Dell Chassis Management Controller Version 3.
Notes, cautions, and warnings NOTE: A NOTE indicates important information that helps you make better use of your product. CAUTION: A CAUTION indicates either potential damage to hardware or loss of data and tells you how to avoid the problem. WARNING: A WARNING indicates a potential for property damage, personal injury, or death. © 2013 - 2018 Dell Inc. or its subsidiaries. All rights reserved. Dell, EMC, and other trademarks are trademarks of Dell Inc. or its subsidiaries.
Contents 1 Overview.......................................................................................................................................................14 What is new in this release.............................................................................................................................................. 15 Key Features..........................................................................................................................................................
Launching CMC Using Other Systems Management Tools................................................................................. 36 Downloading and Updating CMC Firmware................................................................................................................. 36 Setting Chassis Physical Location and Chassis Name................................................................................................ 36 Setting Chassis Physical Location and Chassis Name Using Web Interface...
Conversion of External Shared PERC 8 card High Availability to Non-High Availability Mode using RACADM.....................................................................................................................................................................49 Conversion of External Shared PERC 8 card Non-High Availability to High Availability Mode using RACADM............................................................................................................................................
Chassis Graphics.........................................................................................................................................................71 Selected Component Information............................................................................................................................ 73 Viewing Server Model Name and Service Tag....................................................................................................... 75 Viewing Chassis Summary...........
Accessing the Web page of a Member Chassis or Server.................................................................................... 91 Propagating Leader Chassis Properties to Member Chassis................................................................................ 91 Server Inventory for MCM group............................................................................................................................ 92 Saving Server Inventory Report.............................................
Adding or Saving Profile............................................................................................................................................ 111 Applying Profile.......................................................................................................................................................... 112 Importing Profile.......................................................................................................................................................
Extended Schema Active Directory Overview...................................................................................................... 137 Configuring Extended Schema Active Directory.................................................................................................. 138 Configuring Generic LDAP Users................................................................................................................................. 146 Configuring the Generic LDAP Directory to Access CMC.
Viewing WWN or MAC Address Information.............................................................................................................. 167 Viewing Basic WWN or MAC Address Information Using Web Interface............................................................... 168 Viewing Advanced WWN or MAC Address Information Using Web Interface....................................................... 169 Viewing WWN or MAC Address Information Using RACADM.................................................
External Power Management................................................................................................................................. 186 Configuring Power Budget and Redundancy Using CMC Web Interface......................................................... 187 Configuring Power Budget and Redundancy Using RACADM........................................................................... 187 Executing Power Control Operations..............................................................
Deleting Encryption Key Using RACADM............................................................................................................. 203 Encrypting Virtual Disks................................................................................................................................................ 203 Encrypting Virtual Disks Using CMC Web Interface........................................................................................... 203 Encrypting Virtual Disks Using RACADM........
Interpreting LED Colors and Blinking Patterns............................................................................................................221 Troubleshooting Non-responsive CMC....................................................................................................................... 222 Observing LEDs to Isolate the Problem................................................................................................................ 222 Troubleshooting Network Problems...........
1 Overview The Dell Chassis Management Controller (CMC) for Dell EMC PowerEdge VRTX is a Systems Management hardware and software solution for managing the PowerEdge VRTX chassis. The CMC has its own microprocessor and memory and is powered by the modular chassis into which it is plugged.
• What is new in this release • Key Features • Chassis Overview • Minimum CMC Version • Supported Remote Access Connections • Supported Platforms • Supported Web Browsers • Managing Licenses • Viewing Localized Versions of the CMC Web Interface • Supported Management Console Applications • How to use this Guide • Other Documents You May Need • Accessing documents from the Dell EMC support site What is new in this release This release of CMC for Dell EMC PowerEdge VRTX supports: •
• Power usage reporting. • Secure Sockets Layer (SSL) encryption — Provides secure remote system management through the web interface. • Launch point for the Integrated Dell Remote Access Controller (iDRAC) web interface. • Support for WS-Management. • FlexAddress feature — Replaces the factory-assigned World Wide Name/Media Access Control (WWN/MAC) addresses with chassisassigned WWN/MAC addresses for a particular slot. • iDRAC I/O Identity feature support for enhanced WWN/MAC Address Inventory.
Figure 1. CMC connectors and LEDs Table 1. CMC connectors and LEDs Item Indicator, Button, or Connector 1 Status/identification indicator (CMC 1) 2 Power indicator (CMC 1) 3 CMC connector ports (2) 4 Power indicator (CMC 2) 5 Status/identification indicator (CMC 2) A Back Panel view of the chassis is given here with a table that lists the parts and devices available in the CMC.
Figure 2. CMC back panel Table 2. CMC back panel — parts Item Indicator, Button, or Connector 1 PCIe expansion card slots low-profile (5) 2 PCIe expansion card slots full height (3) 3 CMC GB Ethernet port (CMC-2) 4 CMC GB Ethernet port (CMC-1) 5 Serial Connector 6 Blower modules (4) 7 I/O module ports 8 PSU 4 9 PSU 3 10 PSU 1 11 PSU 2 A Front Panel view of the chassis is given here with a table that lists the parts and devices available in the CMC.
Figure 3. Front-Panel Features And Indicators—3.5 Inch Hard Disk Drive Chassis Table 3. Front panel — features and indicators Item Indicator, Button, or Connector Description 1 USB connectors (2) Allows a keyboard and mouse to be connected to the system. 2 LCD panel Provides system information and status, and error messages to indicate when the system is operating correctly or when the system needs attention. 3 LCD menu scroll buttons (4) Moves the cursor in one-step increments.
Item Indicator, Button, or Connector Description 10 Video connector Allows a monitor to be connected to the system. 11 Server modules Up to four PowerEdge M520, M620, M630, or M640 server modules or 2 M820 server modules configured for the enclosure. Minimum CMC Version The following table lists the minimum CMC version required to enable the listed server modules. Table 4. Minimum CMC Version for server modules Servers Minimum version of CMC PowerEdge M520 CMC 1.36 PowerEdge M620 CMC 1.
Connection Features • Provides access only to the active CMC. Supported Platforms CMC supports modular servers designed for the PowerEdge VRTX platform. For information about compatibility with CMC, see the documentation for your device. For the latest supported platforms, see the Dell Chassis Management Controller (CMC) Version 3.0 for Dell PowerEdge VRTX Release Notes available at dell.com/support/manuals.
• Self-service portal — A link to the Self-Service Portal is available from CMC. Click this link to open the licensing Self-Service Portal on the internet from where you can purchase licenses. For more information, see the online help for the self-service portal page. • Point-of-sale — License is acquired while placing the order for a system. License Operations Before you perform the license management tasks, make sure to acquire the licenses.
Managing Licenses Using CMC Web Interface To manage the licenses using the CMC Web interface, go to Chassis Overview > Setup > Licenses. Before importing a license, make sure to store a valid license file on the local system or on a network share that is accessible from the CMC. The license is either embedded, or sent through an email from the Self-Service Web Portal, or from the License Key Management tool.
Feature Express Enterprise Extended iDRAC Management Yes Yes Remote Syslog No Yes Directory Services No* Yes iDRAC Single Sign-On No Yes Two-Factor Authentication No Yes PK Authentication No Yes Remote File Share Yes Yes Slot Resource Management No Yes Enclosure-level power capping No* Yes *For non-default power cap setting, only Restore Power Cap is allowed with an Express license. Restore Power Cap will reset the Power Cap settings to factory default.
Feature Express Enterprise Quick Deploy No Yes Notes Viewing Localized Versions of the CMC Web Interface To view localized versions of the CMC web interface, read through your web browser's documentations. Supported Management Console Applications CMC supports integration with Dell OpenManage Console. For more information, see the OpenManage Console documentation available at dell.com/support/manuals.
• The Dell PowerEdge VRTX Getting Started Guide shipped with your system provides an overview of system features, setting up your system, and technical specifications. • The setup placemat shipped with your system provides information about the initial system setup and configuration. • The server module's Owner's Manual provides information about the server module's features and describes how to troubleshoot the server module and install or replace the server module's components.
2 Installing and Setting Up CMC This section provides information about how to install your CMC hardware, establish access to CMC, configure your management environment to use CMC, and guides you through the tasks for configuring a CMC: • Set up initial access to CMC. • Access CMC through a network. • Add and configure CMC users. • Update CMC firmware. For more information about installing and setting up redundant CMC environments, see Understanding Redundant CMC Environment.
1 CMC and the management station, where you use your browser, must be on the same network, which is called the management network. Connect an Ethernet network cable from the CMC active port to the management network. 2 Install the I/O module in the chassis and connect the network cable to the chassis. 3 Insert the servers in the chassis. 4 Connect the chassis to the power source. 5 Press the power button, or turn on the chassis from the CMC web interface after completing the task in step 7.
Installing RACADM on a Linux Management Station 1 Log in as root to the system running a supported Red Hat Enterprise Linux or SUSE Linux Enterprise Server operating system where you want to install the managed system components. 2 Insert the Dell Systems Management Tools and Documentation DVD into the DVD drive. 3 To mount the DVD to a required location, use the mount command or a similar command.
Internet Explorer To edit the exception list in Internet Explorer: 1 Start Internet Explorer. 2 Click Tools > Internet Options > Connections. 3 In the Local Area Network (LAN) settings section, click LAN Settings. 4 In the Proxy server section, select the Use a proxy server for your LAN (These settings will not apply to dial-up or VPN connections) option, and then click Advanced.
Downloading Files From CMC With Internet Explorer When you use Internet Explorer to download files from the CMC, you may experience problems when the Do not save encrypted pages to disk option is not enabled. To enable the Do not save encrypted pages to disk option: 1 Start Internet Explorer. 2 Click Tools > Internet Options > Advanced. 3 In the Security section, select the Do not save encrypted pages to disk option.
• The LCD panel on the front of the chassis • Dell CMC serial console If you configure initial network settings after the CMC has an IP address, you can use any of the following interfaces: • Command line interfaces (CLIs) such as a serial console, Telnet, SSH, or the Dell CMC console. • Remote RACADM • CMC web interface • LCD Panel interface CMC supports both IPv4 and IPv6 addressing modes. The configuration settings for IPv4 and IPv6 are independent of each other.
Determine whether or not your network supports the above network speeds and set it accordingly. If the network configuration does not match any of these values, it is recommended to select the Auto (1 Gb) option, or refer to your network equipment manufacturer's user documentation. 4 Perform one of the following tasks: • Select Auto (1Gb), by pressing the center button, and then pressing the center button again. The Protocol panel is displayed. Go to step 6. • Select 10Mb, or 100Mb.
Table 9. Network mode Network mode Description Dynamic Host Configuration Protocol (DHCP) iDRAC retrieves IP configuration (IP address, mask, and gateway) automatically from a DHCP server on your network. The iDRAC is assigned a unique IP address allotted over your network. Press the center button. The IPMI Over LAN panel is displayed. Static If you select Static, manually enter the IP address, gateway, and subnet mask by following the instructions on the LCD screen.
NOTE: Telnet is not as secure as the other interfaces, hence it is disabled by default. Enable Telnet by using web, SSH, or remote RACADM. NOTE: Using more than one interface at the same time may generate unexpected results. Table 10. CMC Interfaces Interface Description Web interface Provides remote access to CMC using a graphical user interface. The Web interface is built into the CMC firmware and is accessed through the NIC interface from a supported web browser on the management station.
Interface Description • • • • DTMF Web site — dmtf.org/standards/profiles/ WSMan Release notes file. www.wbemsolutions.com/ws_management.html DMTF WSManagement Specifications: www.dmtf.org/standards/wbem/wsman Web services interfaces can be utilized by leveraging client infrastructure, such as Windows WinRM and Powershell CLI, open source utilities like WSManCLI, and application programming environments like Microsoft .NET.
You can view the chassis name while logging in to CMC using SSH, by selecting Show Chassis Name in SSH Prompt. By default, the Show Chassis Name in SSH Prompt option is cleared. NOTE: The Chassis Location field is optional. Use the Data Center, Aisle, Rack, and Rack Slot fields to indicate the physical location of the chassis. 3 Click Apply. The settings are saved.
– Chassis Overview > Chassis Controller > Troubleshooting. – Chassis Overview > Server Overview > Troubleshooting. NOTE: Only servers can be selected on this page. – Chassis Overview > I/O Module Overview > Troubleshooting. – Storage > Troubleshooting > Identify. NOTE: Physical disk per enclosures, virtual disks per enclosures, and external storage component LED can be selected on this page.
Configuring iDRAC Launch Method Using RACADM To update CMC firmware using RACADM, use the cfgRacTuneIdracDNSLaunchEnable subcommand. For more information, see the Chassis Management Controller for PowerEdge VRTX RACADM Command Line Reference Guide available at dell.com/support/manuals. Configuring Login Lockout Policy Attributes Using CMC Web Interface NOTE: To perform the following tasks, you must have Chassis Configuration Administrator privilege.
Understanding Redundant CMC Environment You can install a standby CMC that takes over if your active CMC stops functioning. The redundant CMC may be pre-installed or can be installed later. To make sure full redundancy or best performance, it is important that the CMC network is properly cabled. Failovers can occur when you: • Run the RACADM cmcchangeover command.
NOTE: You can configure the enclosure either with a single CMC or with redundant CMCs. In redundant CMC configurations, if the primary CMC loses communication with the enclosure or the management network, the standby CMC takes over the chassis management. Active CMC Election Process There is no difference between the two CMC slots; that is, slot does not indictate precedence. Instead, CMC that is installed or started first, assumes the role of an active CMC.
Accessing a Server Using KVM To map the server to the KVM and enable accessing the server remote console through the KVM interface, you can use the CMC web interface, RACADM, or the LCD interface. Mapping a Server to KVM Using CMC Web Interface Make sure the KVM console is connected to the chassis. To map a server to a KVM: 1 In the left pane, click Chassis Overview > Front Panel > Setup .
3 Logging in to CMC You can log in to CMC as a CMC local user, as a Microsoft Active Directory user, or as an LDAP user. The default user name and password is root and calvin respectively. You can also log in using Single Sign-On or a Smart Card. NOTE: CMC does not support the following special characters as user name or password from chassis profile using XML: " , ! , #, $, %, ^, &, *, (, ), -, _, +, =, ?, {, }, +, &, >, |, .
Logging in to CMC as a Local User, Active Directory User, or LDAP User To log in to CMC, you must have a CMC account with the Log In to CMC privilege. The default CMC user name is root, and the password is calvin. The root account is the default administrative account that ships with CMC. NOTE: • For added security, it is strongly recommended that you change the default password of the root account during initial set up. • When Certificate Validation is enabled, FQDN of the system should be provided.
To log in to CMC as an Active Directory user using a smart card: 1 Log in to CMC using the link https://. The CMC Login page is displayed asking you to insert a smart card. NOTE: If you changed the default HTTPS port number (port 80), access the CMC web page using :, where cmcname is the CMC host name for CMC, domain-nameis the domain name, and port number is the HTTPS port number. 2 Insert the smart card and click Login.
You are logged in to CMC. Related links Using Telnet console with CMC Configuring Linux Minicom Using SSH with CMC Accessing CMC Using RACADM RACADM provides a set of commands that allow you to configure and manage CMC through a text-based interface. RACADM can be accessed using a Telnet/SSH or serial connection, using the Dell CMC console on the KVM, or remotely using the RACADM command line interface installed on a management station.
Table 11. Multiple CMC sessions Interface Number of Sessions CMC web interface 4 RACADM 4 Telnet 4 SSH 4 Changing Default Login Password The warning message that prompts you to change the default password is displayed if: • You log in to CMC with Configure Users privilege. • Default password warning feature is enabled. • Default user name and password for any currently enabled account are root and calvin respectively.
For more information, see the Chassis Management Controller for PowerEdge VRTX RACADM Command Line Reference Guide available at dell.com/support/manuals. Enabling or Disabling Default Password Warning Message You can enable or disable the display of the default password warning message. To do this, you must have Configure Users privilege.
7 External Shared PERC 8 card is not in HighAvailabiltiy Mode and navigate to Storage→ Troubleshooting→ Setup Troubleshooting to view the Non-HA status. Conversion of External Shared PERC 8 card Non-High Availability to High Availability Mode using Web Interface Dell PowerEdge VRTX chassis must have 2 External Shared PERC 8 cards in PCI slot 5 and PCI slot 6. Workflow 1 Power down chassis. Disconnect all SAS cables from External Shared PERC 8 cards to MD12x0 enclosures. 2 Power Up chassis.
2 Power Up chassis. 3 Login to CMC Racadm and run the following command when the servers are in powered off state: racadm raid set controllers:RAID.ChassisSlot.5-1 –p HighAvailabilityMode ha 4 Run the command racadm raid set controllers:RAID.ChassisSlot.6-1 –p HighAvailabilityMode ha on External Shared PERC 8 card in slot 6. 5 Resetting both the PERCs may take two minutes to reflect in HA mode. 6 Power down chassis and connect the enclosures in HA Mode. 7 Power Up chassis.
4 Updating Firmware You can update firmware for: • CMC • Chassis infrastructure • VRTX Expander or Storage Backplane Expander Firmware of Inegrated or external enclosures • Physical Disks (HDD) per enclosure NOTE: You can update the HDD firmware only if required.
While updating VRTX Chassis firmware, it is recommended to update the firmware versions of the chassis components in the following order: 1 Blade components firmware 2 CMC firmware 3 Chassis infrastructure firmware 4 Shared PERC8 firmware (integrated and external) 5 Internal Storage Backplane firmware and external enclosure's expanders 6 HDD firmware (external and integrated enclosures) For more information about the update sequence for VRTX chassis, see the CMC Firmware 3.
If you have redundant CMCs installed in the chassis, it is recommended to update both the CMCs to the same firmware version, at the same time, with a single operation. If CMCs have different firmware and a failover occurs, unexpected results may occur. NOTE: • The CMC firmware cannot be updated to any earlier version other than 2.0 for a chassis that is configured with 1600W PSU. • CMC firmware update or roll back is supported only for firmware versions 1.2, 1.25, 1.3, 1.31, 1.35, 1.36, 2.0, 2.01 and 2.
NOTE: • To view the MD12x0 cabling diagram, refer to Upgrading PowerEdge VRTX to Support Shared Storage Expansion User's Guide or Dell Shared PowerEdge RAID Controller (PERC) 8 Cards For Dell PowerEdge VRTX Systems User’s Guide available at dell.com/ support/manuals. • The external shared storage adapter requires that you update the CMC v2.20 or later and mainboard v2.21 or later to support External Shared PERC 8 card. • You cannot downgrade the CMC firmware prior to 2.2 with external shared adapters.
5 For a standby CMC, when the update is complete, the Update State field displays Done. For an active CMC, during the final phases of the firmware update process, the browser session and connection with CMC is lost temporarily because the active CMC is not connected to the network. You must log in after a few minutes, when the active CMC has restarted. After CMC resets, the new firmware is displayed on the Firmware Update page. NOTE: After the firmware update, delete the files from the web browser cache.
Updating Chassis Infrastructure Firmware Using RACADM To update chassis infrastructure firmware using RACADM, use the fwupdate sub-command. For more information about using the RACADM commands, see the Chassis Management Controller for PowerEdge VRTX RACADM Command Line Reference Guide. Updating Server iDRAC Firmware You can update firmware for iDRAC using the CMC Web interface or the RACADM. To use this feature, you must have an Enterprise License. The iDRAC firmware version must be 1.40.
Updating Server Component Firmware The one-to-many update feature in CMC enables you to update server component firmware across multiple servers. You can update the server components using the Dell Update Packages available on the local system or on a network share. This operation is enabled by leveraging the Lifecycle Controller functionality on the server. The Lifecycle Controller service is available on each server and is facilitated by iDRAC.
NOTE: The Single Click all blade update method has the following benefits: • Enables you to update all the components on all the blade servers with minimal clicks. • All the updates are packaged in a directory. This avoids individual upload of each component’s firmware. • Faster and consistent method of updating the server components • Enables you to maintain a standard image with the required updates versions of the server components that can be used to update multiple servers in a single operation.
Enabling Lifecycle Controller You can enable the Lifecycle Controller service when turning on a server: • For iDRAC servers, on the boot console, to access System Setup, press the key. • On the System Setup Main Menu page, go to iDRAC Settings > Lifecycle Controller, click Enabled. Go to the System Setup Main Menu page and click Finish to save the settings. Canceling System Services enables you to cancel all scheduled jobs that are pending and remove them from the queue.
NOTE: Automatic filtering feature is important while using the Dell Update Package (DUP). The update programming of a DUP can be based on the type or model of a component or device. The automatic filtering behavior is designed to minimize the subsequent selection decisions after an initial selection is made. Following are some examples where the filtering mechanisms are applied: • If the BIOS filter is selected, only the BIOS inventory of all the servers is displayed.
Viewing Firmware Inventory You can view the summary of the firmware versions for all components and devices for all servers currently present in the chassis along with their status. NOTE: To use this feature, you must have an Enterprise License. Viewing Firmware Inventory Using CMC Web Interface To view the firmware inventory: 1 In the left pane, click Server Overview, and then click Update.
Field Description Job Status Displays the job status of any operations that are scheduled on the server. The job status is continuously updated dynamically. If a job completion with state completed is detected, then the firmware versions for the components and devices on that server are automatically refreshed in case there has been a change of firmware version on any of the components or devices.
• Profile Folder • Domain Name • User Name • Password • SMB Version NOTE: The SMB Version option is available only if the Protocol type is CIFS. NOTE: If you are using CIFS that is registered with a domain, and are accessing the CIFS using the IP with the CIFS local user credentials, it is mandatory to enter the hostname or host IP in the Domain Name field. For more information, see the CMC Online Help. 3 Click Test Directory to verify whether the directories are readable and writeable.
Reinstalling Server Component Firmware You can reinstall the firmware image of the currently installed firmware for selected components or devices across one or more servers. The firmware image is available within the Lifecycle Controller. Re-installing Server Component Firmware Using Web Interface To reinstall a server component firmware: 1 In the left pane, click Server Overview > Update. 2 On the Server Component Update page, in the Choose Update Type section, select Update from File.
BIOS updates are specific to the model of the server. Sometimes, even though a single Network Interface Controller (NIC) device is selected for firmware update on a server, the update may get applied to all the NIC devices on the server. This behavior is inherent in the Lifecycle Controller functionality and particularly the programming contained with the Dell Update Package (DUP). Currently, Dell Update Packages (DUP) that are less than 48 MB in size are supported.
Server Component Single Click Update Using Network Share The Servers or server component update from a network share using Dell Repository Manager and Dell PowerEdge VRTX chassis integration simplifies the update by using customized bundle firmware, so that you can deploy faster and more easily. Update from a network share provides flexibility to update all the 12G server components at the same time with a single catalog either from a CIFS or from a NFS.
NOTE: Click Collapse against a slot to collapse the component and device firmware details for the specific slot. Alternatively, to view all the details again, click Expand. 6 In the Component/Device Firmware Inventory section, select the check box against Select/Deselect All to select all the supported servers. Alternatively, select the check box against the server for which you want to update the server component firmware. You cannot select individual components for the server.
Platform M630 M830 M640 Server Component Previous Component Version (N-1 Version) Updated Component Version (N Version) BIOS 2.6.1 2.6.1 iDRAC 2.52.52.52 2.60.60.60 Lifecycle Controller 2.52.52.52 2.60.60.60 Diagnostics 4239.44 4239A36 BIOS 2.6.0 2.7.1 iDRAC 2.52.52.52 2.60.60.60 Lifecycle Controller 2.52.52.52 2.60.60.60 Diagnostics 4239.44 4239A36 BIOS 2.5.4 2.7.1 iDRAC 3.15.15.15 3.21.21.21 Lifecycle Controller 3.15.15.15 3.21.21.
To update the storage components: 1 In the left pane, click Chassis Overview > Storage > Update. 2 On the Storage Component Update page, click Browse. The Choose to Upload File dialog box is displayed 3 Browse to location where the required DUP file was downloaded and saved from the Dell support Site and select the DUP file, and click Open. 4 Click Upload. The DUP file name and path are displayed in the Browse field. The DUP is uploaded to CMC.
5 Viewing Chassis Information and Monitoring Chassis and Component Health You can view information and monitor the health of the following: • Active and standby CMCs • All severs and individual servers • IO Module • Fans • Power Supply Units (PSUs) • Temperature sensors • Hard disk drives • LCD assembly • Storage controllers • PCIe devices NOTE: The health of external components impacts the overall health of the storage component with existing storage health and integrated storage compone
To view the chassis health, click Chassis Overview. The system displays the overall health status of the chassis, active and standby CMCs, server modules, IO Module (IOM), fans, blowers, power supply units (PSUs), LCD assembly, storage controller, and PCIe devices. Detailed information about each component is displayed when you click that component. In addition, the latest events in the CMC Hardware Log are also displayed. For more information, see the Online Help.
Icon Description A server is present, but reporting a noncritical error. A server is present, but reporting a critical error. A server is not present. Table 15. Server Icon States in 14th generation systems Icon Description A server is present, turned on, and is operating normally. A server is present, but turned off. A server is present, but reporting a noncritical error. A server is present, but reporting a critical error.
Icon Description A server is not present. NOTE: By default, the server state icons for Dell's 13th generation PowerEdge systems are displayed if, you insert a 14th generation PowerEdge server when the chassis is turned off.
Component Health and Performance Properties Properties Quick Links NOTE: Quick links for Power Off Server and Graceful Shutdown are displayed only if the server power state is On. If the server power state is Off, the quick link for Power On Server is displayed.
Component Blower SPERC Slot External Shared PERC 8 card slot IOM Slot Health and Performance Properties Properties Quick Links • Fan Offset • Speed • Warning Threshold • Fans Status • PWM (% of Max) • Critical Threshold • Fan Configuration • Enhanced Cooling Mode • Installed • Model • Controller Status • Assigned • Controller Setup • Server Slot Mapping • Vendor ID • Device ID • Slot Type • Allocated Power • Fabric • Power Status • Installed • Model • PCI
The Chassis Controller Status page is displayed. For more information, see the Online Help. Viewing Information and Health Status of All Servers To view the health status of all the servers, do one of the following: • Click Chassis Overview. The Chassis Health page displays a graphical overview of all the servers installed in the chassis. Server health status is indicated by the overlay of the server subgraphic. For more information about the chassis health, see the Online Help.
NOTE: The CMC monitors the temperature sensors in the chassis and automatically adjust the fan speed as needed. However, you can override to maintain a minimum fan speed by the racadm fanoffset command. When overriden using this command, the CMC will always run the fan to the selected speed even though the chassis does not require the fans to run at that speed. CMC generates an alert and increases the fan speeds when the following events occur: • CMC ambient temperature threshold is exceeded.
For more information about the fan offset-related RACADM commands, see the Chassis Management Controller for PowerEdge VRTX RACADM Command Line Reference Guide available at dell.com/support/Manuals. Enhanced Cooling Mode (ECM) — Is a feature in the CMC that allows increased cooling capacity for the servers installed within the PowerEdge VRTX chassis. Example uses for ECM are operation in a high ambient environment or using servers with high power (≥120W) CPUs installed.
Alternatively, go to Chassis Overview > Front Panel > Properties > Status. On the Status page, under the LCD Properties, you can view the status of the LCD available on the chassis. For more information, see Online Help. Viewing Information and Health Status of Temperature Sensors To view the health status of the temperature sensors: In the left pane, click Chassis Overview > Temperature Sensors.
6 Configuring CMC Chassis Management Controller enables you to configure properties, set up users, and alerts to perform remote management tasks. Before you begin configuring the CMC, you must first configure the CMC network settings to allow CMC to be managed remotely. This initial configuration assigns the TCP/IP networking parameters that enable access to the CMC. For more information, see Setting Up Initial Access to CMC. You can configure CMC using Web interface or RACADM.
Viewing and Modifying CMC Network LAN Settings The LAN settings, such as community string and SMTP server IP address, affect both the CMC and the external settings of the chassis. If you have two CMCs (active and standby) on the chassis that are connected to the network, the standby CMC automatically assumes the network settings of the active CMC in the event of failover. When IPv6 is enabled at boot time, three router solicitations are sent after every four seconds.
To enable or disable the CMC IPv4 addressing, type: racadm config -g cfgLanNetworking -o cfgNicIPv4Enable 1 racadm config -g cfgLanNetworking -o cfgNicIPv4Enable 0 NOTE: The CMC IPv4 addressing is enabled by default. To enable or disable the CMC IPv6 addressing, type: racadm config -g cfgIpv6LanNetworking -o cfgIPv6Enable 1 racadm config -g cfgIpv6LanNetworking -o cfgIPv6Enable 0 NOTE: Note the following: • There is a 30 seconds delay between changing a network setting and actually applying it.
To disable the DHCP for DNS address feature and specify the static preferred and alternate DNS server addresses, type: racadm config -g cfgLanNetworking -o cfgDNSServersFromDHCP 0 To disable the DHCP for DNS address feature for IPv6 and specify the static preferred and alternate DNS server addresses, type: racadm config -g cfgIPv6LanNetworking -o cfgIPv6DNSServersFromDHCP6 0 Setting Static DNS IP addresses NOTE: The static DNS IP addresses settings are not valid unless the DCHP for DNS address feature is d
You can disable auto negotiation and specify the duplex mode and network speed by typing: racadm config -g cfgNetTuning -o cfgNetTuningNicAutoneg 0 racadm config -g cfgNetTuning -o cfgNetTuningNicFullDuplex where: is 0 (half duplex) or 1 (full duplex, default) racadm config -g cfgNetTuning -o cfgNetTuningNicSpeed where: is 10 or 100 (default).
5 Click Apply to save your settings. Configuring IP Range Attributes Using RACADM You can configure the following IP Range attributes for CMC using RACADM: • IP range checking feature • Range of IP addresses that you want to block from accessing CMC • IP Range Mask that you want to block from accessing CMC IP filtering compares the IP address of an incoming login to the IP address range that is specified.
For example: racadm config -g cfgLanNetworking -o cfgNicVLanPriority 7 You can also specify both the VLAN ID and the VLAN priority with a single command: racadm setniccfg -v For example: racadm setniccfg -v 1 7 4 To remove the CMC VLAN, disable the VLAN capabilities of the external chassis management network: racadm config -g cfgLanNetworking -o cfgNicVLanEnable 0 You can also remove the CMC VLAN using the following command: racadm setniccfg -v Configuring Virtual LAN Tag Propert
The following features/applications support FIPS. • • • • • • • • Web GUI RACADM WSMan SSH v2 SMTP Kerberos NTP Client NFS NOTE: SNMP is not FIPS-compliant. In FIPS mode, all SNMP features except Message Digest algorithm version 5 (MD5) authentication work. Enabling FIPS Mode Using CMC Web Interface To enable FIPS: 1 In the left pane, click Chassis Overview. The Chassis Health page is displayed. 2 On the menu bar, click Network. The Network Configuration page is displayed.
accepting and responding to secure HTTP requests from clients. This service is required by the web interface and remote RACADM CLI tool for communicating with CMC. If the web server resets, wait at least one minute for the services to become available again. A web server reset usually happens as a result of any of the following events: • • • • Network configuration or network security properties are changed through the CMC web user interface or RACADM.
# # # # # # # # cfgSsnMgtWebServerActiveSessions=N/A cfgSsnMgtWebServerTimeout=N/A cfgSsnMgtSSHMaxSessions=N/A cfgSsnMgtSSHActiveSessions=N/A cfgSsnMgtSSHTimeout=N/A cfgSsnMgtTelnetMaxSessions=N/A cfgSsnMgtTelnetActiveSessions=N/A cfgSsnMgtTelnetTimeout=N/A Configuring CMC Extended Storage Card You can enable or repair the optional Removable Flash Media for use as an extended non-volatile storage. Some CMC features depend on extended nonvolatile storage for their operation.
Adding Members To Chassis Group After the Chassis Group is set up, to add members to the group: 1 Log in with chassis administrator privileges to the leader chassis. 2 Select the lead chassis in the tree. 3 Click Setup > Group Administration. 4 Under Group Management, enter the member’s IP address or DNS name in the Hostname/IP Address field. 5 In the User Name field, enter a user name with chassis administrator privileges for the member chassis.
Disabling an Individual Member at the Member Chassis Sometimes a member cannot be removed from a group by the lead chassis. This can happen if network connectivity to the member is lost. To remove a member from a group at the member chassis: 1 Log in with chassis administrator privileges to the member chassis. 2 In the left pane, click Chassis Overview > Setup > Group Administration. 3 Select None, and then click Apply.
If On-Change Propagation is selected, the member chassis take on the properties of the leader. If Manual Propagation is selected, click Propagate whenever you want to propagate the chosen settings to member chassis. For more information on propagation of leader chassis properties to member chassis, see the Online Help. Server Inventory for MCM group A group is a lead chassis that has 0 to 8 chassis group members.
Data Field Example Slot Name SLOT-01 Host Name Corporate Webserver NOTE: Requires a Server Administrator agent running on the Server; otherwise shown as blank. Operating System Windows Server 2008 NOTE: Requires a Server Administrator agent running on the Server; otherwise shown as blank. Model PowerEdgeM610 Service Tag 1PB8VF1 Total System Memory 4.0 GB NOTE: Requires VRTX CMC 1.0 (or later) on member; otherwise shown as blank. # of CPUs 2 NOTE: Requires VRTX CMC 1.
Viewing Selected Chassis Inventory Using Web Interface To view the selected chassis inventory using CMC Web interface: 1 In the system tree, select Group. click Properties > Firmware Version. The Chassis Group Firmware Version page displays all the chassis in the group. 2 In the Select a Chassis section, select the member chassis for which you want to view the inventory.
To save the current chassis configuration, perform the following tasks: 1 Go to the Chassis Configuration Profiles page. In the Save and Backup > Save Current Configuration section, enter a name for the profile in the Profile Name field. NOTE: While saving the current chassis configuration, the standard ASCII extended character set is supported. However, the following special characters are not supported: “, ., *, >, <, \, /, :, and | 2 Select one of the following profile types from the Profile Type opti
Applying Chassis Configuration Profiles You can apply chassis configuration to the chassis if the chassis configuration profiles are available as stored profiles on the network share. To initiate a chassis configuration operation, you can apply a stored profile to a chassis. To apply a profile to a chassis, perform the following tasks: 1 Go to the Chassis Configuration Profiles page. In the Stored Profiles section, select the stored profile that you want to apply. 2 Click Apply Profile.
Configuring Multiple CMCs Using RACADM Using RACADM, you can configure one or more CMCs with identical properties. When you query a specific CMC card using its group ID and object ID, RACADM creates the racadm.cfg configuration file from the retrieved information. By exporting the file to one or more CMCs, you can configure your controllers with identical properties in a minimal amount of time.
Follow these guidelines when you create a .cfg file: • If the parser encounters an indexed group, it is the value of the anchored object that differentiates the various indexes. The parser reads in all of the indexes from the CMC for that group. Any objects within that group are modifications when the CMC is configured. If a modified object represents a new index, the index is created on the CMC during configuration. • You cannot specify a desired index in a .cfg file. Indexes may be created and deleted.
You cannot specify which index is used. If the index already exists, it is either used or the new entry is created in the first available index for that group. The racadm getconfig -f .cfg command places a comment in front of index objects, allowing you to see the included comments.
# comment, the rest of this line is ignored cfgNicGateway=10.35.9.1 The command racadm config -f .cfg parses the file and identifies any errors by line number. A correct file updates the proper entries. Additionally, you can use the same getconfig command from the previous example to confirm the update. Use this file to download company-wide changes or to configure new systems over the network with the command, racadm getconfig -f .cfg.
2 To import the chassis configuration profiles from NFS network share, type the following: racadm set –f clone.xml –t xml –l xx.xx.xx.xx:/PATH You can import chassis configuration profiles from network share through remote RACADM interface. 1 To import the chassis configuration profiles from CIFS network share, type the following: racadm –r xx.xx.xx.xx –u USERNAMECMC –p PASSWORDCMC set –f clone.xml –t xml –l // xx.xx.xx.
The Sessions page displays the session ID, username, IP address, and session type. For more information about these properties, see the Online Help. 2 To end the session, click Terminate for a session. Viewing and Ending CMC Sessions Using RACADM You must have administrator privileges to end CMC sessions using RACADM. To view the current user sessions, use the getssninfo command. To end a user session, use the closessn command.
7 Configuring Servers You can configure the following settings of a server: • Slot Names • iDRAC Network Settings • DRAC Virtual LAN Tag Settings • First Boot Device • Server FlexAddress • Remote File Share • BIOS Settings Using Server Clone Topics: • Configuring Slot Names • Configuring iDRAC Network Settings • Configuring iDRAC Virtual LAN Tag Settings • Setting First Boot Device • Configuring Server FlexAddress • Configuring Remote File Share • Configuring Profile Settings Usin
The slot name setting in the web interface resides on CMC only. If a server is removed from the chassis, the slot name setting does not remain with the server. The slot name setting in the CMC web interface always overrides any change you make to the display name in the iDRAC interface. To edit a slot name using the CMC Web interface: 1 In the left pane, go to Chassis Overview > Server Overview > Setup > Slot Names. 2 On the Slot Names page, edit the slot name, in the Slot Name field.
Setting Description . Set iDRAC Root Password on Server Insertion Select the option to change iDRAC root password to match the value provided in the iDRAC Root Password field, when a server is inserted. iDRAC Root Password When the Set iDRAC Root Password on Server Insertion and QuickDeploy Enabled options are selected, this password value is assigned to a server's iDRAC root user password when the server is inserted into a chassis.
Setting Description Enable iDRAC DNS Name Select Enable iDRAC DNS Name to apply the iDRAC DNS name prefix to the blade servers inserted in the chassis. By default, the Enable iDRAC DNS Name is disabled. iDRAC DNS Name (Prefix) You can configure the iDRAC DNS name prefix only if Enable iDRAC DNS Name is selected. The DNS name prefix can contain a maximum of 59 and a minimum of one character.
Modifying iDRAC Network Settings for Individual Server iDRAC Using this feature, you can configure the iDRAC network configurations settings for each installed server. The initial values displayed for each of the fields are the current values read from the iDRAC. To use this feature, you must have an Enterprise License. To modify the iDRAC Network Settings: 1 In the left pane, click Server Overview, and then click Setup.
Configuring iDRAC Virtual LAN Tag Settings Using RACADM • Specify the Virtual LAN ID and priority of a particular server with the following command: racadm setniccfg -m server- -v The valid values for are 1–4. The valid values for are 1–4000 and 4021–4094. Default is 1. The valid values for are 0–7. Default is 0.
You can set the following devices for first boot. Table 19. Boot Devices Boot Device Description PXE Boot from a Preboot Execution Environment (PXE) protocol on the Network Interface Card. Hard Drive Boot from the hard disk drive on the server. Local CD/DVD Boot from a CD or DVD drive on the server. Virtual Floppy Boot from the virtual floppy drive. The floppy drive (or a floppy disk image) is on another computer on the management network, and is attached using the iDRAC GUI console viewer.
Setting First Boot Device Using RACADM To set the first boot device, use the cfgServerFirstBootDevice object. To enable boot once for a device, use the cfgServerBootOnce object. For more information about these objects, see the Chassis Management Controller for PowerEdge VRTX RACADM Command Line Reference Guide available at dell.com/support/manuals.
Configuring Profile Settings Using Server Configuration Replication The server configurations replicating feature allows you to apply all profile settings from a specified server to one or more servers. Profile settings that can be replicated are those profile settings which can be modified and are intended to be replicated across servers. The following three profile groups for servers are displayed and can be replicated: • BIOS — This group includes only the BIOS settings of a server.
Removing or disabling the nonvolatile extended storage media prevents access to stored profile and disables the Server Configuration Replication feature. To add or save a profile: 1 Open the Server Profiles page. In the Server Profiles section, click Apply and Save Profiles. 2 Select the server from whose settings you want to generate the profile, and then click Save Profile. The Save Profile section is displayed. 3 Select Extended Storage or Network Share as the location to save the profile.
The selected profile is applied to the server(s) and the server(s) may be restarted immediately, if necessary. For more information, see the CMC Online Help. Importing Profile You can import a server profile that is stored on a management station to CMC. To import a stored profile from CMC: 1 In the Server Profiles page, in the Stored Profiles section, click Import Profile. The Import Server Profile section is displayed.
To edit a stored profile: 1 Go to the Server Profiles page. In the Stored Profiles section, select the required profile and then click Edit Profile. The Edit Server Profile — section is displayed. 2 Edit the profile name and description of the server profile as required and then click Edit Profile. NOTE: You can edit the profile description only for profiles stored on SD cards. For more information, see the Online Help.
configuration replication operation, and the replication log message description. The log entries are also available in the RAC log. To view the other available entries, click Go to Profile Log. The Profile Log page is displayed. For more information, see the Online Help. Completion Status And Troubleshooting To check the completion status of an applied BIOS profile: 1 In the left pane, click Chassis Overview > Server Overview > Setup > Profiles.
NOTE: • If an assigned profile is on the Network Share which is not accessible when a server is inserted in the slot, the LCD displays a message that the assigned profile is not available for Slot . • The Network Share option is enabled and the details are displayed in the Stored Profiles section only if the network share is mounted and is accessible. If the Network Share is not connected, configure the Network Share for the chassis.
NOTE: Boot identity is saved only if the Network Share option is enabled and accessible, the details are displayed in the Stored Profiles section. If the Network Share is not connected, configure the network share for the chassis. To configure the network share, click Edit in the Stored Profiles section. For more information, see Configuring Network Share Using CMC Web Interface.
Clearing Boot Identity Profiles Before applying a new boot identity profile to a standby server, you can clear the existing boot identity configurations of a selected server by using the Clear Identity option available in the CMC web interface. To clear boot identity profiles: 1 Go to the Server Profiles page. In the Boot Identity profiles section, select the server from which you want to clear the boot identity profile.
To delete a stored profile, perform the following tasks:: 1 Go to the Server Profiles page. In the Boot Identity Profiles > Stored Profiles section, select the required profile, and then click Delete Profile. 2 Click OK to delete the selected profile. A warning message is displayed indicating that deleting a profile would delete the selected profile permanently. For more information, see the CMC Online Help.
3 Enter the count of the MAC addresses that you want to add, in the Number of MAC Addresses field. The valid values are from 1 to 3000. 4 Click OK to add MAC addresses. For more information, see the CMC Online Help. Removing MAC Addresses You can remove a range of MAC addresses from the network share by using the Remove MAC Addresses option available in the CMC web interface. NOTE: You cannot remove MAC addresses if they are active on the node or are assigned to a profile.
NOTE: If the iDRAC network LAN is disabled (LAN Enabled = No), single sign-on is not available. If you click Launch iDRAC GUI, an error page may be displayed, if: • the server is removed from the chassis • the iDRAC IP address is changed • the iDRAC network connection experiences a problem. In MCM, while launching the iDRAC web interface from a member chassis, the user credentials of the leader and member chassis must be the same.
Launching Remote Console from Server Status Page To launch a remote console for an individual server: 1 In the left pane, expand Server Overview. All the four servers appear in the expanded servers' list. 2 Click the server for which you want to launch the remote console. 3 On the Server Status page, click Launch Remote Console.
8 Configuring CMC To Send Alerts You can set alerts and actions for certain events that occur on the chassis. An event is generated when a device or service’s status has changed or an error condition is detected. If an event matches an event filter and you have configured this filter to generate an alert message (email alert or SNMP trap), then an alert is sent to one or more configured destinations such as email address, IP address, or an external server.
3 • System Health • Storage • Configuration • Audit • Updates Select one or more of the following severity levels: • Critical • Warning • Informational The Monitored Alerts section displays the results based on the selected category and severity. For information about the field descriptions on the this page, see the Online Help. 4 Click Apply. Setting Event Alerts Using RACADM To set an event alert, run the eventfilters command.
The IP alert destinations are configured. Configuring SNMP Trap Alert Destinations Using RACADM To configure IP alert destination using RACADM: 1 Open a serial/Telnet/SSH text console to CMC and log in. NOTE: Only one filter mask may be set for both SNMP and email alerting. If you have already selected the filter mask, do not perform task 2, and go to step 3.
Configuring Email Alert Settings When CMC detects a chassis event, such as an environmental warning or a component failure, it can be configured to send an email alert to one or more email addresses. Configure the SMTP email server to accept relayed emails from the CMC IP address, a feature which is normally turned off in most mail servers due to security concerns. For instructions to configure in a secure manner, see the documentation that was provided with the SMTP server.
6 Specify the name of the person receiving the email alert: racadm config -g cfgEmailAlert -o cfgEmailAlertEmailName -i where is the name of the person or group receiving the email alert, and is the index value specified in step 4 and step 5. The email name can contain up to 32 alphanumeric characters, dashes, underscores, and periods. Spaces are not valid. 7 Set up the SMTP host: racadm config -g cfgRemoteHosts -o cfgRhostsSmtpServerIpAddr host.
9 Configuring User Accounts and Privileges You can set up user accounts with specific privileges (role-based authority) to manage your system with CMC and maintain system security. By default, CMC is configured with a local administrator account. The default user name is rootand the password is calvin. As an administrator, you can set up user accounts to allow other users to access the CMC.
Privilege Description • Is associated with the chassis, such as slot name and slot priority. Although these properties apply to the servers, they are strictly chassis properties relating to the slots rather than the servers themselves. For this reason, slot names and slot priorities can be added or changed whether or not servers are present in the slots. When a server is moved to a different chassis, it inherits the slot name and priority assigned to the slot it occupies in the new chassis.
Privilege Description Configure Users: • • Set iDRAC root password iDRAC reset Server Control Administrator: • • • • • Power on Power off Power cycle Graceful shutdown Server Reboot Test Alert User User can send test alert messages. Debug Command Administrator User can execute system diagnostic commands. Fabric A Administrator User can set and configure the Fabric A IOM.
User Group Privileges Granted • • • • • • None Clear Logs Administrator Chassis Control Administrator (Power commands) Server Administrator Test Alert User Debug Command Administrator Fabric A Administrator No assigned permissions Table 22.
To add and configure local CMC users: 1 In the left pane, click Chassis Overview, and then click User Authentication. 2 On the Local Users page, in the User ID column, click a user ID number. The User Configuration page is displayed. NOTE: User ID 1 is the root user account that is shipped by default with a CMC. This cannot be changed. 3 Enable the user ID and specify the user name, password, and access privileges for the user. For more information about the options, see the Online Help.
The following example describes how to add a new user named "John" with a "123456" password and login privileges to the CMC.
NOTE: On the following Operating Systems, you can recognize the users of CMC users by using Active Directory. • Microsoft Windows 2000 • Microsoft Windows Server 2003 • Microsoft Windows Server 2008 You can configure user authentication through Active Directory to log in to the CMC. You can also provide role-based authority, which enables an administrator to configure specific privileges for each user.
NOTE: The Bit Mask values are used only when setting Standard Schema with the RACADM. NOTE: For more information about user privileges, see Types of Users. Configuring Standard Schema Active Directory To configure CMC for an Active Directory login access: 1 On an Active Directory server (domain controller), open Active Directory Users and Computers Snap-in. 2 Using the CMC Web interface or RACADM: a b 3 Create a group or select an existing group. Configure the role privileges.
11 Log out and then log in to CMC to complete the CMC Active Directory configuration. 12 Select Chassis in the system tree, and navigate to the Network tab. The Network Configuration page is displayed. 13 Under Network Settings, if Use DHCP (for CMC Network Interface IP Address) is selected, select Use DHCP to obtain DNS server address. To manually enter a DNS server IP address, clear Use DHCP to obtain DNS server addresses and type the primary and alternate DNS server IP addresses.
In this case, you must upload the CA certificate using the following RACADM command: racadm sslcertupload -t 0x2 -f NOTE: If certificate validation is enabled, specify the Domain Controller Server addresses and the Global Catalog FQDN. Make sure that DNS is correctly configured. Extended Schema Active Directory Overview Using the extended schema solution requires the Active Directory schema extension.
You can create as many or as few association objects as required. However, you must create at least one Association Object, and you must have one RAC device object for each RAC (CMC) on the network that you want to integrate with Active Directory. The Association Object allows as many or as few users and/or groups as well as RAC Device Objects. However, the Association Object only includes one Privilege Object per Association Object.
• LDIF script file If you use the LDIF script file, the Dell organizational unit is not added to the schema. The LDIF files and Dell Schema Extender are located on your Dell Systems Management Tools and Documentation DVD in the following respective directories: • DVDdrive:\SYSMGMT\ManagementStation\support\OMActiveDirectory_Tools\Remote_Management_Advanced\LDIF_Files • :\SYSMGMT\ManagementStation\support\OMActiveDirector y_Tools\Remote_Management_Advanced\Schema Extender To use the LDIF file
Table 26. delliDRACAssociationObject Class OID 1.2.840.113556.1.8000.1280.1.7.1.2 Description Represents the Dell Association Object. The Association Object provides the connection between the users and the devices. Class Type Structural Class SuperClasses Group Attributes dellProductMembers dellPrivilegeMember Table 27. dellRAC4Privileges Class OID 1.2.840.113556.1.8000.1280.1.1.1.3 Description Defines the privileges (Authorization Rights) for CMC device.
OID 1.2.840.113556.1.8000.1280.1.1.1.5 Attributes dellAssociationMembers Table 30. List of Attributes Added to the Active Directory Schema Assigned OID/Syntax Object Identifier Single Valued Attribute: dellPrivilegeMember FALSE Description: List of dellPrivilege objects that belong to this attribute. OID: 1.2.840.113556.1.8000.1280.1.1.2.1 Distinguished Name: (LDAPTYPE_DN 1.3.6.1.4.1.1466.115.121.1.
Assigned OID/Syntax Object Identifier Single Valued Boolean (LDAPTYPE_BOOLEAN 1.3.6.1.4.1.1466.115.121.1.7) Attribute: dellIsTestAlertUser TRUE Description: TRUE if the user has Test Alert User rights on the device. OID: 1.2.840.113556.1.8000.1280.1.1.2.10 Boolean (LDAPTYPE_BOOLEAN 1.3.6.1.4.1.1466.115.121.1.7) Attribute: dellIsDebugCommandAdmin TRUE Description: TRUE if the user has Debug Command Admin rights on the device. OID: 1.2.840.113556.1.8000.1280.1.1.2.11 Boolean (LDAPTYPE_BOOLEAN 1.3.6.1.4.
When you install your systems management software using the Dell Systems Management Tools and Documentation DVD, you can extend the Snap-in by selecting the Active Directory Users and Computers Snap-in option during the installation procedure. See the Dell OpenManage Software Quick Installation Guide for additional instructions about installing systems management software. For 64-bit Windows Operating Systems, the Snap-in installer is located at :\SYSMGMT\ManagementStation\support\OMActiveDirect o
Adding Objects To Association Object Using the Association Object Properties window, you can associate users or user groups, privilege objects, and RAC devices or RAC device groups. If your system is running on Microsoft Windows 2000 operating system or later version, use Universal Groups to span domains with your user or RAC objects. You can add groups of Users and RAC devices. Adding Users Or User Groups To add users or user groups: 1 Right-click the Association Object and select Properties.
– Specify a Domain — enter the domain name to use for the DNS lookup • 4 To enable CMC to use the specified Active Directory Domain Controller server addresses, select Specify Domain Controller Addresses . These are the addresses of the domain controllers where the CMC device object and the associated objects are located. Click Apply to save the settings. NOTE: You must apply the settings before continuing. If you do not apply the settings, the settings are lost when you navigate to the next page.
To disable the certificate validation during an handshake (optional): racadm config -g cfgActiveDirectory -o cfgADCertValidationEnable 0 NOTE: In this case, you do not have to upload a CA certificate.
Authorization Of LDAP Users To authorize a user: 1 Search each configured group for the user's domain name within the member or uniqueMember attributes. An administrator can configure a user domain. 2 For every user group that the user belongs to, give the user appropriate user access rights and privileges. Configuring Generic LDAP Directory Service Using CMC Web Interface To configure the generic LDAP directory service: NOTE: You must have the Chassis Configuration Administrator privilege.
Configuring Generic LDAP Directory Service Using RACADM To configure the LDAP directory service, use the objects in cfgLdap and cfgLdapRoleGroup RACADM groups. There are many options to configure LDAP logins. In most of the cases, some options can be used with their default settings. NOTE: It is highly recommended to use the racadm testfeature -f LDAP command to test the LDAP settings for first time setups. This feature supports both IPv4 and IPv6.
10 Configuring CMC For Single Sign-On Or Smart Card Login This section provides information to configure CMC for Smart Card login and Single Sign-On (SSO) login for Active Directory users. SSO uses Kerberos as an authentication method allowing users, who have signed in as an automatic- or single sign-on to subsequent applications such as Exchange.
Client Systems • For only Smart Card login, the client system must have the Microsoft Visual C++ 2005 redistributable. For more information see www.microsoft.com/downloads/details.aspx?FamilyID= 32BC1BEEA3F9-4C13-9C99-220B62A191EE&displaylang=en • For Single Sign-On or smart card login, the client system must be a part of the Active Directory domain and Kerberos Realm. CMC • Each CMC must have an Active Directory account. • CMC must be a part of the Active Directory domain and Kerberos Realm.
For information about configuring CMC for Extended Schema Active Directory, see Extended Schema Active Directory Overview. Configuring Browser For SSO Login Single Sign-On (SSO) is supported on Internet Explorer versions 6.0 and later, and Firefox versions 3.0 and later. NOTE: The following instructions are applicable only if CMC uses Single Sign-On with Kerberos authentication.
NOTE: For information about the options, see the Online Help. 1 2 While configuring Active Directory to set up user account, perform the following additional steps: • Upload the keytab file. • To enable SSO, select the Enable Single Sign-On option. • To enable smart card login, select the Enable Smart-Card Login option. NOTE: If these two options are selected, all command line out-of-band interfaces, including secure shell (SSH), Telnet, Serial, and remote RACADM remain unchanged . Click Apply.
11 Configuring CMC to Use Command Line Consoles This section provides information about the CMC command line console (or serial/Telnet/Secure Shell console) features, and explains how to set up the system so that you can perform systems management actions through the console. For information about using the RACADM commands in CMC through the command line console, see the Chassis Management Controller for PowerEdge VRTX RACADM Command Line Reference Guide.
If your management station is running Microsoft Windows XP or Microsoft Windows Server 2003, you may experience an issue with the characters in a CMC Telnet session. This issue may occur as a frozen login where the return key does not respond and the password prompt does not appear. To fix this issue, download hotfix 824810 from support.microsoft.com. For more information, you can also see Microsoft Knowledge Base article 824810.
Scheme Type Scheme • • • • • • RIJNDAEL192-CBC AES128-CBC RIJNDAEL128-CBC BLOWFISH-128-CBC 3DES-192-CBC ARCFOUR-128 Message Integrity • • • • HMAC-SHA1-160 HMAC-SHA1-96 HMAC-MD5-128 HMAC-MD5-96 Authentication Password Configure Public Key Authentication Over SSH You can configure up to six public keys that can be used with the service username over an SSH interface.
To use the PuTTY Key Generator to create a basic key for clients running Windows: 1 Start the application and select SSH-2 RSA or SSH-2 DSA for the type of key to generate (SSH-1 is not supported). 2 Enter the number of bits for the key. Ensure that the RSA key size is between 1024 and 4096. NOTE: 3 • The recommended DSA key length is 1024. • CMC may not display a message if you add keys less than 1024 or greater than 4096, but when you try to log in with these keys, CMC stops responding.
To view one key at a time, replace all with a number from 1 – 6. For example, to view key 2, type: racadm sshpkauth –i svcacct –k 2 –v Adding Public Keys To add a public key to the CMC using the file upload -f option, at the commond line interface console, enter: racadm sshpkauth –i svcacct –k 1 –p 0xfff –f NOTE: You can use only the file upload option with remote RACADM. For more information, see Chassis Management Controller for PowerEdge VRTX RACADM Command Line Reference Guide.
7 Select Modem and Dialing and press . 8 In the Modem Dialing and Parameter Setup menu, press to clear the init, reset, connect, and hangup settings so that they are blank, and then press to save each blank value. 9 When all specified fields are clear, press to exit the Modem Dialing and Parameter Setup menu. 10 Select Exit From Minicom and press . 11 At the command shell prompt, type minicom .
When you reference the IOM in the connect command, the IOM is mapped to switch as shown in the following table. Table 34. Mapping IO Module to Switches IO Module Label Switch A1 switch-a1 or switch- 1 NOTE: At a time, there can be only one IOM connection per chassis. NOTE: You cannot connect to pass-throughs from the serial console. To connect to a managed-server serial console, run the command connect server-n, where n is 1–4. You can also use the racadm connect server-n command.
Configuring Windows for Serial Console Redirection There is no configuration necessary for servers running the Microsoft Windows Server versions, starting with Windows Server 2003. Windows receives information from the BIOS, and enable the Special Administration Console (SAC) console one COM1. Configuring Linux for Server Serial Console Redirection During Boot The following steps are specific to the Linux GRand Unified Bootloader (GRUB). Similar changes are necessary for using a different boot loader.
When you edit the /etc/grub.conf file, follow these guidelines: • Disable GRUB's graphical interface and use the text-based interface. Else, the GRUB screen is not displayed in console redirection. To disable the graphical interface, comment out the line starting with splashimage. • To start multiple GRUB options to start console sessions through the serial connection, add the following line to all options: console=ttyS1,57600 The example shows console=ttyS1,57600 added to only the first option.
cancel it.
12 Using FlexAddress and FlexAdress Plus This section provides information about FlexAddress, FlexAddress Plus, and configuring. NOTE: An Enterprise License must be installed on the CMC to use the Flexaddress feature.
is used for this unique MAC address range. The mac_count tag is the total number of MAC addresses that the SD card allocates. The total MAC range allocated can be determined by: + - 1 = For example: (starting_mac)00188BFFDCFA + (mac_count)0xCF - 1 = (ending_mac)00188BFFDDC8 . NOTE: Lock the SD card prior to inserting in the USB Memory Card Reader to prevent accidentally modifying any contents. Unlock the SD card before inserting into CMC.
Status Message Actions the SD feature card installed is the active CMC and not the standby CMC. The feature card inserted is valid and contains the following feature(s) FlexAddress: bound. No action required. The feature card inserted is valid and contains the following feature(s) FlexAddress: bound to another chassis, svctag=ABC1234, SD card SN = 1122334455. Remove the SD card; locate and install the SD card for the current chassis.
NOTE: By using the racresetcfg subcommand, you can reset the Flex Address of a CMC to its factory-default setting, which is “disabled”. The RACADM syntax is: racadm racresetcfg -c flex For more information about the FlexAddress-related RACADM commands and data about the other factory-default properties, see the Chassis Management Controller for PowerEdge VRTX RACADM Command Line Reference Guide available at dell.com/ cmcmanuals. The server must be turned off before you begin configuration.
where, = A or iDRAC and = 0 or 1 0 is disable and 1 is enable. To enable or disable slots, use the following RACADM command: racadm setflexaddr [-i where, = 1 or 4 and = 0 or 1 0 is disable and 1 is enable. For more information about the setflexaddr command, see the Chassis Management Controller for PowerEdge VRTX RACADM Command Line Reference Guide.
• Protocol that is being used on the NIC Adapter port. For example, LAN, ISCI, and FCoE. • Fibre Channel World Wide Name (WWN) configuration and Media Access Control (MAC) addresses of a slot in the chassis. • MAC address assignment type and the current active address type — Server assigned, FlexAddress, or I/O Identity MAC. A black check mark indicates the active address type, either server-assigned, chassis-assigned, or remote assigned.
For information about the fields, see the Online Help. Viewing Advanced WWN or MAC Address Information Using Web Interface To view WWN/MAC Address Information for each server slot or all servers in a chassis, in the advanced mode: 1 Click Server Overview > Properties > WWN/MAC The WWN/MAC Summary page displays the WWN/MAC Address Information. 2 From the View drop-down menu, select Advanced, to view the WWN/MAC Addresses attributes in detailed view.
To display the iSCSI MAC for a specific server, use the following RACADM command: racadm getmacaddress [-m [-x]] [-t iscsi] To display the user-defined MAC and WWN address, use the following RACADM command: racadm getmacaddress -c io-identity racadm getmacaddress -c io-identity -m server -2 To display the console assigned MAC/WWN of all LOMs or mezzanine cards, use the following RACADM command: racadm getmacaddress -c all To display the chassis assigned WWN/MAC address, use the following RACADM com
Situation Command Output Guest user attempts to set FlexAddress on slots/fabrics. $racadm setflexaddr [-f ] ERROR: Insufficient user privileges to perform operation $racadm setflexaddr [-i ] $racadm feature -d -c flexaddress ERROR: Unable to deactivate the feature because the chassis is powered ON Guest user tries to deactivate the feature $racadm feature -d -c flexaddress on the chassis.
product if you retain no copies and the recipient agrees to the terms hereof. Any transfer must include the most recent update and all prior versions. You may not reverse engineer, decompile or disassemble the Software. If the package accompanying your computer contains compact discs, 3.5" and/or 5.25" disks, you may use only the disks appropriate for your computer.
This license is effective until terminated. It terminates upon the conditions set forth above or if you fail to comply with any of its terms. Upon termination, you agree that the Software and accompanying materials, and all copies thereof, is destroyed. This agreement is governed by the laws of the State of Texas. Each provision of this agreement is severable.
13 Managing Fabrics The chassis supports a fabric type, which is Fabric A. Fabric A is used by the single I/O Module, and is always connected to the on-board Ethernet adapters of the servers. The chassis has only one I/O module (IOM), where the IOM is a pass-through or switch module. The I/O Module is classified as group A. Chassis IOM uses a discrete data path called Fabric, and it is named A. The Fabric A supports only Ethernet.
NOTE: Do not configure I/O module network settings for Ethernet pass-through and Infiniband switches. Configuring Network Settings for IOM Using CMC Web Interface To configure the network settings for I/O Module: 1 In the left pane, click Chassis Overview, click I/O Module Overview, and then click Setup. Alternatively, to configure the network settings of the only available I/O module that is A, click A Gigabit Ethernet, and then click Setup.
14 Managing and Monitoring Power The PowerEdge VRTX chassis is the most power-efficient modular server enclosure. It is designed to include highly efficient power supplies and fans, has an optimized layout for the air to flow more easily through the system, and contains power-optimized components throughout the enclosure.
• Assigning Priority Levels To Servers Using RACADM • Viewing Power Consumption Status • Viewing Power Budget Status Using CMC Web Interface • Redundancy Status and Overall Power Health • Configuring power budget and redundancy • Executing Power Control Operations • Executing Power Control Operations on a Server • Executing Power Control Operations for Multiple Servers Using CMC Web Interface • Executing Power Control Operations on the IOM Redundancy Policies Redundancy policy is a configu
Power Supply Redundancy Policy The power supply redundancy policy is useful when redundant power grids are not available, but you may want to be protected against a single PSU failure bringing down your servers in a modular enclosure. The highest capacity PSU is kept in online reserve for this purpose. This forms a Power Supply redundancy pool. PSUs beyond those required for power and redundancy are still available and is added to the pool in the event of a failure.
NOTE: With DPSE in enabled state, if power demand increases in both the two Power Redundancy policy modes, the standby PSUs are brought Online to reclaim power. Default Redundancy Configuration As shown in the table here, the default redundancy configuration for a chassis depends on the number of PSUs that it contains. Table 37.
When a server is turned on in an enclosure, the iDRAC software reestimates the power requirements and requests a subsequent change in the power envelope. CMC supplies the requested power to the server, and the allocated wattage is subtracted from the available budget. After the server is granted a power request, the server's iDRAC software continuously monitors the actual power consumption. On the basis of actual power requirements, the iDRAC power envelope may change over a period of time.
enough power to run at their maximum performance or they may not even power on at all, depending on how low the system input power cap is set and the server power requirements. If an administrator manually powers on the low priority server modules before the higher priority ones, then the low priority server modules are the first modules to have their power allocation lowered down to the minimum value, in order to accommodate the higher priority servers.
Viewing Power Consumption Status Using RACADM To view power consumption status using RACADM: Open a serial/Telnet/SSH text console to CMC, log in, and type: racadm getpminfo AC Power Recovery If the AC power supply of a system is disrupted, the chassis is restored to the previous power state before the AC power loss. The restoration to the previous power state is the default behavior.
Power Management After PSU Failure When an insufficient-power event occurs, such as a PSU failure, CMC reduces power supply to the servers . After reducing the power, CMC reevaluates the power needs of the chassis. If power requirements are still not met, CMC turns off the lower priority servers. However, this is done on the basis of power redundancy policy that you set on your CMC. A redundant server can tolerate the loss of power without impacting the performance of the servers.
If the subsequent power capacity or the user power capacity is greater than the server allocations, servers have degraded performance or, in an extrement case, servers may be turned off. Both conditions are in reverse-priority order; that is, the low-priority servers are turned off first. The following table provides the firmware response to a PSU turnoff, or removal as it applies to various PSU redundancy configurations. Table 39.
Configuring power budget and redundancy You can configure the power budget, redundancy, and dynamic power of the entire chassis (chassis, servers, I/O module, KVM, CMC, and power supplies), which uses four power supply units (PSUs). The power management service optimizes power consumption and reallocates power to different modules based on the requirement.
Server Power Reduction to Maintain Power Budget CMC reduces power allocations of low-priority servers, when additional power is required to maintain the system power consumption within the user-configured System Input Power Cap. For example, when a new server is engaged, CMC may decrease power to lowpriority servers to allow more power for the new server.
When the Maximum Power Conservation Mode is enabled, the CMC sets the System Input Power Capacity to the maximum that the chassis can handle. CMC does not allow power to exceed the highest capacity. However, PM3 handles all other power capacity limitations. When PM3 management of power is disabled, the CMC reverts to the server priority settings before the external management was enabled. NOTE: When PM3 management is disabled, CMC does not revert to the earlier setting of the maximum chassis power.
For example, the following command sets the maximum power budget to 4800 Watt: racadm config -g cfgChassisPower -o cfgChassisPowerCap 4800 • To enable or disable dynamic PSU engagement, type: racadm config -g cfgChassisPower -o cfgChassisDynamicPSUEngagementEnable where is 0 (disable), 1 (enable). The default is 0.
Executing Power Control Operations on the Chassis CMC enables you to remotely perform several power management actions, such as an orderly shutdown on the entire chassis (chassis, servers, IOM, and PSUs). NOTE: To perform power management actions, you must have the Chassis Configuration Administrator privilege.
Executing Power Control Operations for Multiple Servers Using CMC Web Interface To execute power control operation for multiple servers using the Web interface: 1 In the left pane, click Server Overview > Power. The Power Control page is displayed.
15 Managing Chassis Storage On the Dell PowerEdge VRTX, you can perform the following operations: • View the status of physical disks drives and storage controllers. • View the properties of controllers, physical disk drives, virtual disks, and enclosures. • Set up controllers, physical disk drives, and virtual disks. • Assign virtual adapters. • Troubleshoot controller, physical disk drives, and virtual disks. • Update storage components.
• Applying Virtual Adapter Access Policy To Virtual Disks • Modifying Virtual Disk Properties Using CMC Web Interface • Enclosure Management Module • Viewing Enclosure Properties Using CMC Web Interface Viewing Status of the Storage Components To view the status of the storage components: 1 In the left pane, click Chassis Overview > Storage > Properties > Storage Overview.
– Correct Firmware on Chassis Infrastructure – Shared PERCs have the same settings: Indicates whether or not SPERCs have the same settings.
NOTE: • You can map only one virtual adapter to one server at a time. • Without an appropriate license, you can unmap a VA–server assignment, or map the VA to the default serve, only. • The default mapping is VA1–Server Slot 1, VA2–Server Slot 2, VA3–Server Slot 3, and VA4–Server Slot 4. • If full height server is inserted, then the upper slot has the VA mapped to it while the bottom slot is still unmapped. For example, a full height in slot 1 has VA1 assigned to slot 1 and VA3 is still unmapped.
• Provides uptime for all storage applications even when a controller stops functioning. • Provides access to critical functions of the chassis at all times. • Enables server to handle situations when controller stops functioning are becomes faulty. • Makes use of component redundancy Using the fault-tolerant feature of controllers, you can manage the tasks associated with shared storage that are achieved by having an active and passive (peer) controller.
NOTE: If the Controllers are in fault-tolerant mode, then the following information regarding the fault-tolerant status and mode is also displayed: • Fault Tolerant Mode – Shared, Active/Passive • Fault Tolerant Status – Healthy/Normal, or Lost/Degraded • Peer Controller - Indicates the name of controller that acts as the peer (stand-by) in case of a fault-tolerant mode supported by two controllers NOTE: If the peer controller is disabled, the name is displayed as Disabled PERC (Integrated 2) or Disab
The attribute values for the selected controller are updated in the table. 3 Type or select appropriate data, and then click Apply. NOTE: For information about the attributes and other field descriptions, see Online Help. The newly set properties are applied to the selected controllers and the Current Value field displays the updated values for the attributes. Configuring Storage Controller Settings Using RACADM To set up the storage controller by running a RACADM command, use the following syntax.
NOTE: • The chassis must be turned on and all server modules must be turned off before you run the enable or disable commands. The chassis is automatically power cycled as part of this operation. After changing the Shared PERC operation mode, it is recommended to reset the CMC using the Troubleshooting page or the racadm racreset command. • By default if second integrated PERC 8 cards are detected, then the mode displays high availability mode.
◦ Enable RAID Controller — Enables the RAID controller. If the PERC is already disabled, then Enable Raid Controller option is available in the drop-down menu. • Reset Configuration — Select this option to delete virtual drive and unassign all the hot spares attached to the controller. However, this only removes the disks from the configuration and does not delete any data. NOTE: Reset Configuration does not remove any foreign configurations. Use Clear Foreign Configuration to reset.
NOTE: The following attributes are displayed for fault-tolerant mode of integrated shared adapters: • Active controller — Shared PERC8 (Integrated 1) • Redundant/Failover controller — Shared PERC8 (Integrated 2) The following attributes are displayed for fault-tolerant mode of external shared adapters: • Active controller — Shared PERC8 (SPERC Slot 5) • Redundant/Failover controller — Shared PERC8 (SPERC Slot 6) You can also use the following filters to view specific physical disk drive's properties
Viewing Virtual Disk Properties Using CMC Web Interface Make sure that the virtual disks are created. To view the virtual disk properties: 1 In the left pane, click Chassis Overview > Storage > Virtual Disks > Properties. 2 On the Properties page, under the Virtual Disks section, click the properties: . You can also use the following filters to view specific virtual disk • Under Basic Virtual Disks Filter section, from the Controller drop-down menut, select controller name, and then click Apply.
Creating Encryption Key Using CMC Web Interface You can create encryption or security keys for controllers if the encryption key is Unconfigured. To create an encryption key: 1 In the left pane, go to Storage > Controllers > Setup. 2 From the Security Key drop-down, select Create Security Key. A pop-up window is displayed. 3 Enter the security key and password and click OK. 4 On the Controller Setup page, click Apply.
After you delete the encryption key, all the SEDs that are not part of the virtual disks are secure-erased. For more information, see the Online Help. Deleting Encryption Key Using RACADM To delete an encryption key by running a RACADM command, use the following syntax: racadm raid deletesecuritykey:RAID.ChassisIntegrated.1-1 For more information, see the Chassis Management Controller PowerEdge VRTX RACADM Command Line Reference Guide.
Once drives are unlocked, you can import the foreign configuration using the CMC web interface or RACADM. If the controller is power cycled after the unlock and before the import phase, the drives are locked again. If the system has multiple foreign configurations, unlock and import each foreign configuration before unlocking the foreign configuration. The key ID used in unlocking is used only to identify the drives with matching the key ID.
Performing Cryptographic Erase If the physical disk is part of a virtual disk, remove it from the virtual disk before performing cryptographic erase. To perform a cryptographic erase: 1 In the left pane, go to Storage > Physical Disks > Setup. 2 Select the physical disk from which you want to erase the data. 3 From the Physical Disk Actions drop-down, select Cryptographic Erase and click Apply. The Configure Physical Disks page is displayed. A message is displayed prompting you to confirm the action.
Enclosure Management Module Enclosure Management Module (EMM) provides data path and enclosure management tasks for enclosure. EMM monitors and controls the enclosure components and access to the drives. EMM communicates enclosure attributes and states to the host server.
NOTE: The rollup status of the enclosure turns critical when the EMM, PSU, or Fan is removed but the primary Status remains unchanged. After the CMC or chassis is power cycled, the primary status also changes to critical. Viewing Status and Attributes of Enclosure Using RACADM To view the status of the enclosure, use racadm raid get enclosures —o —p Status command. To view the attributes of the enclosure, use racadm raid get enclosures —o command.
Viewing Temperature Probe Status and attributes of the Enclosure Temperature probe status displays the status of the temperature sensors of the enclosure. Sensors contain a status value that is unique from the enclosure. You can have up to four temperature sensors or probes and enclosure firmware creates a status for each sensor. You must have CMC Login privileges to view probe status.
To set the maximum warning threshold of temperature probe in the enclosure, use racadm raid set tempprobes:TempSensor.Embedded.0:Enclosure.External.1-0:RAID.ChassisSlot.6-1 –p MaximumWarningThreshold command. For more information, see the Chassis Management Controller for PowerEdge VRTX RACADM Command Line Reference Guide available at dell.com/support/manuals.
16 Managing PCIe Slots By default, all slots are unmapped. You can do the following: • View the status of all PCIe Slots in the chassis. • Assign or remove an assigned PCIe slot from the servers. Consider the following before assigning a PCIe slot to a server: • An empty PCIe slot cannot be assigned to a server that is turned on. • A PCIe slot with an adapter assigned to a server cannot be assigned to another server if the currently-assigned server (source) is turned on.
• To view the information about one PCIe slot, click Chassis Overview > PCIe Slot > Properties > Status. NOTE: User Interface differentiates the external PCIe slots which contains SPERC (or any shared) devices installed from external PCIE slots with dedicated adapters as these shared devices have different properties.
PCIe Power Ride-Through Newly assigned PCIe cards in CMC VRTX must be discovered and initialized before a server node is powered on.
Configuring PCIe Ride-through Properties Using CMC Web Interface To configure the PCIe Ride-through properties for CMC VRTX: 1 In the left pane, click Chassis Overview > Setup > Ridethrough. The PCIe Ridethrough Settings page is displayed. 2 To enable or disable the PCIe Ride-through feature, select or clear the Enable PCIe Ridethrough option. NOTE: By default, the Ride-through feature is enabled and the time period set for 300 seconds.
17 Troubleshooting and Recovery This section explains how to perform tasks related to recovering and troubleshooting problems on the remote system using the CMC web interface. • Viewing chassis information. • Viewing the event logs. • Gathering configuration information, error status, and error logs. • Using the diagnostic console. • Managing power on a remote system. • Managing Lifecycle Controller jobs on a remote system. • Reset components.
• Re-insert the CMC module to chassis, after the CMC is in online state, the default credential is active (User Name: root/ Password: calvin) • Login to CMC using default credential and change the password • After the password is changed, remove CMC module and jumper from Password recovery header • Re-insert the CMC module to chassis, after the CMC is in online state, the new credential is active Gathering Configuration Information, Chassis Status, and Logs Using RACDUMP The racdump subcommand provi
Subsystem RACADM Command System event log getsel Downloading SNMP Management Information Base File The CMC SNMP Management Information Base (MIB) file defines the chassis types, events, and indicators. CMC enables you to download the MIB file using the web interface. To download the CMC's SNMP MIB file using the CMC web interface: 1 In the left pane, click Chassis Overview > Network > Services > SNMP. 2 In the SNMP Configuration section, click Save to download the CMC MIB file to your local system.
– Resolution C: Check for the server slot power priority of the slot associated with the newly-inserted server, and then ensure it is not lesser than any other server slot power priority. • Problem: Available power keeps changing, even when the modular enclosure configuration has not changed.
Viewing Hardware Logs Using CMC Web Interface You can view, save, and clear the hardware log. You can sort the log entries based on Severity, Date/Time, or Description by clicking the column heading. Subsequent clicks on the column headings reverse the sort. To view the hardware logs using CMC Web interface, in the left pane, click Chassis Overview > Logs. The Hardware Log page is displayed.
Viewing Chassis Logs Using the Web Interface You can view, save, and clear the chassis log. You can filter the logs based on the log type and filter. Additionally, you can even perform a search based on a keyword or view the logs on specified days. In the left pane, click Chassis Overview > Logs > Chassis Log. The Chassis Log page is displayed. To save a copy of the chassis log to your managed station or network, click Save Log and then specify a location save the log file.
NOTE: • CMC does not reset upon restoring configuration, however CMC services may take some time to effectively impose any changed or new configuration. After successful completion, all current sessions are closed. • Flexaddress information, server profiles, and extended storage are not saved or restored with the Chassis Configuration.
Interpreting LED Colors and Blinking Patterns The LEDs on the chassis provide the following status of a component: • Steadily glowing green LEDs indicate that the component is turned on. If the green LED is blinking, it indicates a critical but routine event, such as a firmware upload, during which the unit is not operational. It does not indicate a fault. • A blinking amber LED on a module indicates a fault on that module. • Blue, blinking LEDs are configurable by the user and used for identification.
Component Blower PSU Enclosure LED Color, Blinking Pattern Status Blue, glowing steadily Normal Blue, blinking User-enabled module identifier Amber, glowing steadily Not used Amber, blinking Fault Blue, dark No fault Green, glowing steadily Fan working Green, blinking Not used Green, dark Turned off Amber, glowing steadily Fan type not recognized, update the CMC firmware Amber, blinking Fan fault; tachometer out of range Amber, dark Not used (Oval) Green, glowing steadily AC OK
– An image corruption. In this case, upload the CMC firmware image to recover the CMC. NOTE: A normal CMC boot or reset takes over a minute to fully boot into its operating system and be available for login. The blue LED is enabled on the active CMC. In a redundant, two-CMC configuration, only the upper-right green LED is enabled on the standby CMC. Troubleshooting Network Problems The integrated CMC trace log allows you to debug CMC alerts and networking.
Hotplugging enclosures in fault-tolerant chassis 1 Make sure that slots 5 and 6 chassis are not fault-tolerant. 2 Disconnect the enclosures. 3 Change the status of slots 5 and 6 to fault-tolerant mode. 4 Reconnect the enclosures in fault-tolerant cabling. Power cycle the chassis after disconnecting the enclosures and before reconnecting enclosures as, the drives retain the previous SCSI-3 Reservation until the chassis is power cycled.
18 Using LCD Panel Interface You can use the LCD panel on the chassis to perform configuration and diagnostics, and to obtain status information about the chassis and its contents. The following figure illustrates the LCD panel. The LCD screen displays menus, icons, pictures, and messages. Figure 4.
Table 44. LCD Panel Navigational Icons Icon Normal Icon Highlighted Icon Name and Description Back — Highlight and press the center button to return to the previous screen. Accept/Yes — Highlight and press the center button to accept a change and return to the previous screen. Skip/Next — Highlight and press the center button to skip any changes and go to the next screen. No — Highlight and press the center button to answer "No" to a question and go to the next screen.
NOTE: The DVD Mapping feature is displayed on the LCD Main Menu screen only if you have a DVD drive installed. Enclosure Menu From this screen, you can navigate to the following screens: • Front Status • Rear Status • Side Status • Enclosure Status Use the navigation buttons to highlight the desired item (highlight the Back icon to return to the Main Menu), and then press the center button. The selected screen is displayed.
Default Screen The Default Screen allows you to change the screen that the LCD panel displays when there is no activity at the panel. The factory default screen is the Main Menu.
Table 45. CMC Status Item Description Name/Location Example: CMC1, CMC2. No Errors If there are no errors, No Errors is displayed. Else, error messages are listed where critical ones are first listed, and then the warning-related. Firmware Version Only displays on an active CMC. Displays Standby for the standby CMC. IP4 Displays current IPv4 enabled state only on an active CMC. IP4 Address: Only displays if IPv4 is enabled only on an active CMC.
Item Description Status Offline, Online, or Standby — Indicates the power status of a PSU. Maximum Wattage Maximum Wattage that PSU can supply to the system. Table 49. IOM Status Item Description Name/Location IOM A Error Messages If there are no errors, No Errors is displayed. Else, error messages are listed where critical ones are first listed, and then the warning-related. Status Off or On — Indicates whether the IOM is functioning. Model Model of the IOM. Fabric Type Networking type.
Item Description RPM Current blower speed in RPM. Table 53. SPERC Status Item Description SPERC: Displays the SPERC name in the format SPERC n, where 'n' is the SPERC number. Example: SPERC 1, SPERC 2, and so on. Error Messages If there are no errors, No Errors is displayed. Else, error messages are listed where critical ones are first listed, and then the warning-related. Working Status On or Off — Indicates whether the SPERC is functioning. Name: Name of the shared PERC.
Item Description Firmware version Firmware version of the Hard Disk Drive State Offline, Online, or Standby — Indicates the power status of the hard disk drive. Table 56. Server Status Item Description Name/Location Example: Server 1, Server 2, and so on. No Errors If there are no errors, No Errors is displayed. Else, error messages are listed where critical ones are first listed, and then the warning-related. For more information, see "LCD Error Messages". Slot Name Chassis slot name.
The information is displayed only if iDRAC has completed booting. For more information on this feature, see the RACADM Command Line Reference Guide for CMC in PowerEdge VRTX.
19 Frequently Asked Questions This section lists the frequently asked questions about the following: • RACADM • Managing and Recovering a Remote System • Active Directory • FlexAddress and FlexAddressPlus • IOM Topics: • RACADM • Managing and Recovering a Remote System • Active Directory • FlexAddress and FlexAddressPlus • IOM RACADM After performing a CMC reset (using the RACADM racreset subcommand), when a command is entered, the following message is displayed: racadm Tran
An error message Not Found is displayed while using the $ logout and $ quit commands. Managing and Recovering a Remote System Why are the remote RACADM and Web-based services unavailable after a property change? It may take a minute for the remote RACADM services and the web interface to become available after the CMC Web server resets. The CMC web server is reset after the following occurrences: • Changing the network configuration or network security properties using the CMC web user interface.
To ensure that the CSR matches the registered DNS CMC name: 1 In the left pane, click Chassis Overview. 2 Click Network. The Network Configuration page appears. 3 Select the Register CMC on DNS option. 4 Type a CMC name in the DNS CMC Name field. 5 Click Apply Changes. Active Directory Does Active Directory support CMC login across multiple trees? Yes. The CMC’s Active Directory querying algorithm supports multiple trees in a single forest.
FlexAddress and FlexAddressPlus What happens if a feature card is removed? There is no visible change if a feature card is removed. Feature cards can be removed and stored, or can be left in place. What happens if a feature card that was used in one chassis is removed and put into another chassis? The Web interface displays the following error message: This feature card was activated with a different chassis. It must be removed before accessing the FlexAddress feature.
No feature card inserted. What happens to FlexAddress feature if the server BIOS is updated from version 1.xx to version 2.xx? The server module must be turned off before it can be used with FlexAddress. After the server BIOS update is complete, the server module does not get chassis-assigned addresses until the server is power cycled.