Chassis Management Controller Version 2.2 for Dell PowerEdge VRTX User's Guide October 2016 Rev.
Notes, cautions, and warnings NOTE: A NOTE indicates important information that helps you make better use of your product. CAUTION: A CAUTION indicates either potential damage to hardware or loss of data and tells you how to avoid the problem. WARNING: A WARNING indicates a potential for property damage, personal injury, or death. © 2016 Dell Inc. or its subsidiaries. All rights reserved. This product is protected by U.S. and international copyright and intellectual property laws.
Contents Chapter 1: Overview.....................................................................................................................13 What is new in this release.............................................................................................................................................. 14 Key Features.......................................................................................................................................................................
Setting Chassis Physical Location and Chassis Name Using Web Interface................................................ 34 Setting Chassis Physical Location and Chassis Name Using RACADM......................................................... 35 Setting Date and Time on CMC.....................................................................................................................................35 Setting Date and Time on CMC Using CMC Web Interface..................................................
Viewing Currently Installed Firmware Versions..........................................................................................................49 Viewing Currently Installed Firmware Versions Using CMC Web Interface..................................................49 Viewing Currently Installed Firmware Versions Using RACADM..................................................................... 49 Updating the CMC Firmware................................................................................
Viewing Viewing Viewing Viewing Viewing Front Panel Properties...................................................................................................................................... 71 KVM Information and Health Status..............................................................................................................71 LCD Information and Health............................................................................................................................
Editing Chassis Configuration Profiles................................................................................................................... 88 Deleting Chassis Configuration Profiles.................................................................................................................88 Configuring Multiple CMCs Using RACADM.............................................................................................................. 88 Creating a CMC Configuration File...............
Exporting Boot Identity Profiles............................................................................................................................. 107 Deleting Boot Identity Profiles................................................................................................................................107 Managing Virtual MAC Address Pool.................................................................................................................... 108 Creating MAC Pool................
Configuring CMC SSO Or Smart Card Login For Active Directory Users Using RACADM.....................138 Chapter 11: Configuring CMC to Use Command Line Consoles....................................................139 CMC Command Line Console Features..................................................................................................................... 139 CMC Command Line Interface Commands.........................................................................................................
Power Budgeting For Hardware Modules..................................................................................................................164 Server Slot Power Priority Settings............................................................................................................................165 Assigning Priority Levels To Servers..........................................................................................................................
Enabling or Disabling RAID Controller Using CMC Web Interface....................................................................... 181 Enabling or Disabling RAID Controller Using RACADM.......................................................................................... 182 Enabling or disabling fault tolerance of external RAID controller using RACADM...........................................182 Viewing Physical Disk Properties Using the CMC Web Interface.............................................
Resetting Forgotten Administrative Password........................................................................................................ 196 Gathering Configuration Information, Chassis Status, and Logs Using RACDUMP........................................197 Supported Interfaces................................................................................................................................................ 197 Downloading SNMP Management Information Base (MIB) File.................
1 Overview The Dell Chassis Management Controller (CMC) for Dell PowerEdge VRTX is a Systems Management hardware and software solution for managing the PowerEdge VRTX chassis. The CMC has its own microprocessor and memory and is powered by the modular chassis into which it is plugged.
• • • • • Viewing Localized Versions of the CMC Web Interface Supported Management Console Applications How to Use this User's Guide Other Documents You May Need Accessing support content from the Dell EMC support site What is new in this release This release of CMC for Dell PowerEdge VRTX supports: ● Creating a Virtual Disk without initialization of the virtual disk.
● Firmware updates for various chassis components — Enables you to update the firmware for CMC, iDRAC on servers, chassis infrastructure, and chassis storage. ● Firmware update of server components such as BIOS, network controllers, storage controllers, and so on across multiple servers in the chassis using Lifecycle Controller. ● Dell OpenManage software integration — Enables you to launch the CMC web interface from Dell OpenManage Server Administrator or OpenManage Essentials (OME) 1.2.
Figure 1. CMC connectors and LEDs Table 1. CMC connectors and LEDs Item Indicator, Button, or Connector 1 Status/identification indicator (CMC 1) 2 Power indicator (CMC 1) 3 CMC connector ports (2) 4 Power indicator (CMC 2) 5 Status/identification indicator (CMC 2) A Back Panel view of the chassis is given here with a table that lists the parts and devices available in the CMC.
Figure 2. CMC back panel Table 2. CMC back panel — parts Item Indicator, Button, or Connector 1 PCIe expansion card slots low-profile (5) 2 PCIe expansion card slots full height (3) 3 CMC GB Ethernet port (CMC-2) 4 CMC GB Ethernet port (CMC-1) 5 Serial Connector 6 Blower modules (4) 7 I/O module ports 8 PSU 4 9 PSU 3 10 PSU 1 11 PSU 2 A Front Panel view of the chassis is given here with a table that lists the parts and devices available in the CMC.
Figure 3. Front-Panel Features And Indicators—3.5 Inch Hard Disk Drive Chassis Table 3. Front panel — features and indicators Item Indicator, Button, or Connector Description 1 USB connectors (2) Allows a keyboard and mouse to be connected to the system. 2 LCD panel Provides system information and status, and error messages to indicate when the system is operating correctly or when the system needs attention. 3 LCD menu scroll buttons (4) Moves the cursor in one-step increments.
Minimum CMC Version The following table lists the minimum CMC version required to enable the listed server modules. Table 4. Minimum CMC Version for server modules Servers Minimum version of CMC PowerEdge M520 CMC 1.36 PowerEdge M620 CMC 1.36 PowerEdge M820 CMC 1.36 PowerEdge M630 CMC 2.00 PowerEdge M830 CMC 2.00 The following table lists the minimum CMC version required to enable the listed I/O moduless. Table 5.
Supported Web Browsers The following web browsers are supported for Dell PowerEdge VRTX: ● Microsoft Internet Explorer 9 ● Microsoft Internet Explorer 10 ● Microsoft Internet Explorer 11 ● Microsoft EDGE ● Safari version 7.1 ● Safari version 8.0 ● Mozilla Firefox version 40 ● Mozilla Firefox version 41 ● Google Chrome version 49 ● Google Chrome version 50 NOTE: By default, TLS 1.1 and TLS 1.2 are supported in this release. However, to enable TLS 1.
NOTE: If you have purchased a system with all the licenses pre-installed, then license management is not required. ● View — View the current license information. ● Import — After acquiring the license, store the license in a local storage and import it into CMC using one of the supported interfaces. The license is imported if it passes the validation checks. NOTE: For a few features, a CMC restart may be required to enable the features.
Licensable Features in CMC A list of CMC features that are enabled on the basis of your license is given here in the table. Table 8.
Table 8. Licensable features (continued) Feature Express Enterprise Notes Advanced Configuration No Yes Enclosure-level backup No Yes FlexAddress Enablement No* Yes *For non-default FlexAddress settings, only Restore Default is allowed with Express license. Restore Default will reset the FlexAddress settings to the factory default. PCIe Adapter Mapping Yes* Yes *A maximum of two PCIe Adapters can be assigned per Server with Express License.
Other Documents You May Need To access the documents from the Dell Support site. Along with this Reference Guide, you can access the following guides available at dell.com/support/manuals. ● The VRTX CMC Online Help provides information about using the Web interface. To access the Online Help, click Help on the CMC web interface. ● The Chassis Management Controller Version 2.2 for Dell PowerEdge VRTX RACADM Command Line Reference Guide provides information about using the VRTX–related RACADM features.
○ For Dell EMC OpenManage Connections Enterprise Systems Management—https://www.dell.com/ OMConnectionsEnterpriseSystemsManagement ○ For Dell EMC Serviceability Tools—https://www.dell.com/serviceabilitytools ● Dell EMC support site: 1. Go to https://www.dell.com/support. 2. Click Browse all products. 3. From the All products page, click Software, and then click the required link. 4. Click the required product and then click the required version.
2 Installing and Setting Up CMC This section provides information about how to install your CMC hardware, establish access to CMC, configure your management environment to use CMC, and guides you through the tasks for configuring a CMC: ● Set up initial access to CMC. ● Access CMC through a network. ● Add and configure CMC users. ● Update CMC firmware. For more information about installing and setting up redundant CMC environments, see Understanding Redundant CMC Environment.
3. Insert the servers in the chassis. 4. Connect the chassis to the power source. 5. Press the power button, or turn on the chassis from the CMC web interface after completing the task in step 7. NOTE: Do not turn on the servers. 6. Using the LCD panel, navigate to the IP Summary and click on the Check button to select. Use the IP address for the CMC in the management system browser (IE, Chrome, or Mozilla). To set up DHCP for CMC, use LCD panel to, click Main Menu > Settings > Network Settings. 7.
5. For help about the RACADM command, type racadm help after you run the previous commands. For more information about RACADM, see the Chassis Management Controller for Dell PowerEdge VRTX RACADM Command Line Reference Guide. NOTE: When using the RACADM remote capability, you must have the 'write' permission on the folders where you are using the RACADM subcommands, involving the file operations. For example, racadm getconfig -f . Uninstalling RACADM From a Linux Management Station 1.
1. Start Mozilla Firefox. 2. Click Tools > Options (for systems running on Windows), or click Edit > Preferences (for systems running on Linux). 3. Click Advanced, and then click the Network tab. 4. Click Settings. 5. Select Manual Proxy Configuration. 6. In the No Proxy for field, type the addresses for CMCs and iDRACs on the management network to the comma-separated list. You can use DNS names and wildcards in your entries.
For information about configuring CMC network settings, see Configuring Initial CMC Network. This initial configuration assigns the TCP/IP networking parameters that enable access to CMC. CMC and iDRAC on each server and the network management ports for the switch I/O module are connected to a common integrated network in the PowerEdge VRTX chassis. This allows the management network to be isolated from the server data network.
1. From the Network Settings panel, select Quick Setup (DHCP). The panel displays the following message. About to get DHCP addresses. Ensure CMC network cable is connected. 2. Press the center button to highlight the accept button. Press the center button again to accept the settings or navigate to the back arrow and the press the center button to go back and modify the settings. Configuring CMC Using Advanced Setup 1.
12. On the Protocol panel, select the IP type that you want to use for the servers: ● IPv4 — The options DHCP or Static are displayed. ● Both — The options DHCP or Static are displayed. ● IPv6 — The iDRAC Configuration panel is displayed. Go to step 15. 13. Select DHCP or Static. Table 9. Network mode Dynamic Host Configuration Protocol (DHCP) iDRAC retrieves IP configuration (IP address, mask, and gateway) automatically from a DHCP server on your network.
When you have confirmed that the settings you entered are accurate, press the center button, and then press the center button. The Main Menu panel id displayed. CMC and iDRACs are now available on the network. You can access the CMC on the assigned IP address using the Web interface or CLIs such as a serial console, Telnet, and SSH. Interfaces and Protocols to Access CMC After you have configured the CMC network settings, you can remotely access CMC using various interfaces.
Table 10. CMC Interfaces (continued) Interface Description WSMan is a Simple Object Access Protocol (SOAP)–based protocol used for systems management. CMC uses WS–Management to convey Distributed Management Task Force (DMTF) Common Information Model (CIM)–based management information. The CIM information defines the semantics and information types that can be modified in a managed system. The CMC WSMan implementation uses SSL on port 443 for transport security, and supports basic authentication.
NOTE: The Chassis Location field is optional. It is recommended to use the Data Center, Aisle, Rack, and Rack Slot fields to indicate the physical location of the chassis. 3. Click Apply. The settings are saved. Setting Chassis Physical Location and Chassis Name Using RACADM To set the chassis name, location, date, and time by using the command line interface, see the setsysinfo and setchassisname commands.
NOTE: Physical disk per enclosures, virtual disks per enclosures, and external storage component LED can be selected on this page. To enable blinking of a component LED, select the Select/Deselect All option corresponding to the physical disk drive or virtual disk or enclosures, and then click Blink. To disable blinking of a component LED, clear the Select/Deselect All option corresponding to the LED, and then click Unblink.
The Log in Security enables you to configure the IP range attributes for CMC login using the CMC web interface. To configure the IP range attributes using CMC web interface: 1. In the left pane, go to Chassis Overview and click Network > Network. The Network Configuration page is displayed. 2. In the IPv4 Settings section, click Advanced Settings. Alternatively, to access the Log in Security page, in the left pane, go to Chassis Overview, click Security > Log in. The Log in Security page is displayed. 3.
● Reset the active CMC from web interface. See the Reset CMC option for Power Control Operations that is described in Executing Power Control Operations. ● Remove the network cable from the active CMC. ● Remove the active CMC from the chassis. ● Initiate a CMC firmware flash on the active CMC. ● Have an active CMC that is no longer functional. NOTE: In the event of a CMC failover, all iDRAC connections and all active CMC sessions are logged off.
Configuring Front Panel You can configure the following: ● Power button ● LCD ● DVD drive Configuring Power Button To configure the chassis power button: 1. In the left pane, click Chassis Overview > Front Panel > Setup. 2. On the Front Panel Configuration page, under the Power Button Configuration section, select the Disable Chassis Power Button option, and then click Apply. The chassis power button is disabled. Configuring LCD 1. In the left pane, clickChassis Overview > Front Panel > Setup . 2.
Mapping a Server to a DVD Drive To map the server to the chassis DVD drive: 1. In the left pane, click Chassis Overview > Front Panel > Setup . 2. On the Front Panel Configuration page, under the DVD Drive Configuration section: From the DVD Mapped drop-down menu, select one of the servers. Select the servers for which chassis DVD drive access is required. 3. Click Apply. The DVD allows mapping to all the server slots.
3 Logging in to CMC You can log in to CMC as a CMC local user, as a Microsoft Active Directory user, or as an LDAP user. The default user name and password is root and calvin respectively. You can also log in using Single Sign-On or a Smart Card. NOTE: CMC does not support the following special characters as user name or password from chassis profile using XML: " , ! , #, $, %, ^, &, *, (, ), -, _, +, =, ?, {, }, +, &, >, |, .
Logging in to CMC as a Local User, Active Directory User, or LDAP User To log in to CMC, you must have a CMC account with the Log In to CMC privilege. The default CMC user name is root, and the password is calvin. The root account is the default administrative account that ships with CMC. NOTE: ● For added security, it is strongly recommended that you change the default password of the root account during initial set up. ● When Certificate Validation is enabled, FQDN of the system should be provided.
NOTE: If you changed the default HTTPS port number (port 80), access the CMC web page using :, where cmcname is the CMC host name for CMC, domain-nameis the domain name, and port number is the HTTPS port number. 2. Insert the smart card and click Login. The PIN dialog box is displayed. 3. Type the PIN and click Submit. NOTE: If the smart card user is present in Active Directory, an Active Directory password is not required.
● Remote RACADM — Allows you to run RACADM commands on a management station with the -r option and the DNS name or IP address of the CMC. NOTE: Remote RACADM is included on the Dell Systems Management Tools and Documentation DVD and is installed on a management station. ● Firmware RACADM — Allows you to log in to the CMC using Telnet, SSH, or a serial connection. With firmware RACADM, you can the RACADM implementation that is part of the CMC firmware.
To change the credentials, you must have Configure Users privilege. NOTE: A CMC log message is generated if the Do not show this warning again option is selected on the CMC Login page. Changing Default Login Password Using Web Interface When you log in to the CMC web interface, if the Default Password Warning page is displayed, you can change the password. To do this: 1. Select the Change Default Password option. 2. In the New Password field, type the new password.
Enabling or Disabling Warning Message to Change Default Login Password Using RACADM To enable the display of the warning message to change the default login password using RACADM, use racadm config -g cfgRacTuning -o cfgRacTuneDefCredentialWarningEnable<0> or <1> object. For more information, see the Chassis Management Controller for PowerEdge VRTX RACADM Command Line Reference Guide available at dell.com/ support/manuals.
Workflow 1. Power down chassis. Disconnect all SAS cables from External Shared PERC 8 cards to MD12x0 enclosures. 2. Power Up chassis. 3. Login to CMC Racadm and run the following command when the servers are in powered off state: racadm raid set controllers:RAID.ChassisSlot.5-1 –p HighAvailabilityMode None 4. Run the command racadm raid set controllers:RAID.ChassisSlot.6-1 –p HighAvailabilityMode None on External Shared PERC 8 card in slot 6. 5.
4 Updating Firmware You can update firmware for: ● CMC ● Chassis infrastructure ● VRTX Expander or Storage Backplane Expander Firmware of Inegrated or external enclosures ● Physical Disks (HDD) per enclosure NOTE: You can update the HDD firmware only if required.
For more information about the update sequence for VRTX chassis, see the CMC Firmware 2.2 Release Notes on support site. Viewing Currently Installed Firmware Versions You can view the currently installed firmware versions using the CMC web interface or RACADM.
Running this command helps you to verify that the update has succeeded and that the new firmware is working properly, before you update the firmware in the second CMC. When both CMCs are updated, you can use the cmcchangeover command to restore the CMCs to their previous roles. CMC firmware revision 2.x updates both the primary CMC and the redundant CMC without running the cmcchangeover command.
PERC 8 card is inserted after the rollback, the CMC treats it as a non-shared adapter. It may happen that the HOST PERC driver does not support the External Shared PERC 8 card. Updating CMC Firmware Using Web Interface NOTE: ● Before you update the CMC firmware, make sure that you turn on the chassis, but turn off all the servers in the chassis. ● Downgrading the CMC Firmware prior to 2.1 with external shared adapters is blocked. To update the CMC firmware using the CMC web interface: 1.
Updating Chassis Infrastructure Firmware Using CMC Web Interface 1. Go to any of the following pages: ● Chassis Overview > Update. ● Chassis Overview > Chassis Controller > Update. 2. On the Firmware Update page, in the Chassis Infrastructure Firmware section, in the Update Targets column, select the option, and then click Apply Chassis Infrastructure Firmware. 3. On the Firmware Update page, click Browse, and then select the appropriate chassis infrastructure firmware. 4.
The Firmware Update Progress section provides firmware update status information. A progress bar indicates the status of the upload process. File transfer time varies on the basis of connection speed. When the internal update process begins, the page automatically refreshes and the firmware update timer is displayed. NOTE: Additional instructions to follow: ● Do not click the Refresh icon or navigate to another page during the file transfer. ● To cancel the process, click Cancel File Transfer and Update.
NOTE: The Single Click all blade update method has the following benefits: ● Enables you to update all the components on all the blade servers with minimal clicks. ● All the updates are packaged in a directory. This avoids individual upload of each component’s firmware. ● Faster and consistent method of updating the server components ● Enables you to maintain a standard image with the required updates versions of the server components that can be used to update multiple servers in a single operation.
● On the System Setup Main Menu page, go to iDRAC Settings > Lifecycle Controller, click Enabled. Go to the System Setup Main Menu page and click Finish to save the settings. Canceling System Services enables you to cancel all scheduled jobs that are pending and remove them from the queue. For more information about the Lifecycle Controller and supported server components, and device firmware management, see: ● Lifecycle Controller-Remote Services Quick Start Guide. ● delltechcenter.
1. In the left pane, go to Server Overview, and then click Update . 2. On the Server Component Update page, in the Component/Device Update Filter section, select one or more of the following: ● ● ● ● ● ● ● BIOS iDRAC Lifecycle Controller 32-Bit Diagnostics OS Driver Pack Network I/F Controller RAID Controller The Component/Device Update Filter section is displayed only for the Update by File mode of firmware update.
devices information and allows you to verify the currently installed components and devices. The inventory does not reflect the component and device information accurately when: ○ The server iDRAC firmware is updated to newly introduce the Lifecycle Controller functionality to the server management. ○ The new devices are inserted into the server. To automate this action the iDRAC Settings Utility provides an option that can be accessed through the boot console: a.
NOTE: The Dell Repository Manager Application uses the Inventory.xml file as an input to create a repository of updates for all the blades available in the chassis. This repository can be later exported to a network share. Update from Network Share mode of firmware update uses this network share to update the components of all the servers.
Sometimes, when an operation is in the process of being submitted for scheduling through another session or context, another operation is attempted. In this case, a confirmation message is displayed indicating the situation and the operation must not be submitted. Wait for the operation in process to complete and then submit the operation again. Do not navigate away from the page after an operation is submitted for scheduling.
NOTE: For iDRAC and Operating System Driver packs firmware update, make sure the Extended Storage feature is enabled. It is recommended to clear the job queue before initializing a server component firmware update. A list of all jobs on the servers is available on the Lifecycle Controller Jobs page. This page enables deletion of single or multiple jobs or purging of all jobs on the server. BIOS updates are specific to the model of the server.
Server Component Single Click Update Using Network Share The Servers or server component update from a network share using Dell Repository Manager and Dell PowerEdge VRTX chassis integration simplifies the update by using customized bundle firmware, so that you can deploy faster and more easily. Update from a network share provides flexibility to update all the 12G server components at the same time with a single catalog either from a CIFS or from a NFS.
● On Next Reboot — Updates are scheduled but are applied only after the next server reboot. 8. Click Update to schedule firmware updates for the available components of the selected servers. A message is displayed based on the type of updates contained and asking you to confirm if you want to continue. 9. Click OK to continue and complete scheduling the firmware update for the selected servers. Note: NOTE: The Job Status column displays the job status of the operations scheduled on the server.
Deleting Scheduled Server Component Firmware Jobs Using the Web Interface To delete scheduled server component firmware jobs: 1. In the left pane, click Server Overview, and then click Update. 2. On the Server Component Update page, filter the component or device (optional). 3. In the Job Status column, if a check box is displayed next to the job status, it implies that a Lifecycle Controller job is in progress and currently in the indicated state. It can be selected for a job-deletion operation. 4.
5 Viewing Chassis Information and Monitoring Chassis and Component Health You can view information and monitor the health of the following: ● Active and standby CMCs ● All severs and individual servers ● IO Module ● Fans ● Power Supply Units (PSUs) ● Temperature sensors ● Hard disk drives ● LCD assembly ● Storage controllers ● PCIe devices NOTE: The health of external components impacts the overall health of the storage component with existing storage health and integrated storage components in VRTX.
To view the chassis health, click Chassis Overview. The system displays the overall health status of the chassis, active and standby CMCs, server modules, IO Module (IOM), fans, blowers, power supply units (PSUs), LCD assembly, storage controller, and PCIe devices. Detailed information about each component is displayed when you click that component. In addition, the latest events in the CMC Hardware Log are also displayed. For more information, see the Online Help.
Table 14. Server Icon States (continued) Icon Description A server is present, but reporting a critical error. A server is not present. Selected Component Information Information for the selected component is displayed in three independent sections: ● Health and Performance, and Properties — Displays the active, critical, and non-critical events as displayed by the hardware logs and the performance data that vary with time.
Table 15. Component properties (continued) ● Total System Memory KVM Slot ● KVM Mapped Health Graceful Shutdown are displayed only if the server power state is On. If the server power state is Off, the quick link for Power On Server is displayed.
Table 15.
The Chassis Controller Status page is displayed. For more information, see the Online Help. Viewing Information and Health Status of All Servers To view the health status of all the servers, do one of the following: ● Click Chassis Overview. The Chassis Health page displays a graphical overview of all the servers installed in the chassis. Server health status is indicated by the overlay of the server subgraphic. For more information about the chassis health, see the Online Help.
NOTE: The CMC monitors the temperature sensors in the chassis and automatically adjust the fan speed as needed. However, you can override to maintain a minimum fan speed by the racadm fanoffset command. When overriden using this command, the CMC will always run the fan to the selected speed even though the chassis does not require the fans to run at that speed. CMC generates an alert and increases the fan speeds when the following events occur: ● CMC ambient temperature threshold is exceeded.
When enabled, ECM will only increase the cooling capacity to the server slots within the chassis. It is also important to note that ECM is not designed to provide increased cooling to the servers at all times. Even with ECM enabled, the higher blower speeds will only be seen when the increased cooling is needed. Examples of this situation include high levels of server utilization or stress, and high ambient temperatures. By default, ECM is off.
The Temperature Sensors Status page displays the status and readings of the temperature probes on the entire chassis (chassis and servers). For more information, see Online Help. NOTE: The temperature probes value cannot be edited. Any change beyond the threshold generates an alert that causes the fan speed to vary. For example, if the CMC ambient temperature probe exceeds the threshold, the speed of the fans on the chassis increases.
6 Configuring CMC Chassis Management Controller enables you to configure properties, set up users, and alerts to perform remote management tasks. Before you begin configuring the CMC, you must first configure the CMC network settings to allow CMC to be managed remotely. This initial configuration assigns the TCP/IP networking parameters that enable access to the CMC. For more information, see Setting Up Initial Access to CMC. You can configure CMC using Web interface or RACADM.
the IPv6 router solicitations are sent. In such cases, there may be a period when IPv6 connectivity is limited, until router advertisements are gratuitously sent by the IPv6 routers. NOTE: Changing the CMC network settings may disconnect your current network connection. NOTE: You must have Chassis Configuration Administrator privilege to set up CMC network settings.
For an IPv4 network, to disable DHCP and specify static CMC IP address, gateway, and subnet mask, type: racadm racadm racadm racadm config config config config -g -g -g -g cfgLanNetworking cfgLanNetworking cfgLanNetworking cfgLanNetworking -o -o -o -o cfgNicUseDHCP 0 cfgNicIpAddress cfgNicGateway cfgNicNetmask By default, for IPv6, the CMC requests and automatically obtains a CMC IP address from the IPv6 autoconfiguration mechanism.
racadm config -g cfgIPv6LanNetworking -o cfgIPv6DNSServer2 Configuring DNS Settings (IPv4 and IPv6) ● CMC Registration — To register the CMC on the DNS server, type: racadm config -g cfgLanNetworking -o cfgDNSRegisterRac 1 NOTE: Some DNS servers only register names of 31 characters or fewer. Make sure the designated name is within the DNS required limit. NOTE: The following settings are valid only if you have registered the CMC on the DNS server by setting cfgDNSRegisterRac to 1.
where is a value between 576–1500 (inclusive; default is 1500). NOTE: IPv6 requires a minimum MTU of 1280. If IPv6 is enabled, and cfgNetTuningMtu is set to a lower value, the CMC uses an MTU of 1280. Configuring CMC Network and Login Security Settings The IP address blocking and User blocking features in CMC allow you to prevent security issues due to password guessing attempts. This feature enables you to block a range of IP addresses and users who can access CMC.
● To specify the IP Range Mask that you want to block from accessing CMC, use the following property under cfgRacTuning group: cfgRacTuneIpRangeMask Configuring Virtual LAN Tag Properties for CMC Virtual LANfunctionality enables multiple VLANs to coexist on the same physical network cable and to segregate the network traffic for security or load management purposes. When you enable the VLAN functionality, each network packet is assigned a VLAN tag.
Configuring Virtual LAN Tag Properties for CMC Using Web Interface To configure Virtual LAN(VLAN) for CMC using the CMC Web interface: 1. Go to any of the following pages: ● In the left pane, click Chassis Overview and click Network > VLAN. ● In the left pane, click Chassis Overview > Server Overview and click Network > VLAN. The VLAN Tag Settings page is displayed. VLAN tags are chassis properties. They remain with the chassis even when a component is removed. 2.
2. On the menu bar, click Network. The Network Configuration page is displayed. 3. Under the Federal Information Processing Standards (FIPS) section, from the FIPS Mode drop-down menu, select Enabled. A message is displayed that enabling FIPS resets CMC to the default settings. 4. Click OK to proceed. Enabling FIPS Mode Using RACADM To enable FIPS mode, run the following command: racadm config –g cfgRacTuning –o cfgRacTuneFipsModeEnable 1 .
● ● ● ● ● ● Web Server SSH Telnet Remote RACADM SNMP Remote Syslog For information about the fields, see the Online Help. 3. Click Apply, and then update all default time-out and maximum time-out limits.
The Chassis group features are: ● Displays images portraying the front and back of each chassis, a set for the leader and a set for each member. ● Health concerns for the leader and members of a group are recognized by red or yellow overlays and an X or an ! on the component with the symptoms. Details are visible below the chassis image when you click the chassis image or Details. ● Quick launch links are available for opening member chassis’s or server’s web pages.
Disbanding a Chassis Group To disband a chassis group from the lead chassis: 1. Log in with administrator privileges to the leader chassis. 2. Select the lead chassis in the left pane. 3. Click Setup > Group Administration. 4. In the Chassis Group page, under Role, select None, and then click Apply. The lead chassis then communicates to all the members that they have been removed from the group. The lead chassis can be assigned as a leader or member of a new group.
● Manual Propagation — Select this option for manual propagation of the chassis group leader properties with its members. The lead chassis property settings are propagated to group members only when a lead chassis administrator clicks Propagate. 5. In the Propagation Properties section, select the categories of lead configuration properties to be propagated to member chassis. Select only those setting categories that you want identically configured, across all members of the chassis group.
Table 16. Server Module Inventory Field Descriptions (continued) Data Field Example Slot Location 1 Slot Name SLOT-01 Host Name Corporate Webserver NOTE: Requires a Server Administrator agent running on the Server; otherwise shown as blank. Operating System Windows Server 2008 NOTE: Requires a Server Administrator agent running on the Server; otherwise shown as blank. Model PowerEdgeM610 Service Tag 1PB8VF1 Total System Memory 4.0 GB NOTE: Requires VRTX CMC 1.
Viewing Selected Chassis Inventory Using Web Interface To view the selected chassis inventory using CMC Web interface: 1. In the system tree, select Group. click Properties > Firmware Version. The Chassis Group Firmware Version page displays all the chassis in the group. 2. In the Select a Chassis section, select the member chassis for which you want to view the inventory.
● Replace — Includes attributes of the entire CMC configuration except write-only attributes such as user passwords and service tags. This profile type is used as a backup configuration file to restore the complete chassis configuration including identity information such as IP addresses. ● Clone — Includes all the Replace type profile attributes. The Identity attributes such as MAC address and IP address are commented out for safety reasons. This profile type is used to clone a new chassis. 3.
To export a stored profile, perform the following tasks: 1. Go to the Chassis Configuration Profiles page. In the Chassis Configuration Profiles > Stored Profiles section, select the required profile and then click Export Copy of Profile. A File Download message is displayed prompting you to open or save the file. 2. Click Save or Open to export the profile to the required location. Editing Chassis Configuration Profiles You can edit chassis configuration profile name of a chassis.
5. Reset the target CMC that was configured. At the command prompt, type: racadm reset The getconfig -f myfile.cfg subcommand requests the CMC configuration for the active CMC and generates the myfile.cfg file. If required, you can rename the file or save it to a different location. You can run the getconfig command to perform the following actions: ● Display all configuration properties in a group (specified by group name and index). ● Display all configuration properties for a user by user name.
A comment line must start in column one. A "#" character in any other column is treated as a # character. Some modem parameters may include # characters in their strings. An escape character is not required. You may want to generate a .cfg from a racadm getconfig -f .cfg command, and then perform a racadm config -f .cfg command to a different CMC, without adding escape characters.
enter the missing properties into the configuration file after running the getconfig -f command. This is true for all the RACADM–indexed groups.
Exporting Chassis Configuration profiles You can export chassis configuration profiles to network share by using the get command. 1. To export the chassis configuration profiles as clone.xml file to CIFS network share by using get command, type the following: racadm get –f clone.xml –t xml –l //xx.xx.xx.xx/PATH –u USERNAME –p PASSWORDCMC 2. To export the chassis configuration profiles as clone.xml file to NFS network share by using get command, type the following: racadm get –f clone.xml –t xml –l xx.xx.xx.
An ● ● ● XML file contains the following properties: System Configuration, which is the parent node. component, which is the primary child node. Attributes, which contains name and value. You can edit these fields. For example, you can edit the Asset Tag value as follows: PAGE 947 Configuring Servers You can configure the following settings of a server: ● Slot Names ● iDRAC Network Settings ● DRAC Virtual LAN Tag Settings ● First Boot Device ● Server FlexAddress ● Remote File Share ● BIOS Settings Using Server Clone Topics: • • • • • • • Configuring Slot Names Configuring iDRAC Network Settings Configuring iDRAC Virtual LAN Tag Settings Setting First Boot Device Configuring Server FlexAddress Configuring Remote File Share Configuring Profile Settings Using Server Configuration Re
3. To use a server’s host name as slot name, select the Use Host Name for the Slot name option. This overrides the static slot names with the server’s Host Name (or system name), if available. This requires the OMSA agent to be installed on the server. For more information about the OMSA agent, see the Dell OpenManage Server Administrator User's Guide available at dell.com/support/manuals. 4. To use the iDRAC DNS name as slot name, select the Use iDRAC DNS Name for Slot Name option.
Table 17. QuickDeploy Settings (continued) Setting Description Enable iDRAC IPMI over LAN Enables or disables the IPMI over LAN channel for each iDRAC present in the chassis. By default, this option is selected. Enable iDRAC IPv4 DHCP Enables or disables DHCP for each iDRAC present in the chassis.
Assigning QuickDeploy IP Address to Servers The figure here shows the QuickDeploy IP addresses assignment to the servers when there are four half-height servers in VRTX chassis: The following figure shows the QuickDeploy IP addresses assignment to the servers when there are two full-height blades in VRTX chassis: Modifying iDRAC Network Settings for Individual Server iDRAC Using this feature, you can configure the iDRAC network configurations settings for each installed server.
For more information about the property default values and ranges, see the Chassis Management Controller for PowerEdge VRTX RACADM Command Line Reference Guide available at dell.com/support/manuals. Configuring iDRAC Virtual LAN Tag Settings Virtual LAN (VLAN) tags enable multiple VLANs to coexist on the same physical network cable and to segregate the network traffic for security or load management purposes. When you enable the VLAN functionality, each network packet is assigned a VLAN tag.
in the BIOS boot order, until it is changed again either from the CMC web interface (Chassis Overview > Server Overview > Setup > First Boot Device) or from the BIOS boot sequence. NOTE: The first boot device setting in CMC web Interface overrides the system BIOS boot settings. The boot device that you specify must exist and contain a bootable media. You can set the following devices for first boot. Table 18.
5. Click Apply to save the settings. Setting First Boot Device Using RACADM To set the first boot device, use the cfgServerFirstBootDevice object. To enable boot once for a device, use the cfgServerBootOnce object. For more information about these objects, see the Chassis Management Controller for PowerEdge VRTX RACADM Command Line Reference Guide available at dell.com/support/manuals.
● All Settings — This version includes all the settings of the server and components on that server. These profiles are generated from ○ CMC for PowerEdge VRTX version 1.00 and later ○ 12th generation servers with iDRAC7 1.00.00 or later and Lifecycle Controller 2 version 1.1 or later ○ 13th generation servers with iDRAC8 with Lifecycle Controller 2.00.00.00 or later The server configurations replication feature supports iDRAC7 and later servers.
A progress indicator indicates that the Save operation is in progress. After the action is complete, a message, "Operation Successful" is displayed. NOTE: The process to gather the settings runs in the background. Hence, it may take some time before the new profile is displayed. If the new profile is not displayed, check the profile log for errors.
● Local or Network Share if the source file is on an SD card. NOTE: The Network Share option is enabled and the details are displayed in the Stored Profiles section only if the network share is mounted and is accessible. If the Network Share is not connected, configure the Network Share for the chassis. To configure the Network Share, click Edit in the Stored Profiles section. For more information, see Configuring Network Share Using CMC Web Interface.
● 13th generation servers —After restarting the server, when prompted, press F10 to access Dell Lifecycle Controller. Go to the Hardware Inventory page by clicking Hardware Configuration > Hardware Inventory. On the Hardware Inventory page, click Collect System Inventory on Restart. Viewing Stored Profile Settings To view profile settings of the stored server profiles, go to the Server Profiles page. In the Stored Profiles section, click View in the View Profile column for the required server profile.
NOTE: ● A slot that does not have any profile assigned to it is indicated by the term “No Profile Selected” that appears in the select box. ● To remove a profile assignment from one or more slots, select the slots and click Remove Assignment A message is displayed warning you that removing a profile from the slot or slots removes the configuration settings in the profile from any server (s) inserted in the slot (s) when Quick Deploy Profiles feature is enabled. Click OK to remove the profile assignments.
For Emulex Fibre Channel (FC) cards, the Enable/Disable Boot From SAN attribute in the Option ROM is disabled by default. Enable the attribute in the Option ROM and apply the boot identify profile to the server for booting from SAN. To save a profile, perform the following tasks: 1. Go to the Server Profiles page. In the Boot Identity Profiles section, select the server that has the required settings with which you want to generate the profile and select FQDD from the FQDD drop-down menu. 2.
Clearing Boot Identity Profiles Before applying a new boot identity profile to a standby server, you can clear the existing boot identity configurations of a selected server by using the Clear Identity option available in the CMC web interface. To clear boot identity profiles: 1. Go to the Server Profiles page. In the Boot Identity profiles section, select the server from which you want to clear the boot identity profile.
Managing Virtual MAC Address Pool You can create, add, remove, and deactivate MAC addresses by using the Managing Virtual MAC Address Pool. You can only use unicast MAC addresses in the Virtual MAC Address Pool. The following MAC address ranges are allowed in CMC.
To remove MAC addresses from the network share: 1. Go to the Server Profiles page. In the Boot Identity Profiles > Manage Virtual MAC Address Pool section, click Remove MAC Addresses. 2. Enter the starting MAC address of the MAC address pool in the Starting MAC Address field. 3. Enter the count of the MAC addresses that you want to remove, in the Number of MAC Addresses field. 4. Click OK to remove MAC addresses.
Launching iDRAC from Servers Status Page To launch the iDRAC management console from the Servers Status page: 1. In the left pane, click Server Overview. 2. On the Servers Status page, click Launch iDRAC for the server you want to launch the iDRAC Web interface. Launching Remote Console You can launch a Keyboard-Video-Mouse (KVM) session directly on the server. The remote console feature is supported only when all of the following conditions are met: ● The chassis power is on.
8 Configuring CMC To Send Alerts You can set alerts and actions for certain events that occur on the chassis. An event is generated when a device or service’s status has changed or an error condition is detected. If an event matches an event filter and you have configured this filter to generate an alert message (email alert or SNMP trap), then an alert is sent to one or more configured destinations such as email address, IP address, or an external server. To 1. 2. 3. 4.
● Critical ● Warning ● Informational The Monitored Alerts section displays the results based on the selected category and severity. For information about the field descriptions on the this page, see the Online Help. 4. Click Apply. Setting Event Alerts Using RACADM To set an event alert, run the eventfilters command. For more information, see the Chassis Management Controller for PowerEdge VRTX RACADM Command Line Reference Guide available at dell.com/support//manuals.
NOTE: Only one filter mask may be set for both SNMP and email alerting. If you have already selected the filter mask, do not perform task 2, and go to step 3. 2. Enable alert generation: racadm config -g cfgAlerting -o cfgAlertingEnable 1 3. Specify the events filters by running the racadm eventfilters set command. a. To clear all the available alert settings, run the following command: racadm eventfilters set -c cmc.alert.all -n none b. Configure using severity as a parameter.
Configure the SMTP email server to accept relayed emails from the CMC IP address, a feature which is normally turned off in most mail servers due to security concerns. For instructions to configure in a secure manner, see the documentation that was provided with the SMTP server. NOTE: If your mail server is Microsoft Exchange Server 2007, make sure that iDRAC domain name is configured for the mail server to receive the email alerts from iDRAC. NOTE: Email alerts support both IPv4 and IPv6 addresses.
where is the name of the person or group receiving the email alert, and is the index value specified in step 4 and step 5. The email name can contain up to 32 alphanumeric characters, dashes, underscores, and periods. Spaces are not valid. 7. Set up the SMTP host: racadm config -g cfgRemoteHosts -o cfgRhostsSmtpServerIpAddr host.domain where host.domain is the FQDN. You can configure up to four destination email addresses to receive email alerts.
9 Configuring User Accounts and Privileges You can set up user accounts with specific privileges (role-based authority) to manage your system with CMC and maintain system security. By default, CMC is configured with a local administrator account. The default user name is rootand the password is calvin. As an administrator, you can set up user accounts to allow other users to access the CMC.
Table 19. User Types (continued) Privilege Description NOTE: CMC users with the Chassis Configuration Administrator privilege can configure power settings. However, the Chassis Control Administrator privilege is required to perform chassis power operations, including power on, power off, and power cycle. User Configuration Administrator User can: ● Add a new user. ● Change the password of a user. ● Change the privileges of a user.
Table 19. User Types (continued) Privilege Description ● Graceful shutdown ● Server Reboot Test Alert User User can send test alert messages. Debug Command Administrator User can execute system diagnostic commands. Fabric A Administrator User can set and configure the Fabric A IOM. Fabric B Administrator User can set and configure the Fabric B, which corresponds to the first mezzanine card in the servers and is connected to the fabric B circuitry in the shared PCIe subsystem in the main board.
Table 21.
Configure Local Users Using RACADM NOTE: You must be logged in as a root user to execute RACADM commands on a remote Linux system. You can configure up to 16 users in the CMC property database. Before you manually enable a CMC user, verify if any current users exist. If you are configuring a new CMC or if you have used the racadm racresetcfg command, the only current user is root with the password calvin. The racresetcfg subcommand resets all configuration parameters to the default values.
NOTE: For a list of valid bit mask values for specific user privileges, see the Chassis Management Controller for PowerEdge VRTX RACADM Command Line Reference Guide. The default privilege value is 0, which indicates that the privileges of a user are not enabled.
● Standard schema solution that uses Microsoft’s default Active Directory group objects only. ● Extended schema solution that has customized Active Directory objects provided by Dell. All the access control objects are maintained in Active Directory. It provides maximum flexibility to configure user access on different CMCs with varying privilege levels.
Configuring Active Directory With Standard Schema Using CMC Web Interface NOTE: For information about the various fields, see the CMC Online Help. 1. In the left pane, go to Chassis Overview, and then click User Authentication > Directory Services. The Directory Services page is displayed. 2. Select Microsoft Active Directory (Standard Schema). The settings to be configured for standard schema is displayed on the same page. 3.
racadm config -g cfgStandardSchema -i -o cfgSSADRoleGroupDomain racadm config -g cfgStandardSchema -i -o cfgSSADRoleGroupPrivilege racadm config -g cfgActiveDirectory -o cfgADDomainController1 racadm config -g cfgActiveDirectory -o cfgADDomainController2 racadm config -g cfgA
companies add extensions to the schema, they can be guaranteed to be unique and not to conflict with each other. To extend the schema in Microsoft's Active Directory, Dell received unique OIDs, unique name extensions, and uniquely linked attribute IDs for the attributes and classes that are added into the directory service. ● Dell extension: dell ● Dell base OID: 1.2.840.113556.1.8000.
Configuring Extended Schema Active Directory To configure Active Directory to access CMC: 1. Extend the Active Directory schema. 2. Extend the Active Directory Users and Computers Snap-in. 3. Add CMC users and their privileges to Active Directory. 4. Enable SSL on each of your domain controllers. 5. Configure CMC Active Directory properties using CMC web interface or RACADM.
Table 24. dellRacDevice Class OID 1.2.840.113556.1.8000.1280.1.7.1.1 Description Represents the Dell RAC device. The RAC must be configured as delliDRACDevice in Active Directory. This configuration enables CMC to send Lightweight Directory Access Protocol (LDAP) queries to Active Directory. Class Type Structural Class SuperClasses dellProduct Attributes dellSchemaVersion dellRacType Table 25. delliDRACAssociationObject Class OID 1.2.840.113556.1.8000.1280.1.7.1.
Table 28. dellProduct Class (continued) OID 1.2.840.113556.1.8000.1280.1.1.1.5 Class Type Structural Class SuperClasses Computer Attributes dellAssociationMembers Table 29. List of Attributes Added to the Active Directory Schema Assigned OID/Syntax Object Identifier Single Valued Attribute: dellPrivilegeMember FALSE Description: List of dellPrivilege objects that belong to this attribute. OID: 1.2.840.113556.1.8000.1280.1.1.2.1 Distinguished Name: (LDAPTYPE_DN 1.3.6.1.4.1.1466.115.121.1.
Table 29. List of Attributes Added to the Active Directory Schema (continued) Assigned OID/Syntax Object Identifier Single Valued Boolean (LDAPTYPE_BOOLEAN 1.3.6.1.4.1.1466.115.121.1.7) Attribute: dellIsDebugCommandAdmin TRUE Description: TRUE if the user has Debug Command Admin rights on the device. OID: 1.2.840.113556.1.8000.1280.1.1.2.11 Boolean (LDAPTYPE_BOOLEAN 1.3.6.1.4.1.1466.115.121.1.7) Attribute: dellSchemaVersion TRUE Description: The Current Schema Version is used to update the schema.
● Create an Association Object ● Add objects to an Association Object Creating RAC Device Object To create RAC device object: 1. In the MMC Console Root window, right-click a container. 2. Select New > Dell Remote Management Object Advanced. 3. On the New Object page, type a name for the new object. The name must be identical to the CMC name that you type in the Configuring Active Directory With Standard Schema Using Web Interface. 4. Select RAC Device Object and click OK.
Adding Privileges To add privileges: 1. Select the Privileges Object tab and click Add. 2. Enter the privilege object name and click OK. Click the Privilege Object tab to add the privilege object to the association that defines the user’s or user group’s privileges when authenticating to an RAC device. Only one privilege object can be added to an Association Object. Adding RAC Devices Or RAC Device Groups To add RAC devices or RAC device groups: 1. Select the Products tab and click Add. 2.
8. Click Apply. The CMC web server automatically restarts after you click Apply. 9. Log in to the CMC Web interface. 10. Select Chassis in the system tree, click the Network tab, and then click the Network subtab. The Network Configuration page is displayed. 11. If Use DHCP for CMC Network Interface IP Address is enabled, do one of the following: ● Select Use DHCP to Obtain DNS Server Addresses to enable the DHCP server to obtain the DNS server addresses automatically.
A CMC administrator can now integrate the LDAP server user logins with CMC. This integration requires configuration on both LDAP server and CMC. On the LDAP server, a standard group object is used as a role group. A user who has CMC access becomes a member of the role group. Privileges are still stored on CMC for authorization similar to the working of the Standard Schema setup with Active Directory support.
The following DNS query is performed for SRV records: _[Service Name]._tcp.[Search Domain] where is the root level domain to use within the query and is the service name to use within the query. For example: _ldap._tcp.dell.com where ldap is the service name and dell.com is the search domain. 4. Click Apply to save the settings. NOTE: You must apply the settings before continuing. If you do not apply the settings, the settings are lost when you navigate to the next page. 5.
10 Configuring CMC For Single Sign-On Or Smart Card Login This section provides information to configure CMC for Smart Card login and Single Sign-On (SSO) login for Active Directory users. SSO uses Kerberos as an authentication method allowing users, who have signed in as an automatic- or single sign-on to subsequent applications such as Exchange.
● For Single Sign-On or smart card login, the client system must be a part of the Active Directory domain and Kerberos Realm. CMC ● Each CMC must have an Active Directory account. ● CMC must be a part of the Active Directory domain and Kerberos Realm. Prerequisites For Single Sign-On Or Smart Card Login The pre-requisites to configure SSO or Smart Card logins are: ● ● ● ● Set up the kerberos realm and Key Distribution Center (KDC) for Active Directory (ksetup).
Configuring Browser For SSO Login Single Sign-On (SSO) is supported on Internet Explorer versions 6.0 and later, and Firefox versions 3.0 and later. NOTE: The following instructions are applicable only if CMC uses Single Sign-On with Kerberos authentication. Internet Explorer To configure Internet Explorer for Single Sign-On: 1. In the Internet Explorer, select Tools > Internet Options. 2. On the Security tab, under Select a zone to view or change security settings, select Local Intranet. 3. Click Sites.
NOTE: If these two options are selected, all command line out-of-band interfaces, including secure shell (SSH), Telnet, Serial, and remote RACADM remain unchanged . 2. Click Apply. The settings are saved. You can test the Active Directory using Kerberos authentication using the RACADM command: testfeature -f adkrb -u @ where is a valid Active Directory user account.
11 Configuring CMC to Use Command Line Consoles This section provides information about the CMC command line console (or serial/Telnet/Secure Shell console) features, and explains how to set up the system so that you can perform systems management actions through the console. For information about using the RACADM commands in CMC through the command line console, see the Chassis Management Controller for PowerEdge VRTX RACADM Command Line Reference Guide.
To fix this issue, download hotfix 824810 from support.microsoft.com. For more information, you can also see Microsoft Knowledge Base article 824810. In the command line interface, you can manage session timeouts using the racadm command, racadm getconfig -g cfgSessionManagement. For more information, see the Chassis Management Controller Version for Dell PowerEdge VRTX Command Line Reference Guide.
Configure Public Key Authentication Over SSH You can configure up to six public keys that can be used with the service username over an SSH interface. Before adding or deleting public keys, make sure to use the view command to see what keys are already set up, so that a key is not accidentally overwritten or deleted. The service username is a special user account that can be used when accessing the CMC through SSH.
Generating Public Keys for Systems Running Linux The ssh-keygen application for Linux clients is a command line tool with no graphical user interface. Open a terminal window and at the shell prompt type: ssh-keygen –t rsa –b 1024 –C testing where, –t must be dsa or rsa. –b specifies the bit encryption size between 768 and 4096. –c allows modifying the public key comment and is optional. The is optional.
Configuring Terminal Emulation Software CMC supports a serial text console from a management station running one of the following types of terminal emulation software: ● Linux Minicom. ● Hilgraeve’s HyperTerminal Private Edition (version 6.3). Complete the tasks in the following subsections to configure the required type of terminal software. Configuring Linux Minicom Minicom is a serial port access utility for Linux. The following steps are valid for configuring Minicom version 2.0.
Table 32. Minicom Settings (continued) Setting Description Required Setting Modem dialing and parameter settings Clear the init, reset, connect, and hangup settings so that they are blank Connecting to Servers or I/O Module Using Connect Command CMC can establish a connection to redirect the serial console of a server or I/O module. For servers, serial console redirection can be accomplished using: ● CMC command line interface (CLI) or the RACADM connect command.
NOTE: All keys do not work on the BIOS setup pages. Therefore, provide appropriate keyboard shortcuts for and others. The initial redirection screen displays the necessary keyboard shortcuts. Configuring the Managed Server BIOS for Serial Console Redirection You can use a Remote Console session to connect to the managed system using the iDRAC web interface (see the iDRAC User’s Guide on dell.com/support/manuals). By default, the Serial communication in the BIOS is turned off.
The following example shows the changes described in this procedure. # grub.conf generated by anaconda # # Note that you do not have to rerun grub after making changes # to this file # NOTICE: You do not have a /boot partition. This means that # all kernel and initrd paths are relative to /, e.g. # root (hd0,0) # kernel /boot/vmlinuz-version ro root= /dev/sdal # initrd /boot/initrd-version.img # #boot=/dev/sda default=0 timeout=10 #splashimage=(hd0,2)/grub/splash.xpm.
# do not have networking) # 3 - Full multiuser mode # 4 - unused # 5 - X11 # 6 - reboot (Do NOT set initdefault to this) # id:3:initdefault: # System initialization. si::sysinit:/etc/rc.d/rc.sysinit l0:0:wait:/etc/rc.d/rc 0 l1:1:wait:/etc/rc.d/rc 1 l2:2:wait:/etc/rc.d/rc 2 l3:3:wait:/etc/rc.d/rc 3 l4:4:wait:/etc/rc.d/rc 4 l5:5:wait:/etc/rc.d/rc 5 l6:6:wait:/etc/rc.d/rc 6 # Things to run in every runlevel.
tty8 tty9 tty10 tty11 ttyS1 148 Configuring CMC to Use Command Line Consoles
12 Using FlexAddress and FlexAdress Plus This section provides information about FlexAddress, FlexAddress Plus, and configuring. NOTE: An Enterprise License must be installed on the CMC to use the Flexaddress feature.
For example: (starting_mac)00188BFFDCFA + (mac_count)0xCF - 1 = (ending_mac)00188BFFDDC8 . NOTE: Lock the SD card prior to inserting in the USB Memory Card Reader to prevent accidentally modifying any contents. Unlock the SD card before inserting into CMC. About FlexAddress Plus The FlexAddress Plus is a new feature added to the feature card version 2.0. It is an upgrade from FlexAddress feature card version 1.0. FlexAddress Plus contains more MAC addresses than the FlexAddress feature.
Table 34. Status Messages Returned by the featurecard -s Command (continued) Status Message Actions the CMC module with the feature card installed becomes active.
program the address, it needs to be operational which requires the server module to be powered up. When the power-down and power-up sequences complete, the chassis-assigned MAC addresses are available for Wake-On-LAN (WOL) function. Configuring FlexAddress for Chassis-Level Fabric and Slots At the chassis level, you can enable or disable the FlexAddress feature for fabrics and slots. FlexAddress is enabled on a perfabric–basis and then slots are selected for participation in the feature.
NOTE: By using the racresetcfg subcommand, you can reset the Flex Address of a CMC to its factory-default setting, which is “disabled”. The RACADM syntax is: racadm racresetcfg -c flex For more information about the FlexAddress-related RACADM commands and data about the other factory-default properties, see the Chassis Management Controller for PowerEdge VRTX RACADM Command Line Reference Guide available at dell.com/cmcmanuals.
● Basic Mode — In this mode, you can view Server Slot, Fabric, Protocol, WWN/MAC addresses, and Partition Status. Only Active MAC addresses are displayed in the WWN/MAC address box. You can filter using any or all of the fields displayed: ● Advanced Mode — In this mode you can view all the fields displayed in the basic mode and all the MAC types (Server Assigned, Flex Address, and IO Identity). You can filter using any or all of the fields displayed.
6. From the Fabric drop-down menu, select one of the fabric types to view details for all or specific type of management or I/O fabric associated with the servers. 7. From the Protocol drop-down menu, select All Protocols or one of the listed network protocols to view all the MACS or the MACs associated with the selected protocol. 8. In the WWN/MAC Addresses field, enter the MAC address to view only the slots associated with the specific MAC address. 9.
To display the Ethernet and iSCSI MAC/WWN addresses for all iDRAC/LOMs/mezzanine cards, use the following RACADM command: racadm getmacaddress -a For more information on the getflexaddr and getmacaddress subcommand, see the Chassis Management Controller for PowerEdge VRTX RACADM Command Line Reference Guide. Command Messages The following table lists the RACADM commands and output for common FlexAddress situations. Table 35.
Table 35. FlexAddress Commands and Output (continued) Situation Command Output Changing the Flexaddress settings of slot or fabric, when the CMC Enterprise License is not installed. $racadm setflexaddr i ERROR: SWC0242 : A required license is missing or expired. Obtain an appropriate license and try again, or contact your service provider for additional details. $racadm setflexaddr f NOTE: To resolve this issue, you must have a FlexAddress Enablement license.
PURPOSE, FOR THE SOFTWARE AND ALL ACCOMPANYING WRITTEN MATERIALS. This limited warranty gives you specific legal rights; you may have others, which vary from jurisdiction to jurisdiction.
13 Managing Fabrics The chassis supports a fabric type, which is Fabric A. Fabric A is used by the single I/O Module, and is always connected to the on-board Ethernet adapters of the servers. The chassis has only one I/O module (IOM), where the IOM is a pass-through or switch module. The I/O Module is classified as group A. Chassis IOM uses a discrete data path called Fabric, and it is named A. The Fabric A supports only Ethernet.
Configuring Network Settings for IOM Using CMC Web Interface To configure the network settings for I/O Module: 1. In the left pane, click Chassis Overview, click I/O Module Overview, and then click Setup. Alternatively, to configure the network settings of the only available I/O module that is A, click A Gigabit Ethernet, and then click Setup. On the Configure I/O Module Network Settings page, type appropriate data, and then click Apply. 2.
14 Managing and Monitoring Power The PowerEdge VRTX chassis is the most power-efficient modular server enclosure. It is designed to include highly efficient power supplies and fans, has an optimized layout for the air to flow more easily through the system, and contains power-optimized components throughout the enclosure.
Redundancy Policies Redundancy policy is a configurable set of properties that determine how CMC manages power to the chassis. The following redundancy policies are configurable with or without dynamic PSU engagement: ● Grid redundancy ● Power supply redundancy Grid Redundancy Policy The purpose of the Grid redundancy policy is to enable a modular enclosure system to operate in a mode in which it can tolerate AC power failures.
To operate remaining PSUs at their maximum efficiency, use the following power redundancy modes: ● PSU Redundancy mode with DPSE provides power efficiency. At least two supplies are online, with one PSU required to power the configuration, and one to provide redundancy in case of a PSU failure. PSU Redundancy mode offers protection against the failure of any one PSU, but offers no protection in the event of an AC grid loss.
Power Supply Redundancy When power supply redundancy is enabled, a PSU in the chassis is kept as a spare, ensuring that the failure of any one PSU does not cause the servers or chassis to turn off. Power supply redundancy mode requires minimum two PSUs. Additional PSUs, if present, are utilized to improve power efficiency of the system if DPSE is enabled. Subsequent failures after loss of redundancy may cause the servers in the chassis to turn off.
● I/O module turned off ● Storage adapters, PCIe cards, physical disk drive, and main board turned off ● Transition of the chassis to a turned-off state You can reconfigure the System Input Power Cap when the chassis is either turned on or turned off. Server Slot Power Priority Settings CMC allows you to set a power priority for each of the four server slots in an enclosure. The priority settings are 1 (highest) through 9 (lowest).
For example, to set the priority level to 1 for the server in slot 4, type the following command: racadm config -g cfgServerInfo -o cfgServerPriority -i 4 1 Viewing Power Consumption Status CMC provides the actual input power consumption for the entire system. Viewing Power Consumption Status Using CMC Web Interface In the left pane, click Chassis Overview > Power > Power Monitoring.
Redundancy Status and Overall Power Health The redundancy status is a factor in determining the overall power health. When the power redundancy policy is set, for example, to Grid Redundancy and the redundancy status indicates that the system is operating with redundancy, the overall power health is typically OK. If the PSU installed on a chassis fails owing to some reason, the overall power health status of the chassis is displayed as Non-Critical.
If the subsequent power capacity or the user power capacity is greater than the server allocations, servers have degraded performance or, in an extrement case, servers may be turned off. Both conditions are in reverse-priority order; that is, the low-priority servers are turned off first. The following table provides the firmware response to a PSU turnoff, or removal as it applies to various PSU redundancy configurations. Table 38.
● ● ● ● ● ● ● ● ● System Input Power Cap Redundancy Policy Enable Dynamic Power Supply Engagement Disable Chassis Power Button Max Power Conservation Mode Remote Power Logging Remote Power Logging Interval Server Based Power Management Disable AC Power Recovery Power Conservation and Power Budget CMC conserves power when the user-configured maximum power limit is reached.
Remote Logging Power consumption can be reported to a remote syslog server. Total chassis power consumption, minimum, maximum, and average power consumption over a collection period can be logged. For more information about enabling this feature and configuring the collection or logging interval, see Managing and Monitoring Power. External Power Management CMC power management is optionally controlled by the OpenManage Power Center (OMPC). For more information, see the OMPC User’s Guide.
Configuring Power Budget and Redundancy Using RACADM NOTE: To perform power management actions, you must have the Chassis Configuration Administrator privilege. To enable and set the redundancy policy: 1. Open a serial/Telnet/SSH text console to CMC and log in. 2. Set properties as needed: ● To select a redundancy policy, type: racadm config -g cfgChassisPower -o cfgChassisRedundancyPolicy where is 1 (Grid Redundancy), and 2 (Power Supply Redundancy). The default value is 2.
● To determine if the power remote logging feature is enabled, enter the following command: racadm getconfig -g cfgRemoteHosts -o cfgRhostsSyslogPowerLoggingEnabled ● To determine the power remote logging interval, enter the following command: racadm getconfig -g cfgRemoteHosts -o cfgRhostsSyslogPowerLoggingInterval The power remote logging feature is dependent on previously configured remote syslog hosts having been .
Executing Power Control Operations on the Chassis Using RACADM Open a serial/Telnet/SSH text console to CMC, log in, and type: racadm chassisaction -m chassis where is powerup, powerdown, powercycle, nongraceshutdown, or reset. Executing Power Control Operations on a Server You can remotely perform power management actions for multiple servers at a time or an individual server in the chassis.
Executing Power Control Operations on the IOM Using RACADM To execute power control operations on the IOM using RACADM, open a serial/Telnet/SSH text console to CMC, log in, and type: racadm chassisaction -m switch where indicates the operation you want to execute: power cycle.
15 Managing Chassis Storage On ● ● ● ● ● ● ● ● the Dell PowerEdge VRTX, you can perform the following operations: View the status of physical disks drives and storage controllers. View the properties of controllers, physical disk drives, virtual disks, and enclosures. Set up controllers, physical disk drives, and virtual disks. Assign virtual adapters. Troubleshoot controller, physical disk drives, and virtual disks. Update storage components.
2. On the Storage Overview page, you can: ● ● ● ● View the graphic summary of the physical disk drives installed in the chassis and their status. View the summary of all the storage components with links to their respective pages. View the used capacity and total capacity of the storage. View controller information. NOTE: In case of a fault-tolerant controller, the name format is: Shared (Integrated ).
○ One Shared PERC detected ○ One expanders detected ○ Shared PERC and expanders correctly cabled ● View the status of each attribute that indicates if the fault-tolerant criteria is fulfilled. NOTE: If the attribute in a fault-tolerant environment is not matching the criterion, then an Update Now option is displayed for that attribute. NOTE: A Learn How option is displayed against some of the attributes. For more information about the attribute, click Learn How. 3.
Map or un-map a PERC Virtual Controller to blade: ● Each External Shared PERC 8 card has four virtual adapters (VA). If one or two External Shared PERC 8 card are present in the system, then in shared mode you can map or un-map one of the four virtual adapters’. ● If an external PCIE slot is occupied by shared adapter, the virtual adapter mapping can get the current details or information for VA mapping of the shared storage VA pool.
2. Click Server Overview > Power > Control > Power Off Server. 3. Modify the security key on one or both of the existing non-fault-tolerant controllers so that the keys match. 4. Power cycle the chassis. 5. Verify if the controllers have matching keys. Viewing Controller Properties Using CMC Web Interface To view the controller properties: 1. In the left pane, click Chassis Overview > Controller. 2. On the Controllers page, under the Controllers section, you can see the basic properties of the controller.
NOTE: Note the following: ● If the storage controllers are in fault-tolerant mode, and if both have the same firmware version, then both the controllers are displayed as a single device in the drop-down menu. For example, Shared PERC8 (Integrated 1) or Shared PERC8 (Integrated 2) or Shared PERC8 (SPERC Slot 5) or Shared PERC8 (SPERC Slot 6). If the settings of two controllers are different, the Settings Incompatible message is displayed.
● Run the racadm raid disableperc:RAID.ChassisIntegrated.2-1 command to disable Second Integrated shared PERC8 and Fault Tolerant mode. NOTE: ● The chassis must be turned on and all server modules must be turned off before you run the enable or disable commands. The chassis is automatically power cycled as part of this operation. After changing the Shared PERC operation mode, it is recommended to reset the CMC using the Troubleshooting page or the racadm racreset command.
Enable RAID Controller — Enables the RAID controller. If the PERC is already disabled, then Enable Raid Controller option is available in the drop-down menu. Reset Configuration — Select this option to delete virtual drive and unassign all the hot spares attached to the controller. However, this only removes the disks from the configuration and does not delete any data. NOTE: Reset Configuration does not remove any foreign configurations. Use Clear Foreign Configuration to reset.
The Properties page is displayed. 2. To view properties of all the physical disk drives, under the Physical Disks section, click the .
2. On the Setup page, under Recover Physical Disks section, select the physical disk that must be recovered and from the drop-down menu, appropriately select Rebuild Drive, Cancel Rebuild, or Force Online, and then click Apply. Viewing Virtual Disk Properties Using CMC Web Interface Make sure that the virtual disks are created. To view the virtual disk properties: 1. In the left pane, click Chassis Overview > Storage > Virtual Disks > Properties. 2.
Creating Encryption Key Using CMC Web Interface You can create encryption or security keys for controllers if the encryption key is Unconfigured. To create an encryption key: 1. In the left pane, go to Storage > Controllers > Setup. 2. From the Security Key drop-down, select Create Security Key. A pop-up window is displayed. 3. Enter the security key and password and click OK. 4. On the Controller Setup page, click Apply. Once the encryption key is created, the status of the Security Key changes to Enabled.
Deleting Encryption Key Using RACADM To delete an encryption key by running a RACADM command, use the following syntax: racadm raid deletesecuritykey:RAID.ChassisIntegrated.1-1 For more information, see the Chassis Management Controller PowerEdge VRTX RACADM Command Line Reference Guide. Encrypting Virtual Disks You can encrypt virtual disks created on SEDs after configuring an encryption key on the controller. Whenever you perform an encryption, a message is logged in the CMC Log.
NOTE: You can unlock the locked drives by only using the RACADM or WSMan commands. Unlocking Foreign Configuration Using RACADM To unlock foreign configuration by running a RACADM command, use the following syntax: racadm raid unlock: -key -passwd For more information, see the Chassis Management Controller PowerEdge VRTX RACADM Command Line Reference Guide. Cryptographic Erase You can use the cryptographic erase option to securely erase data present on secure SEDs.
1. In the left pane, click Chassis Overview > Storage > Virtual Disks > Manage. 2. On the Manage Virtual Disks page, from the Virtual Disk Actions drop-down menu, select one of the following actions, and then click Apply. ● Rename ● Delete NOTE: If you select Delete, the following message is shown indicating that deleting a virtual disk permanently deletes data available in that virtual disk. Deleting the virtual disk removes the virtual disk from the controller's configuration.
Viewing Enclosure Status and Attributes CMC displays the health of the enclosure based on the physical components. Data of the enclosures attached to shared storage is displayed in CMC, but the external enclosures attached to few PCIe cards are not displayed. You must have CMC Login privileges to view the status and attributes of the enclosures.
Viewing Temperature Probe Status and attributes of the Enclosure Temperature probe status displays the status of the temperature sensors of the enclosure. Sensors contain a status value that is unique from the enclosure. You can have up to four temperature sensors or probes and enclosure firmware creates a status for each sensor. You must have CMC Login privileges to view probe status.
Viewing Fan Status and attributes of the Enclosure Fan status and attributes displays the status of the enclosure fan and contains a status value that is unique from the enclosure. You can have up to two fans, and the enclosure firmware creates a status for each fan. You must have CMC Login privileges to view fan status. NOTE: If a PSU is missing, the corresponding fan of the PSU displays a critical status.
16 Managing PCIe Slots By default, all slots are unmapped. You can do the following: ● View the status of all PCIe Slots in the chassis. ● Assign or remove an assigned PCIe slot from the servers. Consider the following before assigning a PCIe slot to a server: ● An empty PCIe slot cannot be assigned to a server that is turned on. ● A PCIe slot with an adapter assigned to a server cannot be assigned to another server if the currently-assigned server (source) is turned on.
Assigning PCIe Slots To Servers Using CMC Web Interface To assign PCIe slots to the servers: ● In the left pane, click Chassis Overview > PCIe Overview > Setup > Mapping: PCIe Slots to Server Slots. On the Mapping: PCIe Slots to Server Slots page, in the Action column, from the Action drop-down menu, select the appropriate server name, and then click Apply. Note the following: ● Without a license, the maximum number of PCIe slots that maybe mapped to a half-height server is two.
PCIe Power Ride-Through Newly assigned PCIe cards in CMC VRTX must be discovered and initialized before a server node is powered on.
2. To enable or disable the PCIe Ride-through feature, select or clear the Enable PCIe Ridethrough option. NOTE: By default, the Ride-through feature is enabled and the time period set for 300 seconds. 3. In the Timeout field, enter the time for which the Ride-through feature to be enabled. Type either zero (0) or a value from 60–1800 seconds. Zero indicates an infinite timeout. 4. Click Apply.
17 Troubleshooting and Recovery This section explains how to perform tasks related to recovering and troubleshooting problems on the remote system using the CMC web interface. ● Viewing chassis information. ● Viewing the event logs. ● Gathering configuration information, error status, and error logs. ● Using the diagnostic console. ● Managing power on a remote system. ● Managing Lifecycle Controller jobs on a remote system. ● Reset components. ● Troubleshooting Network Time Protocol (NTP) problems.
Gathering Configuration Information, Chassis Status, and Logs Using RACDUMP The racdump subcommand provides a single command to get comprehensive chassis status, configuration state information, and the historic event logs.
First Steps to Troubleshoot a Remote System The following questions are commonly used to troubleshoot high-level issues in the managed system: ● Is the system turned on or turned off? ● If turned on, is the operating system functioning, not responding, or stopped functioning? ● If turned off, did the power turn off unexpectedly? Power Troubleshooting The following information helps you to troubleshoot power supply and power-related issues: ● Problem: Configured the Power Redundancy Policy to Grid Redundanc
○ Resolution: This can occur if the System Input Power Cap has been configured to a value that results in an increased power need by fans having to be made up by reduction in the power allocation to the servers. User can increase the System Input Power Cap to a higher value that allow for additional power allocation to the fans without an impact on server performance. Troubleshooting Alerts Use the CMC log and the trace log to troubleshoot CMC alerts.
Viewing Hardware Logs Using RACADM To view the hardware log using RACADM, open a serial/Telnet/SSH text console to CMC, log in, and type: racadm getsel To clear the hardware log, type: racadm clrsel Viewing Chassis Log CMC generates a log of the chassis-related events. CMC provides alert capabilities through System Event Log (SEL), SNMP, and Email interfaces. SPERC is inserted while one or more PowerEdge serves are powered on.
Resetting Components You can reset the active CMC, or virtually reseat servers making them to behave as if they were removed and reinserted. If the chassis has a standby CMC, resetting the active CMC causes a failover and the standby CMC becomes active. NOTE: To reset components, you must have Debug Command Administrator privilege. To reset the components using the CMC Web interface, 1. In the left pane, click Chassis Overview > Troubleshooting > Reset Components. The Reset Components page is displayed. 2.
If you attempt to configure a Windows-based NTP server, it may help to increase the MaxDist parameter for ntpd. Before changing this parameter, understand all the implications, since the default setting must be large enough to work with most NTP servers.
Table 42.
Table 42.
Recovering Firmware Image CMC enters recover mode when a normal CMC operating boot is not possible. In recover mode, a small subset of commands are available that allow you to reprogram the flash devices by uploading the firmware update file, vrtx_cmc.bin. This is the same firmware image file used for normal firmware updates. The recovery process displays its current activity and boots to the CMC OS upon completion.
● Disable Fault Tolerance — Disables the fault-tolerance mode of the External shared PERC 8 card. NOTE: Enable Fault Tolerance and Disable Fault Tolerance are displayed only for the External Shared PERC 8 cards. The default mode of the External Shared PERC 8 cards is the non-fault-tolerant mode. NOTE: ● Displays an error message if the blades are powered ON. ● The command fails if the blade is powered ON. Hotplugging enclosures in fault-tolerant chassis 1.
18 Using LCD Panel Interface You can use the LCD panel on the chassis to perform configuration and diagnostics, and to obtain status information about the chassis and its contents. The following figure illustrates the LCD panel. The LCD screen displays menus, icons, pictures, and messages. Figure 4. LCD Display 1. LCD screen 2. Selection ("check") button 3.
Table 43. LCD Panel Navigational Icons (continued) Accept/Yes — Highlight and press the center button to accept a change and return to the previous screen. Skip/Next — Highlight and press the center button to skip any changes and go to the next screen. No — Highlight and press the center button to answer "No" to a question and go to the next screen. Component Identify — Blinks the blue LED on a component. NOTE: There is a blinking blue rectangle around this icon when Component Identify is enabled.
● Side Status ● Enclosure Status Use the navigation buttons to highlight the desired item (highlight the Back icon to return to the Main Menu), and then press the center button. The selected screen is displayed. IP Summary Menu The IP Summary screen displays the IP information about the CMC (IPv4 and IPv6), and each server that is installed on the chassis. Use the up and down arrow buttons to scroll through the list.
Diagnostics The LCD panel helps you to diagnose issues in any server or module in the chassis. If there is an issue or fault with the chassis or any server or other module in the chassis, the LCD panel status indicator blinks amber. On the Main Menu, an icon with an amber background displays next to the menu item— Enclosure—that leads to the Front, Rear, Side, or Enclosure status.
Table 45. Chassis or Enclosure Status (continued) Item Description Minimum Power Minimum power consumed in watts. Ambient Temperature Current ambient temperature in degrees Celsius. Service Tag The factory-assigned service tag. CMC redundancy mode Non-Redundant or Redundant. PSU redundancy mode Non-Redundant, Grid Redundant, or DC Redundant. Table 46. Fan Status Item Description Name/Location Example: Fan1, Fan2, and so on. Error Messages If there are no errors, No Errors is displayed.
Table 50. DVD Mapping Status Item Description Server Displays a list of servers to which the DVD can be mapped. Error Messages If there are no errors, No Errors is displayed. Else, error messages are listed where critical ones are first listed, and then the warning-related. Mapped Displays a list of servers mapped to a DVD, if any. Slot Indicates the server slot to which the DVD is mapped to. Possible values are SLOT-<01 to 04>.
Table 54. Hard Disk Drive Status Item Description Hard Disk Drive: Displays the Hard disk drive name in the format Hard Disk Drive , where 'n' is the hard drive number. Example: Hard Disk Drive 1, Hard Disk Drive 2, and so on. Error Messages If there are no errors, No Errors is displayed. Else, error messages are listed where critical ones are first listed, and then the warning-related.
The information in the table is dynamically updated. If the server does not support this feature, then the following information does not appear, else Server Administrator options are as follows: ● Option “None” = No strings must be displayed on the LCD. ● Option “Default” = No Effect. ● Option “Custom” = Allows you to enter a string name for the server. The information is displayed only if iDRAC has completed booting.
19 Frequently Asked Questions This section lists the frequently asked questions about the following: ● ● ● ● ● RACADM Managing and Recovering a Remote System Active Directory FlexAddress and FlexAddressPlus IOM Topics: • • • • • RACADM Managing and Recovering a Remote System Active Directory FlexAddress and FlexAddressPlus IOM RACADM After performing a CMC reset (using the RACADM racreset subcommand), when a command is entered, the following message is displayed: racadm Transport: ERROR: (R
Managing and Recovering a Remote System Why are the remote RACADM and Web-based services unavailable after a property change? It may take a minute for the remote RACADM services and the web interface to become available after the CMC Web server resets. The CMC web server is reset after the following occurrences: ● ● ● ● ● Changing the network configuration or network security properties using the CMC web user interface.
Active Directory Does Active Directory support CMC login across multiple trees? Yes. The CMC’s Active Directory querying algorithm supports multiple trees in a single forest. Does the login to CMC using Active Directory work in mixed mode (that is, the domain controllers in the forest run different operating systems, such as Microsoft Windows 2000 or Windows Server 2003)? Yes.
● If the original feature card is present in the active CMC on that or any other chassis, the Web interface displays the following error message: ○ This feature card was activated with a different chassis. It must be removed before accessing the FlexAddress feature.