Dell Chassis Management Controller Version 3.
Notes, cautions, and warnings NOTE: A NOTE indicates important information that helps you make better use of your product. CAUTION: A CAUTION indicates either potential damage to hardware or loss of data and tells you how to avoid the problem. WARNING: A WARNING indicates a potential for property damage, personal injury, or death. Copyright © 2017 Dell Inc. or its subsidiaries. All rights reserved. Dell, EMC, and other trademarks are trademarks of Dell Inc. or its subsidiaries.
Contents 1 Overview........................................................................................................................ 14 What is new in this release................................................................................................................................................15 Key Features.....................................................................................................................................................................
Launching CMC Using Other Systems Management Tools.........................................................................................33 Downloading and Updating CMC Firmware...................................................................................................................... 33 Setting Chassis Physical Location and Chassis Name.......................................................................................................
4 Updating Firmware........................................................................................................46 Downloading CMC Firmware............................................................................................................................................46 Viewing Currently Installed Firmware Versions..................................................................................................................
Viewing Chassis Summary................................................................................................................................................66 Viewing Chassis Controller Information and Status.......................................................................................................... 66 Viewing Information and Health Status of All Servers.......................................................................................................
Saving Server Inventory Report.................................................................................................................................. 81 Chassis Group Inventory and Firmware Version..........................................................................................................82 Viewing Chassis Group Inventory ..............................................................................................................................
Exporting Profile.........................................................................................................................................................99 Editing Profile........................................................................................................................................................... 100 Deleting Profile....................................................................................................................................................
Configuring the Generic LDAP Directory to Access CMC......................................................................................... 128 Configuring Generic LDAP Directory Service Using CMC Web Interface.................................................................. 128 Configuring Generic LDAP Directory Service Using RACADM.................................................................................. 129 10 Configuring CMC For Single Sign-On Or Smart Card Login.............................
Viewing WWN or MAC Address Information Using RACADM......................................................................................... 148 Command Messages...................................................................................................................................................... 149 FlexAddress DELL SOFTWARE LICENSE AGREEMENT................................................................................................ 150 13 Managing Fabrics................................
Executing Power Control Operations.............................................................................................................................. 164 Executing Power Control Operations on the Chassis................................................................................................ 164 Executing Power Control Operations on the Chassis Using Web Interface...............................................................
Encrypting Virtual Disks Using RACADM...................................................................................................................178 Unlocking Foreign Configuration..................................................................................................................................... 178 Unlocking Foreign Configuration Using CMC Web Interface.....................................................................................
Obtain Recovery Information from DB-9 Serial Port................................................................................................. 195 Recovering Firmware Image......................................................................................................................................195 Troubleshooting Network Problems................................................................................................................................ 196 Troubleshooting Controller.......
1 Overview The Dell Chassis Management Controller (CMC) for Dell EMC PowerEdge VRTX is a Systems Management hardware and software solution for managing the PowerEdge VRTX chassis. The CMC has its own microprocessor and memory and is powered by the modular chassis into which it is plugged.
What is new in this release This release of CMC for Dell EMC PowerEdge VRTX supports: • Displaying fan speed and temperature information using WSMan. • Integrating the LLDP opensource daemon to forward the LLDP packets to iDRAC through VLAN. • Transferring CMC dumplogs to iDRAC. • Unlocking secure foreign configuration using the CMC web interface. • Displaying wear gauge details of Solid State Drives (SSDs). Key Features The CMC features are grouped into management and security features.
• Configure storage components on the chassis. • Map PCIe slots to the servers and their identification. Security Features The CMC provides the following security features: • Password-level security management — Prevents unauthorized access to a remote system. • Centralized user authentication through: – Active Directory using Standard Schema or an Extended Schema (optional). – Hardware-stored user IDs and passwords.
Item Indicator, Button, or Connector 5 Status/identification indicator (CMC 2) A Back Panel view of the chassis is given here with a table that lists the parts and devices available in the CMC. Figure 2. CMC back panel Table 2.
Figure 3. Front-Panel Features And Indicators—3.5 Inch Hard Disk Drive Chassis Table 3. Front panel — features and indicators Item Indicator, Button, or Connector Description 1 USB connectors (2) Allows a keyboard and mouse to be connected to the system. 2 LCD panel Provides system information and status, and error messages to indicate when the system is operating correctly or when the system needs attention. 3 LCD menu scroll buttons (4) Moves the cursor in one-step increments.
Item Indicator, Button, or Connector Description 11 Server modules Up to four PowerEdge M520, M620, M630, or M640 server modules or 2 M820 server modules configured for the enclosure. Minimum CMC Version The following table lists the minimum CMC version required to enable the listed server modules. Table 4. Minimum CMC Version for server modules Servers Minimum version of CMC PowerEdge M520 CMC 1.36 PowerEdge M620 CMC 1.36 PowerEdge M820 CMC 1.36 PowerEdge M630 CMC 2.
For the latest supported platforms, see the Dell Chassis Management Controller (CMC) Version 3.0 for Dell PowerEdge VRTX Release Notes available at dell.com/support/manuals.
NOTE: If you have purchased a system with all the licenses pre-installed, then license management is not required. • View — View the current license information. • Import — After acquiring the license, store the license in a local storage and import it into CMC using one of the supported interfaces. The license is imported if it passes the validation checks. NOTE: For a few features, a CMC restart may be required to enable the features.
Table 8.
Feature Express Enterprise One-to-many Server Firware Update No Yes One-to-many configuration for No iDRAC Yes Boot Identity No Yes Chassis Profile No Yes Quick Deploy No Yes Notes Viewing Localized Versions of the CMC Web Interface To view localized versions of the CMC web interface, read through your web browser's documentations. Supported Management Console Applications CMC supports integration with Dell OpenManage Console.
• The safety instructions that came with your system provide important safety and regulatory information. For additional regulatory information, see the Regulatory Compliance home page at www.dell.com/regulatory_compliance. Warranty information may be included within this document or as a separate document. • The Dell PowerEdge VRTX Getting Started Guide shipped with your system provides an overview of system features, setting up your system, and technical specifications.
2 Installing and Setting Up CMC This section provides information about how to install your CMC hardware, establish access to CMC, configure your management environment to use CMC, and guides you through the tasks for configuring a CMC: • • • • Set up initial access to CMC. Access CMC through a network. Add and configure CMC users. Update CMC firmware. For more information about installing and setting up redundant CMC environments, see Understanding Redundant CMC Environment.
11. Connect to the I/O module by using the web browser and provide final configuration of the IO module. 12. Turn on the servers and install the operating system. Basic CMC Network Connection For the highest degree of redundancy, connect each available CMC to your management network.
Configuring a Web Browser You can configure and manage CMC, servers, and modules installed in the chassis through a web browser. See the “Supported Browsers" section in the Dell Systems Software Support Matrix at dell.com/support/manuals. The CMC and the management station where you use your browser must be on the same network, which is called the management network. On the basis of your security requirements, the management network can be an isolated and highly secure network.
Certificate Revocation List Fetching If your CMC has no access to the Internet, disable the certificate revocation list (CRL) fetching feature in Internet Explorer. This feature tests whether a server such as the CMC web server uses a certificate that is on a list of revoked certificates retrieved from the Internet. If the Internet is inaccessible, this feature can cause delays of several seconds when you access the CMC using the browser or with a command line interface such as remote RACADM.
Configuring Initial CMC Network NOTE: Changing your CMC Network settings may disconnect your current network connection. You can perform the initial network configuration of CMC before or after CMC has an IP address.
For effective network throughput, the network speed setting must match your network configuration. Setting the network speed lower than the speed of your network configuration increases bandwidth consumption and slows down the network communication. Determine whether or not your network supports the above network speeds and set it accordingly.
Table 9. Network mode Dynamic Host Configuration iDRAC retrieves IP configuration (IP address, mask, and gateway) automatically from a DHCP Protocol (DHCP) server on your network. The iDRAC is assigned a unique IP address allotted over your network. Press the center button. The IPMI Over LAN panel is displayed. Static If you select Static, manually enter the IP address, gateway, and subnet mask by following the instructions on the LCD screen.
NOTE: Using more than one interface at the same time may generate unexpected results. Table 10. CMC Interfaces Interface Description Web interface Provides remote access to CMC using a graphical user interface. The Web interface is built into the CMC firmware and is accessed through the NIC interface from a supported web browser on the management station. For a list of supported Web browsers, see the “Supported Browsers” section in the Dell System Software Support Matrix at dell.com/support/manuals.
Interface Description • DMTF WSManagement Specifications: www.dmtf.org/standards/wbem/wsman Web services interfaces can be utilized by leveraging client infrastructure, such as Windows WinRM and Powershell CLI, open source utilities like WSManCLI, and application programming environments like Microsoft .NET. For client connection using Microsoft WinRM, the minimum required version is 2.0. For more information, refer to the Microsoft article, .
Setting Date and Time on CMC Using CMC Web Interface To set the date and time on CMC: 1. In the left pane, click Chassis Overview → Setup → Date/Time. 2. To synchronize the date and time with a Network Time Protocol (NTP) server, on the Date/Time page, select Enable NTP and specify up to three NTP servers. To manually set the date and time, clear the Enable NTP option, and then edit the Date and Time fields. 3. Select the Time Zone from the drop-down menu, and then click Apply.
• 0 — not blinking (default) • 1 — blinking racadm raid , where the operation value is blink or unblink, and the FQDD is for the component's physical disk drive, virtual disk and enclosures. Configuring CMC Properties You can configure CMC properties such as power budgeting, network settings, users, and SNMP and email alerts using the web interface or RACADM commands.
• IP address blocking • Number of login attempts allowed • Timespan for the lockout failure counts to occur • Lockout penalty time • To enable user blocking feature, use: racadm config -g cfgRacTuning -o cfgRacTuneUserBlkEnable <0|1> • To enable IP blocking feature, use: racadm config –g cfgRacTuning –o cfgRacTuneIPBlkEnable <0|1> • To specify the number of login attempts, use: racadm config –g cfgRacTuning –o cfgRacTuneIpBlkFailCount • To specify the time span within which, lockout fail cou
• You cannot turn on the newly installed servers. • You cannot remotely access existing servers. • Server performance reduces to limit power consumption until management of the CMC is restored. The following are some of the conditions that can result in CMC management loss: • CMC removal — Chassis management resumes after replacing CMC, or after failover to standby CMC.
• From the LCD Language drop-down menu, select the required language. • From the LCD Orientation drop-down menu, select the required mode — Tower Mode or Rack Mode. NOTE: When you configure the chassis by using the LCD wizard, if you select the Auto-Apply settings to newly inserted servers option, you cannot disable the Auto-Apply settings to newly inserted servers function by using a basic license.
3 Logging in to CMC You can log in to CMC as a CMC local user, as a Microsoft Active Directory user, or as an LDAP user. The default user name and password is root and calvin respectively. You can also log in using Single Sign-On or a Smart Card. NOTE: CMC does not support the following special characters as user name or password from chassis profile using XML: " , ! , #, $, %, ^, &, *, (, ), -, _, +, =, ?, {, }, +, &, >, |, .
• CMC user name: • Active Directory user name: \, / or @. • LDAP user name: NOTE: This field is case-sensitive. 2. In the Password field, type the user password. NOTE: For Active Directory user, the Username field is case-sensitive. 3. From the drop-down menu of the Domain field, select the required domain. 4. Optionally, select a session timeout.
Logging in to CMC Using Single Sign-on When Single Sign-On (SSO) is enabled, you can log in to CMC without providing your domain user authentication credentials, such as user name and password. To use this feature, you must have an Enterprise License. NOTE: You cannot use the IP address to log in to the SSO. Kerberos validates your credentials against the Fully Qualified Domain Name (FQDN).
You can use remote RACADM commands in scripts to configure multiple CMCs. You cannot run the scripts directly on the CMC web interface, because CMC does not support it. For more information about RACADM, see the Chassis Management Controller for PowerEdge VRTX RACADM Command Line Reference Guide. For more information about configuring multiple CMCs, see Configuring Multiple CMCs Using RACADM. Logging in to CMC Using Public Key Authentication You can log in to the CMC over SSH without typing a password.
Changing Default Login Password Using Web Interface When you log in to the CMC web interface, if the Default Password Warning page is displayed, you can change the password. To do this: 1. Select the Change Default Password option. 2. In the New Password field, type the new password. The maximum characters for the password are 20. The characters are masked. The following characters are supported: • 0-9 • A-Z • a-z 3. • Special characters: +, &, ?, >, -, }, |, .
Use case scenarios This section describes typical use cases and tasks that you can perform with Chassis Management Controller Version 3.0 for Dell PowerEdge VRTX. Conversion of External Shared PERC 8 card High Availability to Non-High Availability Mode using Web Interface Dell PowerEdge VRTX chassis must have 2 External Shared PERC 8 cards in PCI slot 5 and PCI slot 6 in HA mode. Workflow 1. Power down chassis. Disconnect all SAS cables from External Shared PERC 8 cards to MD12x0 enclosures. 2.
7. Power Up chassis. 8. External Shared PERC 8 card is not in HighAvailabiltiy Mode and the following command is used to view the status: racadm raid get controllers -o -p HighAvailabilityMode Conversion of External Shared PERC 8 card Non-High Availability to High Availability Mode using RACADM Dell PowerEdge VRTX chassis must have External Shared PERC 8 cards in PCI slot 5 and PCI slot 6. Workflow 1. Power down chassis. Disconnect all SAS cables from External Shared PERC 8 cards to MD12x0 enclosures.
4 Updating Firmware You can update firmware for: • CMC • Chassis infrastructure • VRTX Expander or Storage Backplane Expander Firmware of Inegrated or external enclosures • Physical Disks (HDD) per enclosure NOTE: You can update the HDD firmware only if required.
• Chassis Overview → Update • Chassis Overview → Chassis Controller → Update • Chassis Overview → Server Overview → Server Component Update • Chassis Overview → I/O Module Overview → Update • Chassis Overview → Storage → Storage Component Update The Firmware Update page displays the current version of the firmware for each listed component and allows you to update the firmware to the latest version.
When transferring files to and from CMC, the file transfer icon spins during the transfer. If your icon is not animated, make sure that your browser is configured to allow animations. For more information about allowing animations in the browser, see Allow Animations in Internet Explorer. Signed CMC Firmware Image For VRTX CMC 2.0 and later, the firmware includes a signature. The CMC firmware verifies the signature to ensure the authenticity of the uploaded firmware.
Updating CMC Firmware Using Web Interface NOTE: • Before applying the CMC update, ensure that the chassis is powered on. If the blades are powered on, it is not necessary to power off the blades to perform the CMC update. • Downgrading the CMC Firmware prior to 2.1 with external shared adapters is blocked. To update the CMC firmware using the CMC web interface: 1. In the left pane, go to any of the following pages: • 2.
• Chassis Overview → Update. 2. • Chassis Overview → Chassis Controller → Update. On the Firmware Update page, in the Chassis Infrastructure Firmware section, in the Update Targets column, select the option, and then click Apply Chassis Infrastructure Firmware. 3. On the Firmware Update page, click Browse, and then select the appropriate chassis infrastructure firmware. 4. Click Begin Firmware Update, and then click Yes.
The Firmware Update Progress section provides firmware update status information. A progress bar indicates the status of the upload process. File transfer time varies on the basis of connection speed. When the internal update process begins, the page automatically refreshes and the firmware update timer is displayed. NOTE: Additional instructions to follow: • Do not click the Refresh icon or navigate to another page during the file transfer. • To cancel the process, click Cancel File Transfer and Update.
Center. For information on saving the inventory file that DRM uses as input to create the repositories, see Saving Chassis Inventory Report Using CMC Web Interface NOTE: The Single Click all blade update method has the following benefits: • Enables you to update all the components on all the blade servers with minimal clicks. • All the updates are packaged in a directory. This avoids individual upload of each component’s firmware.
• For iDRAC servers, on the boot console, to access System Setup, press the key. • On the System Setup Main Menu page, go to iDRAC Settings → Lifecycle Controller, click Enabled. Go to the System Setup Main Menu page and click Finish to save the settings. Canceling System Services enables you to cancel all scheduled jobs that are pending and remove them from the queue.
• Automatic filtering is important for firmware updates of Network Interface Controllers (NIC) and RAID Controllers. These device categories have different types and models. Similarly, the firmware update images (DUP) may be available in optimized forms, where a single DUP may be programmed to update multiple types or models of devices of a given category. Filtering Components for Firmware Updates Using CMC Web Interface To filter the devices: 1.
• If the server is listed as Not Ready, it indicates that when the firmware inventory was retrieved, the iDRAC on the server was still initializing. Wait for the iDRAC to be fully operational, and then refresh the page to retrieve the firmware inventory again. • If the inventory of components and devices does not reflect what is physically installed on the server, invoke the Lifecycle Controller when the server is in the boot process.
Saving Chassis Inventory Report Using CMC Web Interface To save the chassis inventory report: 1. In the system tree, go to Server Overview, and then click Update → Server Component Update. The Server Component Update page is displayed. 2. Click Save Inventory Report. The Inventory.xml file is saved on an external system. NOTE: The Dell Repository Manager Application uses the Inventory.xml file as an input to create a repository of updates for all the blades available in the chassis.
• Rollback • Update • Delete Jobs Only one type of operation can be performed at a time. Components and devices that are not supported may be listed as part of the inventory, but do not permit Lifecycle Controller operations. To perform the Lifecycle Controller operations, you must have: • For CMC: Server Administrator privilege. • For iDRAC: Configure iDRAC privilege and Log in to iDRAC privilege. A Lifecycle Controller operation scheduled on a server may take 10 to 15 minutes to complete.
3. In the Rollback Version column, select the option for the component or device for which you want to roll back the firmware. 4. Select one of the following options: • 5. Reboot Now — Restart the server immediately. • On Next Reboot - Manually restart the server at a later time. Click Rollback. The previously installed firmware version is reinstalled for the selected component or device.
6. Select one of the following options: • Reboot Now - Reboot immediately. The firmware update is applied immediately • On Next Reboot - Manually reboot the server at a later time. The firmware update is applied after the next reboot. NOTE: This step is not valid for Lifecycle Controller and 32-bit Diagnostics firmware update. A server reboot is not required for these devices. 7. Click Update. The firmware version is updated for the selected component or device.
NOTE: Click Collapse against a slot to collapse the component and device firmware details for the specific slot. Alternatively, to view all the details again, click Expand. 6. In the Component/Device Firmware Inventory section, select the check box against Select/Deselect All to select all the supported servers. Alternatively, select the check box against the server for which you want to update the server component firmware. You cannot select individual components for the server. 7.
Deleting Scheduled Server Component Firmware Jobs NOTE: To use this feature, you must have an Enterprise License. You can delete jobs scheduled for the selected components and/or devices across one or more servers. Deleting Scheduled Server Component Firmware Jobs Using the Web Interface To delete scheduled server component firmware jobs: 1. In the left pane, click Server Overview, and then click Update. 2. On the Server Component Update page, filter the component or device (optional). 3.
5 Viewing Chassis Information and Monitoring Chassis and Component Health You can view information and monitor the health of the following: • Active and standby CMCs • All severs and individual servers • IO Module • Fans • Power Supply Units (PSUs) • Temperature sensors • Hard disk drives • LCD assembly • Storage controllers • PCIe devices NOTE: The health of external components impacts the overall health of the storage component with existing storage health and integrated storage compone
Chassis Graphics The chassis is represented by the front and back views (the upper and lower images respectively). Servers, DVDs, HDDs, KVMs, and LCD are shown in the front view and the remaining components are shown in the back view. Component selection is indicated by a blue cast and is controlled by clicking the image of the required component.
NOTE: In Multi-Chassis Management (MCM), all the Quick Links associated with the servers are not displayed. Table 15.
• State Power Supply Units Power Status PCIe Devices Fans Blower SPERC Slot External Shared PERC 8 card slot IOM Slot • Serial Number • Physical Disk Setup • Power Status • • Firmware Version View Controller for this Physical Disk • Size • • Type View Virtual Disks for this Physical Disk • Power Supply Status • Power Consumption • System Budget Capacity • Installed • Model • PCIe Status • Assigned • Server Slot Mapping • PCIe Setup • Vendor ID • Device ID • S
• Role • Service Tag Launch IOM GUI Viewing Server Model Name and Service Tag You can view the model name and service tag of each server instantly using the following steps: 1. In the left pane, under Server Overview tree node, all the servers (SLOT-01 to SLOT-04) appear in the servers list. If a server is not present in a slot, the corresponding image in the graphic is grayed out. When a full height server occupies slot 1 and slot 3, slot 3 will show the slot name as Extension of 1. 2.
Viewing Information and Health Status of the IOM To view health status of the IOMs, in the CMC Web interface, do any of the following: 1. Click Chassis Overview. The Chassis Health page is displayed. The graphics in the left pane displays the rear, front, and side view of the chassis and contains the health status for the IOM. IOM health status is indicated by the overlay of the IOM sub-graphic. Move the cursor over the individual IOM sub-graphic.
For more information, see the Online Help. Configuring Fans Fan Offset — A feature to provide increased cooling to the storage and PCIe regions of the chassis. This feature allows you to increase the airflow delivery to the HDDs, Shared PERC controllers, and PCIe card slots. An example usage of the Fan Offset is when you use high-power or custom PCIe cards that require more cooling than normal. The Fan Offset feature has options of Off, Low, Medium, and High.
corresponding text hint or screen tip is displayed. The text hint provides additional information about the KVM. Click the KVM sub-graphic to view the KVM information in the right pane. 2. Alternatively, click Chassis Overview → Front Panel. On the Status page, under the KVM Properties section, you can view the status and properties of a KVM associated with the chassis. For more information, see the Online Help. Viewing LCD Information and Health To view the health status of an LCD: 1.
NOTE: For more information, see the Online Help.
6 Configuring CMC Chassis Management Controller enables you to configure properties, set up users, and alerts to perform remote management tasks. Before you begin configuring the CMC, you must first configure the CMC network settings to allow CMC to be managed remotely. This initial configuration assigns the TCP/IP networking parameters that enable access to the CMC. For more information, see Setting Up Initial Access to CMC. You can configure CMC using Web interface or RACADM.
Viewing and Modifying CMC Network LAN Settings Using CMC Web Interface To view and modify the CMC LAN network settings using CMC Web interface: 1. In the left pane, click Chassis Overview, and then click Network. The Network Configuration page displays the current network settings. 2. Modify the general, IPv4, or IPv6 settings as required. For more information, see the Online Help. 3. Click Apply Changes for each section to apply the settings.
cfgIPv6Address racadm config -g cfgIPv6LanNetworking -o cfgIPv6PrefixLength 64 racadm config -g cfgIPv6LanNetworking -o cfgIPv6Gateway Enabling or Disabling DHCP for the CMC Network Interface Address When enabled, the CMC’s DHCP for NIC address feature requests and obtains an IP address from the Dynamic Host Configuration Protocol (DHCP) server automatically. This feature is enabled by default.
• DNS Domain Name — The default DNS domain name is a single blank character. To set a DNS domain name, type: racadm config -g cfgLanNetworking -o cfgDNSDomainName where is a string of up to 254 alphanumeric characters and hyphens. For example: p45, a-tz-1, r-id-001.
For more information, see the Online Help. 5. Click Apply to save your settings. Configuring IP Range Attributes Using RACADM You can configure the following IP Range attributes for CMC using RACADM: • IP range checking feature • Range of IP addresses that you want to block from accessing CMC • IP Range Mask that you want to block from accessing CMC IP filtering compares the IP address of an incoming login to the IP address range that is specified.
4. To remove the CMC VLAN, disable the VLAN capabilities of the external chassis management network: racadm config -g cfgLanNetworking -o cfgNicVLanEnable 0 You can also remove the CMC VLAN using the following command: racadm setniccfg -v Configuring Virtual LAN Tag Properties for CMC Using Web Interface To configure Virtual LAN(VLAN) for CMC using the CMC Web interface: 1. Go to any of the following pages: • In the left pane, click Chassis Overview and click Network → VLAN.
NOTE: SNMP is not FIPS-compliant. In FIPS mode, all SNMP features except Message Digest algorithm version 5 (MD5) authentication work. Enabling FIPS Mode Using CMC Web Interface To enable FIPS: 1. In the left pane, click Chassis Overview. The Chassis Health page is displayed. 2. On the menu bar, click Network. The Network Configuration page is displayed. 3. Under the Federal Information Processing Standards (FIPS) section, from the FIPS Mode drop-down menu, select Enabled.
NOTE: Because the network transport for the forwarded log entries is UDP, there is no guaranteed delivery of log entries, nor is there any feedback to CMC about whether the log entries were received successfully. Configuring Services Using CMC Web Interface To configure CMC services using CMC web interface: 1. In the left pane, click Chassis Overview, and then click Network → Services. The Services Management page is displayed. 2.
• Stop using flash media for storing chassis data For more information about these options, see the Online Help. 3. Click Apply to apply the selected option. If two CMCs are present in the chassis, both CMCs (active and standby) must contain flash media; else, the Extended Storage functionality will be degraded unless both the active and standby CMCs contain flash media. Setting Up Chassis Group CMC enables you to monitor multiple chassis from a single lead chassis.
Removing a Member from the Leader You can remove a member from the group from the lead chassis. To remove a member: 1. Log in with chassis administrator privileges to the leader chassis. 2. In the left pane, select the lead chassis. 3. Click Setup → Group Administration. 4. From the Remove Members list, select the member’s name to be deleted, and then click Apply. The lead chassis then communicates to the member or members, if more than one is selected, that it has been removed from the group.
NOTE: In MCM, all the Quick Links associated with the servers are not displayed. Propagating Leader Chassis Properties to Member Chassis You can apply the properties from the leader to the member chassis of a group. To synchronize a member with the leader properties: 1. Login with administrator privileges to the leader chassis. 2. Select the Lead chassis in the tree. 3. Click Setup → Group Administration. 4.
• In Chassis Power State Off state • Turned off NOTE: If a server is inserted while the chassis is turned off, the model number is not displayed anywhere in the web interface until the chassis is turned on again. The following table lists the specific data fields and specific requirements for fields to be reported for each server: Table 16. Server Module Inventory Field Descriptions Data Field Example Chassis Name Data Center Chassis Leader Chassis IP Address 192.168.0.
• RAID • NIC NOTE: The inventory information displayed for the chassis group, member chassis, servers, and server components is updated every time a chassis is added or removed from the group. Viewing Chassis Group Inventory To view the chassis group using CMC web interface, in the left pane, select Group. Click Properties → Firmware Version. The Chassis Group Firmware Version page displays all the chassis in the group.
NOTE: Server and iDRAC settings are not saved or restored with the chassis configuration. To save the current chassis configuration, perform the following tasks: 1. Go to the Chassis Configuration Profiles page. In the Save and Backup → Save Current Configuration section, enter a name for the profile in the Profile Name field. NOTE: While saving the current chassis configuration, the standard ASCII extended character set is supported. However, the following special characters are not supported: “, .
To apply a profile to a chassis, perform the following tasks: 1. Go to the Chassis Configuration Profiles page. In the Stored Profiles section, select the stored profile that you want to apply. 2. Click Apply Profile. A warning message is displayed that applying a new profile overwrites the current settings and also reboots the selected chassis. You are prompted to confirm if you want to continue the operation. 3. Click OK to apply the profile to the chassis.
NOTE: The generated configuration file is myfile.cfg. You can rename the file. The .cfg file does not contain user passwords. When the .cfg file is uploaded to the new CMC, you must re-add all passwords. 2. At the command prompt, type: racadm getconfig -f myfile.cfg NOTE: Redirecting the CMC configuration to a file using getconfig -f is only supported with the remote RACADM interface. 3. Modify the configuration file using a plain-text editor (optional).
a complete list of objects and groups, see the Chassis Management Controller for PowerEdge VRTX RACADM Command Line Reference Guide. CAUTION: Use the racresetcfg subcommand to reset the database and the CMC Network Interface settings to the original default settings and remove all users and user configurations. While the root user is available, other users’ settings are also reset to the default settings. • If you type racadm getconfig -f .cfg, the command builds a .
• When using remote RACADM to capture the configuration groups into a file, if a key property within a group is not set, the configuration group is not saved as part of the configuration file. If these configuration groups are needed to be cloned onto other CMCs, the key property must be set before executing the getconfig -f command. Alternatively, you can manually enter the missing properties into the configuration file after running the getconfig -fcommand. This is true for all the RACADM–indexed groups.
Exporting Chassis Configuration profiles You can export chassis configuration profiles to network share by using the get command. 1. To export the chassis configuration profiles as clone.xml file to CIFS network share by using get command, type the following: racadm get –f clone.xml –t xml –l //xx.xx.xx.xx/PATH –u USERNAME –p PASSWORDCMC 2. To export the chassis configuration profiles as clone.xml file to NFS network share by using get command, type the following: racadm get –f clone.xml –t xml –l xx.xx.
Example of an XML file is as follows: 00000 PAGE 917 Configuring Servers You can configure the following settings of a server: • Slot Names • iDRAC Network Settings • DRAC Virtual LAN Tag Settings • First Boot Device • Server FlexAddress • Remote File Share • BIOS Settings Using Server Clone Configuring Slot Names Slot names are used to identify individual servers. When choosing slot names, the following rules apply: • Names may contain a maximum of 15 non-extended ASCII characters (ASCII codes 32 through 126).
4. To use the iDRAC DNS name as slot name, select the Use iDRAC DNS Name for Slot Name option. This option replaces the static slot names with the respective iDRAC DNS names, if it is available. If iDRAC DNS names are not available, the default or edited slot names are displayed. NOTE: To use the Use iDRAC DNS Name for Slot Name option, you must have the Chassis Configuration Administrator privilege. 5. To save the settings, click Apply.
Setting Description Enable iDRAC IPv4 DHCP Enables or disables DHCP for each iDRAC present in the chassis. If this option is enabled, the fields QuickDeploy IP, QuickDeploy Subnet Mask, and QuickDeploy Gateway are disabled, and cannot be modified since DHCP is used to automatically assign these settings for each iDRAC. To select this option, you must select the Enable iDRAC IPv4 option. Quick Deploy IP address is provided with two options — 2 and 4.
Assigning QuickDeploy IP Address to Servers The figure here shows the QuickDeploy IP addresses assignment to the servers when there are four half-height servers in VRTX chassis: The following figure shows the QuickDeploy IP addresses assignment to the servers when there are two full-height blades in VRTX chassis: Modifying iDRAC Network Settings for Individual Server iDRAC Using this feature, you can configure the iDRAC network configurations settings for each installed server.
• cfgSessionManagement For more information about the property default values and ranges, see the Chassis Management Controller for PowerEdge VRTX RACADM Command Line Reference Guide available at dell.com/support/manuals. Configuring iDRAC Virtual LAN Tag Settings Virtual LAN (VLAN) tags enable multiple VLANs to coexist on the same physical network cable and to segregate the network traffic for security or load management purposes.
NOTE: The first boot device setting in CMC web Interface overrides the system BIOS boot settings. The boot device that you specify must exist and contain a bootable media. You can set the following devices for first boot. Table 18. Boot Devices Boot Device Description PXE Boot from a Preboot Execution Environment (PXE) protocol on the Network Interface Card. Hard Drive Boot from the hard disk drive on the server. Local CD/DVD Boot from a CD or DVD drive on the server.
For more information about these objects, see the Chassis Management Controller for PowerEdge VRTX RACADM Command Line Reference Guide available at dell.com/support/manuals. Configuring Server FlexAddress For information about configuring FlexAddress for servers, see Configuring FlexAddress for Chassis-Level Fabric and Slots Using CMC Web Interface. To use this feature, you must have an Enterprise License.
• iDRAC must have the minimum version that is required. • Server must be powered on. You can: • View profile settings on a server or from a saved profile. • Save a profile from a server. • Apply a profile to other servers. • Import stored profiles from a management station or remote file share. • Edit the profile name and description. • Export stored profiles to a management station or remote file share. • Delete stored profiles.
Applying Profile Server configuration replication is possible only when server profiles are available as stored profiles in the nonvolatile media on the CMC or stored on the remote share. To initiate a server configuration replication operation, you can apply a stored profile to one or more servers. NOTE: If a server does not support Dell Lifecycle Controller or the chassis is turned off, you cannot apply a profile to the server. To apply a profile to one or more server(s): 1.
NOTE: The Network Share option is enabled and the details are displayed in the Stored Profiles section only if the network share is mounted and is accessible. If the Network Share is not connected, configure the Network Share for the chassis. To configure the Network Share, click Edit in the Stored Profiles section. For more information, see Configuring Network Share Using CMC Web Interface. • Local or SD Card if the source file is on the Network Share.
• 13th generation servers —After restarting the server, when prompted, press F10 to access Dell Lifecycle Controller. Go to the Hardware Inventory page by clicking Hardware Configuration → Hardware Inventory. On the Hardware Inventory page, click Collect System Inventory on Restart. Viewing Stored Profile Settings To view profile settings of the stored server profiles, go to the Server Profiles page. In the Stored Profiles section, click View in the View Profile column for the required server profile.
NOTE: • A slot that does not have any profile assigned to it is indicated by the term “No Profile Selected” that appears in the select box. • To remove a profile assignment from one or more slots, select the slots and click Remove Assignment A message is displayed warning you that removing a profile from the slot or slots removes the configuration settings in the profile from any server (s) inserted in the slot (s) when Quick Deploy Profiles feature is enabled. Click OK to remove the profile assignments.
For Emulex Fibre Channel (FC) cards, the Enable/Disable Boot From SAN attribute in the Option ROM is disabled by default. Enable the attribute in the Option ROM and apply the boot identify profile to the server for booting from SAN. To save a profile, perform the following tasks: 1. Go to the Server Profiles page. In the Boot Identity Profiles section, select the server that has the required settings with which you want to generate the profile and select FQDD from the FQDD drop-down menu. 2.
NOTE: You can apply a boot identity profile to only one NIC FQDD partition in a server at a time. To apply the same boot identity profile to a NIC FQDD partition in another server, you must clear it from the server where it is first applied. Clearing Boot Identity Profiles Before applying a new boot identity profile to a standby server, you can clear the existing boot identity configurations of a selected server by using the Clear Identity option available in the CMC web interface.
For more information, see the CMC Online Help. Managing Virtual MAC Address Pool You can create, add, remove, and deactivate MAC addresses by using the Managing Virtual MAC Address Pool. You can only use unicast MAC addresses in the Virtual MAC Address Pool. The following MAC address ranges are allowed in CMC.
NOTE: You cannot remove MAC addresses if they are active on the node or are assigned to a profile. To remove MAC addresses from the network share: 1. Go to the Server Profiles page. In the Boot Identity Profiles → Manage Virtual MAC Address Pool section, click Remove MAC Addresses. 2. Enter the starting MAC address of the MAC address pool in the Starting MAC Address field. 3. Enter the count of the MAC addresses that you want to remove, in the Number of MAC Addresses field. 4.
Launching iDRAC from Server Status Page To launch the iDRAC management console for an individual server: 1. In the left pane, expand Server Overview. All four servers appear in the expanded Servers Overview list. 2. Click the server for which you want to launch the iDRAC Web interface. 3. On the Servers Status page, click Launch iDRAC. The iDRAC Web interface is displayed. For information about the field descriptions, see the Online Help.
8 Configuring CMC To Send Alerts You can set alerts and actions for certain events that occur on the chassis. An event is generated when a device or service’s status has changed or an error condition is detected. If an event matches an event filter and you have configured this filter to generate an alert message (email alert or SNMP trap), then an alert is sent to one or more configured destinations such as email address, IP address, or an external server. To configure CMC to send alerts: 1.
• Critical • Warning • Informational The Monitored Alerts section displays the results based on the selected category and severity. For information about the field descriptions on the this page, see the Online Help. 4. Click Apply. Setting Event Alerts Using RACADM To set an event alert, run the eventfilters command. For more information, see the Chassis Management Controller for PowerEdge VRTX RACADM Command Line Reference Guide available at dell.com/support//manuals.
b. Configure using severity as a parameter. For example, all informational events in storage category are assigned poweroff as action, and email and SNMP as notifications: racadm eventfilters set -c cmc.alert.storage.info -n email,snmp c. Configure using subcategory as a parameter. For example, all configurations under the licensing subcategory in the audit category are assigned poweroff as action and all notifications are enabled: racadm eventfilters set -c cmc.alert.audit.lic -n all d.
Configuring Email Alert Settings Using CMC Web Interface To configure the email alert settings using Web interface: 1. In the left pane, click Chassis Overview → Alerts → E-mail Alert Settings. 2. Specify the SMTP email server settings and the email addresses to receive the alerts. For information about the field descriptions, see the Online Help. 3. Click Apply to save the settings. 4. Click Send under Test E-mail to send a test email to the specified email alert destination.
9 Configuring User Accounts and Privileges You can set up user accounts with specific privileges (role-based authority) to manage your system with CMC and maintain system security. By default, CMC is configured with a local administrator account. The default user name is rootand the password is calvin. As an administrator, you can set up user accounts to allow other users to access the CMC.
Privilege Description User Configuration Administrator User can: Clear Logs Administrator User can clear the hardware log and CMC log. Chassis Control Administrator (Power Commands) CMC users with the Chassis Power Administrator privilege can perform all power-related operations. They can control chassis power operations, including power on, power off, and power cycle.
Privilege Description Test Alert User User can send test alert messages. Debug Command Administrator User can execute system diagnostic commands. Fabric A Administrator User can set and configure the Fabric A IOM. Fabric B Administrator User can set and configure the Fabric B, which corresponds to the first mezzanine card in the servers and is connected to the fabric B circuitry in the shared PCIe subsystem in the main board.
Table 21.
Configure Local Users Using RACADM NOTE: You must be logged in as a root user to execute RACADM commands on a remote Linux system. You can configure up to 16 users in the CMC property database. Before you manually enable a CMC user, verify if any current users exist. If you are configuring a new CMC or if you have used the racadm racresetcfg command, the only current user is root with the password calvin. The racresetcfg subcommand resets all configuration parameters to the default values.
For more information about the RACADM commands, see the Chassis Management Controller for PowerEdge VRTX RACADM Command Line Reference Guide available at dell.com/support/manuals. Disabling CMC User When using RACADM, users must be disabled manually on an individual-basis. Users cannot be deleted using a configuration file.
Table 22.
• 4. To enable CMC to use the specified Active Directory Domain Controller server addresses, select Specify Domain Controller Addresses . These server addresses are the addresses of the domain controllers where the user accounts and the role groups are located. Click Apply to save the settings. NOTE: You must apply the settings before continuing. If you do not apply the settings, the settings are lost when you navigate to the next page. 5. In the Standard Schema Role Groups section, click a Role Group.
racadm config -g cfgActiveDirectory -o cfgADGlobalCatalog2 racadm config -g cfgActiveDirectory -o cfgADGlobalCatalog3 NOTE: The Global Catalog server is only required for standard schema when the user accounts and role groups are in different domains. In multiple domain case, only the Universal Group can be used.
can perform authentication and authorization with Active Directory. Additionally, the administrator must add the RAC to at least one association object for users to authenticate. NOTE: The RAC privilege object applies to CMC. You can create as many or as few association objects as required. However, you must create at least one Association Object, and you must have one RAC device object for each RAC (CMC) on the network that you want to integrate with Active Directory.
• LDIF script file If you use the LDIF script file, the Dell organizational unit is not added to the schema. The LDIF files and Dell Schema Extender are located on your Dell Systems Management Tools and Documentation DVD in the following respective directories: • DVDdrive:\SYSMGMT\ManagementStation\support\OMActiveDirectory_Tools\Remote_Management_Advanced\LDIF_Files • :\SYSMGMT\ManagementStation\support\OMActiveDirector y_Tools\Remote_Management_Advanced\Schema Extender To use the LDIF file
OID 1.2.840.113556.1.8000.1280.1.7.1.2 SuperClasses Group Attributes dellProductMembers dellPrivilegeMember Table 26. dellRAC4Privileges Class OID 1.2.840.113556.1.8000.1280.1.1.1.3 Description Defines the privileges (Authorization Rights) for CMC device.
Assigned OID/Syntax Object Identifier Single Valued Link ID: 12070 OID: 1.2.840.113556.1.8000.1280.1.1.2.2 Distinguished Name: (LDAPTYPE_DN 1.3.6.1.4.1.1466.115.121.1.12) Attribute: dellIsCardConfigAdmin TRUE Description: TRUE if the user has Card Configuration rights on the device. OID: 1.2.840.113556.1.8000.1280.1.1.2.4 Boolean (LDAPTYPE_BOOLEAN 1.3.6.1.4.1.1466.115.121.1.7) Attribute: dellIsLoginUser TRUE Description: TRUE if the user has Login rights on the device. OID: 1.2.840.113556.1.8000.1280.
Assigned OID/Syntax Object Identifier Single Valued Attribute: dellPermissionsMask1 OID: 1.2.840.113556.1.8000.1280.1.6.2.1 Integer (LDAPTYPE_INTEGER) Attribute: dellPermissionsMask2 OID: 1.2.840.113556.1.8000.1280.1.6.2.
To create association object: 1. In the Console Root (MMC) window, right-click a container. 2. Select New → Dell Remote Management Object Advanced. 3. On the New Object page, type a name for the new object and select Association Object. 4. Select the scope for the Association Object and click OK. Adding Objects To Association Object Using the Association Object Properties window, you can associate users or user groups, privilege objects, and RAC devices or RAC device groups.
4. Click Apply to save the settings. NOTE: You must apply the settings before continuing. If you do not apply the settings, the settings are lost when you navigate to the next page. 5. In the Extended Schema Settings section, type the CMC device name and the domain name. 6. If you have enabled certificate validation, you must upload the domain forest root certificate authority-signed certificate to CMC.
NOTE: If certificate validation is enabled, specify the Domain Controller Server addresses and the FQDN. Make sure that DNS is configured correctly under. Using the following RACADM command may be optional: racadm sslcertdownload -t 0x1 -f < RAC SSL certificate > Configuring Generic LDAP Users CMC provides a generic solution to support Lightweight Directory Access Protocol (LDAP)-based authentication. This feature does not require any schema extension on your directory services.
NOTE: For information about the various fields, see the Online Help. • Common Settings • Server to use with LDAP: – Static server — Specify the FQDN or IP address and the LDAP port number. – DNS server — Specify the DNS server to retrieve a list of LDAP servers by searching for their SRV record within the DNS. The following DNS query is performed for SRV records: _[Service Name]._tcp.
10 Configuring CMC For Single Sign-On Or Smart Card Login This section provides information to configure CMC for Smart Card login and Single Sign-On (SSO) login for Active Directory users. SSO uses Kerberos as an authentication method allowing users, who have signed in as an automatic- or single sign-on to subsequent applications such as Exchange.
Prerequisites For Single Sign-On Or Smart Card Login The pre-requisites to configure SSO or Smart Card logins are: • Set up the kerberos realm and Key Distribution Center (KDC) for Active Directory (ksetup). • A robust NTP and DNS infrastructure to avoid issues with clock drift and reverse lookup. • Configure CMC with Active Directory standard schema role group with authorized members.
3. Click Sites. The Local Intranet dialog box is displayed. 4. Click Advanced . The Local Intranet Advance Settings dialog box is displayed. 5. In the Add this site to the zone, type the name of CMC and the domain it belongs to and click Add. NOTE: You can use a wildcard (*) to specify all devices or users in that domain. Mozilla Firefox 1. In Firefox, type about:config in the Address bar. NOTE: If the browser displays the This might void your warranty warning, click I'll be careful. I promise. 2.
You can upload a Kerberos Keytab generated on the associated Active Directory Server. You can generate the Kerberos Keytab from the Active Directory Server by executing the ktpass.exe utility. This keytab establishes a trust relationship between the Active Directory Server and CMC. To upload the keytab file: 1. In the left pane, click Chassis Overview → User Authentication → Directory Services. 2. Select Microsoft Active Directory (Standard Schema). 3.
11 Configuring CMC to Use Command Line Consoles This section provides information about the CMC command line console (or serial/Telnet/Secure Shell console) features, and explains how to set up the system so that you can perform systems management actions through the console. For information about using the RACADM commands in CMC through the command line console, see the Chassis Management Controller for PowerEdge VRTX RACADM Command Line Reference Guide.
Using SSH With CMC SSH is a command line session that includes the same capabilities as a Telnet session, but with session negotiation and encryption to improve security. CMC supports SSH version 2 with password authentication. SSH is enabled on the CMC by default. NOTE: CMC does not support SSH version 1. When an error occurs during the CMC login, the SSH client issues an error message. The message text is dependent on the client and is not controlled by CMC.
over SSH is set up and used correctly, you need not enter username or passwords to log in to the CMC. This can be very useful to set up automated scripts to perform various functions. NOTE: There is no GUI support for managing this feature, you can use only the RACADM. When adding new public keys, make sure that the existing keys are not already at the index, where the new key is added. CMC does not perform checks to ensure previous keys are deleted before a new one is added.
–c allows modifying the public key comment and is optional. The is optional. After the command completes, use the public file to pass to the RACADM for uploading the file. RACADM Syntax Notes for CMC When using the racadm sshpkauth command, ensure the following: • For the –i option, the parameter must be svcacct. All other parameters for -i fail in CMC. The svcacct is a special account for public key authentication over SSH in CMC. • To log in to the CMC, the user must be service.
Configuring Minicom Version 2.0 NOTE: For best results, set the cfgSerialConsoleColumns property to match the number of columns. Be aware that the prompt consumes two characters. For example, for an 80-column terminal window: racadm config –g cfgSerial –o cfgSerialConsoleColumns 80. 1. If you do not have a Minicom configuration file, go to the next step. If you have a Minicom configuration file, type minicom, and then go to step 12. 2.
CAUTION: When run from the CMC serial console, the connect -b option stays connected until the CMC resets. This connection is a potential security risk. NOTE: The connect command provides the –b (binary) option. The –b option passes raw binary data, and cfgSerialConsoleQuitKey is not used. Additionally, when connecting to a server using the CMC serial console, transitions in the DTR signal (for example, if the serial cable is removed to connect a debugger) will not result in you exiting the application.
5. Save the changes and exit. The managed system restarts. Configuring Windows for Serial Console Redirection There is no configuration necessary for servers running the Microsoft Windows Server versions, starting with Windows Server 2003. Windows receives information from the BIOS, and enable the Special Administration Console (SAC) console one COM1. Configuring Linux for Server Serial Console Redirection During Boot The following steps are specific to the Linux GRand Unified Bootloader (GRUB).
The example shows console=ttyS1,57600 added to only the first option. Configuring Linux for Server Serial Console Redirection After Boot Edit the /etc/inittab file as follows: Add a new line to configure agetty on the COM2 serial port: co:2345:respawn:/sbin/agetty -h -L 57600 ttyS1 ansi The following example shows the file with the new line. # # inittab This file describes how the INIT process # should set up the system in a certain # run-level.
# xdm is now a separate service x:5:respawn:/etc/X11/prefdm -nodaemon Edit the /etc/securettyfile as follows: Add a new line, with the name of the serial tty for COM2: ttyS1 The following example shows a sample file with the new line.
12 Using FlexAddress and FlexAdress Plus This section provides information about FlexAddress, FlexAddress Plus, and configuring. NOTE: An Enterprise License must be installed on the CMC to use the Flexaddress feature. About FlexAddress If a server is replaced, the FlexAddress for the slot remains the same for the given server slot. If the server is inserted in a new slot or chassis, the server-assigned WWN/MAC is used unless that chassis has the FlexAddress feature enabled for the new slot.
Wide Name/Media Access Control (WWN/MAC) addresses to Fibre Channel and Ethernet devices. Chassis assigned WWN/MAC addresses are globally unique and specific to a server slot. Viewing FlexAddress Activation Status A Feature Card contains one or more of the following features: FlexAddress, FlexAddress Plus, and/or Extended Storage. To view the chassis FlexAddress status using the CMC web interface, click Chassis Overview → Setup. The General Chassis Settings page is displayed.
Current Status = redundant, active Date/time Activated = 05 Oct 2013 - 11:50:58 Feature installed from SD-card serial number = CN0H871T1374036T00MXA00 If there are no active features on the chassis, the command returns a message: racadm feature -s No features active on the chassis Dell Feature Cards may contain more than one feature.
NOTE: Note the following: 4. • If a slot is not selected, FlexAddress is not enabled for the selected fabric. • When none of the fabrics are selected and a server slot is selected and applied, the following message is displayed No fabrics selected! FlexAddress will not be used on this chassis. Select both the fabric and the slot to successfully configure FlexAddress. • Configuring Flexaddress for slave slot is not allowed. The option is greyed out in the CMC Web interface.
NOTE: – Fabric A displays the type of the Input/Output fabric installed. If Fabric A is enabled, unpopulated slots display chassisassigned MAC addresses for Fabric A. – iDRAC management controller is not a fabric, but its FlexAddress is considered as a fabric. – IF the check box associated with a component is selected, it implies that the fabric is enabled for FlexAddress or FlexAddressPlus. • Protocol that is being used on the NIC Adapter port. For example, LAN, ISCI, and FCoE.
9. From the Partition Status drop-down menu, select the status of the partitions to display servers with the selected partition status. For information about the fields, see the Online Help. Viewing Advanced WWN or MAC Address Information Using Web Interface To view WWN/MAC Address Information for each server slot or all servers in a chassis, in the advanced mode: 1. Click Server Overview → Properties → WWN/MAC The WWN/MAC Summary page displays the WWN/MAC Address Information. 2.
To display the user-defined MAC and WWN address, use the following RACADM command: racadm getmacaddress -c io-identity racadm getmacaddress -c io-identity -m server -2 To display the console assigned MAC/WWN of all LOMs or mezzanine cards, use the following RACADM command: racadm getmacaddress -c all To display the chassis assigned WWN/MAC address, use the following RACADM command: racadm getmacaddress -c flexaddress To display the MAC/WWN addresses for all LOMs or mezzanine cards, use the following RACADM
Situation Command Output Changing the slot/fabric FlexAddress settings while the server modules are powered ON. $racadm setflexaddr -i 1 1 ERROR: Unable to perform the set operation because it affects a powered ON server $racadm setflexaddr Changing the Flexaddress settings of slot or fabric, when the CMC Enterprise i License is not installed. $racadm setflexaddr f ERROR: SWC0242 : A required license is missing or expired.
Dell does NOT warrant that the functions of the Software meets your requirements or that operation of the Software is uninterrupted or error free. You assume responsibility for selecting the Software to achieve your intended results and for the use and results obtained from the Software.
13 Managing Fabrics The chassis supports a fabric type, which is Fabric A. Fabric A is used by the single I/O Module, and is always connected to the onboard Ethernet adapters of the servers. The chassis has only one I/O module (IOM), where the IOM is a pass-through or switch module. The I/O Module is classified as group A. Chassis IOM uses a discrete data path called Fabric, and it is named A. The Fabric A supports only Ethernet.
On the Configure I/O Module Network Settings page, type appropriate data, and then click Apply. 2. If allowed, type the root password, SNMP RO Community string, and Syslog Server IP Address for the IOM. For more information about the field descriptions, see the Online Help. NOTE: The IP address set on the IOM from CMC is not saved to the permanent startup configuration of the switch.
14 Managing and Monitoring Power The PowerEdge VRTX chassis is the most power-efficient modular server enclosure. It is designed to include highly efficient power supplies and fans, has an optimized layout for the air to flow more easily through the system, and contains power-optimized components throughout the enclosure.
When you configure a system for Grid redundancy, the PSUs are divided into grids: PSUs in slots 1 and 2 are in the first grid while PSUs in slots 3 and 4 are in the second grid. CMC manages power so that if there is a failure of either grid, the system continues to operate without any degradation. Grid redundancy also tolerates failures of individual PSUs.
• In a Power Supply Redundancy configuration, in addition to the PSUs required to power the enclosure, the enclosure always keeps an additional PSU powered on and marked Online. Power utilization is monitored and one PSU can be moved to Standby state on the basis of overall system load. In a four PSU configuration, a minimum of two PSUs are always turned on.
iDRAC provides CMC with its power envelope requirements before powering up the server. The power envelope consists of the maximum and minimum power requirements necessary to keep the server operating. iDRAC’s initial estimate is based on its initial understanding of components in the server. After operation commences and further components are discovered, iDRAC may increase or decrease its initial power requirements.
If an administrator manually powers on the low priority server modules before the higher priority ones, then the low priority server modules are the first modules to have their power allocation lowered down to the minimum value, in order to accommodate the higher priority servers. Therefore, after the available power for allocation is exhausted, CMC reclaims power from lower or equal priority servers until they are at their minimum power level.
AC Power Recovery If the AC power supply of a system is disrupted, the chassis is restored to the previous power state before the AC power loss. The restoration to the previous power state is the default behavior.
• CMC does not support automated power-down of a low-priority server to allow turning-on of a higher priority server; however, you can perform user-initiated turn-offs. • Changes to the PSU redundancy policy are limited by the number of PSUs in the chassis. You can select any of the two PSU redundancy configuration settings listed in Default Redundancy Configuration.
Table 39. SEL Events for Power Supply Changes Power Supply Event System Event Log (SEL) Entry Insertion Power supply is present. Removal Power supply is absent. AC input received The power input for power supply has been restored. AC input lost The power input for power supply is lost. DC output produced Power supply is operating normally. DC output lost Power supply failed.
Maximum Power Conservation Mode This is enabled for Grid Redundancy or PSU Redundancy modes. CMC performs maximum power conservation when: • Maximum conservation mode is enabled. • An automated command line script, issued by a UPS device, enables maximum conservation mode. In maximum power conservation mode, all servers start functioning at their minimum power levels, and all subsequent server power allocation requests are denied. In this mode, the performance of powered on servers may be degraded.
• Dynamic power supply engagement OPMC then manages prioritization and power of supported VRTX server nodes in the chassis from the budget available after allocation of power to chassis infrastructure and prior generation server nodes. Remote power logging is unaffected by external power management. After the Server Based Power Management Mode is enabled, the chassis is prepared for PM3 management. All supported VRTX server priorities are set to 1 (High).
For example, the following command sets the maximum power budget to 4800 Watt: racadm config -g cfgChassisPower -o cfgChassisPowerCap 4800 • To enable or disable dynamic PSU engagement, type: racadm config -g cfgChassisPower -o cfgChassisDynamicPSUEngagementEnable where is 0 (disable), 1 (enable). The default is 0.
Executing Power Control Operations on the Chassis Using Web Interface To execute power control operations on the chassis using the CMC web interface: 1. In the left pane, click Chassis Overview → Power → Control. The Chassis Power Control page is displayed. 2. Select one of the following power control operations. For information about each option, see the Online Help. 3.
Executing Power Control Operations on the IOM You can remotely reset or turn on an IOM. NOTE: To perform power management actions, you must have the Chassis Configuration Administrator privilege. Executing Power Control Operations on IOM Using CMC Web Interface To execute power control operations on the I/O Module: 1. In the left pane, click Chassis Overview → I/O Module Overview → Power. 2.
15 Managing Chassis Storage On the Dell PowerEdge VRTX, you can perform the following operations: • View the status of physical disks drives and storage controllers. • View the properties of controllers, physical disk drives, virtual disks, and enclosures. • Set up controllers, physical disk drives, and virtual disks. • Assign virtual adapters. • Troubleshoot controller, physical disk drives, and virtual disks. • Update storage components.
Viewing Fault-tolerant Troubleshooting Information of SPERC Using CMC Web Interface To view the attributes that indicate the correct functioning of fault-tolerant features of a SPERC: 1. In the left pane, click Chassis Overview → Storage → Troubleshooting → Setup Troubleshooting. The Storage Setup Troubleshooting page is displayed. 2.
– The server slot is empty, or the server in the slot is turned off. – The VA is unmapped from a server or a slot. – All affected servers are powered off. • Virtual disks are created and they are assigned as Virtual Adapter 1, Virtual Adapter 2, Virtual Adapter 3, or Virtual Adapter 4. For more information, see Applying Virtual Adapter Access Policy to Virtual Disks. NOTE: • You can map only one virtual adapter to one server at a time.
functionality is visible, but does not eliminate downtime. Fault Tolerance (FT) makes use of redundant components within a storage system, which are configured to behave as backup components and are kept in standby mode. Storage Controllers in fault-tolerant mode prevent disruption of storage services and automatically take over the services of a component that has stopped functioning.
NOTE: If the Controllers are in fault-tolerant mode, then the following information regarding the fault-tolerant status and mode is also displayed: • Fault Tolerant Mode – Shared, Active/Passive • Fault Tolerant Status – Healthy/Normal, or Lost/Degraded • Peer Controller - Indicates the name of controller that acts as the peer (stand-by) in case of a fault-tolerant mode supported by two controllers NOTE: If the peer controller is disabled, the name is displayed as Disabled PERC (Integrated 2) or Disab
The newly set properties are applied to the selected controllers and the Current Value field displays the updated values for the attributes. Configuring Storage Controller Settings Using RACADM To set up the storage controller by running a RACADM command, use the following syntax. racadm raid ctrlprop:RAID.ChassisIntegrated.
NOTE: To prevent loss of data, before performing controller enable or disable operations: • Complete all data operations such as Rebuild or Copy Back. • Make sure that the data volumes are in optimal state. NOTE: While enabling the second PERC adapter, a warning message is displayed and the fault-tolerant status is degraded if: • Any of the PERC adapter settings are changed. • Firmware is updated.
NOTE: – For a disabled PERC, none of the other options Reset Configuration, Export TTY Log, Discard Pinned Cache, and Disable RAID Controller are available in the drop-down menu. – By default the two integrated shared storage adapters are detected with high availability mode. – You must enable Fault Tolerance mode on the external shared controller after it is cabled. – Enable Fault Tolerance and Disable Fault Tolerance are displayed only for the External Shared PERC 8 cards.
Viewing Physical Disk Drives Properties Using RACADM To view the properties of physical disk drives using RACADM, run the command racadm raid get pdisks —o For more information, see the Chassis Management Controller for PowerEdge VRTX RACADM Command Line Reference Guide.
For more information, see the Chassis Management Controller for PowerEdge VRTX RACADM Command Line Reference Guide. Creating Virtual Disk Using CMC Web Interface By default, CMC creates virtual disks without initializing them. However, you can choose the fast-initialization option for virtual disks that are created without initialization. The fast-initialization process clears the first and last 8 MB of the virtual disk, deleting all boot records or partition information.
Modifying Encryption Key Identifier Using CMC Web Interface You can modify the encryption key identifier and passphrase for controllers. To modify an encryption key identifier and passphrase: 1. In the left pane, go to Storage → Controllers → Setup. 2. From the Security Key drop-down, select Modify Security Key. A pop-up window is displayed. 3. Enter the new encryption key identifier and existing and new passphrases, and click OK. 4. On the Controller Setup page, click Apply.
NOTE: The Encrypt Virtual Disk option is available only if unsecure virtual disks are configured in the SED. Encrypting Virtual Disks Using RACADM To encrypt virtual disks by running a RACADM command, use the following syntax: racadm raid encryptvd:Disk.Virtual.0:RAID.ChassisIntegrated.1-1 For more information, see the Chassis Management Controller PowerEdge VRTX RACADM Command Line Reference Guide. Unlocking Foreign Configuration Drives which are part of secure virtual disks are called secured drives.
Cryptographic Erase You can use the cryptographic erase option to securely erase data present on secure SEDs. Secure data exists on drives even after the virtual disk is deleted and is thus exposed to threat. Cryptographic erase can be used in the following conditions: • To erase data to retire/reuse secure drives. • To securely erase data if secure and locked foreign configuration need not be imported. • To recover locked drives if the passphrase is lost.
• Edit Policy: Read Cache • Edit Policy: Write Cache • Edit Policy: Disk Cache • Initialize: Fast • Initialize: Full • Encrypt Virtual Disk Enclosure Management Module Enclosure Management Module (EMM) provides data path and enclosure management tasks for enclosure. EMM monitors and controls the enclosure components and access to the drives. EMM communicates enclosure attributes and states to the host server.
For more information, see the Chassis Management Controller for PowerEdge VRTX RACADM Command Line Reference Guide available at dell.com/support/manuals. Reporting up to two Enclosures per Connector Each External Shared PERC 8 card supports up to two enclosures per connector. However, there are two different configurations with different restrictions. In a single PERC (non-fault tolerant) configuration you can connect up to two enclosures per card.
NOTE: • Error is displayed if you enter an invalid value. • Initially the value which is saved in the firmware is displayed. • You must have Chassis Configuration Privileges to set asset tag and asset name of the enclosure. Setting the Temperature Warning Threshold of the Enclosure Using Web Interface To set temperature warning threshold of the enclosure: Click Chassis Overview → Storage → Enclosures → Setup.
16 Managing PCIe Slots By default, all slots are unmapped. You can do the following: • View the status of all PCIe Slots in the chassis. • Assign or remove an assigned PCIe slot from the servers. Consider the following before assigning a PCIe slot to a server: • An empty PCIe slot cannot be assigned to a server that is turned on. • A PCIe slot with an adapter assigned to a server cannot be assigned to another server if the currently-assigned server (source) is turned on.
• In the left pane, click Chassis Overview → PCIe Overview → Setup → Mapping: PCIe Slots to Server Slots. On the Mapping: PCIe Slots to Server Slots page, in the Action column, from the Action drop-down menu, select the appropriate server name, and then click Apply. Note the following: • Without a license, the maximum number of PCIe slots that maybe mapped to a half-height server is two.
• The Server nodes are turned on quickly, thus turning on the PCIe cards quickly. • The powered state of PCIe cards is extended for a pre-defined time period in the following scenarios: – After the associated server is turned off. – After adapter discovery process is completed. • The power-on readiness state of the cards is extended for a predefined time after the discovery process. This extension eliminates the delays for common types of power cycling scenarios.
• To set the acceptable timeout range, run the command, racadm setpciecfg help ridethru For more information, see the Chassis Management Controller for PowerEdge VRTX RACADM Command Line Reference Guide.
17 Troubleshooting and Recovery This section explains how to perform tasks related to recovering and troubleshooting problems on the remote system using the CMC web interface. • Viewing chassis information. • Viewing the event logs. • Gathering configuration information, error status, and error logs. • Using the diagnostic console. • Managing power on a remote system. • Managing Lifecycle Controller jobs on a remote system. • Reset components.
• Sensor information • Firmware build information Supported Interfaces • CLI RACADM • Remote RACADM • Telnet RACADM racdump includes the following subsystems and aggregates the following RACADM commands. For more information about racdump, see the RACADM Command Line Reference Guide for CMC in PowerEdge VRTX. Table 41.
Power Troubleshooting The following information helps you to troubleshoot power supply and power-related issues: • Problem: Configured the Power Redundancy Policy to Grid Redundancy, and a Power Supply Redundancy Lost event was raised. – Resolution A: This configuration requires at least one power supply in side 1 (the left two slots) and one power supply in side 2 (the right two slots) to be present and functional in the modular enclosure.
– Resolution: This can occur if the System Input Power Cap has been configured to a value that results in an increased power need by fans having to be made up by reduction in the power allocation to the servers. User can increase the System Input Power Cap to a higher value that allow for additional power allocation to the fans without an impact on server performance. Troubleshooting Alerts Use the CMC log and the trace log to troubleshoot CMC alerts.
Viewing Chassis Log CMC generates a log of the chassis-related events. CMC provides alert capabilities through System Event Log (SEL), SNMP, and Email interfaces. SPERC is inserted while one or more PowerEdge serves are powered on. NOTE: • To clear the chassis log, you must have the Clear Logs Administrator privilege.
This operation causes the servers to behave as if they were removed and reinserted. Saving or Restoring Chassis Configuration This is a licensed feature. To save or restore a backup of the Chassis configuration using the CMC Web interface: 1. In the left pane, click Chassis Overview → Setup → Chassis Backup. The Chassis Backup page is displayed. To save the chassis configuration, click Save. Override the default file path (optional) and click OK to save the file.
If the NTP server IP address is not configured, you may see a trace log entry similar to the following: Jan 8 19:59:24 cmc ntpd[1423]: Cannot find existing interface for address 1.2.3.4 Jan 8 19:59:24 cmc ntpd[1423]: configuration of 1.2.3.
Component IOM (Pass through) Blower PSU Enclosure LED Color, Blinking Pattern Status Amber, glowing steadily Not used Amber, blinking Fault Blue, dark No fault/stack slave Green, glowing steadily Turned on Green, blinking Not used Green, dark Powered off Blue, glowing steadily Normal Blue, blinking User-enabled module identifier Amber, glowing steadily Not used Amber, blinking Fault Blue, dark No fault Green, glowing steadily Fan working Green, blinking Not used Green, dark
– Verify that you have AC present to at least one power supply. – Verify that the CMC card is seated properly. You can release or pull the ejector handle, remove the CMC, reinstall the CMC making sure that the board is inserted all the way and the latch closes correctly. • Lower-left LED — This LED is multi-colored. When CMC is active and running, and there are no problems, the bottom LED is blue. If it is amber, a fault is detected.
Troubleshooting Network Problems The integrated CMC trace log allows you to debug CMC alerts and networking. You can access the trace log using the CMC Web interface or RACADM. See the gettracelog command section in the Chassis Management Controller for PowerEdge VRTX RACADM Command Line Reference Guide. The trace log tracks the following information: • DHCP — Traces packets sent to and received from a DHCP server. • DDNS — Traces dynamic DNS update requests and responses.
Power cycle the chassis after disconnecting the enclosures and before reconnecting enclosures as, the drives retain the previous SCSI-3 Reservation until the chassis is power cycled.
18 Using LCD Panel Interface You can use the LCD panel on the chassis to perform configuration and diagnostics, and to obtain status information about the chassis and its contents. The following figure illustrates the LCD panel. The LCD screen displays menus, icons, pictures, and messages. Figure 4. LCD Display 1. LCD screen 3. Scroll buttons (4) 2.
No — Highlight and press the center button to answer "No" to a question and go to the next screen. Component Identify — Blinks the blue LED on a component. NOTE: There is a blinking blue rectangle around this icon when Component Identify is enabled. A status indicator LED on the LCD panel provides an indication of the overall health of the chassis and its components. • Solid blue indicates good health. • Blinking amber indicates that at least one component has a fault condition.
IP Summary Menu The IP Summary screen displays the IP information about the CMC (IPv4 and IPv6), and each server that is installed on the chassis. Use the up and down arrow buttons to scroll through the list. Use the left and right arrow buttons to scroll selected messages that are longer than the screen. Use the up and down arrow buttons to select the Back icon and press the center button to return to the Enclosure menu.
server’s System Event Log (SEL). For chassis errors, use the CMC web interface or command line interface to clear the hardware log. Front Panel LCD Messages This section contains two subsections that list error and status information that is displayed on the front panel LCD. Error messages on the LCD have a format that is similar to the System Event Log (SEL) viewed from the CLI or Web interface.
Table 46. Fan Status Item Description Name/Location Example: Fan1, Fan2, and so on. Error Messages If there are no errors, No Errors is displayed. Else, error messages are listed where critical ones are first listed, and then the warning-related. RPM Current fan speed in RPM. Table 47. PSU Status Item Description Name/Location Example: PSU1, PSU2, and so on. Error Messages If there are no errors, No Errors is displayed.
Item Description Slot Indicates the server slot to which the DVD is mapped to. Possible values are SLOT-<01 to 04>. Unmapped Displayed if the KVM is not mapped to any of the servers. Table 51. Blower Status Item Description Name/Location Example: Blower1, Blower2, and so on. Error Messages If there are no errors, No Errors is displayed. Else, error messages are listed where critical ones are first listed, and then the warning-related. RPM Current blower speed in RPM. Table 52.
Item Description Firmware version Firmware version of the Hard Disk Drive State Offline, Online, or Standby — Indicates the power status of the hard disk drive. Table 55. Server Status Item Description Name/Location Example: Server 1, Server 2, and so on. No Errors If there are no errors, No Errors is displayed. Else, error messages are listed where critical ones are first listed, and then the warning-related. For more information, see "LCD Error Messages". Slot Name Chassis slot name.
19 Frequently Asked Questions This section lists the frequently asked questions about the following: • RACADM • Managing and Recovering a Remote System • Active Directory • FlexAddress and FlexAddressPlus • IOM RACADM After performing a CMC reset (using the RACADM racreset subcommand), when a command is entered, the following message is displayed: racadm Transport: ERROR: (RC=-1) What does this message mean? Another command must be issued only after CMC completes the reset.
• • The cfgRacTuneHttpsPort property is changed (including when a config -f changes it). racresetcfg is used or a chassis configuration backup is restored. • • CMC is reset. A new SSL server certificate is uploaded. My DNS server doesn’t register my CMC? Some DNS servers only register names with a maximum of 31 characters. When accessing the CMC Web interface, a security warning stating that the SSL certificate was issued by a certificate authority that is not trusted is displayed.
The Dell-extended Active Directory Users and Computers Snap-In checks the mode and limits users in order to create objects across domains, if in a mixed mode. Does using CMC with Active Directory support multiple domain environments? Yes. The domain forest function level must be in Native mode or Windows 2003 mode. In addition, the groups among Association Object, RAC user objects, and RAC Device Objects (including Association Object) must be universal groups.
A feature card in the active CMC is active and installed in the chassis. The second card is ignored by CMC. Does the SD card have a write-protection lock on it? Yes it does. Before installing the SD card into the CMC module, verify the write protection latch is in the unlock position. The FlexAddress feature cannot be activated if the SD card is write protected. In this situation, the $racadm feature -s command returns this message: No features active on the chassis.