis, type: racadm getsysinfo Configuring the Network LAN Settings NOTE: To perform the following steps, you must have Chassis
You can disable the DHCP for NIC address feature and specify a static IP address, subnet mask, and gateway. For instructions, see "Setting Up Initial Access to the CMC" on page 71. NOTE: If you disable the DHCP for NIC address feature and then re-enable it later, the static IP address, subnet mask, and gateway settings are lost. Enabling or Disabling DHCP for DNS IP Addresses By default, the CMC’s DHCP for DNS address feature is disabled.
• CMC Name. By default, the CMC name on the DNS server is cmc. To change the CMC name on the DNS server, type: racadm config -g cfgLanNetworking -o cfgDNSRacName where is a string of up to 63 alphanumeric characters and hyphens; the name must begin with a letter. For example, cmc-1, d-345. • DNS Domain Name. The default DNS domain name is a single blank character.
where is a value between 576–1500 (inclusive; default is 1500). Setting the SMTP Server IP Address You can enable the CMC to send e-mail alerts using Simple Mail Transfer Protocol (SMTP) to a specified IP address. To enable this feature, type: racadm config -g cfgRemoteHosts -o cfgRhostsFwUpdateIpAddr where is the IP address of the network SMTP server.
Using RACADM to Configure Users Before You Begin You can configure up to 16 users in the CMC property database. Before you manually enable a CMC user, verify if any current users exist. If you are configuring a new CMC or you ran the RACADM racresetcfg command, the only current user is root with the password calvin. The racresetcfg subcommand resets the CMC back to the original defaults.
specify any number of groups/objects to write, the index cannot be specified. A new user is added to the first available index. This behavior allows more flexibility in configuring a second CMC with the same settings as the main CMC. Adding a CMC User To add a new user to the CMC configuration, you can use a few basic commands. Perform the following procedures: 1 Set the user name. 2 Set the password. 3 Set the user privileges.
racadm getconfig –g cfgUserAdmin –i 2 Enabling a CMC User With Permissions To enable a user with specific administrative permissions (role-based authority), first locate an available user index by performing the steps in "Before You Begin" on page 76. Next, type the following command lines with the new user name and password. NOTE: See Table 3-1 in the database property chapter of the Dell Chassis Management Controller Firmware Version 2.
When you query a specific CMC card using its group ID and object ID, RACADM creates the racadm.cfg configuration file from the retrieved information. By exporting the file to one or more CMCs, you can configure your controllers with identical properties in a minimal amount of time. NOTE: Some configuration files contain unique CMC information (such as the static IP address) that must be modified before you export the file to other CMCs.
The config subcommand loads the information into other CMCs. The Server Administrator uses the config command to synchronize the user and password database. Creating a CMC Configuration File The CMC configuration file, .cfg, is used with the racadm config -f .cfg command to create a simple text file. The command allows you to build a configuration file (similar to an .ini file) and configure the CMC from this file. You may use any file name, and the file does not require a .
need to make exact index matches between all the CMCs being managed. New users are added to the first available index. A .cfg file that parses and runs correctly on one CMC may not run correctly on another if all indexes are full and you must add a new user. • Use the racresetcfg subcommand to configure both CMCs with identical properties. Use the racresetcfg subcommand to reset the CMC to original defaults, and then run the racadm config -f .cfg command. Ensure that the .
The starting [ character that denotes a group name must be in column one. This group name must be specified before any of the objects in that group. Objects that do not include an associated group name generate an error. The configuration data is organized into groups as defined in the database property chapter of the Dell Chassis Management Controller Firmware Version 2.0 Administrator Reference Guide.
You must remove an indexed object manually using the following command: racadm config -g -o -i "" NOTE: A NULL string (identified by two " characters) directs the CMC to delete the index for the specified group. To view the contents of an indexed group, use the following command: racadm getconfig -g -i • For indexed groups the object anchor must be the first object after the [ ] pair.
# Object Group "cfgLanNetworking" # [cfgLanNetworking] cfgNicIpAddress=10.35.9.143 # comment, the rest of this line is ignored cfgNicGateway=10.35.9.1 The command racadm config -f .cfg parses the file and identifies any errors by line number. A correct file will update the proper entries. Additionally, you can use the same getconfig command from the previous example to confirm the update.
Table 4-3. Using the Serial and RACADM Commands: Frequently Asked Questions Question Answer When I use the RACADM subcommands, I get errors that I do not understand. You may encounter one or more of the following errors when using RACADM: • Local error messages — Problems such as syntax, typographical errors, and incorrect names. Example: ERROR: Use the RACADM help subcommand to display correct syntax and usage information.
– • • connect to switch or server serial console (new command) deploy – added -a option to set root user password on all iDRACs – added -b and -o options to set first boot device and enable/disable boot once fwupdate – – option added to support one-to-many iDRAC firmware updates in two modes of operation • 1) recovery mode • 2) normal mode (for 11G series servers only) option added to support one-to-many firmware updates by the generation of iDRAC For more information on the updates to these c
Using the CMC Web Interface 5 The CMC provides a Web interface that enables you to configure the CMC properties and users, perform remote management tasks, and troubleshoot a remote (managed) system for problems. For everyday chassis management, use the CMC Web interface. This chapter provides information about how to perform common chassis management tasks using the CMC Web interface.
Logging In NOTE: To log in to the CMC, you must have a CMC account with Log In to CMC privilege. NOTE: The default CMC user name is root, and the password is calvin. The root account is the default administrative account that ships with the CMC. For added security, Dell strongly recommends that you change the default password of the root account during initial setup. NOTE: The CMC does not support extended ASCII characters, such as ß, å, é, ü, or other characters used primarily in non-English languages.
Configuring Basic CMC Settings Setting the Chassis Name You can set the name used to identify the chassis on the network. (The default name is "Dell Rack System.") For example, an SNMP query on the chassis name will return the name you configure. To set the chassis name: 1 Log in to the CMC Web interface. The Component Health page displays. 2 Click the Setup tab. The General Chassis Settings page displays. 3 Type the new name in the Chassis Name field, and then click Apply.
Monitoring System Health Status Viewing Chassis and Component Summaries The CMC displays a graphical representation of the chassis on the Chassis Graphics page that provides a visual overview of installed component status. The Chassis Graphics page is dynamically updated, and the component subgraphic colors and text hints are automatically changed to reflect the current state. Figure 5-1.
The Component Health page provides an overall health status for all chassis components. For instructions on viewing chassis graphics and component health status, see "Viewing Chassis and Component Health Status" on page 313. Viewing Power Budget Status The Power Budget Status page displays the power budget status for the chassis, servers, and chassis power supply units (PSUs). For instructions on viewing power budget status, see "Viewing Power Consumption Status" on page 235.
• Amber - server is present, but may or may not be powered on, or may or may not be communicating with the CMC; an adverse condition may exist. • Gray - server is present and not powered on. It is not communicating with the CMC and there is no indication of an adverse condition. The Servers Status page provides overviews of the servers in the chassis. To view health status for all servers: 1 Log in to the CMC Web interface. 2 Select Servers in the system tree. The Servers Status page appears.
Table 5-1. All Servers Status Information (continued) Item Launch iDRAC GUI Description Warning Indicates that only warning alerts have been issued, and corrective action must be taken within the time frame set by the administrator. If corrective actions are not taken within the administrator-specified time, critical or severe failures that can affect the integrity of the device could occur. Severe Indicates at least one Failure alert has been issued.
Table 5-1. All Servers Status Information (continued) Item Description Service Tag Displays the service tag for the server. The service tag is a unique identifier provided by the manufacturer for support and maintenance. If the server is absent, this field is empty. For information on how to launch the iDRAC management console and single sign-on policies, see "Launching iDRAC using Single Sign-On" on page 160. Editing Slot Names The Slot Names page allows you to update slot names in the chassis.
• • Housing-Center The strings Server-1 through Server-16 may be used, but only for the corresponding slot. For example, Server-3 is a valid name for slot 3, but not for slot 4. Note that Server-03 is a valid name for any slot. NOTE: To change a slot name, you must have Chassis Configuration Administrator privilege. NOTE: The slot name setting in the Web interface resides on the CMC only. If a server is removed from the chassis, the slot name setting does not remain with the server.
The boot device that you specify must exist and contain bootable media. Table 5-2 lists the boot devices that you can specify. Table 5-2. Boot Devices Boot Device Description PXE Boot from a Preboot Execution Environment (PXE) protocol on the network interface card. Hard Drive Boot from the hard drive on the server. Local CD/DVD Boot from a CD/DVD drive on the server. Virtual Floppy Boot from the virtual floppy drive.
To set the first boot device for some or all servers in the chassis: 1 Log in to the CMC Web interface. 2 Click Servers in the system tree and then click Setup Device. A list of servers is displayed, one per row. Deploy First Boot 3 Select the boot device you want to use for each server. from the list box. 4 If you want the server to boot from the selected device every time it boots, uncheck the Boot Once check box for the server.
4 The server subgraphic is hyperlinked to the corresponding CMC GUI page to provide immediate navigation to the Server Status page for that server. The Server Status page (separate from the Servers Status page) provides an overview of the server and a launch point to the Web interface for the Integrated Dell Remote Access Controller (iDRAC), which is the firmware used to manage the server. NOTE: To use the iDRAC user interface, you must have an iDRAC user name and password.
Table 5-3. Individual Server Status - Properties (continued) Item Health Description OK Indicates that the server is present and communicating with the CMC. In the event of a communication failure between the CMC and the server, the CMC cannot obtain or display health status for the server. Informational Displays information about the server when no change in health status (OK, Warning, Severe) has occurred.
Table 5-4. Individual Server Status - iDRAC Network Settings Item Description iDRAC MAC Address Displays server's management network interface (iDRAC) MAC address, which is a unique identifier for the server on the network. LAN Enabled Indicates if the LAN channel is Enabled (Yes) or disabled (No). IPMI over LAN Indicates if the IPMI LAN channel is Enabled (Yes) or disabled Enabled (No). DHCP Enabled Indicates whether Dynamic Host Configuration Protocol (DHCP) is enabled (Yes) or disabled (No).
Table 5-5. Individual Server Status - WWN/MAC Address (continued) Item Description ChassisAssigned Displays the chassis-assigned WWN/MAC addresses used for the particular slot. WWN/MAC addresses showing N/A indicate that the FlexAddress feature is not installed. NOTE: A green check mark in the Server-Assigned and ChassisAssigned columns indicates the type of active addresses.
• Gray - IOM is present and not powered on. It is not communicating with the CMC and there is no indication of an adverse condition. 3 Use the cursor to hover over an individual IOM subgraphic and a corresponding text hint or screen tip is displayed. The text hint provides additional information on that IOM. 4 The IOM subgraphic is hyperlinked to the corresponding CMC GUI page to provide immediate navigation to the I/O Module Status page associated with that IOM.
The Fans Status page provides the status and speed measurements in revolutions per minute, or RPMs, of the fans in the chassis. There can be one or more fans. The CMC, which controls fan speeds, automatically increases or decreases fan speeds based on system wide events. The CMC generates an alert and increases the fan speeds when the following events occur: • The CMC ambient temperature threshold is exceeded. • A fan fails. • A fan is removed from the chassis.
Table 5-6. Fans Health Status Information (continued) Item Description Speed Indicates the speed of the fan in RPM. Viewing the iKVM Status The local access KVM module for your Dell M1000e server chassis is called the Avocent® Integrated KVM Switch Module, or iKVM. The health status of the iKVM associated with the chassis can be viewed on the Chassis Graphics page. To view health status for the iKVM using Chassis Graphics: 1 Log in to the CMC Web interface. 2 The Chassis Status page is displayed.
For more information about iKVM, see "Using the iKVM Module" on page 257. Viewing the Health Status of the PSUs The health status of the PSUs associated with the chassis can be viewed in two ways: from the Chassis Graphics section on the Chassis Status page or the Power Supply Status page. The Chassis Graphics page provides a graphical overview of all PSUs installed in the chassis. To view health status for all PSUs using Chassis Graphics: 1 Log in to the CMC Web interface.
Table 5-7 provides descriptions of the information provided on the Power Supply Status page. Table 5-7. Power Supply Health Status Information Item Description Name Displays the name of the PSU: PS-n, where n is the power supply number. Present Indicates whether the power supply is present (Yes or No). Health OK Indicates that the PSU is present and communicating with the CMC. Indicates that the health of the PSU is OK.
2 Select Temperature Sensors in the system tree. The Temperature Sensors Information page displays. Table 5-8 provides descriptions of the information provided on the Temperature Sensors Information page. Table 5-8. Temperature Sensors Health Status Information Item Description ID Displays the numeric ID of the temperature probe. Name Displays the name of each temperature probe on the chassis, servers, IOMs, and iKVM. Examples: Ambient Temp, Server 1 Temp, I/O Module 1, iKVM Temp.
Viewing World Wide Name/Media Access Control (WWN/MAC) IDs The WWN/MAC Summary page allows you to view the WWN configuration and MAC address of a slot in the chassis. Fabric Configuration The Fabric Configuration section displays the type of Input/Output fabric that is installed for Fabric A, Fabric B, and Fabric C. A green check mark indicates that the fabric is enabled for FlexAddress.
Configuring CMC Network Properties Setting Up Initial Access to the CMC NOTE: You must have Chassis Configuration Administrator privilege to set up CMC network settings. 1 Log in to the Web interface. 2 Select Chassis in the system tree. The Component Health page appears. 3 Click the Network/Security tab. The Network Configuration page appears. 4 Enable or disable DHCP for the CMC by selecting or clearing the Use DHCP (For CMC NIC IP Address) check box.
Table 5-9. Network Settings Setting Description CMC MAC Address Displays the chassis’ MAC address, which is a unique identifier for the chassis over the computer network. Enable CMC NIC Enables the NIC of the CMC. Default: Enabled. If this option is checked: • The CMC communicates with and is accessible over the computer network. • The Web interface, CLI (remote RACADM), WSMAN, Telnet, and SSH associated with the CMC are available.
Table 5-9. Network Settings (continued) Setting Description Use DHCP (For CMC NIC IP Address) Enables the CMC to request and obtain an IP address from the Dynamic Host Configuration Protocol (DHCP) server automatically. Default: Checked (enabled) If this option is checked, the CMC retrieves IP configuration (IP address, mask, and gateway) automatically from a DHCP server on your network. The CMC will always have a unique IP address allotted over your network.
Table 5-9. Network Settings (continued) Setting Description Use DHCP to Obtain DNS Server Addresses Obtains the primary and secondary DNS server addresses from the DHCP server instead of the static settings. Default: Checked (enabled) by default NOTE: If Use DHCP (For NIC IP Address) is enabled, then enable the Use DHCP to Obtain DNS Server Addresses property. If this option is checked, the CMC retrieves its DNS IP address automatically from a DHCP server on your network.
Table 5-9. Network Settings (continued) Setting Description DNS CMC Name Displays the CMC name only when Register CMC on DNS is selected. The default CMC name is CMC_service_tag, where service tag is the service tag number of the chassis, for example: CMC-00002. The maximum number of characters is 63. The first character must be a letter (a-z, A-Z), followed by an alphanumeric (a-z, A-Z, 0-9) or a hyphen (-) characters. Use DHCP for DNS Domain Name Uses the default DNS domain name.
Table 5-9. Network Settings (continued) Setting Description Network Speed Set the network speed to 100 Mbps or 10 Mbps to match your network environment. NOTE: The Network Speed setting must match your network configuration for effective network throughput. Setting the Network Speed lower than the speed of your network configuration increases bandwidth consumption and slows network communication. Determine whether your network supports the above network speeds and set it accordingly.
2 Click the Network/Security tab. The Network Configuration page displays. 3 Click the Advanced Settings button. The Network Security page displays. 4 Configure the CMC network security settings. Table 5-10 describes the settings on the Network Security page. Table 5-10. Network Security Page Settings Settings Description IP Range Enabled Enables the IP Range checking feature, which defines a specific range of IP addresses that can access the CMC.
Table 5-10. Network Security Page Settings (continued) Settings Description • IP Blocking Penalty Time The time span in seconds within which login attempts from an IP address with excessive failures are rejected. NOTE: The IP Blocking Fail Count, IP Blocking Fail Window, and IP Blocking Penalty Time fields are active only if the IP Blocking Enabled check box (the property field preceding these fields) is checked (enabled).
directly. The User Configuration Administrator cannot create a server user from CMC or vice versa. This rule protects the security and integrity of the servers. Table 5-11, Table 5-12, and Table 5-13 describe CMC user privileges (local or Active Directory), and what operations a CMC user can execute on the chassis and on the servers based on the privileges he is granted. The term user or users, therefore, should be understood as CMC users. Server users will be explicitly specified. Table 5-11.
Table 5-11. User Types (continued) Privilege Description Chassis Configuration Administrator Users who have the Chassis Configuration Administrator privilege can add or change data that: • Identifies the chassis, such as chassis name and chassis location • Is assigned specifically to the chassis, such as IP mode (static or DHCP), static IP address, static gateway, and static subnet mask • Provides services to the chassis, such as date and time, firmware update, and CMC reset.
Table 5-11. User Types (continued) Privilege Description Server Administrator The Server Administrator privilege is a blanket privilege granting a CMC user all rights to perform any operation on any servers present in the chassis. When a user with CMC Server Administrator privilege issues an action to be performed on a server, the CMC firmware sends the command to the targeted server without checking the user's privileges on the server.
Table 5-11. User Types (continued) Privilege Description Server Administrator (continued) Server Configuration Administrator: • Set IP address • Set gateway • Set subnet mask • Set first boot device User Configuration Administrator: • Set iDRAC root password • iDRAC reset Server Control Administrator: • Power on • Power off • Power cycle • Graceful shutdown • Server Reboot Test Alert User CMC users who have the Test Alert User privilege can send test alert messages.
The CMC user groups provide a series of user groups that have pre-assigned user privileges. The privileges are listed and described in Table 5-11. The following table lists the user groups and the pre-defined user privileges. NOTE: If you select Administrator, Power User, or Guest User, and then add or remove a privilege from the pre-defined set, the CMC Group automatically changes to Custom. Table 5-12.
Table 5-12. CMC Group Privileges (continued) User Group Privileges Granted Custom Select any combination of the following permissions: • CMC Login User • Chassis Configuration Administrator • User Configuration Administrator • Clear Logs Administrator • Chassis Control Administrator (Power Commands) • Super User • Server Administrator • Test Alert User • Debug Command Administrator • Fabric A Administrator • Fabric B Administrator • Fabric C Administrator None No assigned permissions. Table 5-13.
Table 5-13.
NOTE: For added security, Dell strongly recommends that you change the default password of the root (User 1) account. The root account is the default administrative account that ships with the CMC. To change the default password for the root account, click User ID 1 to open the User Configuration page. Help for that page is available through the Help link at the top right corner of the page.
Table 5-14. General User Settings (continued) Property Description User Name Sets or displays the unique CMC user name associated with the user. The user name can contain up to 16 characters. CMC user names cannot include forward slash (/) or period (.) characters. NOTE: If you change the user name, the new name does not appear in the user interface until your next login. Any user logging in after you apply the new user name will be able to see the change immediately.
To refresh the contents of the User Configuration page, click Refresh. To print the contents of the User Configuration page, click Print. Configuring and Managing Microsoft Active Directory Certificates NOTE: To configure Active Directory settings for the CMC, you must have Chassis Configuration Administrator privilege.
Table 5-15. Active Directory Main Menu Page Options (continued) Field Description Download Certificate Download a CMC server certificate to your management station or shared network using Windows Download Manager. When you select this option and click Next, a File Download dialog box appears. Use this dialog box to specify a location on your management station or shared network for the server certificate.
Table 5-16. Active Directory Common Settings Properties Setting Description Root Domain Name Specifies the domain name used by Active Directory. The root domain name is the fully qualified root domain name for the forest. NOTE: The root domain name must be a valid domain name using the x.y naming convention, where x is a 1–256 character ASCII string with no spaces between characters, and y is a valid domain type such as com, edu, gov, int, mil, net, or org.
7 If you selected Extended Schema, type the following required information in the Extended Schema Settings section, and then proceed directly to step 9. If you selected Standard Schema, proceed to step 8. • CMC Device Name – The name that uniquely identifies the CMC card in Active Directory. The CMC name must be the same as the common name of the new CMC object you created in your Domain Controller. The name must be a 1–256 character ASCII string with no spaces between characters. Default: null (empty).
Table 5-17. Active Directory Schema Options (continued) Setting Description Use Extended Schema Uses Extended Schema with Active Directory, which uses Dell-defined Active Directory objects. Before configuring CMC to use the Active Directory Extended Schema option, you must first configure the Active Directory software: 1 Extend the Active Directory schema. 2 Extend the Active Directory Users and Computers Snapin. 3 Add CMC users and their privileges to Active Directory.
To configure the Role Groups for Active Directory, click the individual Role Group (1–5). See Table 5-12 and Table 5-11). NOTE: To save the settings on the Active Directory Configuration and Management page, you have to click Apply before proceeding to the Custom Role Group page. Uploading an Active Directory Certificate Authority-Signed Certificate From the Active Directory Main Menu page: 1 Select Upload AD Certificate, and then click Next. The Certificate Upload page displays.
Table 5-16. Active Directory CA Certificate Information (continued) Field Description Valid From Certificate issue date. Valid To Certificate expiration date. To refresh the contents of the View Active Directory CA Certificate page, click Refresh. To print the contents of the View Active Directory CA Certificate page, click Print.
This encryption process provides a high level of data protection. The CMC employs the 128-bit SSL encryption standard, the most secure form of encryption generally available for Internet browsers in North America. The CMC Web server includes a Dell self-signed SSL digital certificate (Server ID). To ensure high security over the Internet, replace the Web server SSL certificate by submitting a request to the CMC to generate a new Certificate Signing Request (CSR).
NOTE: Any server certificate you upload must be current (not expired) and signed by a certificate authority. 1 Log in to the Web interface. 2 Click the Network/Security tab, and then click the SSL sub-tab. The SSL Main Menu page appears. Use the SSL Main Menu page options to generate a CSR to send to a certificate authority. The CSR information is stored on the CMC firmware.
To obtain a secure server certificate for the CMC, you must submit a Certificate Signing Request (CSR) to a certificate authority of your choice. A CSR is a digital request for a signed, secure server certificate containing information about your organization and a unique, identifying key.
Table 5-18. Generate Certificate Signing Request (CSR) Page Options Field Description Common Name The exact name being certified (usually the Web server's domain name, for example, www.xyzcompany.com/). Valid: Alphanumeric characters (A–Z, a–z, 0–9); hyphens, underscores, and periods. Not valid: Non-alphanumeric characters not noted above (such as, but not limited to, @ # $ % & *); characters used primarily in non-English languages, such as ß, å, é, ü.
Table 5-18. Generate Certificate Signing Request (CSR) Page Options (continued) Field Description Country The country where the organization applying for certification is located. Email Your organization's e-mail address. You may type any e-mail address you want to have associated with the CSR. The e-mail address must be valid, containing the at (@) sign (example: name@xyzcompany.com). Uploading a Server Certificate 1 From the SSL Main Menu page, select Upload Server Certificate, and then click Next.
Table 5-19. Certificate Information (continued) Field Description notBefore Issue date of the certificate notAfter Expiration date of the certificate To refresh the contents of the View Server Certificate page, click Refresh. To print the contents of the View Server Certificate page, click Print. Managing Sessions The Sessions page displays all current instances of connections to the chassis and allows you to terminate any active session.
Table 5-20. Sessions Properties (continued) Property Description Terminate Allows you to terminate any of the sessions listed, except for your own. To terminate the associated session, click the trash can icon . This column is displayed only if you have Chassis Configuration Administrator privileges. To terminate the session, click the trash can icon on the line that describes the session.
4 Configure the following services as required: • CMC serial console (Table 5-21) • Web server (Table 5-22) • SSH (Table 5-23) • Telnet (Table 5-24) • Remote RACADM (Table 5-25) 5 Click Apply; update all default time outs and maximum time out limits. Table 5-21. CMC Serial Console Settings Setting Description Enabled Enables Telnet console interface on the CMC.
Table 5-21. CMC Serial Console Settings (continued) Setting Description Escape Key Allows you to specify the Escape key combination that terminates serial/text console redirection when using the connect or racadm connect command. Default: ^\ (Hold and type a backslash (\) character) NOTE: The caret character ^ represents the key.
Table 5-22. Web Server Settings Setting Description Enabled Enables Web Server services (access through remote RACADM and the Web interface) for the CMC. Default: Checked (enabled) Max Sessions Indicates the maximum number of simultaneous Web user interface sessions allowed for the chassis. A change to the Max Sessions property takes effect at the next login; it does not affect current Active Sessions (including your own).
Table 5-22. Web Server Settings (continued) Setting Description HTTP Port Number Indicates the default port used by the CMC that listens for a server connection. NOTE: When you provide the HTTP address on the browser, the Web server automatically redirects and uses HTTPS.
Table 5-23. SSH Settings Setting Description Enabled Enables the SSH on the CMC. Default: Checked (enabled) Max Sessions The maximum number of simultaneous SSH sessions allowed for the chassis. A change to this property takes effect at the next login; it does not affect current Active Sessions (including your own).
Table 5-24. Telnet Settings Setting Description Enabled Enables Telnet console interface on the CMC. Default: Unchecked (disabled) Max Sessions Indicates the maximum number of simultaneous Telnet sessions allowed for the chassis. A change to this property takes effect at the next login; it does not affect current Active Sessions (including your own).
Table 5-25. Remote RACADM Settings Setting Description Enabled Enables the remote RACADM utility access to the CMC. Default: Checked (enabled) Max Sessions Indicates the maximum number of simultaneous RACADM sessions allowed for the chassis. A change to this property takes effect at the next login; it does not affect current Active Sessions (including your own).
Managing Firmware This section describes how to use the Web interface to update firmware. The following components can be updated using the GUI or RACADM commands: • CMC - primary and standby. • iKVM • iDRAC • IOM infrastructure devices When you update firmware, there is a recommended process to follow that can prevent a loss of service if the update fails. See "Installing or Updating the CMC Firmware" on page 43 for guidelines to follow before you use the instructions in this section.
Updating Firmware NOTE: To update firmware on the CMC, you must have Chassis Configuration Administrator privilege. NOTE: The firmware update retains the current CMC and iKVM settings. NOTE: If a web user interface session is used to update system component firmware, the "Idle Timeout" setting must be set high enough to accommodate the file transfer time. In some cases, the firmware file transfer time may be as high as 30 minutes. To set the "Idle Timeout" value, see "Configuring Services" on page 139.
NOTE: To avoid disconnecting other users during a reset, notify authorized users who might log in to the CMC and check for active sessions by viewing the Sessions page. To open the Sessions page, select Chassis in the tree, click the Network/Security tab, and then click the Sessions sub-tab. Help for that page is available through the Help link at the top right corner of the page. NOTE: When transferring files to and from the CMC, the file transfer icon spins during the transfer.
NOTE: Firmware updates can only be canceled using the GUI; the command line interface can not cancel a firmware update initiated by the GUI. 5 For a standby (secondary) CMC, when the update is complete the Update State field displays "Done". For an active (primary) CMC, during the final phases of the firmware update process, the browser session and connection with the CMC will be lost temporarily as the active (primary) CMC is taken off line.
• Do not use the Refresh button or navigate to another page during the file transfer. • To cancel the process, click Cancel File Transfer and Update - this option is available only during file transfer. • Update status displays in the Update State field; this field is automatically updated during the file transfer process. NOTE: The update may take up to one minute for the iKVM.
7 Click Begin Firmware Update. The Firmware Update Progress section provides firmware update status information. A status indicator displays on the page while the image file uploads. File transfer time can vary greatly based on connection speed. When the internal update process begins, the page automatically refreshes and the Firmware update timer displays. Additional items to note: • Do not use the Refresh button or navigate to another page during the file transfer.
6 In the Firmware Image field, enter the path to the firmware image file on your management station or shared network, or click Browse to navigate to the file location. 7 Click Begin Firmware Update. The Firmware Update Progress section provides firmware update status information. A status indicator displays on the page while the image file uploads. File transfer time can vary greatly based on connection speed.
the fifth parameter of the command. It must be set to a 6-byte address that is unique on your management network.Refer to the documentation for your IPMI utility (for example, ipmitool or ipmish) for help executing the command. Follow these steps to update the iDRAC firmware. 1 Download the latest iDRAC firmware to your management computer from support.dell.com. 2 Log in to the Web interface (see "Accessing the CMC Web Interface" on page 87). 3 Click Chassis in the system tree. 4 Click the Update tab.
Managing iDRAC The CMC provides the Deploy iDRAC page to allow the user to configure installed and newly inserted server's iDRAC network configuration settings. A user can configure one or more installed iDRAC devices from this page. The user can also configure the default iDRAC network configuration settings and root password for severs that will be installed later; these default settings are the iDRAC QuickDeploy settings.
Table 5-26. QuickDeploy Settings (continued) Setting Description Set iDRAC Root Password on Server Insertion Specifies whether a server’s iDRAC root password should be changed to the value provided in the iDRAC Root Password text box when the server is inserted. iDRAC Root Password When Set iDRAC Root Password on Server Insertion and QuickDeploy Enabled are checked, this password value is assigned to a server's iDRAC root user password when the server is inserted into chassis.
Table 5-26. QuickDeploy Settings (continued) Setting Description Starting iDRAC IP Address (Slot 1) Specifies the static IP address of the iDRAC of the server in slot 1 of the enclosure. The IP address of each subsequent iDRAC is incremented by 1 for each slot from slot 1's static IP address. In the case where the IP address plus the slot number is greater than the subnet mask, an error message is displayed. NOTE: The subnet mask and the gateway are not incremented like the IP address.
NOTE: When there is a LAN or LAN over IPMI difference, the user is prompted to accept the QuickDeploy IP address setting. If the difference is the DHCP setting, the user is prompted to accept the DHCP QuickDeploy setting. To copy the QuickDeploy settings into the iDRAC Network Settings section, press the Auto-Populate iDRAC Network Settings button. The QuickDeploy network configurations settings are copied into the corresponding fields in the iDRAC Network Configuration Settings table.
5 Set the remaining iDRAC Network Settings accordingly. Table 5-27. QuickDeploy Settings Setting Description Slot Displays the slot occupied by the server on the chassis. Selection of All Servers automatically fills the content of the input fields of servers that are present. Slot numbers are sequential IDs, from 1 to 16 (there are 16 slots available on the chassis), that help identify the location of the server in the chassis.
Table 5-27. QuickDeploy Settings (continued) Setting Description Gateway Specifies the default gateway assigned to the iDRAC which will be installed in this slot. 6 To deploy the setting to iDRAC, press the Apply iDRAC Network Settings button. If you made changes to the QuickDeploy settings, you can press the Save QuickDeploy Settings button to save the QuickDeploy settings.
1 Log in to the CMC Web interface. 2 Expand Servers in the system tree. All of the servers (1–16) appear in the expanded Servers list. 3 Click the server you want to view. The Server Status page displays. 4 Click the Launch iDRAC GUI icon. A user may be able to launch iDRAC GUI without having to login a second time, as this feature utilizes single sign-on. Single sign-on policies are described below.
FlexAddress This section describes the FlexAddress feature Web interface screens. FlexAddress is an optional upgrade that allows server modules to replace the factory assigned WWN/MAC ID with a WWN/MAC ID provided by the chassis. NOTE: You must purchase and install the FlexAddress upgrade to have access to the configuration screens. If the upgrade has not been purchased and installed, the following text will be displayed on the Web interface: Optional feature not installed.
1 Log in to the Web interface (see "Accessing the CMC Web Interface" on page 87). 2 Click Chassis in the system tree. 3 Click the Setup tab. The General Setup page appears. The FlexAddress entry will have a value of Active or Not Active; a value of active means that the feature is installed on the chassis. A value of not active means that the feature is not installed and not in use on the chassis.
Use the following steps to display a FlexAddress status overview for each server module: 1 Log in to the Web interface (see "Accessing the CMC Web Interface" on page 87). 2 Click Servers in the system tree. Click the Properties tab, WWN/MAC sub-tab. 3 The FlexAddress Summary page is displayed. This page allows you to view the WWN configuration and MAC addresses for all slots in the chassis.
Use the following steps to view FlexAddress server information: 1 Log in to the Web interface (see "Accessing the CMC Web Interface" on page 87). 2 Expand Servers in the system tree. All of the servers (1–16) appear in the expanded Servers list. 3 Click the server you want to view. The Server Status page displays. 4 Click the Setup tab, and the FlexAddress sub-tab. The FlexAddress Status page is displayed. This page allows you to view the WWN configuration and MAC addresses for the selected server.
Health OK Indicates that FlexAddress is present and providing status to the CMC. In the event of a communication failure between the CMC and FlexAddress, the CMC cannot obtain or display health status for FlexAddress. Informational Displays information about FlexAddress when no change in health status (OK, Warning, Severe) has occurred. Warning Indicates that only warning alerts have been issued, and corrective action must be taken within the time frame set by the administrator.
5 For additional information, click the Help link and review "Using FlexAddress" on page 173. Configuring FlexAddress If you purchase FlexAddress with your chassis, it will be installed and active when you power up your system. If you purchase FlexAddress separately, you must install the SD feature card using the instructions in the Chassis Management Controller (CMC) Secure Digital (SD) Card Technical Specification document. See support.dell.com for this document.
4 The Select Fabrics for Chassis-Assigned WWN/MACs displays a check box for Fabric A, Fabric B, and Fabric C. 5 Click the check box for each fabric you want to enable FlexAddress on. To disable a fabric, click the check box to clear the selection. NOTE: If no fabrics are selected, FlexAddress will not be enabled for the selected slots. The Select Slots for Chassis-Assigned WWN/MACs page displays an Enabled check box for each slot in the chassis (1 - 16).
6 Click Apply to save the changes. For additional information, click the Help link and review "Using FlexAddress" on page 173. Frequently Asked Questions Table 5-28 lists frequently asked questions and answers. Table 5-28. Managing and Recovering a Remote System: Frequently Asked Questions Question Answer When accessing the CMC Web interface, I get a security warning stating the host name of the SSL certificate does not match the host name of the CMC.
Table 5-28. Managing and Recovering a Remote System: Frequently Asked Questions Question Answer Why are the remote RACADM and Web-based services unavailable after a property change? It may take a minute for the remote RACADM services and the Web interface to become available after the CMC Web server resets.
Table 5-28. Managing and Recovering a Remote System: Frequently Asked Questions Question Answer The following message is displayed for unknown reasons: As part of discovery, IT Assistant attempts to verify the device’s get and set community names. In IT Assistant, you have the get community name = public and the set community name = private. By default, the community name for the CMC agent is public.
Using the CMC Web Interface
6 Using FlexAddress The FlexAddress feature is an optional upgrade introduced in CMC 1.1 that allows server modules to replace the factory assigned World Wide Name and Media Access Control (WWN/MAC) network IDs with WWN/MAC IDs provided by the chassis. Every server module is assigned unique WWN and MAC IDs as part of the manufacturing process.
Activating FlexAddress FlexAddress is delivered on a Secure Digital (SD) card that must be inserted into the CMC to provide the chassis-assigned WWN/MAC IDs. To activate the FlexAddress feature, perform several required updates; if you are not activating FlexAddress these updates are not required. The updates, which are listed in the table below, include server module BIOS, I/O mezzanine BIOS or firmware, and CMC firmware. You must apply these updates before you enable FlexAddress.
4 Update all CMC firmware in the chassis; if redundant CMCs are present, ensure both are updated. 5 Insert the SD card into the passive module for a redundant CMC module system or into the single CMC module for a non-redundant system. NOTE: If the CMC firmware that supports FlexAddress (version 1.10 or later) is not installed, the feature will not be activated. See the Chassis Management Controller (CMC) Secure Digital (SD) Card Technical Specification document for SD card installation instructions.
The following table lists the status messages returned by the command. Table 6-1. Status Messages Returned by featurecard -s Command Status Message Actions No feature card inserted. Check the CMC to verify that the SD card was properly inserted. In a redundant CMC configuration, make sure the CMC with the SD feature card installed is the active CMC and not the standby CMC. The feature card inserted is valid and No action required.
If there are no active features on the chassis, the command will return a message: racadm feature -s No features active on the chassis. After you have run both commands, the FlexAddress feature activation is verified. For further information on the RACADM commands, see the feature and featurecard command sections of the Dell Chassis Management Controller Firmware Version 2.0 Administrator Reference Guide.
For further information on the command, see the feature command section of the Dell Chassis Management Controller Firmware Version 2.0 Administrator Reference Guide. Viewing FlexAddress Status Using the CLI You can use the command line interface to view FlexAddress status information. You can view status information for the entire chassis or for a particular slot.
Enabled slots will be FlexAddress enabled for all fabrics that are enabled. For example, it is not possible to enable Fabric-A and B, and have Slot 1 be FlexAddress enabled on Fabric-A but not on Fabric-B. Use the following RACADM command to enable or disable fabrics: racadm setflexaddr [-f ] = = A, B, C 0 or 1 Where 0 is disable and 1 is enable.
Wake-On-LAN with FlexAddress When the FlexAddress feature is deployed for the first time on a given server module, it requires a power-down and power-up sequence for FlexAddress to take effect. FlexAddress on Ethernet devices is programmed by the server module BIOS. For the server module BIOS to program the address, it needs to be operational which requires the server module to be powered up.
No feature card inserted ERROR: can't open file 4 If the chassis service tag is reprogrammed, what happens if there is a feature card bound to that chassis? The Web interface will display an error that states: This feature card was activated with a different chassis. It must be removed before accessing the FlexAddress feature.
module will not get chassis-assigned addresses until the server has been power cycled. 9 What will happen if a chassis with a single CMC is downgraded with firmware prior to 1.10? The FlexAddress feature and configuration will be removed. After the CMC firmware is upgraded to 1.10 or later, the FlexAddress feature will need to be reactivated and configured by the user. 10 In a chassis with redundant CMCs, if you are replacing a CMC unit with one that has firmware prior to 1.
Table 6-2. FlexAddress Commands and Output Situation Command SD card in the active $racadm featurecard -s CMC module is bound to another service tag. Output The feature card inserted is valid and contains the following feature(s) FlexAddress: The feature card is bound to another chassis, svctag = J310TF1 SD card SN =0188BFFE03A SD card in the active $racadm featurecard -s CMC module that is bound to the same service tag.
Table 6-2.
FlexAddress DELL SOFTWARE LICENSE AGREEMENT This is a legal agreement between you, the user, and Dell Products L.P. or Dell Global B.V. ("Dell"). This agreement covers all software that is distributed with the Dell product, for which there is no separate license agreement between you and the manufacturer or owner of the software (collectively the "Software"). This agreement is not for the sale of Software or any other intellectual property.
The Software is protected by United States copyright laws and international treaties. You may make one copy of the Software solely for backup or archival purposes or transfer it to a single hard disk provided you keep the original solely for backup or archival purposes.
AND ALL ACCOMPANYING WRITTEN MATERIALS. This limited warranty gives you specific legal rights; you may have others, which vary from jurisdiction to jurisdiction. IN NO EVENT SHALL DELL OR ITS SUPPLIERS BE LIABLE FOR ANY DAMAGES WHATSOEVER (INCLUDING, WITHOUT LIMITATION, DAMAGES FOR LOSS OF BUSINESS PROFITS, BUSINESS INTERRUPTION, LOSS OF BUSINESS INFORMATION, OR OTHER PECUNIARY LOSS) ARISING OUT OF USE OR INABILITY TO USE THE SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGES.
documentation with only those rights set forth herein. Contractor/manufacturer is Dell Products, L.P., One Dell Way, Round Rock, Texas 78682. GENERAL This license is effective until terminated. It will terminate upon the conditions set forth above or if you fail to comply with any of its terms. Upon termination, you agree that the Software and accompanying materials, and all copies thereof, will be destroyed. This agreement is governed by the laws of the State of Texas.
Using the CMC With Microsoft Active Directory 7 A directory service maintains a common database of all information needed for controlling network users, computers, printers, and so on. If your company uses the Microsoft® Active Directory® service software, you can configure the software to provide access to the CMC. This allows you to add and control CMC user privileges to your existing users in your Active Directory software.
Extended Schema Overview There are two ways to enable Extended Schema Active Directory: • Using the CMC Web interface. For instructions, see "Configuring the CMC With Extended Schema Active Directory and the Web Interface" on page 205. • Using the RACADM CLI tool. For instructions, see "Configuring the CMC With Extended Schema Active Directory and RACADM" on page 207. Active Directory Schema Extensions The Active Directory data is a distributed database of Attributes and Classes.
The Association property links together users or groups with a specific set of privileges to one or more RAC devices. This model provides an Administrator maximum flexibility over the different combinations of users, RAC privileges, and RAC devices on the network without adding too much complexity.
Figure 7-1. Typical Setup for Active Directory Objects Association Object User(s) Group(s) Privilege Object RAC Device Object(s) RAC Privilege Object The Association Object allows for as many or as few users and/or groups as well as RAC Device Objects. However, the Association Object only includes one Privilege Object per Association Object. The Association Object connects the "Users" who have "Privileges" on the RACs (CMCs).
Figure 7-2. Setting Up Active Directory Objects in a Single Domain AO1 Group1 User1 User2 AO2 Priv1 User3 Priv2 RAC1 RAC2 To configure the objects for the single domain scenario: 1 Create two Association Objects. 2 Create two RAC Device Objects, RAC1 and RAC2, to represent the two CMCs. 3 Create two Privilege Objects, Priv1 and Priv2, in which Priv1 has all privileges (administrator) and Priv2 has login privilege. 4 Group user1 and user2 into Group1.
Domain1, and user2 and user 3 are in Domain2. In this scenario, configure user1 and user 2 with administrator privileges to both CMCs and configure user3 with login privileges to the RAC2 card. Figure 7-3. Setting Up Active Directory Objects in Multiple Domains Domain1 Domain2 AO1 Group1 User1 User2 AO2 Priv1 User3 Priv2 RAC1 RAC2 To configure the objects for the multiple domain scenario: 1 Ensure that the domain forest function is in Native or Windows 2003 mode.
6 Add Group1 as Members in Association Object 1 (A01), Priv1 as Privilege Objects in A01, and RAC1, RAC2 as RAC Devices in A01. 7 Add User3 as Members in Association Object 2 (A02), Priv2 as Privilege Objects in A02, and RAC2 as RAC Devices in A02. Configuring Extended Schema Active Directory to Access Your CMC Before using Active Directory to access your CMC, configure the Active Directory software and the CMC: 1 Extend the Active Directory schema (see "Extending the Active Directory Schema" on page 195).
The LDIF files and Dell Schema Extender are located on your Dell Systems Management Tools and Documentation DVD in the following respective directories: • :\SYSMGMT\ManagementStation\support\ OMActiveDirectory_Tools\\LDIF Files • :\SYSMGMT\ManagementStation\support\ OMActiveDirectory_ Tools\\Schema Extender To use the LDIF files, see the instructions in the readme included in the LDIF_Files directory.
Table 7-1. Class Definitions for Classes Added to the Active Directory Schema (continued) Class Name Assigned Object Identification Number (OID) dellAssociationObject 1.2.840.113556.1.8000.1280.1.1.1.2 dellRACPrivileges 1.2.840.113556.1.8000.1280.1.1.1.3 dellPrivileges 1.2.840.113556.1.8000.1280.1.1.1.4 dellProduct 1.2.840.113556.1.8000.1280.1.1.1.5 Table 7-2. dellRacDevice Class OID 1.2.840.113556.1.8000.1280.1.1.1.1 Description Represents the Dell RAC device.
Table 7-4. dellRAC4Privileges Class OID 1.2.840.113556.1.8000.1280.1.1.1.3 Description Defines Authorization Rights (privileges) for the CMC device. Class Type Auxiliary Class SuperClasses None Attributes dellIsLoginUser dellIsCardConfigAdmin dellIsUserConfigAdmin dellIsLogClearAdmin dellIsServerResetUser dellIsTestAlertUser dellIsDebugCommandAdmin dellPermissionMask1 dellPermissionMask2 Table 7-5. dellPrivileges Class OID 1.2.840.113556.1.8000.1280.1.1.1.
Table 7-7. List of Attributes Added to the Active Directory Schema Assigned OID/Syntax Object Identifier Single Valued Attribute: dellPrivilegeMember Description: List of dellPrivilege objects that belong to this attribute. OID: 1.2.840.113556.1.8000.1280.1.1.2.1 FALSE Distinguished Name: (LDAPTYPE_DN 1.3.6.1.4.1.1466.115.121.1.12) Attribute: dellProductMembers Description: List of dellRacDevices objects that belong to this role.
Table 7-7. List of Attributes Added to the Active Directory Schema (continued) Assigned OID/Syntax Object Identifier Single Valued Attribute: dellIsUserConfigAdmin Description: TRUE if the user has User Configuration Administrator rights on the device. OID: 1.2.840.113556.1.8000.1280.1.1.2.5 TRUE Boolean (LDAPTYPE_BOOLEAN 1.3.6.1.4.1.1466.115.121.1.7) Attribute: delIsLogClearAdmin Description: TRUE if the user has Clear Logs Administrator rights on the device. OID: 1.2.840.113556.1.8000.1280.1.1.2.
Table 7-7. List of Attributes Added to the Active Directory Schema (continued) Assigned OID/Syntax Object Identifier Single Valued Attribute: dellRacType Description: This attribute is the Current Rac Type for the dellRacDevice object and the backward link to the dellAssociationObjectMembers forward link. OID: 1.2.840.113556.1.8000.1280.1.1.2.13 TRUE Case Ignore String(LDAPTYPE_CASEIGNORESTRING 1.2.840.113556.1.4.
For more information about the Active Directory User’s and Computers Snap-In, see your Microsoft documentation. Installing the Administrator Pack You must install the Administrator Pack on each system that is managing the Active Directory CMC Objects. If you do not install the Administrator Pack, you cannot view the Dell RAC Object in the container.
Creating a RAC Device Object 1 In the MMC Console Root window, right-click a container. 2 Select New Dell RAC Object. The New Object window appears. 3 Type a name for the new object. The name must be identical to the CMC Name that you will type in step 8a of "Configuring the CMC With Extended Schema Active Directory and the Web Interface" on page 205. 4 Select RAC Device Object. 5 Click OK.
For example, if you select Universal, the association objects are only available when the Active Directory Domain is functioning in Native Mode or above. 1 In the Console Root (MMC) window, right-click a container. 2 Select New Dell RAC Object. This opens the New Object window. 3 Type a name for the new object. 4 Select Association Object. 5 Select the scope for the Association Object. 6 Click OK.
Adding RAC Devices or RAC Device Groups To add RAC devices or RAC device groups: 1 Select the Products tab and click Add. 2 Type the RAC device or RAC device group name and click OK. 3 In the Properties window, click Apply and click OK. Configuring the CMC With Extended Schema Active Directory and the Web Interface 1 Log in to the CMC Web interface. 2 Select Chassis in the system tree. 3 Click the Network/Security tab, and then click the Active Directory subtab.
7 Select the Use Extended Schema radio button in the Active Directory Schema Selection area. 8 In the Extended Schema Settings section: a Type the CMC Name. The CMC Name uniquely identifies the CMC card in Active Directory. The CMC Name must be the same as the common name of the new CMC object you created in your Domain Controller. The CMC Name must be a 1–256 character ASCII string with no spaces between characters. b Type the CMC Domain Name (example: cmc.com).
16 If Use DHCP (for NIC IP Address) is enabled (checked), do one of the following: • Select Use DHCP to Obtain DNS Server Addresses to enable the DNS server addresses to be obtained automatically by the DHCP server., or • Manually configure a DNS server IP address by leaving the Use DHCP to Obtain DNS Server Addresses check box unchecked and then typing your primary and alternate DNS server IP addresses in the fields provided. 17 Click Apply Changes.
Optional: If you want to specify an LDAP or Global Catalog server instead of using the servers returned by the DNS server to search for a user name, type the following command to enable the Specify Server option: racadm config -g cfgActiveDirectory -o cfgADSpecifyServerEnable 1 NOTE: When you use the Specify Server option, the host name in the certificate authority-signed certificate is not matched against the name of the specified server.
• If DHCP is disabled on the CMC, or if DHCP is enabled but you want to specify your DNS IP address manually, type following commands: racadm config -g cfgLanNetworking -o cfgDNSServersFromDHCP 0 racadm config -g cfgLanNetworking -o cfgDNSServer1 racadm config -g cfgLanNetworking -o cfgDNSServer2 The Extended Schema feature configuration is complete.
Figure 7-4.
Table 7-8.
NOTE: The bit mask values are used only when setting Standard Schema with the RACADM. NOTE: For more information about user privileges, see "User Types" on page 116. There are two ways to enable Standard Schema Active Directory: • With the CMC Web interface. See "Configuring the CMC With Standard Schema Active Directory and Web Interface" on page 212. • With the RACADM CLI tool. See "Configuring the CMC With Standard Schema Active Directory and RACADM" on page 215.
5 In the Common Settings section: a Select the Enable Active Directory check box. b Type the ROOT Domain Name. The ROOT Domain Name is the fully qualified root domain name for the forest. NOTE: The ROOT domain name must be a valid domain name using the x.y naming convention, where x is a 1–256 character ASCII string with no spaces between characters, and y is a valid domain type such as com, edu, gov, int, mil, net, or org. c Type the Timeout time in seconds. Configuration range: 15–300 seconds.
13 Click Apply to save the Role Group settings. 14 Click Go Back To Active Directory Configuration and Management. 15 Click Go Back To Active Directory Main Menu. 16 Upload your domain forest Root certificate authority-signed certificate into the CMC. a Select the Upload Active Directory CA Certificate check box and then click Next. b In the Certificate Upload page, type the file path of the certificate or browse to the certificate file.
Configuring the CMC With Standard Schema Active Directory and RACADM To configure the CMC Active Directory Feature with Standard Schema using the RACADM CLI, use the following commands: 1 Open a serial/Telnet/SSH text console to the CMC, log in, and type: racadm config -g cfgActiveDirectory -o cfgADEnable 1 racadm config -g cfgActiveDirectory -o cfgADType 2 racadm config -g cfgActiveDirectory -o cfgADRootDomain racadm config -g cfgStandardSchema -i -o cfgSSADRoleGr
• If DHCP is disabled on the CMC or you want manually to input your DNS IP address, type the following commands: racadm config -g cfgLanNetworking -o cfgDNSServersFromDHCP 0 racadm config -g cfgLanNetworking -o cfgDNSServer1 racadm config -g cfgLanNetworking -o cfgDNSServer2 Frequently Asked Questions Table 7-9 lists frequently asked questions and answers about using Active Directory with the CMC. Table 7-9.
Table 7-9. Using CMC With Active Directory: Frequently Asked Questions (continued) Question Answer Can these Dell-extended objects (Dell Association Object, Dell RAC Device, and Dell Privilege Object) be in different domains? The Association Object and the Privilege Object must be in the same domain. The Dellextended Active Directory Users and Computers Snap-In forces you to create these two objects in the same domain. Other objects can be in different domains. Are there any restrictions on Domain Yes.
Table 7-9. Using CMC With Active Directory: Frequently Asked Questions (continued) Question Answer What can I do if I cannot log into the CMC using Active Directory authentication? How do I troubleshoot the issue? 1 Ensure that you use the correct user domain name during a login and not the NetBIOS name. 2 If you have a local CMC user account, log into the CMC using your local credentials.
8 Power Management Overview The PowerEdge M1000e server enclosure was designed to be the most powerefficient modular server in the market. It was designed to include highlyefficient power supplies and fans, has an optimized layout so that air flows more easily through the system, and contains power optimized components throughout the enclosure.
this mode, the CMC will report three supplies as online and the other three supplies as redundant, but the load is shared across all six supplies. This is done to ensure that system does not experience downtime in the event of a failure. If any of the three PSUs in a grid fail, the CMC will report the other grid as Online and the enclosure redundancy status will change to No.
Power Budgeting for Hardware Modules The figure below illustrates a chassis that contains a six-PSU configuration. The PSUs are numbers 1 - 6, starting on the left-side of the enclosure. Figure 8-1. Chassis With Six-PSU Configuration PSU1 PSU2 PSU3 PSU4 PSU5 PSU6 The CMC maintains a power budget for the enclosure that reserves the necessary wattage for all installed servers and components.
consumption and limit it to within a few watts of the allocated power. Under heavy load the server’s processors may be throttled to ensure power consumption stays below or at allocation. The M1000e enclosure can supply enough power for peak performance of most server configurations, but many available server configurations will not consume the maximum power that the enclosure can supply.
Server Slot Power Priority Settings The CMC allows users to set a power priority for each of the sixteen server slots in an enclosure. The priority settings are 1 (highest) through 9 (lowest). These settings are assigned to slots in the chassis, and the slot's priority will be inherited by any server inserted in that slot. The CMC uses slot priority to preferentially budget power to the highest priority servers in the enclosure.
• Power Supply Redundancy mode with DPSE is also power efficient. Two supplies are active, with one PSU required to power the configuration and one to provide redundancy in case of PSU failure. PSU Redundancy mode offers protection against the failure of any one PSU, but does not protect the user in the event of an AC grid loss.
be moved to Standby state depending on overall system load. In a six PSU configuration, a minimum of two power supply units are always powered on, one in Online state and one in Redundant state. Since an enclosure in the Power Supply Redundancy configuration always has one extra PSU engaged, the enclosure can tolerate the loss of one online PSU and still have enough power for the installed server modules. The loss of the online PSU will cause a standby PSU to come online.
Table 8-1. Default Redundancy Configuration PSU Configuration Default Redundancy Policy Default Dynamic PSU Engagement Setting Six PSUs AC Redundancy Disabled Three PSUs No Redundancy Disabled AC Redundancy For AC Redundancy mode to operate at optimal power, the chassis must contain six PSUs. A chassis can be set to operate in AC Redundancy mode with fewer than six PSUs, but it will operate in a degraded state. In AC Redundancy mode, all six PSUs will be active.
Power Conservation and Power Budget Changes The CMC performs power conservation when the user-configured maximum power limit is reached. When the demand for power exceeds the set power limit, the CMC reduces power to servers assigned a lower priority in order to free power for higher priority servers and other modules in the chassis. If all or multiple slots in the chassis are configured with the same priority level, the CMC decreases power to servers by increasing slot number order.
Figure 8-2.
Figure 8-3. No Redundancy Power Grid #1 Power Supply #1 Power Supply #2 Power Supply #3 Empty Slot #4 Empty Slot #5 Empty Slot #6 Chassis DC Power Bus Single Power Grid: No protection against grid or power supply failure New Server Engagement Policy When a new server is powered on, the CMC may need to decrease power to lower priority servers to allow more power for the new server if adding the new server exceeds the power available for the chassis.
• If enough power is freed by reducing power to the existing servers, the freed power is allocated to the new server and the server is allowed to power up. Table 8-2 describes the actions taken by the CMC when a new server is powered on in the scenario described above. Table 8-2.
Table 8-3. Chassis Impact from PSU Failure or Removal (continued) PSU Configuration Dynamic PSU Firmware Response Engagement No Redundancy Enabled Decrease power to low priority servers, if needed. PSU Removals With a No Redundancy Policy The CMC may begin conserving power when a user removes a PSU or a PSU AC cord. The CMC decreases power to the lower priority servers until power allocation is supported by the remaining PSUs in the chassis.
Table 8-4.
Table 8-5. SEL Events for Power Policy Changes Power Policy Event System Event Log (SEL) Entry PSU Count back to three sufficient resources (nonredundant) was asserted Configuring and Managing Power You can use the Web-based and RACADM interfaces to manage and configure power controls on the CMC.
• Amber - PSU is present, but may or may not be powered on, or may or may not be communicating with the CMC; an adverse condition may exist. • Gray - PSU is present and not powered on. It is not communicating with the CMC and there is no indication of an adverse condition. 3 Use the cursor to hover over the an individual PSU subgraphic and a corresponding text hint or screen tip is displayed. The text hint provides additional information on that PSU.
Table 8-6. Power Supply Health Status Information (continued) Item Description Severe Indicates at least one Failure alert has been issued for the power supply. Severe status indicates a power failure on the chassis, and corrective action must be taken immediately. Name Displays the name of the PSU: PS-n, where n is the power supply number.
Using RACADM Open a serial/Telnet/SSH text console to the CMC, log in, and type: racadm getpminfo Table 8-7. Real-Time Power Statistics Item Description System Input Power Displays the current cumulative power consumption of all modules in the chassis measured from the input side of the PSUs. The value for system input power is indicated in both watts and BTU/h units. Peak System Power Displays the maximum system level input power consumption since the value was last cleared.
Table 8-7. Real-Time Power Statistics (continued) Item Description Minimum System Power Displays the minimum system level AC power consumption value (in watts) over the time since the user last cleared this value. This property allows you to track the minimum power consumption by the system (chassis and modules) recorded over a period of time. Click the Configuration sub-tab on the Budget Status page to clear this value. The value for minimum system power is displayed in both the watts and BTU/h units.
Table 8-7. Real-Time Power Statistics (continued) Item Description System Potential Power Displays the estimated power consumption of the chassis when it is operating at maximum power. The maximum power consumption is defined as the state of the chassis while it is ON and all modules are consuming maximum power. This is an estimated value and not a measured value.
Table 8-8. Real-Time Energy Statistics Status (continued) Item Description System Energy Consumption Timestamp Displays the date and time when the system energy consumption was calculated for display. The timestamp is displayed in the format hh:mm:ss MM/DD/YYYY, where hh is hours (0-24), mm is minutes (00-60), ss is seconds (00-60), MM is the month (1-12), DD is the day (1-31), and YYYY is the year. Table 8-9.
Table 8-10. Server Modules Item Description Slot Displays the location of the server module. The Slot is a sequential number (1–16) that identifies the server module by its location within the chassis. Name Displays the server name. The server name can be redefined by the user. Present Displays whether the server is present in the slot (Yes or No). If this field displays Extension of # (where the # will be 1-8), then number that follows it is the main slot of a multi-slot server.
Using RACADM Open a serial/Telnet/SSH text console to the CMC, log in, and type: racadm getpbinfo For more information about getpbinfo, including output details, see the getpbinfo command section in the CMC Version 2.0 Administrator Reference Guide. Table 8-11. System Power Policy Configuration Item Description System Input Power Cap Displays the user configured maximum power consumption limit for the entire system (chassis, CMC, servers, I/O modules, power supply units, iKVM, and fans).
Table 8-11. System Power Policy Configuration (continued) Item Description Redundancy Policy Indicates the current redundancy configuration: AC Redundancy, Power Supply Redundancy, and No Redundancy. AC Redundancy — Power input is load-balanced across all PSUs. Three of the PSUs are connected to one AC grid and the other three are connected to another grid. When the system is running optimally in AC Redundancy mode, power is load-balanced across all active supplies.
Table 8-12. Power Budgeting Item Description System Input Max Power Capacity Maximum input power that the available power supplies can supply to the system (in watts). Input Redundancy Reserve Displays the amount of redundant power (in watts) in reserve that can be utilized in the event of an AC grid or power supply unit (PSU) failure.
Table 8-13. Server Modules Item Description Slot Displays the location of the server module. The Slot is a sequential number (1–16) that identifies the server module by its location within the chassis. Name Displays the server name. The server name can be redefined by the user. Type Displays the type of the server. Priority Indicates the priority level allotted to the server slot in the chassis for power budgeting.
Table 8-14. System Power Supplies Item Description Name Displays the name of the PSU in the format PS-n, where n, is the PSU number. Power State Indicates the power state of the PSU — On, Initializing, Online, Stand By, In Diagnostics, Failed, Redundant, Unknown, or Absent (missing). Input Volts Displays the present input voltage of the power supply. Input Current Displays the present input current of the power supply.
Table 8-15. Configurable Power Budget/Redundancy Properties Item Description Surplus for Peak Performance The surplus for peak performance value is the difference between the System Input Power Cap and the Power Required for Peak Performance (sum of the Maximum Input Power Allocated to Servers and the Maximum Input Power Allocated to Chassis Infrastructure). The value for surplus for peak performance is indicated in both the watts and BTU/h units.
Table 8-15. Configurable Power Budget/Redundancy Properties (continued) Item Description System Input Power Cap System Input Power Cap is the maximum AC power that the system is allowed to allocate to servers and chassis infrastructure. It can be configured by the user to any value that exceeds the minimum power needed for servers that are powered on and the chassis infrastructure; configuring a value that falls below the minimum power needed for servers and the chassis infrastructure will fail.
Table 8-15. Configurable Power Budget/Redundancy Properties (continued) Item Description Redundancy Policy This option will allow you to select one the following options: • No Redundancy: Power from all three power supplies on one AC circuit (grid) is used to power-on the entire chassis, including the chassis, servers, I/O modules, iKVM, and CMC. NOTE: The No Redundancy mode uses only three power supplies at a time. If 3 PSUs are installed, then there is no backup available.
Table 8-15. Configurable Power Budget/Redundancy Properties (continued) Item Description Enable Dynamic Power Supply Engagement Enables (when checked) dynamic power management. In Dynamic Engagement mode, the power supplies are turned ON or OFF based on power consumption, optimizing the energy consumption of the entire chassis. For example, your power budget is 5000 watts, your redundancy policy is set to AC redundancy mode, and you have six power supply units.
racadm config -g cfgChassisPower -o cfgChassisRedundancyPolicy where is 0 (No Redundancy), 1 (AC Redundancy), 2 (Power Supply Redundant). The default is 0. For example, the following command: racadm config -g cfgChassisPower -o cfgChassisRedundancyPolicy 1 sets the redundancy policy to 1. • To enable or disable dynamic PSU engagement, type: racadm config -g cfgChassisPower -o cfgChassisDynamicPSUEngagementEnable where is 0 (disable), 1 (enable). The default is 1.
3 Click the Power Management tab. The Server Priority page appears, listing all of the servers in your chassis. 4 Select a priority level (1–9, with 1 holding the highest priority) for one, multiple, or all servers. The default value is 1. You can assign the same priority level to multiple servers. 5 Click Apply to save your changes.
5 Type a budget value of up to 7928 watts in the System Input Power Cap text field. NOTE: The power budget is limited to a maximum of three PSUs out of a total of six PSUs. If you attempt to set a AC power budget value that exceeds the power capacity of your chassis, the CMC will display a failure message. NOTE: When value changes are specified in watts, the submitted value will exactly reflect what is actually applied.
• A power failure occurs in a non-redundant configuration For information about assigning priority levels to servers, see "Executing Power Control Operations on the Chassis" on page 253. Executing Power Control Operations on the Chassis NOTE: To perform power management actions, you must have Chassis Control Administrator privilege. NOTE: Power control operations affect the entire chassis. For power control operations on an IOM, see "Executing Power Control Operations on an IOM" on page 254.
• Power Cycle System (cold boot) — Powers off and then reboots the system (cold boot). This option is disabled if the chassis is already powered OFF. NOTE: This action powers off and then reboots the entire chassis (chassis, servers which are configured to always power on, IOMs, iKVM, and power supplies). • Reset CMC — Resets the CMC without powering off (warm reboot). (This option is disabled if the CMC is already powered off). NOTE: This action only resets the CMC. No other components are affected.
5 Click Apply. A dialog box appears requesting confirmation. 6 Click OK to perform the power management action (for example, cause the IOM to power cycle). Using RACADM Open a serial/Telnet/SSH text console to the CMC, log in, and type: racadm chassisaction -m switch- where is a number 1-6 and specifies the IOM (A1, A2, B1, B2, C1, C2), and indicates the operation you want to execute: powercycle or reset.
5 Select one of the following Power Control Operations by clicking its radio button: • Power On Server — Turns on the server power (equivalent to pressing the power button when the server power is off). This option is disabled if the server is already powered on. • Power Off Server — Turns off the server power (equivalent to pressing the power button when the server power is on). • Graceful Shutdown — Powers off and then reboots the server.
Using the iKVM Module 9 Overview The local access KVM module for your Dell™ M1000e server chassis is called the Avocent® Integrated KVM Switch Module, or iKVM. The iKVM is an analog keyboard, video, and mouse switch that plugs into your chassis. It is an optional, hot-pluggable module to the chassis that provides local keyboard, mouse, and video access to the servers in the chassis, and to the active CMC’s command line.
The CMC identifies a slot by assigning it a unique name. To change slot names using the CMC Web interface, see "Editing Slot Names" on page 94. To change a slot name using RACADM, see the setslotname section in the Dell Chassis Management Controller Firmware Version 2.0 Administrator Reference Guide. Video The iKVM video connections support video display resolutions ranging from 640 x 480 at 60 Hz up to 1280 x 1024 at 60 Hz.
3 Rear Panel For example, if you have iKVM connections in the front panel and ACI, the front panel connection remains active while the ACI connection is disabled. If you have ACI and rear connections, the ACI connection takes precedence. Tiering Through the ACI Connection The iKVM allows tiered connections with servers and the iKVM’s CMC command line console, either locally through a Remote Console Switch port or remotely through the Dell RCS® software.
Table 9-1. OSCAR Keyboard and Mouse Navigation (continued) Key or Key Sequence Result Opens the Help screen for the current dialog box. Closes the current dialog box without saving changes and returns to the previous dialog box. In the Main dialog box, closes the OSCAR interface and returns to selected server. In a message box, it closes the pop-up box and returns to the current dialog box.
Table 9-1. OSCAR Keyboard and Mouse Navigation (continued) Key or Key Sequence Result Disabled. To change case, use the key. Configuring OSCAR Table 9-2 describes the features available from the OSCAR Setup menu for configuring your servers. Table 9-2. OSCAR Setup Menu Features Feature Purpose Menu Changes the server listing between numerically by slot or alphabetically by name. Security • Sets a password to restrict access to servers.
To choose the default display order of servers in the Main dialog box: 1 Select Name to display servers alphabetically by name. or Select Slot to display servers numerically by slot number. 2 Click OK. To assign one or more key sequences for OSCAR activation: 1 Select a key sequence from the Invoke OSCAR menu. 2 Click OK. The default key to invoke OSCAR is .
To access the Flag dialog box: 1 Press . The Main dialog box appears. 2 Click Setup and then Flag. The Flag dialog box appears. To specify how the status flag displays: 1 Select Displayed to show the flag all the time or Displayed and Timed to display the flag for only five seconds after switching. NOTE: If you select Timed by itself, the flag is not displayed. 2 Select a flag color from the Display Color section. Options are black, red, blue, and purple.
• Standard USB pointing devices. • Self-powered USB 1.1 hubs connected to the local USB port on the iKVM. • Powered USB 2.0 hubs connected to the Dell M1000e chassis’ front panel console. NOTE: You can use multiple keyboards and mice on the iKVM local USB port. The iKVM aggregates the input signals. If there are simultaneous input signals from multiple USB keyboards or mice, it may have unpredictable results. NOTE: The USB connections are solely for supported keyboard, mouse, and USB hubs.
Viewing the Status of Your Servers The status of the servers in your chassis is indicated in the right columns of the Main dialog box. The following table describe the status symbols. Table 9-4. OSCAR Interface Status Symbols Symbols Description (Green dot.) Server is online. (Red X.) Server is offline or absent from chassis. (Yellow dot.) Server is not available. (Green A or B.) Server is being accessed by the user channel indicated by the letter: A=rear panel, B=front panel.
• To disconnect the user from a server: Press to access OSCAR and then click Disconnect. or Press and then <0>. This leaves you in a free state, with no server selected. The status flag on your desktop, if active, displays Free. See "Controlling the Status Flag" on page 262. Soft Switching Soft switching is switching between servers using a hotkey sequence.
Video Connections The iKVM has video connections on the front and rear panels of the chassis. The front panel connection signals take precedence over that of the rear panel. When a monitor is connected to the front panel, the video connection does not pass through to the rear panel, and an OSCAR message displays stating that the rear panel KVM and ACI connections are disabled.
Use the Security dialog box to lock your console with password protection, set or change your password, or enable the screen saver. NOTE: If the iKVM password is lost or forgotten, you can reset it to the iKVM factory default using the CMC Web interface or RACADM. See "Clearing a Lost or Forgotten Password" on page 270. Accessing the Security Dialog Box 1 Press . The Main dialog box appears. 2 Click Setup and the Security. The Security dialog box appears.
CAUTION: Monitor damage may result from the use of Energy mode with monitors not compliant with Energy Star. 5 Optional: To activate the screen saver test, click Test. The Screen Saver Test dialog box displays. Click OK to start the test. The test takes 10 seconds. When it concludes, you are returned to the Security dialog box. Logging In 1 Press to launch OSCAR. The Password dialog box appears. 2 Type your password and then click OK. The Main dialog box appears.
Enabling Screen Saver Mode With No Password Protection NOTE: If your console is password protected, you must first remove password protection. Follow the steps in the previous procedure before following the steps below. 1 Select Enable Screen Saver. 2 Type the number of minutes (1 through 99) that you want to delay activation of the screen saver. 3 Select Energy if your monitor is ENERGY STAR compliant; otherwise select Screen.
To reset a lost or forgotten iKVM password using the CMC Web interface: 1 Log in to the CMC Web interface. 2 Select iKVM from the Chassis submenu. 3 Click the Setup tab. The iKVM Configuration page displays. 4 Click Restore Default Values. You can then change the password from the default using OSCAR. See "Setting or Changing the Password" on page 268.
To display version information: 1 Press . The Main dialog box appears. 2 Click Commands and then Display Versions. The Version dialog box appears. The top half of the Version dialog box lists the subsystem versions in the appliance. 3 Click or press to close the Version dialog box. Scanning Your System In scan mode, the iKVM automatically scans from slot to slot (server to server).
or Click the Clear button to remove all servers from the Scan list. 2 Click the Add/Remove button, and then click OK. To start Scan mode: 1 Press . The Main dialog box appears. 2 Click Commands. The Command dialog box appears. 3 Select the Scan Enable box. 4 Click OK. A message appears indicating that the mouse and keyboard have been reset. 5 Click to close the message box. To cancel scan mode: 1 If OSCAR is open and the Main dialog box is displayed, select a server in the list.
To broadcast to servers: 1 Press . The Main dialog box appears. 2 Click Setup and then Broadcast. The Broadcast dialog box appears. NOTE: Broadcasting keystrokes: When using keystrokes, the keyboard state must be identical for all servers receiving a broadcast for the keystrokes to be interpreted identically. Specifically, the and modes must be the same on all keyboards.
Managing iKVM From the CMC Enabling or Disabling the Front Panel To enable or disable access to the iKVM from the front panel using RACADM, open a serial/Telnet/SSH text console to the CMC, log in, and type: racadm config -g cfgKVMInfo -o cfgKVMFrontPanelEnable where is 1 (enable) or 0 (disable). For more information about the config subcommand, see the config command section in the Dell Chassis Management Controller Firmware Version 2.0 Administrator Reference Guide.
5 Click Apply to save the setting. Viewing the iKVM Status and Properties The local access KVM module for your Dell M1000e server chassis is called the Avocent® Integrated KVM Switch Module, or iKVM. The health status of the iKVM associated with the chassis can be viewed on the Chassis Properties Health page under the Chassis Graphics section. To view health status for the iKVM using Chassis Graphics: 1 Log in to the CMC Web interface. 2 The Chassis Status page is displayed.
Table 9-5. iKVM Status Information Item Description Presence Indicates whether the iKVM module is Present or Absent. Power State Indicates the power status of the iKVM: On, Off, or N/A (Absent). Name Displays the product name of the iKVM. Manufacturer Displays in the manufacturer of the iKVM. Part Number Displays the part number for the iKVM. The part number is a unique identifier provided by the vendor. Firmware Version Indicates the firmware version of the iKVM.
1 Log in to the CMC Web interface. 2 Click Chassis in the system tree. 3 Click the Update tab. The Updatable Components page displays. 4 Click the iKVM name. The Firmware Update page appears. 5 In the Firmware Image field, enter the path to the firmware image file on your management station or shared network, or click Browse to navigate to the file location. NOTE: The default iKVM firmware image name is ikvm.bin; however, the iKVM firmware image name can be changed by the user.
racadm fwupdate -gua 192.168.0.10 -d ikvm.bin -m kvm For more information about the fwupdate subcommand, see the fwupdate command section in the Dell Chassis Management Controller Firmware Version 2.0 Administrator Reference Guide. Troubleshooting NOTE: If you have an active console redirection session and a lower resolution monitor is connected to the iKVM, the server console resolution may reset if the server is selected on the local console.
Table 9-6. Troubleshooting iKVM (continued) Problem Likely Cause and Solution The rear panel access does not work. The front panel setting is enabled by the CMC, and a monitor is currently connected to the front panel. Only one connection is allowed at a time. The front panel connection has precedence over ACI and the rear panel. For more information about connection precedence, see "iKVM Connection Precedences" on page 258.
Table 9-6. Troubleshooting iKVM (continued) Problem Likely Cause and Solution The iKVM’s amber LED is blinking. There are three possible causes: There is problem with the iKVM, for which the iKVM requires reprogramming. To fix the problem, follow the instructions for updating iKVM firmware (see "Updating the iKVM Firmware" on page 277). The iKVM is reprogramming the CMC Console Interface. In this case, the CMC Console is temporarily unavailable and represented by a yellow dot in the OSCAR interface.
Table 9-6. Troubleshooting iKVM (continued) Problem Likely Cause and Solution My iKVM is tiered through the ACI port to an external KVM switch, but all of the entries for the ACI connections are unavailable. The front panel connection is enabled and has a monitor connected. Because the front panel has precedence over all other iKVM connections, the ACI and rear panel connectors are disabled. All of the states are showing a yellow dot in the OSCAR interface.
Table 9-6. Troubleshooting iKVM (continued) Problem Likely Cause and Solution In the OSCAR menu, the Dell CMC connection is displaying a red X, and I cannot connect to the CMC. There are two possible causes: The Dell CMC console has been disabled. In this case, you can enable it using either the CMC Web interface or RACADM. To enable the Dell CMC console using the Web interface: 1 Log in to the CMC Web interface. 2 Select iKVM in the system tree. 3 Click the Setup tab.
Using the iKVM Module
I/O Fabric Management 10 The chassis can hold up to six I/O modules (IOMs), each of which can be pass-through or switch modules. The IOMs are classified into three groups: A, B, and C. Each group has two slots: Slot 1 and Slot 2. The slots are designated with letters, from left to right, across the back of the chassis: A1 | B1 | C1 | C2 | B2 | A2. Each server has slots for two mezzanine cards (MCs) to connect to the IOMs. The MC and the corresponding IOM must have the same fabric.
Figure 10-1 shows the location of IOMs in the chassis. The location of each IOM is indicated by its group number (A, B, or C) and slot number (1 or 2). On the chassis, the IOM slot names are marked A1, A2, B1, B2, C1, and C2. Figure 10-1. Rear View of a Chassis, Showing the Location of the IOMs Slots A1, B1, C1 Slots C2, B2, A2 The CMC creates entries in both the hardware log and CMC logs for invalid hardware configurations.
NOTE: Fabric verification for server MCs is performed only when the chassis is powered on. When the chassis is on standby power, the iDRACs on the server modules remain powered off and thus are unable to report the server's MC fabric type. The MC fabric type may not be reported in the CMC user interface until the iDRAC on the server is powered on.
For information about the CMC and hardware logs, see "Viewing the Event Logs" on page 315. Fresh Power-up Scenario When the chassis is plugged in and powered up, the I/O modules have priority over the servers. The first IOM in each group is allowed to power up before the others. At this time, no verification of their fabric types is performed. If there is no IOM on the first slot of a group, the module on the second slot of that group powers up.
3 Use the cursor to hover over an individual IOM subgraphic and a corresponding text hint or screen tip is displayed. The text hint provides additional information on that IOM. 4 The IOM subgraphic is hyperlinked to the corresponding CMC GUI page to provide immediate navigation to the I/O Module Status page associated with that IOM. To view the health status of all IOMs using the I/O Modules Status page: 1 Log in to the CMC Web interface. 2 Select I/O Modules in the Chassis menu in the system tree.
Table 10-1. I/O Modules Status Information Item Description Slot Indicates the location of the I/O module in the chassis by group number (A, B, or C) and slot number (1 or 2). Slot names: A1, A2, B1, B2, C1, or C2. Present Indicates whether the IOM is present (Yes or No). Health OK Indicates that the IOM is present and communicating with the CMC. In the event of a communication failure between the CMC and the server, the CMC cannot obtain or display health status for the IOM.
Table 10-1. I/O Modules Status Information (continued) Item Description Fabric Indicates the type of fabric for the IOM: Gigabit Ethernet, 10GE XAUI, 10GE KR, 10GE XAUI KR, FC 4 Gbps, FC 8 Gbps, SAS 3 Gbps, SAS 6 Gbps, Infiniband SDR, Infiniband DDR, Infiniband QDR, PCIe Bypass Generation 1, PCIe Bypass Generation 2. NOTE: Knowing the fabric types of the IOMs in your chassis is critical in preventing IOM mismatches within the same group.
Viewing the Health Status of an Individual IOM The I/O Module Status page (separate from the I/O Modules Status page) provides an overview of an individual IOM. To view the health status of an individual IOM: 1 Log in to the CMC Web interface. 2 Expand I/O Modules in the system tree. All of the IOMs (1–6) appear in the expanded I/O Modules list. 3 Click the IOM you want to view in the I/O Modules list in the system tree. 4 Click the Status sub-tab. The I/O Modules Status page displays.
Table 10-2. I/O Module Health Status Information (continued) Item Description Warning Indicates that warning alerts have been issued, and corrective action must be taken. If corrective actions are not taken, it could lead to critical or severe failures that can affect the integrity of the IOM. Examples of conditions causing Warnings: IOM fabric mismatch with the server's mezzanine card fabric; invalid IOM configuration, where the newly installed IOM does not match the existing IOM on the same group.
Table 10-2. I/O Module Health Status Information (continued) Item Description Role Displays the I/O module stacking membership when modules are linked together: • Member - the module is part of a stack set • Master - the module is a primary access point. Configuring Network Settings for an Individual IOM The I/O Modules Setup page allows you to specify the network settings for the interface used to manage the IOM. For Ethernet switches, the out-ofband management port (IP address) is what is configured.
NOTE: The IP address set on the IOMs from the CMC is not saved to the switch's permanent startup configuration. To save the IP address configuration permanently, you must enter the connect switch-n command, or racadm connect switch -n RACADM command, or use a direct interface to the IOM GUI to save this address to the startup configuration file. Table 10-3.
• The CMC can read the IP address setting too quickly after a configuration change; it will display 0.0.0.0 after clicking Apply. You must hit the refresh button in order to see if the IP address is set correctly on the switch. • If an error is made in setting the IP/mask/gateway, the switch will not set the IP address and will return a 0.0.0.0 in all fields. Common errors are: • Setting the out-of-band IP address to be the same as, or on the same network as, the in-band management IP address.
11 Troubleshooting and Recovery Overview This section explains how to perform tasks related to recovering and troubleshooting problems on the remote system using the CMC Web interface.
2 Click Chassis in the system tree. 3 Click the Troubleshooting tab. 4 Click the Identify sub-tab. The Identify page displays, featuring a list of all components on the chassis. 5 To enable blinking for a component LED, check the box beside the device name and then click Blink. 6 To disable blinking for a component LED, check the box beside the device name and then click UnBlink.
Table 11-1. Chassis Events That Can Generate SNMP and E-mail Alerts Event Description Fan Probe Failure A fan is running too slow or not at all. Battery Probe Warning A battery has stopped functioning. Temperature Probe Warning The temperature is approaching excessively high or low limits. Temperature Probe Failure The temperature is either too high or too low for proper operation. Redundancy Degraded Redundancy for the fans and/or power supplies has been reduced.
Using the Web Interface NOTE: To add or configure SNMP alerts, you must have Chassis Configuration Administrator privilege. NOTE: For added security, Dell strongly recommends that you change the default password of the root (User 1) account. The root account is the default administrative account that ships with the CMC. To change the default password for the root account, click User ID 1 to open the User Configuration page.
4 Click the Traps Settings tab. The Chassis Event Alert Destinations page displays. 5 Click Send in the Test Trap column beside the destination. Using RACADM 1 Open a serial/Telnet/SSH text console to the CMC and log in. NOTE: Only one filter mask may be set for both SNMP and e-mail alerting. You may skip step 2 if you have already selected filter mask.
Table 11-2.
where is the SNMP community to which the chassis belongs, and is the index value you specified in steps 4 and 5. You can configure up to four destination IP addresses to receive traps alerts. To add more IP addresses, repeat steps 2–6. NOTE: The commands in steps 2–6 will overwrite any existing settings configured for the index you specify (1–4). To determine whether an index has previously configured values, type: racadm getconfig -g cfgTraps -i .
a Select the check boxes of the events for which you want to enable alerting. To enable all events for alerting, select the Select All check box. b Click Apply to save your settings. 5 Click the Email Alert Settings sub-tab. The Email Alert Destinations page displays. 6 Specify the SMTP server IP address: a Locate the SMTP (Email) Server field, and then type the SMTP hostname or IP address.
3 Click the Alert Management tab. The Chassis Events page appears. 4 Click the Email Alert Settings sub-tab. The Email Alert Destinations page displays. 5 Click Send in the Destination Email Address column beside the destination. Using RACADM 1 Open a serial/Telnet/SSH text console to the CMC and log in. 2 Enable alerting by typing: racadm config -g cfgAlerting -o cfgAlertingEnable 1 NOTE: Only one filter mask may be set by both SNMP and e-mail alerting.
racadm config -g cfgEmailAlert -o cfgEmailAlertEmailName -i where is the name of the person or group receiving the email alert, and is the index value you specified in steps 4 and 5. The e-mail name can contain up to 32 alphanumeric characters, dashes, underscores, and periods. Spaces are not valid. 7 Setup the SMTP host by configuring the cfgRhostsSmtpServerIpAddr database property by typing: racadm config -g cfgRemoteHosts -o cfgRhostsSmtpServerIpAddr host.
For information about power management on the CMC and configuring power budget, redundancy, and power control, see "Power Management" on page 219. Viewing Power Budget Status For instructions on viewing power budget status for the chassis, servers, and PSUs using either the Web interface or RACADM, see "Viewing Power Consumption Status" on page 235.
• Problem: The PSU state is displayed as Failed (No AC), even when an AC cord is connected and the power distribution unit is producing good AC output. – • Problem: Dynamic Power Supply Engagement is enabled, but none of the power supplies display in the Standby state. – • • – Resolution A: Check the system input power cap setting - it might be configured too low to allow any additional servers to be powered up.
• Problem: A subset of servers lost power after an AC Grid failure, even when the chassis was operating in the AC Redundancy configuration with six power supplies. – • Problem: The least priority servers lost power after a PSU failure. – • Resolution: This can occur if the power supplies are improperly connected to the redundant AC grids at the time the AC grid failure occurs.
3 Click the Summary tab. The Chassis Summary page displays. Table 11-3, Table 11-4, Table 11-5, and Table 11-6 describe the information provided. Table 11-3. Chassis Summary Item Description Name Displays the name of the chassis. The name identifies the chassis on the network.For information on setting the name of the chassis, see "Editing Slot Names" on page 94. Model Displays the chassis model or manufacturer. For example, PowerEdge 2900. Service Tag Displays the service tag of the chassis.
Table 11-4. CMC Summary (continued) Item Description Firmware Last Updated Indicates when the firmware was last updated. If no updates have occurred, this property displays as N/A. Hardware Version Indicates the hardware version of the active or primary CMC. MAC Address Indicates the MAC address for the CMC NIC. The MAC address is a unique identifier for the CMC over the network. IP Address Indicates the IP address of the CMC NIC. Gateway Indicates the gateway of the CMC NIC.
Table 11-5. iKVM Summary (continued) Item Description Part Number Displays the part number for the iKVM. The part number is a unique identifier provided by the vendor. Part number naming conventions differ from vendor to vendor. Firmware Version Indicates the firmware version of the iKVM. Hardware Version Indicates the hardware version of the iKVM. Power Status Indicates the power status of the iKVM: On, Off, N/A (Absent).
To view the iKVM summary, type: racadm getkvminfo To view the IOM summary, type: racadm getioinfo Viewing Chassis and Component Health Status Using the Web Interface To view chassis and component health summaries: 1 Log in to the CMC Web interface. 2 Select Chassis in the system tree. The Chassis Status page displays. The Chassis Graphics section provides a graphical view of the front and rear of the chassis.
The Component Health section displays status for each component with an icon. Table 11-7 provides descriptions of each icon. Table 11-7. Health Status Indicators Item Description OK Indicates that the component is present and communicating with the CMC. Informational Displays information about the component when there is no change in health status. Warning Indicates that only Warning alerts have been issued, and corrective action must be taken within the time frame set by the administrator.
Viewing the Event Logs The Hardware Log and CMC Log pages display system-critical events that occur on the managed system. Viewing the Hardware Log The CMC generates a hardware log of events that occur on the chassis. You can view the hardware log using the Web interface and remote RACADM. NOTE: To clear the hardware log, you must have Clear Logs Administrator privilege. NOTE: You can configure the CMC to send e-mail or SNMP traps when specific events occur.
4 Click the Hardware Log sub-tab. The Hardware Log page displays. To save a copy of the hardware log to your managed station or network: Click Save Log. A dialog box opens; select a location for a text file of the log. NOTE: Because the log is saved as a text file, the graphical images used to indicate severity in the user interface do not appear. In the text file, severity is indicated with the words OK, Informational, Unknown, Warning, and Severe. The date and time entries appear in ascending order.
Using RACADM 1 Open a serial/Telnet/SSH text console to the CMC and log in. 2 To view the hardware log, type: racadm getsel To clear the hardware log, type: racadm clrsel Viewing the CMC Log The CMC generates a log of chassis-related events. NOTE: To clear the hardware log, you must have Clear Logs Administrator privilege. Using the Web Interface You can view, save a text file version of, and clear the CMC log in the CMC Web interface.
Table 11-9. CMC Log Information (continued) Command Result Date/Time Indicates the exact date and time the event occurred (for example, Wed May 02 16:26:55 2007). Description Provides a short description of the action, such as a login or a logout, login failure, or clearing the logs. Descriptions are generated by the CMC. Using RACADM 1 Open a serial/Telnet/SSH text console to the CMC and log in.
Table 11-10.
Table 11-10. Firmware Update Error Codes Error Class Error Value (Hex) Error Value (Decimal) ERR_FWUPD_START_UPDATE_CALL 0x1428 5160 ERR_OP_NOT_CANCELABLE 0x1429 5161 BAD_FTP_USERNAME 0x142A 5162 DEVICE_NOT_AVAILABLE 0x142B 5163 Using the Diagnostic Console The Diagnostic Console page enables an advanced user, or a user under the direction of technical support, to diagnose issues related to the chassis hardware using CLI commands.
Table 11-11. Supported Diagnostic Commands (continued) Command Result netstat Prints the contents of the routing table. ping Verifies that the destination is reachable from the CMC with the current routing-table contents. You must type a destination IP address in the field to the right of this option. An Internet control message protocol (ICMP) echo packet is sent to the destination IP address based on the current routing-table contents.
4 Click the Reset Components sub-tab. The Reset Components page displays. The CMC Summary section of the Reset Components page displays the following information: Table 11-12. CMC Summary Attribute Description Health OK The CMC is present and communicating with its components. Informational Displays information about the CMC when no change in health status (OK, Warning, Severe) has occurred.
Table 11-13. Virtual Reseat Server Attribute Description Name Displays the name of the server in each slot. Present Displays whether the server is present in the slot (Yes or No). Health OK The server is present and communicating with the CMC. In the event of a communication failure between the CMC and the server, the CMC cannot obtain or display health status for the server. Informational Displays information about the server when there is no change in health status (OK, Warning, Severe).
Table 11-13. Virtual Reseat Server Attribute Description Power State Displays the server power status: • N/A - The CMC has not determined the power state of the server. • Off - The server or the chassis is off. • On - The chassis and server are on. • Powering On - Temporary state between Off and On. Once the powering on cycle completes, the Power State will change to On. • Powering Off - Temporary state between On and Off. Once the powering off cycle completes, the Power State will change to Off.
The CMC provides tools to troubleshoot these problems, with the primary source of troubleshooting information being the CMC trace log. This log will contain an error message for NTP related failures. If the CMC is unable to synchronize with any of the remote NTP servers that have been configured, then it will derive its timing from the local system clock.
• A blinking amber LED on a module indicates a fault on that module. • Blue, blinking LEDs are configurable by the user and used for identification (see "Configuring LEDs to Identify Components on the Chassis" on page 297). Table 11-14 lists common LED patterns on the chassis. Table 11-14.
Table 11-14.
Table 11-14. LED Color and Blinking Patterns (continued) Component LED Color, Blinking Pattern Meaning PSU (Oval) Green, glowing steadily AC OK (Oval) Green, blinking Not used (Oval) Green, dark AC Not OK Amber, glowing steadily Not used Amber, blinking Fault Amber, dark No fault (Circle) Green, glowing steadily DC OK (Circle) Green, dark DC Not OK Troubleshooting a Non-responsive CMC NOTE: It is not possible to log in to the standby CMC using a serial console.
• A core failure. In this case, the CMC board must be replaced. • A self-test failure. In this case, the CMC board must be replaced. • An image corruption. In this case, you can recover the CMC by uploading the CMC firmware image. NOTE: A normal CMC boot/reset takes over a minute to fully boot into its OS and be available for login. The blue LED is enabled on the active CMC. In a redundant, twoCMC configuration, only the top green LED is enabled on the standby CMC.
Recovering the Firmware Image The CMC enters recover mode when a normal CMC OS boot is not possible. In recover mode, a small subset of commands are available that allow you to reprogram the flash devices by uploading the firmware update file, firmimg.cmc. This is the same firmware image file used for normal firmware updates. The recovery process displays its current activity and boots to the CMC OS upon completion.
The trace log may also contain CMC firmware-specific error codes that are related to the internal CMC firmware, not the managed system’s operating system. NOTE: The CMC will not echo an ICMP (ping) with a packet size larger than 1500 bytes. Disabling a Forgotten Password CAUTION: Many repairs may only be done by a certified service technician.
Figure 11-1. Password Reset Jumper Location PASSWORD_RSET Table 11-15. CMC Password Jumper Settings PASSWORD_RSET (default) The password reset feature is disabled. The password reset feature is enabled. 3 Slide the CMC module into the enclosure. Reattach any cables that were disconnected. 4 Initiate a changeover to make the module active using the GUI interface to perform the following steps: 332 a Navigate to the Chassis page, click the Power Management tab Control sub tab.
5 The CMC automatically fails over to the redundant module, and that module now becomes active. Log into the active CMC using the default administrator username of root and password of calvin, and restore any necessary user account settings. The existing accounts and passwords are not disabled and are still active. After you have completed any account updates, remove the 2-pin jumper and replace the jumper plug. NOTE: Make sure the CMC module is in a passive state before you begin.
Troubleshooting and Recovery
Glossary Active Directory Active Directory is a centralized and standardized system that automates network management of user data, security, and distributed resources, and enables interoperation with other directories. Active Directory is designed especially for distributed networking environments. ARP Address resolution protocol, a method for finding a host’s Ethernet address from its Internet address.
certificate to the applicant that uniquely identifies that applicant for transactions over networks and on the Internet. CD Compact disc Certificate Signing Request (CSR) A digital request to a certificate authority for a secure server certificate. CLI Command Line interface DHCP Dynamic host configuration protocol, a means of dynamically allocating IP addresses to computers on a network.
FQDN Fully qualified domain name, a domain name that specifies a module’s absolute position in the DNS tree hierarchy. Microsoft® Active Directory® only supports an FQDN of 64 bytes or fewer. FSMO Flexible single master operation, a Microsoft Active Directory domain controller task that guarantees atomicity of an extension operation. GB1 The uplink port on the chassis. GMT Greenwich Mean Time. GMT is the standard time common to every place in the world.
IOMINF I/O module infrastructure device. IP Internet Protocol. IP is the network layer for TCP/IP. IP provides packet routing, fragmentation, and reassembly. IPMB Intelligent platform management bus, which is used in systems management technology. Kbps Kilobits per second, a data transfer rate.
MC Mezzanine card Microsoft Active Directory A centralized, standardized system that automates network management of user data, security, and distributed resources, and enables interoperation with other directories. Active Directory is designed especially for distributed networking environments. NIC Network interface card, an adapter circuit board installed in a computer to provide a physical connection to a network.
RPM Red Hat Package Manager, a package-management system for the Red Hat Enterprise Linux operating system. RPM manages the installation of software packages. It is similar to an installation program. SEL System event log or hardware log SMTP Simple mail transfer protocol, used to transfer electronic mail between systems— usually over an Ethernet. SNMP Simple network management protocol, designed to manage nodes on an IP network. iDRACs are SNMP-managed devices (nodes).
TFTP Trivial file transfer protocol, a simple file transfer protocol used for downloading boot code to diskless devices or systems. UPS Uninterruptible power supply USB Universal serial bus, a serial bus standard to interface devices. UTC Universal Coordinated Time. See GMT. vKVM Virtual keyboard-video-mouse console VLAN Virtual local area network VNC Virtual network computing VT-100 Video Terminal 100, which is used by the most common terminal emulation programs.
Glossary
Index A ACI, 259 Active Directory, 189-216 adding CMC users, 202 configuring access to the CMC, 195 configuring and managing certificates, 126 extending schemas, 195 objects, 191 schema extensions, 190 using with standard schema, 209 adding SNMP alerts, 298 alerts troubleshooting, 333 Analog Console Interface, 257 C Certificate Signing Request (CSR) about, 133 generating a new certificate, 134 certificates Active Directory, 126 SSL and digital, 132 uploading a server certificate, 137 viewing a server certi
downloading, 43 managing, 147 updating, CMC, 148 updating, iKVM, 150 updating, IOM infrastructure device, 151 updating, Server iDRAC, 152 FlexAddress, 173 activating, 174 activation verification, 175 configuring using CLI, 178 deactivating, 177 license agreement, 185 Linux configuration, 179 troubleshooting, 180 viewing status using CLI, 178 Wake-On-LAN, 180 frequently asked questions managing and recovering a remote system, 169 using the CMC with Active Directory, 216 iKVM, 257 installing CMC, 27 L LDC p
O OSCAR, 257 P parsing rules, 81 password disabling, 331 reset jumper location, 332 power budgeting configuring, 43 power conservation, 227 remote RACADM configuring, 41 S Secure Sockets Layer (SSL) about, 132 security using SSL and digital certificates, 132 serial console using, 49 proxy server, 30 server certificate uploading, 137 viewing, 137 R services configuring, 139 RAC see Remote Access Connection, 21 RACADM uninstalling from Linux management station, 29 racadm utility configuring network pr
T telnet console using, 49 W web browser configuring, 29 supported browsers, 22 web interface accessing, 87 configuring email alerts, 303 WS-Management, 23 346 Index
Index 347
Index