Chassis Management Controller Version 2.
Notes, cautions, and warnings NOTE: A NOTE indicates important information that helps you make better use of your product. CAUTION: A CAUTION indicates either potential damage to hardware or loss of data and tells you how to avoid the problem. WARNING: A WARNING indicates a potential for property damage, personal injury, or death. © 2016 Dell Inc. All rights reserved. This product is protected by U.S. and international copyright and intellectual property laws.
Contents 1 Overview........................................................................................................................ 14 What is new in this release................................................................................................................................................15 Key Features.....................................................................................................................................................................
Launching CMC Using Other Systems Management Tools........................................................................................34 Downloading and Updating CMC Firmware......................................................................................................................34 Setting Chassis Physical Location and Chassis Name......................................................................................................
4 Updating Firmware........................................................................................................47 Downloading CMC Firmware............................................................................................................................................47 Viewing Currently Installed Firmware Versions.................................................................................................................
Viewing Chassis Summary................................................................................................................................................67 Viewing Chassis Controller Information and Status.......................................................................................................... 67 Viewing Information and Health Status of All Servers......................................................................................................
Saving Server Inventory Report.................................................................................................................................. 81 Chassis Group Inventory and Firmware Version......................................................................................................... 82 Viewing Chassis Group Inventory ..............................................................................................................................
Exporting Profile.......................................................................................................................................................100 Editing Profile........................................................................................................................................................... 100 Deleting Profile.....................................................................................................................................................
Configuring the Generic LDAP Directory to Access CMC.........................................................................................130 Configuring Generic LDAP Directory Service Using CMC Web Interface................................................................. 130 Configuring Generic LDAP Directory Service Using RACADM...................................................................................131 10 Configuring CMC For Single Sign-On Or Smart Card Login...............................
Viewing WWN/MAC Address Information Using RACADM............................................................................................150 Command Messages....................................................................................................................................................... 151 FlexAddress DELL SOFTWARE LICENSE AGREEMENT................................................................................................152 13 Managing Fabrics.................................
Executing Power Control Operations..............................................................................................................................166 Executing Power Control Operations on the Chassis................................................................................................166 Executing Power Control Operations on the Chassis Using Web Interface...............................................................167 Executing Power Control Operations on the Chassis Using RACADM.
Encrypting Virtual Disks Using RACADM.................................................................................................................. 180 Unlocking Foreign Configuration.....................................................................................................................................180 Unlocking Foreign Configuration Using RACADM.....................................................................................................180 Cryptographic Erase....................
Recovering Firmware Image..................................................................................................................................... 197 Troubleshooting Network Problems................................................................................................................................198 Troubleshooting Controller.............................................................................................................................................
1 Overview The Dell Chassis Management Controller (CMC) for Dell PowerEdge VRTX is a Systems Management hardware and software solution for managing the PowerEdge VRTX chassis. The CMC has its own microprocessor and memory and is powered by the modular chassis into which it is plugged.
What is new in this release This release of CMC for Dell PowerEdge VRTX supports: • Creating a Virtual Disk without initialization of the virtual disk. • Following features for Self-Encrypting Drives (SEDs): – Creating, modifying, and deleting the security key (using key identifier and passphrase) – Secure erase – Encrypting virtual disks – Unlocking and importing secure foreign virtual disk configuration using RACADM and WSMan • Querying shared storage health using SNMP.
• Access to system event logs — Provides access to the hardware log and chassis log. • Firmware updates for various chassis components — Enables you to update the firmware for CMC, iDRAC on servers, chassis infrastructure, and chassis storage. • Firmware update of server components such as BIOS, network controllers, storage controllers, and so on across multiple servers in the chassis using Lifecycle Controller.
Figure 1. CMC connectors and LEDs Table 1. CMC connectors and LEDs Item Indicator, Button, or Connector 1 Status/identification indicator (CMC 1) 2 Power indicator (CMC 1) 3 CMC connector ports (2) 4 Power indicator (CMC 2) 5 Status/identification indicator (CMC 2) A Back Panel view of the chassis is given here with a table that lists the parts and devices available in the CMC.
Figure 2. CMC back panel Table 2. CMC back panel — parts Item Indicator, Button, or Connector 1 PCIe expansion card slots low-profile (5) 2 PCIe expansion card slots full height (3) 3 CMC GB Ethernet port (CMC-2) 4 CMC GB Ethernet port (CMC-1) 5 Serial Connector 6 Blower modules (4) 7 I/O module ports 8 PSU 4 9 PSU 3 10 PSU 1 11 PSU 2 A Front Panel view of the chassis is given here with a table that lists the parts and devices available in the CMC.
Figure 3. Front-Panel Features And Indicators—3.5 Inch Hard Disk Drive Chassis Table 3. Front panel — features and indicators Item Indicator, Button, or Connector Description 1 USB connectors (2) Allows a keyboard and mouse to be connected to the system. 2 LCD panel Provides system information and status, and error messages to indicate when the system is operating correctly or when the system needs attention. 3 LCD menu scroll buttons (4) Moves the cursor in one-step increments.
Item Indicator, Button, or Connector Description 11 Server modules Up to four PowerEdge M520, M620, or M630 server modules or 2 M820 server modules configured for the enclosure. Minimum CMC Version The following table lists the minimum CMC version required to enable the listed server modules. Table 4. Minimum CMC Version for server modules Servers Minimum version of CMC PowerEdge M520 CMC 1.36 PowerEdge M620 CMC 1.36 PowerEdge M820 CMC 1.36 PowerEdge M630 CMC 2.00 PowerEdge M830 CMC 2.
For the latest supported platforms, see the Dell Chassis Management Controller (CMC) Version 2.20 for Dell PowerEdge VRTX Release Notes available at dell.com/support/manuals. Supported Web Browsers The following web browsers are supported for Dell PowerEdge VRTX: • Microsoft Internet Explorer 9 • Microsoft Internet Explorer 10 • Microsoft Internet Explorer 11 • Microsoft EDGE • Safari version 7.1 • Safari version 8.
NOTE: If you have purchased a system with all the licenses pre-installed, then license management is not required. • View — View the current license information. • Import — After acquiring the license, store the license in a local storage and import it into CMC using one of the supported interfaces. The license is imported if it passes the validation checks. NOTE: For a few features, a CMC restart may be required to enable the features.
Feature Express Enterprise CMC Network Yes Yes CMC Serial Port Yes Yes RACADM (SSH, Local, and Remote) Yes Yes CMC Setup Backup No Yes CMC Setup Restore Yes Yes WS-MAN Yes Yes SNMP Yes Yes Telnet Yes Yes SSH Yes Yes Web-based Interface Yes Yes Email Alerts Yes Yes LCD Deployment Yes Yes Extended iDRAC Management Yes Yes Remote Syslog No Yes Directory Services No* Yes iDRAC Single Sign-On No Yes Two-Factor Authentication No Yes PK Authentication No Yes
Feature Express Enterprise One-to-many configuration for No iDRAC Yes Boot Identity No Yes Chassis Profile No Yes Quick Deploy No Yes Notes Viewing Localized Versions of the CMC Web Interface To view localized versions of the CMC web interface, read through your web browser's documentations. Supported Management Console Applications CMC supports integration with Dell OpenManage Console. For more information, see the OpenManage Console documentation available at dell.com/support/manuals.
• The Dell PowerEdge VRTX Getting Started Guide shipped with your system provides an overview of system features, setting up your system, and technical specifications. • The setup placemat shipped with your system provides information about the initial system setup and configuration. • The server module's Owner's Manual provides information about the server module's features and describes how to troubleshoot the server module and install or replace the server module's components.
2 Installing and Setting Up CMC This section provides information about how to install your CMC hardware, establish access to CMC, configure your management environment to use CMC, and guides you through the tasks for configuring a CMC: • • • • Set up initial access to CMC. Access CMC through a network. Add and configure CMC users. Update CMC firmware. For more information about installing and setting up redundant CMC environments, see Understanding Redundant CMC Environment.
11. Connect to the I/O module by using the web browser and provide final configuration of the IO module. 12. Turn on the servers and install the operating system. Basic CMC Network Connection For the highest degree of redundancy, connect each available CMC to your management network.
Configuring a Web Browser You can configure and manage CMC, servers, and modules installed in the chassis through a web browser. See the “Supported Browsers" section in the Dell Systems Software Support Matrix at dell.com/support/manuals. The CMC and the management station where you use your browser must be on the same network, which is called the management network. On the basis of your security requirements, the management network can be an isolated and highly secure network.
Certificate Revocation List (CRL) Fetching If your CMC has no access to the Internet, disable the certificate revocation list (CRL) fetching feature in Internet Explorer. This feature tests whether a server such as the CMC web server uses a certificate that is on a list of revoked certificates retrieved from the Internet. If the Internet is inaccessible, this feature can cause delays of several seconds when you access the CMC using the browser or with a command line interface such as remote RACADM.
Configuring Initial CMC Network NOTE: Changing your CMC Network settings may disconnect your current network connection. You can perform the initial network configuration of CMC before or after CMC has an IP address.
NOTE: To skip the CMC configuration navigate to the ‘X’ icon and then press the center button. 3. If you are asked to select an appropriate network speed, select a network speed (Auto (1Gb), 10Mb, or 100Mb) using appropriate buttons. For effective network throughput, the network speed setting must match your network configuration. Setting the network speed lower than the speed of your network configuration increases bandwidth consumption and slows down the network communication.
Dynamic Host Configuration Protocol (DHCP) iDRAC retrieves IP configuration (IP address, mask, and gateway) automatically from a DHCP server on your network. The iDRAC is assigned a unique IP address allotted over your network. Press the center button. The IPMI Over LAN panel is displayed. Static If you select Static, manually enter the IP address, gateway, and subnet mask by following the instructions on the LCD screen.
NOTE: Telnet is not as secure as the other interfaces, hence it is disabled by default. Enable Telnet by using web, SSH, or remote RACADM. NOTE: Using more than one interface at the same time may generate unexpected results. Table 8. CMC Interfaces Interface Description Web interface Provides remote access to CMC using a graphical user interface. The Web interface is built into the CMC firmware and is accessed through the NIC interface from a supported web browser on the management station.
Interface Description • • • • • MOFs and Profiles — delltechcenter.com/page/DCIM.Library DTMF Web site — dmtf.org/standards/profiles/ WSMan Release notes file. www.wbemsolutions.com/ws_management.html DMTF WSManagement Specifications: www.dmtf.org/standards/wbem/wsman Web services interfaces can be utilized by leveraging client infrastructure, such as Windows WinRM and Powershell CLI, open source utilities like WSManCLI, and application programming environments like Microsoft .NET.
Setting Date and Time on CMC Using CMC Web Interface To set the date and time on CMC: 1. In the left pane, click Chassis Overview → Setup → Date/Time. 2. To synchronize the date and time with a Network Time Protocol (NTP) server, on the Date/Time page, select Enable NTP and specify up to three NTP servers. To manually set the date and time, clear the Enable NTP option, and then edit the Date and Time fields. 3. Select the Time Zone from the drop-down menu, and then click Apply.
• 0 — not blinking (default) • 1 — blinking racadm raid , where the operation value is blink or unblink, and the FQDD is for the component's physical disk drive, virtual disk and enclosures. Configuring CMC Properties You can configure CMC properties such as power budgeting, network settings, users, and SNMP and email alerts using the web interface or RACADM commands.
• IP address blocking • Number of login attempts allowed • Timespan for the lockout failure counts to occur • Lockout penalty time • To enable user blocking feature, use: racadm config -g cfgRacTuning -o cfgRacTuneUserBlkEnable <0|1> • To enable IP blocking feature, use: racadm config –g cfgRacTuning –o cfgRacTuneIPBlkEnable <0|1> • To specify the number of login attempts, use: racadm config –g cfgRacTuning –o cfgRacTuneIpBlkFailCount • To specify the time span within which, lockout fail cou
• You cannot turn on the newly installed servers. • You cannot remotely access existing servers. • Server performance reduces to limit power consumption until management of the CMC is restored. The following are some of the conditions that can result in CMC management loss: • CMC removal — Chassis management resumes after replacing CMC, or after failover to standby CMC.
• From the LCD Language drop-down menu, select the required language. • From the LCD Orientation drop-down menu, select the required mode — Tower Mode or Rack Mode. NOTE: When you configure the chassis by using the LCD wizard, if you select the Auto-Apply settings to newly inserted servers option, you cannot disable the Auto-Apply settings to newly inserted servers function by using a basic license.
3 Logging in to CMC You can log in to CMC as a CMC local user, as a Microsoft Active Directory user, or as an LDAP user. The default user name and password is root and calvin respectively. You can also log in using Single Sign-On or a Smart Card. NOTE: CMC does not support the following special characters as user name or password from chassis profile using XML: " , ! , #, $, %, ^, &, *, (, ), -, _, +, =, ?, {, }, +, &, >, |, .
To log in as a local user, Active Directory user, or LDAP user. 1. In the Username field, type your user name: • CMC user name: • Active Directory user name: \, / or @. • LDAP user name: NOTE: This field is case-sensitive. 2. In the Password field, type the user password. NOTE: For Active Directory user, the Username field is case-sensitive. 3. From the drop-down menu of the Domain field, select the required domain. 4.
Logging in to CMC Using Single Sign-on When Single Sign-On (SSO) is enabled, you can log in to CMC without providing your domain user authentication credentials, such as user name and password. To use this feature, you must have an Enterprise License. NOTE: You cannot use the IP address to log in to the SSO. Kerberos validates your credentials against the Fully Qualified Domain Name (FQDN).
For more information about configuring multiple CMCs, see Configuring Multiple CMCs Using RACADM. Logging in to CMC Using Public Key Authentication You can log in to the CMC over SSH without typing a password. You can also send a single RACADM command as a command line argument to the SSH application. The command line options behave similar to the remote RACADM, because the session ends after the command is completed. Before logging in to CMC over SSH, make sure that the public keys are uploaded.
Changing Default Login Password Using Web Interface When you log in to the CMC web interface, if the Default Password Warning page is displayed, you can change the password. To do this: 1. Select the Change Default Password option. 2. In the New Password field, type the new password. The maximum characters for the password are 20. The characters are masked. The following characters are supported: • 0-9 • A-Z • a-z 3. • Special characters: +, &, ?, >, -, }, |, .
Use case scenarios This section describes typical use cases and tasks that you can perform with Chassis Management Controller Version 2.2 for Dell PowerEdge VRTX. Conversion of External Shared PERC 8 card High Availability to Non-High Availability Mode using Web Interface Dell PowerEdge VRTX chassis must have 2 External Shared PERC 8 cards in PCI slot 5 and PCI slot 6 in HA mode. Workflow 1. Power down chassis. Disconnect all SAS cables from External Shared PERC 8 cards to MD12x0 enclosures. 2.
7. Power Up chassis. 8. External Shared PERC 8 card is not in HighAvailabiltiy Mode and the following command is used to view the status: racadm raid get controllers -o -p HighAvailabilityMode Conversion of External Shared PERC 8 card Non-High Availability to High Availability Mode using RACADM Dell PowerEdge VRTX chassis must have External Shared PERC 8 cards in PCI slot 5 and PCI slot 6. Workflow 1. Power down chassis. Disconnect all SAS cables from External Shared PERC 8 cards to MD12x0 enclosures.
4 Updating Firmware You can update firmware for: • CMC • Chassis infrastructure • VRTX Expander or Storage Backplane Expander Firmware of Inegrated or external enclosures • Physical Disks (HDD) per enclosure NOTE: You can update the HDD firmware only if required.
• Chassis Overview → Update • Chassis Overview → Chassis Controller → Update • Chassis Overview → Server Overview → Server Component Update • Chassis Overview → I/O Module Overview → Update • Chassis Overview → Storage → Storage Component Update The Firmware Update page displays the current version of the firmware for each listed component and allows you to update the firmware to the latest version.
Signed CMC Firmware Image For VRTX CMC 2.0 and later, the firmware includes a signature. The CMC firmware verifies the signature to ensure the authenticity of the uploaded firmware. The firmware update process is successful only if the firmware image is authenticated by CMC to be a valid image from the service provider and has not been altered. The firmware update process is stopped if CMC cannot verify the signature of the uploaded firmware image.
Updating CMC Firmware Using Web Interface NOTE: • Before you update the CMC firmware, make sure that you turn on the chassis, but turn off all the servers in the chassis. • Downgrading the CMC Firmware prior to 2.1 with external shared adapters is blocked. To update the CMC firmware using the CMC web interface: 1. In the left pane, go to any of the following pages: • 2.
2. • Chassis Overview → Chassis Controller → Update. On the Firmware Update page, in the Chassis Infrastructure Firmware section, in the Update Targets column, select the option, and then click Apply Chassis Infrastructure Firmware. 3. On the Firmware Update page, click Browse, and then select the appropriate chassis infrastructure firmware. 4. Click Begin Firmware Update, and then click Yes. The Firmware Update Progress section provides firmware update status information.
NOTE: Additional instructions to follow: • Do not click the Refresh icon or navigate to another page during the file transfer. • To cancel the process, click Cancel File Transfer and Update. This option is available only during file transfer. • The Update State field displays the firmware update status. It may take up to 10 minutes to update the iDRAC firmware.
NOTE: The Single Click all blade update method has the following benefits: • Enables you to update all the components on all the blade servers with minimal clicks. • All the updates are packaged in a directory. This avoids individual upload of each component’s firmware. • Faster and consistent method of updating the server components • Enables you to maintain a standard image with the required updates versions of the server components that can be used to update multiple servers in a single operation.
• For iDRAC servers, on the boot console, to access System Setup, press the key. • On the System Setup Main Menu page, go to iDRAC Settings → Lifecycle Controller, click Enabled. Go to the System Setup Main Menu page and click Finish to save the settings. Canceling System Services enables you to cancel all scheduled jobs that are pending and remove them from the queue.
• Automatic filtering is important for firmware updates of Network Interface Controllers (NIC) and RAID Controllers. These device categories have different types and models. Similarly, the firmware update images (DUP) may be available in optimized forms, where a single DUP may be programmed to update multiple types or models of devices of a given category. Filtering Components for Firmware Updates Using CMC Web Interface To filter the devices: 1.
update and not any other component and device on the server. iDRAC firmware update is not dependent on the Lifecycle Controller service. • If the server is listed as Not Ready, it indicates that when the firmware inventory was retrieved, the iDRAC on the server was still initializing. Wait for the iDRAC to be fully operational, and then refresh the page to retrieve the firmware inventory again.
Saving Chassis Inventory Report Using CMC Web Interface To save the chassis inventory report: 1. In the system tree, go to Server Overview, and then click Update → Server Component Update. The Server Component Update page is displayed. 2. Click Save Inventory Report. The Inventory.xml file is saved on an external system. NOTE: The Dell Repository Manager Application uses the Inventory.xml file as an input to create a repository of updates for all the blades available in the chassis.
• Rollback • Update • Delete Jobs Only one type of operation can be performed at a time. Components and devices that are not supported may be listed as part of the inventory, but do not permit Lifecycle Controller operations. To perform the Lifecycle Controller operations, you must have: • For CMC: Server Administrator privilege. • For iDRAC: Configure iDRAC privilege and Log in to iDRAC privilege. A Lifecycle Controller operation scheduled on a server may take 10 to 15 minutes to complete.
3. In the Rollback Version column, select the option for the component or device for which you want to roll back the firmware. 4. Select one of the following options: 5. • Reboot Now — Restart the server immediately. • On Next Reboot - Manually restart the server at a later time. Click Rollback. The previously installed firmware version is reinstalled for the selected component or device.
6. Select one of the following options: • Reboot Now - Reboot immediately. The firmware update is applied immediately • On Next Reboot - Manually reboot the server at a later time. The firmware update is applied after the next reboot. NOTE: This step is not valid for Lifecycle Controller and 32-bit Diagnostics firmware update. A server reboot is not required for these devices. 7. Click Update. The firmware version is updated for the selected component or device.
NOTE: Click Collapse against a slot to collapse the component and device firmware details for the specific slot. Alternatively, to view all the details again, click Expand. 6. In the Component/Device Firmware Inventory section, select the check box against Select/Deselect All to select all the supported servers. Alternatively, select the check box against the server for which you want to update the server component firmware. You cannot select individual components for the server. 7.
Deleting Scheduled Server Component Firmware Jobs Using the Web Interface To delete scheduled server component firmware jobs: 1. In the left pane, click Server Overview, and then click Update. 2. On the Server Component Update page, filter the component or device (optional). 3. In the Job Status column, if a check box is displayed next to the job status, it implies that a Lifecycle Controller job is in progress and currently in the indicated state. It can be selected for a job-deletion operation. 4.
5 Viewing Chassis Information and Monitoring Chassis and Component Health You can view information and monitor the health of the following: • Active and standby CMCs • All severs and individual servers • IO Module • Fans • Power Supply Units (PSUs) • Temperature sensors • Hard disk drives • LCD assembly • Storage controllers • PCIe devices NOTE: The health of external components impacts the overall health of the storage component with existing storage health and integrated storage compone
Chassis Graphics The chassis is represented by the front and back views (the upper and lower images respectively). Servers, DVDs, HDDs, KVMs, and LCD are shown in the front view and the remaining components are shown in the back view. Component selection is indicated by a blue cast and is controlled by clicking the image of the required component.
Component LCD Assembly Heath and Performance Properties Properties • LCD Health • Chassis Power Button • Chassis Health • Lock Control Panel LCD • LCD Language • LCD Orientation Redundancy Mode • Firmware • CMC Status MAC Address • Standby Firmware • Networking • IPv4 • Last Update • Firmware Update • IPv6 • Hardware • Power State • Name • Server Status • Power Consumption • Model • Launch Remote Console • Health • Service Tag • Launch iDRAC GUI • Power
Power Supply Units Power Status PCIe Devices Fans Blower SPERC Slot External Shared PERC 8 card slot IOM Slot 66 • Size • Type Capacity • View Virtual Disks for this Physical Disk • Power Supply Status • Power Consumption • System Budget • Installed • Model • PCIe Status • Assigned • Server Slot Mapping • PCIe Setup • Vendor ID • Device ID • Slot Type • Allocated Power • Fabric • Power Status • Speed • Warning Threshold • Fans Status • PWM (% of Max) • C
Viewing Server Model Name and Service Tag You can view the model name and service tag of each server instantly using the following steps: 1. In the left pane, under Server Overview tree node, all the servers (SLOT-01 to SLOT-04) appear in the servers list. If a server is not present in a slot, the corresponding image in the graphic is grayed out. When a full height server occupies slot 1 and slot 3, slot 3 will show the slot name as Extension of 1. 2.
The Chassis Health page is displayed. The graphics in the left pane displays the rear, front, and side view of the chassis and contains the health status for the IOM. IOM health status is indicated by the overlay of the IOM sub-graphic. Move the cursor over the individual IOM sub-graphic. The text hint provides additional information about that IOM. Click the IOM sub-graphic to view the IOM information in the right pane. 2. Go to Chassis Overview → I/O Module Overview.
Low, Medium, and High. These settings correspond to a fan speed offset (increase) of 20%, 50%, and 100% of the maximum speed respectively. There are also minimum speeds setup for each option, which are 35% for Low, 65% for Medium, and 100% for High. Using the Medium Fan Offset setting for example, increases the speed of fans 1–6 by 50% of its maximum speed. The increase is above the speed already set by the system for cooling on the basis of installed hardware configuration.
Viewing LCD Information and Health To view the health status of an LCD: 1. In the left pane, click Chassis Overview. The Chassis Health page is displayed. The left pane displays the front view of the chassis. LCD health status is indicated by the overlay of the LCD sub-graphic. 2. Move the cursor over the LCD subgraphic. The corresponding text hint or screen tip provides additional information on the LCD. 3. Click the LCD sub-graphic to view the LCD information in the right pane.
6 Configuring CMC Chassis Management Controller enables you to configure properties, set up users, and alerts to perform remote management tasks. Before you begin configuring the CMC, you must first configure the CMC network settings to allow CMC to be managed remotely. This initial configuration assigns the TCP/IP networking parameters that enable access to the CMC. For more information, see Setting Up Initial Access to CMC. You can configure CMC using Web interface or RACADM.
Viewing and Modifying CMC Network LAN Settings Using CMC Web Interface To view and modify the CMC LAN network settings using CMC Web interface: 1. In the left pane, click Chassis Overview, and then click Network. The Network Configuration page displays the current network settings. 2. Modify the general, IPv4, or IPv6 settings as required. For more information, see the Online Help. 3. Click Apply Changes for each section to apply the settings.
cfgIPv6Address racadm config -g cfgIPv6LanNetworking -o cfgIPv6PrefixLength 64 racadm config -g cfgIPv6LanNetworking -o cfgIPv6Gateway Enabling or Disabling DHCP for the CMC Network Interface Address When enabled, the CMC’s DHCP for NIC address feature requests and obtains an IP address from the Dynamic Host Configuration Protocol (DHCP) server automatically. This feature is enabled by default.
• DNS Domain Name — The default DNS domain name is a single blank character. To set a DNS domain name, type: racadm config -g cfgLanNetworking -o cfgDNSDomainName where is a string of up to 254 alphanumeric characters and hyphens. For example: p45, a-tz-1, r-id-001.
4. In the IP Range Address and IP Range Mask fields, type the range of IP addresses and IP range masks that you want to block from accessing CMC. For more information, see the Online Help. 5. Click Apply to save your settings.
You can also specify both the VLAN ID and the VLAN priority with a single command: racadm setniccfg -v For example: racadm setniccfg -v 1 7 4.
• SSH v2 • SMTP • Kerberos • NTP Client • NFS NOTE: SNMP is not FIPS-compliant. In FIPS mode, all SNMP features except Message Digest algorithm version 5 (MD5) authentication work. Enabling FIPS Mode Using CMC Web Interface To enable FIPS: 1. In the left pane, click Chassis Overview. 2. On the menu bar, click Network. The Chassis Health page is displayed. The Network Configuration page is displayed. 3.
• A new SSL server certificate is uploaded. NOTE: To modify service settings, you must have the Chassis Configuration Administrator privilege. Remote syslog is an additional log target for CMC. After you configure the remote syslog, each new log entry generated by CMC is forwarded to the respective destinations.
To enable or repair the Removable Flash Media using the CMC web interface: 1. In the left pane, go to Chassis Overview, and then click Chassis Controller → Flash Media. 2. On the Removable Flash Media page, from the drop-down menu, select one of the following as appropriate: • Repair active controller media • Stop using flash media for storing chassis data For more information about these options, see the Online Help. 3. Click Apply to apply the selected option.
9. To add a maximum of eight members, complete the tasks in step 4 through step 8. The chassis names of the new members appear in the Members dialog box. NOTE: The credentials entered for a member are passed securely to the member chassis to establish a trust relationship between the member and lead chassis. The credentials are not persisted on either chassis, and are never exchanged again after the initial trust relationship is established.
If a server in a chassis is the required destination: a. Select the image of the destination chassis. b. In the chassis image that appears in the Health section, select the server. c. In the box labeled Quick Links, select the destination device. A new window is displayed with the destination page or login screen. Propagating Leader Chassis Properties to Member Chassis You can apply the properties from the leader to the member chassis of a group. To synchronize a member with the leader properties: 1.
• • The Chassis Group leader chassis and all Chassis Group member chassis must be in Chassis Power State On. All servers in the associated chassis must be turned on.
• BIOS • iDRAC • CPLD • USC • Diagnostics • OS Drivers • RAID • NIC NOTE: The inventory information displayed for the chassis group, member chassis, servers, and server components is updated every time a chassis is added or removed from the group. Viewing Chassis Group Inventory To view the chassis group using CMC web interface, in the left pane, select Group. Click Properties → Firmware Version. The Chassis Group Firmware Version page displays all the chassis in the group.
• Apply, edit, delete, or export a copy of the profiles stored on the network share. Saving Chassis Configuration You can save the current chassis configuration to an XML file on a network share or local management station. The configurations include all the chassis properties that can be modified using the CMC web interface and RACADM commands. You can also use the XML file that is saved to restore the configuration on the same chassis or to configure other chassis.
Viewing Stored Chassis Configuration Profiles To view the chassis configuration profiles stored on the network share, go to the Chassis Configuration Profiles page. In the Chassis Configuration Profiles → Stored Profiles section, select the profile and click View in the View Profile column. The View Settings page is displayed. For more information on the displayed settings, see the CMC Online Help.
When you query a specific CMC card using its group ID and object ID, RACADM creates the racadm.cfg configuration file from the retrieved information. By exporting the file to one or more CMCs, you can configure your controllers with identical properties in a minimal amount of time. NOTE: Some configuration files contain unique CMC information (such as the static IP address) that must be modified before you export the file to other CMCs. 1.
This method allows flexibility when adding indexed entries where you do not need to make exact index matches between all the CMCs being managed. New users are added to the first available index. A .cfg file that parses and runs correctly on one CMC may not run correctly on another, if all indexes are full and you must add a new user. • Use the racresetcfg subcommand to configure both the CMCs with identical properties.
NOTE: A NULL string (identified by two " characters) directs the CMC to delete the index for the specified group. To view the contents of an indexed group, run the following command: racadm getconfig -g -i • For indexed groups the object anchor must be the first object after the [ ] pair.
NOTE: By default, the export is done as clone type. You can use the –—clone to get the clone type profile in XML file. You can export chassis profiles (XML files) from CMC to the network share or to a local management station and import chassis profiles (XML files) from the network share or from a local management station. The import and export operation to and from the network share can be done through local RACADM as well as remote RACADM.
• System Configuration, which is the parent node. • component, which is the primary child node. • Attributes, which contains name and value. You can edit these fields. For example, you can edit the Asset Tag value as follows: PAGE 917 Configuring Servers You can configure the following settings of a server: • Slot Names • iDRAC Network Settings • DRAC Virtual LAN Tag Settings • First Boot Device • Server FlexAddress • Remote File Share • BIOS Settings Using Server Clone Configuring Slot Names Slot names are used to identify individual servers. When choosing slot names, the following rules apply: • Names may contain a maximum of 15 non-extended ASCII characters (ASCII codes 32 through 126).
4. To use the iDRAC DNS name as slot name, select the Use iDRAC DNS Name for Slot Name option. This option replaces the static slot names with the respective iDRAC DNS names, if it is available. If iDRAC DNS names are not available, the default or edited slot names are displayed. NOTE: To use the Use iDRAC DNS Name for Slot Name option, you must have the Chassis Configuration Administrator privilege. 5. To save the settings, click Apply.
Setting Description Confirm iDRAC Root Password Allows you to retype the password provided in the Password field. Enable iDRAC LAN Enables or disables the iDRAC LAN channel. By default, this option is cleared. Enable iDRAC IPv4 Enables or disables IPv4 on iDRAC. By default, this option is selected. Enable iDRAC IPMI over LAN Enables or disables the IPMI over LAN channel for each iDRAC present in the chassis. By default, this option is selected.
3. Click Save QuickDeploy Settings to save the settings. If you have made changes to the iDRAC network setting, click Apply iDRAC Network Settings to deploy the settings to the iDRAC. The QuickDeploy feature only executes when it is enabled, and a server is inserted in the chassis. If Set iDRAC Root Password on Server Insertion and QuickDeploy Enabled are enabled, the user is prompted using the LCD interface to allow or not allow the password change.
The iDRAC Network Settings table reflects future network configuration settings; the values shown for installed servers may or may not be the same as the currently installed iDRAC network configuration settings. Click Refresh to update the iDRAC Deploy page with each installed iDRAC network configuration settings after changes are made.
2. • In the left pane, click Chassis Overview → Server Overview and click Setup → VLAN. On the VLAN Tag Settings page, in the iDRAC section, enable VLAN for the server(s), set the priority and enter the ID. For more information about the fields, see the Online Help. 3. Click Apply to save the settings. Setting First Boot Device You can specify the CMC first boot device for each server. This may not be the actual first boot device for the server, or may not even represent a device present in that server.
Setting First Boot Device For Individual Server Using CMC Web Interface NOTE: To set the first boot device for servers, you must have Server Administrator privileges or Chassis Configuration Administrator privileges and iDRAC login privileges. To set the first boot device for individual servers: 1. In the left pane, click Server Overview, and then click the server for which you want to set the first boot device. 2. Go to Setup → First Boot Device. The First Boot Device page is displayed. 3.
Configuring Profile Settings Using Server Configuration Replication The server configurations replicating feature allows you to apply all profile settings from a specified server to one or more servers. Profile settings that can be replicated are those profile settings which can be modified and are intended to be replicated across servers. The following three profile groups for servers are displayed and can be replicated: • BIOS — This group includes only the BIOS settings of a server.
To add or save a profile: 1. Open the Server Profiles page. In the Server Profiles section, click Apply and Save Profiles. 2. Select the server from whose settings you want to generate the profile, and then click Save Profile. The Save Profile section is displayed. 3. Select Extended Storage or Network Share as the location to save the profile. NOTE: The Network Share option is enabled and the details are displayed in the Stored Profiles section only if the network share is mounted and is accessible.
To import a stored profile from CMC: 1. In the Server Profiles page, in the Stored Profiles section, click Import Profile. The Import Server Profile section is displayed. 2. Click Browse to access the profile from the required location and then click Import Profile. For more information about the fields, see the Online Help. Exporting Profile You can export a stored server profile to a specified file folder path on a management station. To export a stored profile: 1. Go to the Server Profiles page.
Deleting Profile You can delete a server profile that is stored on the CMC nonvolatile media (SD Card) or on the Network Share. To delete a stored profile: 1. In the Server Profiles page, in the Stored Profiles section, select the required profile and then click Delete Profile. A warning message is displayed indicating that deleting a profile would permanently delete the selected profile. 2. Click OK to delete the selected profile. For more information, see the Online Help.
Quick Deploy of Profiles The Quick Deploy feature enables you to assign a stored profile to a server slot. Any server supporting server configuration replication that is inserted into a slot is configured using the profile assigned to that slot. You can perform the Quick Deploy action only if the Action When Server is Inserted option on the Deploy iDRAC page is set to Server Profile option or Quick Deploy and Server Profile option.
enabling it to boot with the operating system and applications of the failed server. The main advantage of this feature is the use of a virtual MAC address pool that is unique and shared across all chassis. This feature allows you to manage server operations online without physical intervention if the server stops functioning. You can perform the following tasks by using the Boot Identity Profiles feature: • Initial setup – Create a range of virtual MAC addresses.
Applying Boot Identity Profiles You can apply boot identity profile settings if the boot identity profiles are available as stored profiles on the network share. To initiate a boot identity configuration operation, you can apply a stored profile to a single server. NOTE: If a server does not support Lifecycle Controller or the chassis is powered off, you cannot apply a profile to the server. To apply a profile to a server, perform the following tasks: 1. Go to the Server Profiles page.
To import a stored profile on to the network share from the management station, perform the following tasks: 1. Go to the Server Profiles page. In the Boot Identity Profiles → Stored Profiles section, click Import Profile. The Import Profile section is displayed. 2. Click Browse to access the profile from the required location and then click Import Profile. For more information, see the CMC Online Help.
4. Click Create MAC Pool to create the MAC address pool. After the MAC address database is created in the network share, the Manage Virtual MAC Address Pool displays the list and status of the MAC addresses that are stored in the network share. This section now enables you to add or remove MAC addresses from the MAC Address Pool. Adding MAC Addresses You can add a range of MAC addresses to the network share by using the Add MAC Addresses option available in the CMC web interface.
• A CMC user who has server administrative privilege, is automatically logged into iDRAC using single sign-on. Once on the iDRAC site, this user is automatically granted Administrator privileges. This is true even if the same user does not have an account on iDRAC, or if the account does not have the Administrator’s privileges. • A CMC user who does NOT have the server administrative privilege, but has the same account on iDRAC is automatically logged into iDRAC using single sign-on.
Launching Remote Console from Server Status Page To launch a remote console for an individual server: 1. In the left pane, expand Server Overview. All the four servers appear in the expanded servers' list. 2. Click the server for which you want to launch the remote console. 3. On the Server Status page, click Launch Remote Console. Launching Remote Console from Servers Status Page To launch a remote console from the Servers Status page: 1.
8 Configuring CMC To Send Alerts You can set alerts and actions for certain events that occur on the chassis. An event is generated when a device or service’s status has changed or an error condition is detected. If an event matches an event filter and you have configured this filter to generate an alert message (email alert or SNMP trap), then an alert is sent to one or more configured destinations such as email address, IP address, or an external server. To configure CMC to send alerts: 1.
• Critical • Warning • Informational The Monitored Alerts section displays the results based on the selected category and severity. For information about the field descriptions on the this page, see the Online Help. 4. Click Apply. Setting Event Alerts Using RACADM To set an event alert, run the eventfilters command. For more information, see the Chassis Management Controller for PowerEdge VRTX RACADM Command Line Reference Guide available at dell.com/support//manuals.
a. To clear all the available alert settings, run the following command: racadm eventfilters set -c cmc.alert.all -n none b. Configure using severity as a parameter. For example, all informational events in storage category are assigned poweroff as action, and email and SNMP as notifications: racadm eventfilters set -c cmc.alert.storage.info -n email,snmp c. Configure using subcategory as a parameter.
Configuring Email Alert Settings Using CMC Web Interface To configure the email alert settings using Web interface: 1. In the left pane, click Chassis Overview → Alerts → E-mail Alert Settings. 2. Specify the SMTP email server settings and the email addresses to receive the alerts. For information about the field descriptions, see the Online Help. 3. Click Apply to save the settings. 4. Click Send under Test E-mail to send a test email to the specified email alert destination.
9 Configuring User Accounts and Privileges You can set up user accounts with specific privileges (role-based authority) to manage your system with CMC and maintain system security. By default, CMC is configured with a local administrator account. The default user name is rootand the password is calvin. As an administrator, you can set up user accounts to allow other users to access the CMC.
Privilege Description NOTE: CMC users with the Chassis Configuration Administrator privilege can configure power settings. However, the Chassis Control Administrator privilege is required to perform chassis power operations, including power on, power off, and power cycle. User Configuration Administrator User can: • • • • Add a new user. Change the password of a user. Change the privileges of a user.
Privilege Description • • • • • Power on Power off Power cycle Graceful shutdown Server Reboot Test Alert User User can send test alert messages. Debug Command Administrator User can execute system diagnostic commands. Fabric A Administrator User can set and configure the Fabric A IOM. Fabric B Administrator User can set and configure the Fabric B, which corresponds to the first mezzanine card in the servers and is connected to the fabric B circuitry in the shared PCIe subsystem in the main board.
User Group Privileges Granted • • None Debug Command Administrator Fabric A Administrator No assigned permissions Table 18.
NOTE: User ID 1 is the root user account that is shipped by default with a CMC. This cannot be changed. 3. Enable the user ID and specify the user name, password, and access privileges for the user. For more information about the options, see the Online Help. 4. Click Apply. The user is created with appropriate privileges. Configure Local Users Using RACADM NOTE: You must be logged in as a root user to execute RACADM commands on a remote Linux system.
racadm config -g cfgUserAdmin -i 2 -o cfgUserAdminEnable 1 To verify that the user was successfully added with the correct privileges, run the following command: racadm getconfig –g cfgUserAdmin –i 2 For more information about the RACADM commands, see the Chassis Management Controller for PowerEdge VRTX RACADM Command Line Reference Guide available at dell.com/support/manuals. Disabling CMC User When using RACADM, users must be disabled manually on an individual-basis.
In Active Directory, a standard group object is used as a role group. A user who has CMC access is a member of the role group. To give this user access to a specific CMC card, the role group name and its domain name need to be configured on the specific CMC card. The role and the privilege level is defined on each CMC card and not in the Active Directory. You can configure up to five role groups in each CMC. The following table shows the default role group privileges. Table 19.
Configuring Active Directory With Standard Schema Using CMC Web Interface NOTE: For information about the various fields, see the CMC Online Help. 1. In the left pane, go to Chassis Overview, and then click User Authentication → Directory Services. The Directory Services page is displayed. 2. Select Microsoft Active Directory (Standard Schema). The settings to be configured for standard schema is displayed on the same page. 3.
qualified domain name> racadm config -g cfgStandardSchema -i -o cfgSSADRoleGroupPrivilege racadm config -g cfgActiveDirectory -o cfgADDomainController1 racadm config -g cfgActiveDirectory -o cfgADDomainController2 racadm config -g cfgActiveDirectory -o cfgADDomainController3
Microsoft's Active Directory, Dell received unique OIDs, unique name extensions, and uniquely linked attribute IDs for the attributes and classes that are added into the directory service. • Dell extension: dell • Dell base OID: 1.2.840.113556.1.8000.1280 • RAC LinkID range: 12070 to 12079 Overview of Schema Extensions Dell has extended the schema to include an Association, Device, and Privilege property.
6. Add Group1 as Members in Association Object 1 (A01), Priv1 as Privilege Objects in A01, and RAC1, RAC2 as RAC Devices in A01. 7. Add User3 as Members in Association Object 2 (A02), Priv2 as Privilege Objects in A02, and RAC2 as RAC Devices in A02. Configuring Extended Schema Active Directory To configure Active Directory to access CMC: 1. Extend the Active Directory schema. 2. Extend the Active Directory Users and Computers Snap-in. 3. Add CMC users and their privileges to Active Directory. 4.
Class Name Assigned Object Identification Number (OID) dellPrivileges 1.2.840.113556.1.8000.1280.1.1.1.4 dellProduct 1.2.840.113556.1.8000.1280.1.1.1.5 Table 21. dellRacDevice Class OID 1.2.840.113556.1.8000.1280.1.7.1.1 Description Represents the Dell RAC device. The RAC must be configured as delliDRACDevice in Active Directory. This configuration enables CMC to send Lightweight Directory Access Protocol (LDAP) queries to Active Directory.
OID 1.2.840.113556.1.8000.1280.1.1.1.4 SuperClasses User Attributes dellRAC4Privileges Table 25. dellProduct Class OID 1.2.840.113556.1.8000.1280.1.1.1.5 Description The main class from which all Dell products are derived. Class Type Structural Class SuperClasses Computer Attributes dellAssociationMembers Table 26.
Assigned OID/Syntax Object Identifier Single Valued Description: TRUE if the user has Server Reset rights on the device. OID: 1.2.840.113556.1.8000.1280.1.1.2.7 Boolean (LDAPTYPE_BOOLEAN 1.3.6.1.4.1.1466.115.121.1.7) Attribute: dellIsTestAlertUser TRUE Description: TRUE if the user has Test Alert User rights on the device. OID: 1.2.840.113556.1.8000.1280.1.1.2.10 Boolean (LDAPTYPE_BOOLEAN 1.3.6.1.4.1.1466.115.121.1.
Adding CMC Users And Privileges To Active Directory Using the Dell-extended Active Directory Users and Computers Snap-in, you can add CMC users and privileges by creating RAC device, association, and privilege objects. To add each object, perform the following: • Create a RAC device Object • Create a Privilege Object • Create an Association Object • Add objects to an Association Object Creating RAC Device Object To create RAC device object: 1.
Adding Privileges To add privileges: 1. Select the Privileges Object tab and click Add. 2. Enter the privilege object name and click OK. Click the Privilege Object tab to add the privilege object to the association that defines the user’s or user group’s privileges when authenticating to an RAC device. Only one privilege object can be added to an Association Object. Adding RAC Devices Or RAC Device Groups To add RAC devices or RAC device groups: 1. Select the Products tab and click Add. 2.
9. Log in to the CMC Web interface. 10. Select Chassis in the system tree, click the Network tab, and then click the Network subtab. The Network Configuration page is displayed. 11. If Use DHCP for CMC Network Interface IP Address is enabled, do one of the following: • Select Use DHCP to Obtain DNS Server Addresses to enable the DHCP server to obtain the DNS server addresses automatically.
For information about the privileges level of the role groups and the default role group settings, see Types of Users. Configuring the Generic LDAP Directory to Access CMC The CMC's Generic LDAP implementation uses two phases in granting access to a user—user authentication, and then the user authorization. Authentication of LDAP Users Some directory servers require a bind before a specific LDAP server can be searched for. To authenticate a user: 1. Optionally bind to the Directory Service.
5. In the Group Settings section, click a Role Group. 6. On the Configure LDAP Role Group page, specify the group domain name and privileges for the role group. 7. Click Apply to save the role group settings, click Go Back To Configuration page, and then select Generic LDAP. 8. If you have selected Certificate Validation Enabled option, then in the Manage Certificates section, specify the CA certificate to validate the LDAP server certificate during SSL handshake and click Upload.
10 Configuring CMC For Single Sign-On Or Smart Card Login This section provides information to configure CMC for Smart Card login and Single Sign-On (SSO) login for Active Directory users. SSO uses Kerberos as an authentication method allowing users, who have signed in as an automatic- or single sign-on to subsequent applications such as Exchange.
Prerequisites For Single Sign-On Or Smart Card Login The pre-requisites to configure SSO or Smart Card logins are: • Set up the kerberos realm and Key Distribution Center (KDC) for Active Directory (ksetup). • A robust NTP and DNS infrastructure to avoid issues with clock drift and reverse lookup. • Configure CMC with Active Directory standard schema role group with authorized members.
3. Click Sites. The Local Intranet dialog box is displayed. 4. Click Advanced . The Local Intranet Advance Settings dialog box is displayed. 5. In the Add this site to the zone, type the name of CMC and the domain it belongs to and click Add. NOTE: You can use a wildcard (*) to specify all devices or users in that domain. Mozilla Firefox 1. In Firefox, type about:config in the Address bar. NOTE: If the browser displays the This might void your warranty warning, click I'll be careful. I promise. 2.
You can upload a Kerberos Keytab generated on the associated Active Directory Server. You can generate the Kerberos Keytab from the Active Directory Server by executing the ktpass.exe utility. This keytab establishes a trust relationship between the Active Directory Server and CMC. To upload the keytab file: 1. In the left pane, click Chassis Overview → User Authentication → Directory Services. 2. Select Microsoft Active Directory (Standard Schema). 3.
11 Configuring CMC to Use Command Line Consoles This section provides information about the CMC command line console (or serial/Telnet/Secure Shell console) features, and explains how to set up the system so that you can perform systems management actions through the console. For information about using the RACADM commands in CMC through the command line console, see the Chassis Management Controller for PowerEdge VRTX RACADM Command Line Reference Guide.
Using SSH With CMC SSH is a command line session that includes the same capabilities as a Telnet session, but with session negotiation and encryption to improve security. CMC supports SSH version 2 with password authentication. SSH is enabled on the CMC by default. NOTE: CMC does not support SSH version 1. When an error occurs during the CMC login, the SSH client issues an error message. The message text is dependent on the client and is not controlled by CMC.
over SSH is set up and used correctly, you need not enter username or passwords to log in to the CMC. This can be very useful to set up automated scripts to perform various functions. NOTE: There is no GUI support for managing this feature, you can use only the RACADM. When adding new public keys, make sure that the existing keys are not already at the index, where the new key is added. CMC does not perform checks to ensure previous keys are deleted before a new one is added.
–c allows modifying the public key comment and is optional. The is optional. After the command completes, use the public file to pass to the RACADM for uploading the file. RACADM Syntax Notes for CMC When using the racadm sshpkauth command, ensure the following: • For the –i option, the parameter must be svcacct. All other parameters for -i fail in CMC. The svcacct is a special account for public key authentication over SSH in CMC. • To log in to the CMC, the user must be service.
Configuring Minicom Version 2.0 NOTE: For best results, set the cfgSerialConsoleColumns property to match the number of columns. Be aware that the prompt consumes two characters. For example, for an 80-column terminal window: racadm config –g cfgSerial –o cfgSerialConsoleColumns 80. 1. If you do not have a Minicom configuration file, go to the next step. If you have a Minicom configuration file, type minicom, and then go to step 12. 2.
NOTE: The connect command provides the –b (binary) option. The –b option passes raw binary data, and cfgSerialConsoleQuitKey is not used. Additionally, when connecting to a server using the CMC serial console, transitions in the DTR signal (for example, if the serial cable is removed to connect a debugger) will not result in you exiting the application. NOTE: If the IOM does not support console redirection, the connect command displays an empty console.
The managed system restarts. Configuring Windows for Serial Console Redirection There is no configuration necessary for servers running the Microsoft Windows Server versions, starting with Windows Server 2003. Windows receives information from the BIOS, and enable the Special Administration Console (SAC) console one COM1. Configuring Linux for Server Serial Console Redirection During Boot The following steps are specific to the Linux GRand Unified Bootloader (GRUB).
The example shows console=ttyS1,57600 added to only the first option. Configuring Linux for Server Serial Console Redirection After Boot Edit the /etc/inittab file as follows: Add a new line to configure agetty on the COM2 serial port: co:2345:respawn:/sbin/agetty -h -L 57600 ttyS1 ansi The following example shows the file with the new line. # # inittab This file describes how the INIT process # should set up the system in a certain # run-level.
# xdm is now a separate service x:5:respawn:/etc/X11/prefdm -nodaemon Edit the /etc/securettyfile as follows: Add a new line, with the name of the serial tty for COM2: ttyS1 The following example shows a sample file with the new line.
12 Using FlexAddress and FlexAdress Plus This section provides information about FlexAddress, FlexAddress Plus, and configuring. NOTE: An Enterprise License must be installed on the CMC to use the Flexaddress feature. About FlexAddress If a server is replaced, the FlexAddress for the slot remains the same for the given server slot. If the server is inserted in a new slot or chassis, the server-assigned WWN/MAC is used unless that chassis has the FlexAddress feature enabled for the new slot.
Wide Name/Media Access Control (WWN/MAC) addresses to Fibre Channel and Ethernet devices. Chassis assigned WWN/MAC addresses are globally unique and specific to a server slot. Viewing FlexAddress Activation Status A Feature Card contains one or more of the following features: FlexAddress, FlexAddress Plus, and/or Extended Storage. To view the chassis FlexAddress status using the CMC web interface, click Chassis Overview → Setup. The General Chassis Settings page is displayed.
Feature Name = ExtendedStorage Current Status = redundant, active Date/time Activated = 05 Oct 2013 - 11:50:58 Feature installed from SD-card serial number = CN0H871T1374036T00MXA00 If there are no active features on the chassis, the command returns a message: racadm feature -s No features active on the chassis Dell Feature Cards may contain more than one feature.
NOTE: Note the following: 4. • If a slot is not selected, FlexAddress is not enabled for the selected fabric. • When none of the fabrics are selected and a server slot is selected and applied, the following message is displayed No fabrics selected! FlexAddress will not be used on this chassis. Select both the fabric and the slot to successfully configure FlexAddress. • Configuring Flexaddress for slave slot is not allowed. The option is greyed out in the CMC Web interface.
NOTE: – Fabric A displays the type of the Input/Output fabric installed. If Fabric A is enabled, unpopulated slots display chassisassigned MAC addresses for Fabric A. – iDRAC management controller is not a fabric, but its FlexAddress is considered as a fabric. – IF the check box associated with a component is selected, it implies that the fabric is enabled for FlexAddress or FlexAddressPlus. • Protocol that is being used on the NIC Adapter port. For example, LAN, ISCI, and FCoE.
9. From the Partition Status drop-down menu, select the status of the partitions to display servers with the selected partition status. For information about the fields, see the Online Help. Viewing Advanced WWN/MAC Address Information Using Web Interface To view WWN/MAC Address Information for each server slot or all servers in a chassis, in the advanced mode: 1. Click Server Overview → Properties → WWN/MAC The WWN/MAC Summary page displays the WWN/MAC Address Information. 2.
To display the user-defined MAC and WWN address, use the following RACADM command: racadm getmacaddress -c io-identity racadm getmacaddress -c io-identity -m server -2 To display the console assigned MAC/WWN of all LOMs or mezzanine cards, use the following RACADM command: racadm getmacaddress -c all To display the chassis assigned WWN/MAC address, use the following RACADM command: racadm getmacaddress -c flexaddress To display the MAC/WWN addresses for all LOMs or mezzanine cards, use the following RACADM
Situation Command Output Guest user tries to deactivate the feature on the chassis. $racadm feature -d -c flexaddress ERROR: Insufficient user privileges to perform operation Changing the slot/fabric FlexAddress settings while the server modules are powered ON. $racadm setflexaddr -i 1 1 ERROR: Unable to perform the set operation because it affects a powered ON server Changing the Flexaddress settings of slot or fabric, when the CMC Enterprise License is not installed.
Dell, at your cost and risk. This limited warranty is void if any disk damage has resulted from accident, abuse, misapplication, or service or modification by someone other than Dell. Any replacement disk is warranted for the remaining original warranty period or thirty (30) days, whichever is longer. Dell does NOT warrant that the functions of the Software meets your requirements or that operation of the Software is uninterrupted or error free.
13 Managing Fabrics The chassis supports a fabric type, which is Fabric A. Fabric A is used by the single I/O Module, and is always connected to the onboard Ethernet adapters of the servers. The chassis has only one I/O module (IOM), where the IOM is a pass-through or switch module. The I/O Module is classified as group A. Chassis IOM uses a discrete data path called Fabric, and it is named A. The Fabric A supports only Ethernet.
On the Configure I/O Module Network Settings page, type appropriate data, and then click Apply. 2. If allowed, type the root password, SNMP RO Community string, and Syslog Server IP Address for the IOM. For more information about the field descriptions, see the Online Help. NOTE: The IP address set on the IOM from CMC is not saved to the permanent startup configuration of the switch.
14 Managing and Monitoring Power The PowerEdge VRTX chassis is the most power-efficient modular server enclosure. It is designed to include highly efficient power supplies and fans, has an optimized layout for the air to flow more easily through the system, and contains power-optimized components throughout the enclosure.
When you configure a system for Grid redundancy, the PSUs are divided into grids: PSUs in slots 1 and 2 are in the first grid while PSUs in slots 3 and 4 are in the second grid. CMC manages power so that if there is a failure of either grid, the system continues to operate without any degradation. Grid redundancy also tolerates failures of individual PSUs.
NOTE: In a two PSU configuration modes, server load may prevent any PSU from changing to the Standby mode. • In a Power Supply Redundancy configuration, in addition to the PSUs required to power the enclosure, the enclosure always keeps an additional PSU powered on and marked Online. Power utilization is monitored and one PSU can be moved to Standby state on the basis of overall system load. In a four PSU configuration, a minimum of two PSUs are always turned on.
servers that communicate to the chassis through an iDRAC. For more information, see the iDRAC User’s Guide at dell.com/ support/manuals. iDRAC provides CMC with its power envelope requirements before powering up the server. The power envelope consists of the maximum and minimum power requirements necessary to keep the server operating. iDRAC’s initial estimate is based on its initial understanding of components in the server.
server modules is powered on first. These higher priority servers get their maximum power allocation, while lower priority servers may be not be allocated enough power to run at their maximum performance or they may not even power on at all, depending on how low the system input power cap is set and the server power requirements.
AC Power Recovery If the AC power supply of a system is disrupted, the chassis is restored to the previous power state before the AC power loss. The restoration to the previous power state is the default behavior.
• CMC does not support automated power-down of a low-priority server to allow turning-on of a higher priority server; however, you can perform user-initiated turn-offs. • Changes to the PSU redundancy policy are limited by the number of PSUs in the chassis. You can select any of the two PSU redundancy configuration settings listed in Default Redundancy Configuration.
Table 36. SEL Events for Power Supply Changes Power Supply Event System Event Log (SEL) Entry Insertion Power supply is present. Removal Power supply is absent. AC input received The power input for power supply has been restored. AC input lost The power input for power supply is lost. DC output produced Power supply is operating normally. DC output lost Power supply failed.
• Maximum conservation mode is enabled. • An automated command line script, issued by a UPS device, enables maximum conservation mode. In maximum power conservation mode, all servers start functioning at their minimum power levels, and all subsequent server power allocation requests are denied. In this mode, the performance of powered on servers may be degraded. Additional servers cannot be powered on, regardless of server priority.
After the Server Based Power Management Mode is enabled, the chassis is prepared for PM3 management. All supported VRTX server priorities are set to 1 (High). PM3 manages the server power and priorities directly. Since PM3 controls compatible server power allocations, CMC no longer controls the Maximum Power Conservation Mode. Hence, this selection is disabled. When the Maximum Power Conservation Mode is enabled, the CMC sets the System Input Power Capacity to the maximum that the chassis can handle.
• To enable or disable dynamic PSU engagement, type: racadm config -g cfgChassisPower -o cfgChassisDynamicPSUEngagementEnable where is 0 (disable), 1 (enable). The default is 0.
Executing Power Control Operations on the Chassis Using Web Interface To execute power control operations on the chassis using the CMC web interface: 1. In the left pane, click Chassis Overview → Power → Control. The Chassis Power Control page is displayed. 2. Select one of the following power control operations. For information about each option, see the Online Help. 3.
Executing Power Control Operations on the IOM You can remotely reset or turn on an IOM. NOTE: To perform power management actions, you must have the Chassis Configuration Administrator privilege. Executing Power Control Operations on IOM Using CMC Web Interface To execute power control operations on the I/O Module: 1. In the left pane, click Chassis Overview → I/O Module Overview → Power. 2.
15 Managing Chassis Storage On the Dell PowerEdge VRTX, you can perform the following operations: • View the status of physical disks drives and storage controllers. • View the properties of controllers, physical disk drives, virtual disks, and enclosures. • Set up controllers, physical disk drives, and virtual disks. • Assign virtual adapters. • Troubleshoot controller, physical disk drives, and virtual disks. • Update storage components.
Viewing Fault-tolerant Troubleshooting Information of SPERC Using CMC Web Interface To view the attributes that indicate the correct functioning of fault-tolerant features of a SPERC: 1. In the left pane, click Chassis Overview → Storage → Troubleshooting → Setup Troubleshooting. The Storage Setup Troubleshooting page is displayed. 2.
– The server slot is empty or the server in the slot is turned off. – The VA is unmapped from a server or a slot. – All affected servers are powered off. • Virtual disks are created and they are assigned as Virtual Adapter 1, Virtual Adapter 2, Virtual Adapter 3, or Virtual Adapter 4. For more information, see Applying Virtual Adapter Access Policy to Virtual Disks. NOTE: • You can map only one virtual adapter to one server at a time.
mode prevent disruption of storage services and automatically take over the services of a component that has stopped functioning. Performance remains consistent throughout this failover process since the redundant components(controllers) are not used during normal operating conditions. High Availability with fault-tolerance provides the following benefits: • Provides uptime for all storage applications even when a controller stops functioning.
NOTE: If the Controllers are in fault-tolerant mode, then the following information regarding the fault-tolerant status and mode is also displayed: • Fault Tolerant Mode – Shared, Active/Passive • Fault Tolerant Status – Healthy/Normal, or Lost/Degraded • Peer Controller - Indicates the name of controller that acts as the peer (stand-by) in case of a fault-tolerant mode supported by two controllers NOTE: If the peer controller is disabled, the name is displayed as Disabled PERC (Integrated 2) or Disab
The newly set properties are applied to the selected controllers and the Current Value field displays the updated values for the attributes. Configuring Storage Controller Settings Using RACADM To set up the storage controller by running a RACADM command, use the following syntax. racadm raid ctrlprop:RAID.ChassisIntegrated.
NOTE: To prevent loss of data, before performing controller enable or disable operations: • Complete all data operations such as Rebuild or Copy Back. • Make sure that the data volumes are in optimal state. NOTE: While enabling the second PERC adapter, a warning message is displayed and the fault-tolerant status is degraded if: • Any of the PERC adapter settings are changed. • Firmware is updated.
NOTE: – For a disabled PERC, none of the other options Reset Configuration, Export TTY Log, Discard Pinned Cache, and Disable RAID Controller are available in the drop-down menu. – By default the two integrated shared storage adapters are detected with high availability mode. – You must enable Fault Tolerance mode on the external shared controller after it is cabled. – Enable Fault Tolerance and Disable Fault Tolerance are displayed only for the External Shared PERC 8 cards.
Viewing Physical Disk Drives Properties Using RACADM To view the properties of physical disk drives using RACADM, run the command racadm raid get pdisks —o For more information, see the Chassis Management Controller for PowerEdge VRTX RACADM Command Line Reference Guide.
Creating Virtual Disk Using CMC Web Interface By default, CMC creates virtual disks without initializing them. However, you can choose the fast-initialization option for virtual disks that are created without initialization. The fast-initialization process clears the first and last 8 MB of the virtual disk, deleting all boot records or partition information. You must have the Chassis Configuration Administrator privilege to perform fast-initialization.
Modifying Encryption Key Identifier Using CMC Web Interface You can modify the encryption key identifier and passphrase for controllers. To modify an encryption key identifier and passphrase: 1. In the left pane, go to Storage → Controllers → Setup. 2. From the Security Key drop-down, select Modify Security Key. A pop-up window is displayed. 3. Enter the new encryption key identifier and existing and new passphrases, and click OK. 4. On the Controller Setup page, click Apply.
NOTE: The Encrypt Virtual Disk option is available only if unsecure virtual disks are configured in the SED. Encrypting Virtual Disks Using RACADM To encrypt virtual disks by running a RACADM command, use the following syntax: racadm raid encryptvd:Disk.Virtual.0:RAID.ChassisIntegrated.1-1 For more information, see the Chassis Management Controller PowerEdge VRTX RACADM Command Line Reference Guide. Unlocking Foreign Configuration Drives which are part of secure virtual disks are called secured drives.
Performing Cryptographic Erase If the physical disk is part of a virtual disk, remove it from the virtual disk before performing cryptographic erase. To perform a cryptographic erase: 1. In the left pane, go to Storage → Physical Disks → Setup. The Configure Physical Disks page is displayed. 2. Select the physical disk from which you want to erase the data. 3. From the Physical Disk Actions drop-down, select Cryptographic Erase and click Apply.
EMM communicates enclosure attributes and states to the host server. The EMM modules monitor the following components of the enclosure: • Fans • Power supplies • Temperature probes • Insertion or removal of a physical disk • LEDs on the enclosure Viewing EMM Status and attributes EMM status displays the health of the EMM. EMMs contain a status value that is unique from the enclosure. You can have up to two EMMs. Enclosure firmware creates a status for each EMM.
Setting Asset Tag and Asset Name of the Enclosure To identify the enclosures, set the asset name and asset tag of the enclosures. NOTE: • Error is displayed if you enter an invalid value. • Initially the value which is saved in the firmware is displayed. • You must have Chassis Configuration Privileges to set asset tag and asset name of the enclosure. • You can set Asset Tag and Asset Name only for external enclosures.
Click Chassis Overview → Storage → Enclosures → Setup. Select the enclosure from the Enclosure drop-down menu, then enter the appropriate values for minimum and maximum for warning threshold temperatures of temp sensor 2 and 3. Type the Asset tag and Asset name in the appropriate fields, and then click Apply. For more information, see the CMC Online Help.
16 Managing PCIe Slots By default, all slots are unmapped. You can do the following: • View the status of all PCIe Slots in the chassis. • Assign or remove an assigned PCIe slot from the servers. Consider the following before assigning a PCIe slot to a server: • An empty PCIe slot cannot be assigned to a server that is turned on. • A PCIe slot with an adapter assigned to a server cannot be assigned to another server if the currently-assigned server (source) is turned on.
• In the left pane, click Chassis Overview → PCIe Overview → Setup → Mapping: PCIe Slots to Server Slots. On the Mapping: PCIe Slots to Server Slots page, in the Action column, from the Action drop-down menu, select the appropriate server name, and then click Apply. Note the following: • Without a license, the maximum number of PCIe slots that maybe mapped to a half-height server is two.
• The Server nodes are turned on quickly, thus turning on the PCIe cards quickly. • The powered state of PCIe cards is extended for a pre-defined time period in the following scenarios: – After the associated server is turned off. – After adapter discovery process is completed. NOTE: At the end of the time period, the PCIe cards power-down. All adapters in ride-through are also powered down whenever the chassis door is opened.
• To reset the Ride-through timeout property, run the command, racadm setpciecfg ridethru –t • To set the acceptable timeout range, run the command, racadm setpciecfg help ridethru For more information, see the Chassis Management Controller for PowerEdge VRTX RACADM Command Line Reference Guide.
17 Troubleshooting and Recovery This section explains how to perform tasks related to recovering and troubleshooting problems on the remote system using the CMC web interface. • Viewing chassis information. • Viewing the event logs. • Gathering configuration information, error status, and error logs. • Using the diagnostic console. • Managing power on a remote system. • Managing Lifecycle Controller jobs on a remote system. • Reset components.
• Sensor information • Firmware build information Supported Interfaces • CLI RACADM • Remote RACADM • Telnet RACADM racdump includes the following subsystems and aggregates the following RACADM commands. For more information about racdump, see the RACADM Command Line Reference Guide for CMC in PowerEdge VRTX.
Power Troubleshooting The following information helps you to troubleshoot power supply and power-related issues: • Problem: Configured the Power Redundancy Policy to Grid Redundancy, and a Power Supply Redundancy Lost event was raised. – Resolution A: This configuration requires at least one power supply in side 1 (the left two slots) and one power supply in side 2 (the right two slots) to be present and functional in the modular enclosure.
– Resolution: This can occur if the System Input Power Cap has been configured to a value that results in an increased power need by fans having to be made up by reduction in the power allocation to the servers. User can increase the System Input Power Cap to a higher value that allow for additional power allocation to the fans without an impact on server performance. Troubleshooting Alerts Use the CMC log and the trace log to troubleshoot CMC alerts.
To clear the hardware log, type: racadm clrsel Viewing Chassis Log CMC generates a log of the chassis-related events. CMC provides alert capabilities through System Event Log (SEL), SNMP, and Email interfaces. SPERC is inserted while one or more PowerEdge serves are powered on. NOTE: • To clear the chassis log, you must have the Clear Logs Administrator privilege.
For more information, see the Online Help. This operation causes the servers to behave as if they were removed and reinserted. Saving or Restoring Chassis Configuration This is a licensed feature. To save or restore a backup of the Chassis configuration using the CMC Web interface: 1. In the left pane, click Chassis Overview → Setup → Chassis Backup. The Chassis Backup page is displayed. To save the chassis configuration, click Save. Override the default file path (optional) and click OK to save the file.
If the NTP server IP address is not configured, you may see a trace log entry similar to the following: Jan 8 19:59:24 cmc ntpd[1423]: Cannot find existing interface for address 1.2.3.4 Jan 8 19:59:24 cmc ntpd[1423]: configuration of 1.2.3.
Component IOM (Pass through) Blower PSU Enclosure LED Color, Blinking Pattern Status Amber, glowing steadily Not used Amber, blinking Fault Blue, dark No fault/stack slave Green, glowing steadily Turned on Green, blinking Not used Green, dark Powered off Blue, glowing steadily Normal Blue, blinking User-enabled module identifier Amber, glowing steadily Not used Amber, blinking Fault Blue, dark No fault Green, glowing steadily Fan working Green, blinking Not used Green, dark
– Verify that you have AC present to at least one power supply. – Verify that the CMC card is seated properly. You can release or pull the ejector handle, remove the CMC, reinstall the CMC making sure that the board is inserted all the way and the latch closes correctly. • Lower-left LED — This LED is multi-colored. When CMC is active and running, and there are no problems, the bottom LED is blue. If it is amber, a fault is detected.
Troubleshooting Network Problems The integrated CMC trace log allows you to debug CMC alerts and networking. You can access the trace log using the CMC Web interface or RACADM. See the gettracelog command section in the Chassis Management Controller for PowerEdge VRTX RACADM Command Line Reference Guide. The trace log tracks the following information: • DHCP — Traces packets sent to and received from a DHCP server. • DDNS — Traces dynamic DNS update requests and responses.
Power cycle the chassis after disconnecting the enclosures and before reconnecting enclosures as, the drives retain the previous SCSI-3 Reservation until the chassis is power cycled.
18 Using LCD Panel Interface You can use the LCD panel on the chassis to perform configuration and diagnostics, and to obtain status information about the chassis and its contents. The following figure illustrates the LCD panel. The LCD screen displays menus, icons, pictures, and messages. Figure 4. LCD Display 1. LCD screen 3. Scroll buttons (4) 2.
Skip/Next — Highlight and press the center button to skip any changes and go to the next screen. No — Highlight and press the center button to answer "No" to a question and go to the next screen. Component Identify — Blinks the blue LED on a component. NOTE: There is a blinking blue rectangle around this icon when Component Identify is enabled. A status indicator LED on the LCD panel provides an indication of the overall health of the chassis and its components. • Solid blue indicates good health.
• Enclosure Status Use the navigation buttons to highlight the desired item (highlight the Back icon to return to the Main Menu), and then press the center button. The selected screen is displayed. IP Summary Menu The IP Summary screen displays the IP information about the CMC (IPv4 and IPv6), and each server that is installed on the chassis. Use the up and down arrow buttons to scroll through the list. Use the left and right arrow buttons to scroll selected messages that are longer than the screen.
By following the amber icons through the LCD menu system, you can display the status screen and error messages for the item that has the issue. Error messages on the LCD panel can be removed by removing the module or server that is the cause of the issue, or by clearing the hardware log for the module or server. For server errors, use the iDRAC web interface or command line interface to clear the server’s System Event Log (SEL).
Item Description PSU redundancy mode Non-Redundant, Grid Redundant, or DC Redundant. Table 41. Fan Status Item Description Name/Location Example: Fan1, Fan2, and so on. Error Messages If there are no errors, No Errors is displayed. Else, error messages are listed where critical ones are first listed, and then the warning-related. RPM Current fan speed in RPM. Table 42. PSU Status Item Description Name/Location Example: PSU1, PSU2, and so on.
Table 45. DVD Mapping Status Item Description Server Displays a list of servers to which the DVD can be mapped. Error Messages If there are no errors, No Errors is displayed. Else, error messages are listed where critical ones are first listed, and then the warning-related. Mapped Displays a list of servers mapped to a DVD, if any. Slot Indicates the server slot to which the DVD is mapped to. Possible values are SLOT<01 to 04>.
Table 49. Hard Disk Drive Status Item Description Hard Disk Drive: Displays the Hard disk drive name in the format Hard Disk Drive , where 'n' is the hard drive number. Example: Hard Disk Drive 1, Hard Disk Drive 2, and so on. Error Messages If there are no errors, No Errors is displayed. Else, error messages are listed where critical ones are first listed, and then the warning-related.
• Option “Custom” = Allows you to enter a string name for the server. The information is displayed only if iDRAC has completed booting. For more information on this feature, see the RACADM Command Line Reference Guide for CMC in PowerEdge VRTX.
19 Frequently Asked Questions This section lists the frequently asked questions about the following: • RACADM • Managing and Recovering a Remote System • Active Directory • FlexAddress and FlexAddressPlus • IOM RACADM After performing a CMC reset (using the RACADM racreset subcommand), when a command is entered, the following message is displayed: racadm Transport: ERROR: (RC=-1) What does this message mean? Another command must be issued only after CMC completes the reset.
• • The cfgRacTuneHttpsPort property is changed (including when a config -f changes it). racresetcfg is used or a chassis configuration backup is restored. • • CMC is reset. A new SSL server certificate is uploaded. My DNS server doesn’t register my CMC? Some DNS servers only register names with a maximum of 31 characters. When accessing the CMC Web interface, a security warning stating that the SSL certificate was issued by a certificate authority that is not trusted is displayed.
The Dell-extended Active Directory Users and Computers Snap-In checks the mode and limits users in order to create objects across domains, if in a mixed mode. Does using CMC with Active Directory support multiple domain environments? Yes. The domain forest function level must be in Native mode or Windows 2003 mode. In addition, the groups among Association Object, RAC user objects, and RAC Device Objects (including Association Object) must be universal groups.
A feature card in the active CMC is active and installed in the chassis. The second card is ignored by CMC. Does the SD card have a write-protection lock on it? Yes it does. Before installing the SD card into the CMC module, verify the write protection latch is in the unlock position. The FlexAddress feature cannot be activated if the SD card is write protected. In this situation, the $racadm feature -s command returns this message: No features active on the chassis.