Dell PS-M4110 User Manual
Dell PS-M4110 User Manual

Dell PS-M4110 User Manual

Firmware version 4.3
Hide thumbs Also See for PS-M4110:
Table of Contents

Advertisement

Dell Chassis Management Controller Firmware
Version 4.3 User's Guide

Advertisement

Table of Contents
loading

Summary of Contents for Dell PS-M4110

  • Page 1 Dell Chassis Management Controller Firmware Version 4.3 User’s Guide...
  • Page 2: Notes, Cautions, And Warnings

    CAUTION: A CAUTION indicates either potential damage to hardware or loss of data and tells you how to avoid the problem. WARNING: A WARNING indicates a potential for property damage, personal injury, or death. © 2013 Dell Inc. Trademarks used in this text: Dell , the Dell logo, Dell Boomi , Dell Precision , OptiPlex...
  • Page 3: Table Of Contents

    Contents Notes, Cautions, and Warnings....................2 1 Overview.............................13 ..........................14 What Is New In This Release ................................14 Key Features .............................14 Management Features .............................15 Security Features ..............................15 Chassis Overview .............................16 CMC Port Information ............................17 Minimum CMC Version ........................18 Supported Remote Access Connections ...............................19 Supported Platforms ............................19 Supported Web Browsers...
  • Page 4 ...................32 Setting Chassis Physical Location and Chassis Name ..........32 Setting Chassis Physical Location and Chassis Name Using Web Interface ............33 Setting Chassis Physical Location and Chassis Name Using RACADM ..........................33 Setting Date and Time on CMC ................33 Setting Date and Time on CMC Using CMC Web Interface ....................33 Setting Date and Time on CMC Using RACADM ..................33...
  • Page 5 ..................48 Updating Server iDRAC Firmware Using RACADM ........................48 Updating Server Component Firmware ...........................49 Enabling Lifecycle Controller ....................50 Filtering Components for Firmware Updates ..........................51 Viewing Firmware Inventory .........................52 Lifecycle Controller Job Operations .......................55 Recovering iDRAC Firmware Using CMC 5 Viewing Chassis Information and Monitoring Chassis and Component Health.....57 .......................57 Viewing Chassis Component Summaries ..............................58...
  • Page 6 ..............68 Configuring Virtual LAN Tag Properties for CMC Using RACADM ..............................69 Configuring Services .....................69 Configuring Services Using CMC Web Interface ......................70 Configuring Services Using RACADM ......................70 Configuring CMC Extended Storage Card ............................71 Setting Up Chassis Group .........................71 Adding Members to Chassis Group ......................72 Removing a Member from the Leader ..........................72...
  • Page 7 ..........................91 Configuring Remote File Share ......................92 Configuring BIOS Settings Using Server Clone ...........................93 Accessing BIOS Profile Page ...........................93 Adding or Saving Profile ..........................93 Managing Stored Profiles ..............................94 Applying Profile ...............................94 Importing Profile ...............................94 Exporting Profile ..............................95 Editing Profile ..............................95 Deleting Profile .............................95 Viewing BIOS Settings ...........................95...
  • Page 8 10 Configuring CMC For Single Sign-On Or Smart Card Login..........131 ............................131 System Requirements ..............................132 Client Systems ................................132 ..................132 Prerequisites For Single Sign-On Or Smart Card Login ........................132 Generating Kerberos Keytab File .....................133 Configuring CMC For Active Directory Schema .......................133 Configuring Browser For SSO Login ....................134 Configuring Browser For Smart Card Login ..............134...
  • Page 9 ..............155 Viewing World Wide Name/Media Access Control (WWN/MAC) IDs ............................155 Fabric Configuration ..........................155 WWN/MAC Addresses ............................155 Command Messages ..................156 FlexAddress DELL SOFTWARE LICENSE AGREEMENT 13 Managing I/O Fabric......................159 ..........................159 Fabric Management Overview ............................161 Invalid Configurations .............................161 Fresh Power-up Scenario ............................161 Monitoring IOM Health ......................161...
  • Page 10 Broadcasting to Servers ..........................179 Managing iKVM From CMC ................180 Enabling or Disabling Access to iKVM from Front Panel ...................180 Enabling Access to iKVM from the Dell CMC Console 15 Managing and Monitoring Power..................181 ............................182 Redundancy Policies ...........................182 AC Redundancy Policy .........................183...
  • Page 11 ....................193 Server Performance Over Power Redundancy ..............................193 Remote Logging ........................194 External Power Management ............194 Configuring Power Budget and Redundancy Using CMC Web Interface ..............195 Configuring Power Budget and Redundancy Using RACADM ........................196 Executing Power Control Operations ..................196 Executing Power Control Operations on the Chassis ..................197 Executing Power Control Operations on a Server ...................198...
  • Page 12 ..........................219 Enclosure Status Screen ............................219 IP Summary Screen ................................219 Diagnostics ...........................219 LCD Hardware Troubleshooting ...........................221 Front Panel LCD Messages .............................221 LCD Error Messages ......................225 LCD Module and Server Status Information 18 Frequently Asked Questions....................229 ................................229 RACADM ......................229 Managing and Recovering a Remote System ..............................231 Active Directory ........................231...
  • Page 13: Overview

    The Dell Chassis Management Controller (CMC) is a systems management hardware and software solution for managing multiple Dell blade chassis. It is a hot-pluggable module that sits at the back of Dell PowerEdge M1000e chassis. The CMC has its own microprocessor and memory and is powered by the modular chassis into which it is plugged.
  • Page 14: What Is New In This Release

    Firmware update of server components such as BIOS, Network Controllers, Storage Controllers, and so on across multiple servers in the chassis using Lifecycle Controller. • Dell OpenManage software integration — Enables you to launch the CMC Web interface from Dell OpenManage Server Administrator or IT Assistant. •...
  • Page 15: Security Features

    • Secure Sockets Layer (SSL) encryption — Provides secure remote system management through the Web interface. • Launch point for the Integrated Dell Remote Access Controller (iDRAC) Web interface. • Support for WS-Management. • FlexAddress feature — Replaces the factory-assigned World Wide Name/Media Access Control (WWN/MAC) IDs with chassis-assigned WWN/MAC IDs for a particular slot, an optional upgrade.
  • Page 16: Cmc Port Information

    GB Port STK Port CMC Port Information The following TCP/IP ports are required to remotely access CMC through firewalls. These are the ports CMC listens to for connections. Table 1. CMC Server Listening Ports Port Number Function Telnet HTTP SNMP Agent 443* HTTPS * Configurable port...
  • Page 17: Minimum Cmc Version

    Port Number Function 514* Remote syslog LDAPS 3269 LDAPS for global catalog (GC) * Configurable port Minimum CMC Version The following table lists the minimum CMC version required to enable the listed Blade Servers. Table 3. Minimum CMC Version for Blade Servers Servers Minimum version of CMC PowerEdge M600...
  • Page 18: Supported Remote Access Connections

    IOM Switches Minimum version of CMC Dell 10/100/1000Mb Ethernet Pass-Through CMC 1.0 Dell 4Gbps FC Pass-Through Module CMC 1.0 Dell 8/4Gbps FC SAN Module CMC 1.2 Dell 10Gb Ethernet Pass-Through CMC 2.1 Dell 10Gb Ethernet Pass-Through II CMC 3.0 Dell 10Gb Ethernet Pass-Through-K CMC 3.0...
  • Page 19: Supported Platforms

    Select the required locale from the Your locale (location) drop-down menu. Supported Management Console Applications The CMC supports integration with Dell OpenManage IT Assistant. For more information, see the IT Assistant documentation set available on the Dell Support Web site at dell.com/support/manuals.
  • Page 20: Other Documents You May Need

    Other Documents You May Need In addition to this guide, you can access the following guides available at dell.com/support/manuals. Select Choose from a list of all Dell products and click Continue. Click Software → Monitors → Electronics & Peripherals → Software : •...
  • Page 21: Installing And Setting Up Cmc

    Understanding Redundant CMC Environment. Before You Begin Before setting up your CMC environment, download the latest version of CMC firmware from the Dell Support website at support.dell.com. Dell Systems Management Tools and Documentation DVD that was included with Also, make sure that you have the your system.
  • Page 22: Basic Cmc Network Connection

    8. Provide each iDRAC with an IP address in the CMC Web interface and enable the LAN and IPMI interface. NOTE: iDRAC LAN interface on some servers are disabled by default. 9. Provide each IO module with an IP address in the CMC Web interface. 10.
  • Page 23 Management Network Standby CMC Active CMC The following figures provide examples of incorrect cabling of CMC.
  • Page 24: Installing Remote Access Software On A Management Station

    For information about installing Dell OpenManage software components, see the Dell OpenManage Installation and Security User's Guide available on the DVD or at dell.com/support/manuals. You can also download the latest version of the Dell DRAC Tools from dell.com/support.
  • Page 25: Installing Racadm On A Linux Management Station

    Insert the Dell Systems Management Tools and Documentation DVD into the DVD drive. To mount the DVD to a required location, use the mount command or a similar command.
  • Page 26: Proxy Server

    Proxy Server To browse through a proxy server that does not have access to the management network, you can add the management network addresses to the browser’s exception list. This instructs the browser to bypass the proxy server while accessing the management network. Internet Explorer To edit the exception list in Internet Explorer: Start Internet Explorer.
  • Page 27: Downloading Files From Cmc With Internet Explorer

    It is recommended to isolate chassis management from the data network. Dell cannot support or guarantee uptime of a chassis that is improperly integrated into your environment. Due to the potential of traffic on the data network, the management interfaces on the internal management network can be saturated by traffic intended for servers.
  • Page 28: Configuring Initial Cmc Network

    If you configure initial network settings after the CMC has an IP address, you can use any of the following interfaces: • Command line interfaces (CLIs) such as a serial console, Telnet, SSH, or the Dell CMC Console through iKVM •...
  • Page 29 accordingly. If the network configuration does not match any of these values, it is recommended to use Auto Negotiation (the Auto option) or refer to your network equipment manufacturer. Press the center button to continue to the next CMC Network Settings screen. 5.
  • Page 30: Interfaces And Protocols To Access Cmc

    10. Select the Internet Protocol (IPv4, IPv6, or both) that you want to use for the servers. Dynamic Host Configuration iDRAC retrieves IP configuration (IP address, mask, and gateway) Protocol (DHCP) automatically from a DHCP server on your network. The iDRAC is assigned a unique IP address allotted over your network.Press the center button.
  • Page 31 Web browser on the management station. For a list of supported Web browsers, see the Supported Browsers section in the Readme at dell.com/support/manuals. Remote RACADM command line Use this command line utility to manage CMC and its components. You can use...
  • Page 32: Launching Cmc Using Other Systems Management Tools

    You can set the chassis location in a data center and the chassis name to identify the chassis on the network (the default name is Dell Rack System.) For example, an SNMP query on the chassis name returns the name you configure.
  • Page 33: Setting Chassis Physical Location And Chassis Name Using Racadm

    NOTE: The Chassis Location field is optional. It is recommended to use the Data Center, Aisle, Rack, and Rack Slot fields to indicate the physical location of the chassis. Click Apply. The settings are saved. Setting Chassis Physical Location and Chassis Name Using RACADM To set the chassis name or location, date and time using the command line interface, see the setsysinfo and RACADM Command Line Reference Guide for iDRAC7 and CMC .
  • Page 34: Configuring Led Blinking Using Racadm

    The Identify page is displayed. To enable blinking for a component LED, select required component and click Blink. To disable blinking for a component LED, clear the required component and click UnBlink. Configuring LED Blinking Using RACADM Open a serial/Telnet/SSH text console to CMC, log in, and type: racadm setled -m <module>...
  • Page 35: About Standby Cmc

    About Standby CMC The standby CMC is identical to and is maintained as a mirror of the active CMC. The active and standby CMCs must both be installed with the same firmware revision. If the firmware revisions differ, the system reports as redundancy degraded.
  • Page 36: Obtaining Health Status Of Redundant Cmc

    Obtaining Health Status of Redundant CMC You can view the health status of the standby CMC in the Web interface. For more information about accessing CMC health status in the Web interface, see Viewing Chassis Information and Monitoring Chassis and Component Health.
  • Page 37: Logging In To Cmc

    To access the CMC Web interface: Open a supported Web browser window. Readme located at dell.com/support/manuals. For the latest information on supported Web browsers, see the In the Address field, type the following URL, and press <Enter>: –...
  • Page 38: Logging Into Cmc As Local User, Active Directory User, Or Ldap User

    Logging Into CMC as Local User, Active Directory User, or LDAP User To log in to CMC, you must have a CMC account with Log In to CMC privilege. The default CMC user name is root, and the password is calvin. The root account is the default administrative account that ships with CMC. NOTE: For added security, it is strongly recommended that you change the default password of the root account during initial setup.
  • Page 39: Logging Into Cmc Using Single Sign-On

    Configuring CMC SSO Or Smart Card Login For Active Directory Users Logging In to CMC Using Serial, Telnet, or SSH Console You can log in to CMC through a serial, Telnet, or SSH connection, or through Dell CMC console on iKVM.
  • Page 40: Accessing Cmc Using Racadm

    RACADM provides a set of commands that allow you to configure and manage the CMC through a text-based interface. RACADM can be accessed using a Telnet/SSH or serial connection, using the Dell CMC console on the iKVM, or remotely using the RACADM command line interface installed on a management station.
  • Page 41: Multiple Cmc Sessions

    Multiple CMC Sessions The following table provides the list of multiple CMC sessions that are possible using the various interfaces. Table 7. Multiple CMC Sessions Interface Number of Sessions CMC Web Interface RACADM Telnet...
  • Page 43: Updating Firmware

    Recovering iDRAC Firmware Using CMC Updating IOM Infrastructure Device Firmware Downloading CMC Firmware Before beginning the firmware update, download the latest firmware version from support.dell.com, and save it to your local system. The following software components are included with the CMC firmware package: •...
  • Page 44: Viewing Currently Installed Firmware Versions Using Cmc Web Interface

    Viewing Currently Installed Firmware Versions Using CMC Web Interface In the CMC Web interface, go to any of the following pages to view the current firmware versions: • Chassis Overview → Update • Chassis Overview → Chassis Controller → Update •...
  • Page 45: Updating Cmc Firmware Using Web Interface

    To avoid disconnecting other users during a reset, notify authorized users who may log in to CMC and check for active sessions in the Sessions page. To open the Sessions page, select Chassis in the tree, click the Network tab, and then click the Sessions subtab.
  • Page 46: Updating Ikvm Firmware

    Updating iKVM Firmware The iKVM resets and becomes temporarily unavailable after the firmware is successfully uploaded. Related Links Downloading CMC Firmware Viewing Currently Installed Firmware Versions Updating iKVM Firmware Using CMC Web Interface To update the iKVM firmware using in the CMC Web interface: Go to any of the following pages: –...
  • Page 47: Updating Iom Firmware Using Cmc Web Interface

    NOTE: CMC allows IOM infrastructure device firmware (IOMINF) updates only if it detects that the IOMINF firmware is out-of- date with the image contained in CMC file system. If the IOMINF firmware is up-to-date, CMC prevents IOMINF updates. Up-to-date IOMINF devices are not listed as updatable devices. Related Links Downloading CMC Firmware Viewing Currently Installed Firmware Versions...
  • Page 48: Updating Server Idrac Firmware Using Web Interface

    Viewing Currently Installed Firmware Versions Updating Server iDRAC Firmware Using Web Interface To update the iDRAC firmware in the server using CMC Web interface: Go to any of the following pages: – Chassis Overview → Update – Chassis Overview → Chassis Controller → Update –...
  • Page 49: Updating Server Component Firmware

    Dell Update Packages (DUPs) are used to perform the firmware updates using Lifecycle Controller. The default CMC configuration has a 48 MB limit on the size of the DUP. The OS-Driver Pack component DUP exceeds this limit and must be updated separately using the Extended Storage feature.
  • Page 50: Filtering Components For Firmware Updates

    NOTE: Automatic filtering feature is important while using the Dell Update Package (DUP). The update programming of a DUP can be based on the type or model of a component or device. The automatic filtering behavior is designed to minimize the subsequent selection decisions after an initial selection is made.
  • Page 51: Viewing Firmware Inventory

    To filter components for Firmware Updates using RACADM, use the getversion command: racadm getversion -l [-m <module>] [-f <filter>] For more information, see the RACADM Command Line Reference Guide for iDRAC7 and CMC available at dell.com/ support/manuals. Viewing Firmware Inventory You can view the summary of the firmware versions for all components and devices for all servers currently present in the chassis along with their status.
  • Page 52: Lifecycle Controller Job Operations

    Viewing Firmware Inventory Using RACADM To view Firmware Inventory using RACADM, use the getversion command: racadm getversion -l [-m <module>] [-f <filter>] For more information, see the RACADM Command Line Reference Guide for iDRAC7 and CMC available at dell.com/ support/manuals. Lifecycle Controller Job Operations...
  • Page 53 • Re-install • Rollback • Update • Delete Jobs Only one type of operation can be performed at a time. Components and devices that are not supported may be listed as part of the inventory, but do not permit Lifecycle Controller operations. To perform the Lifecycle Controller operations, you must have: •...
  • Page 54 NIC devices on the server. This behavior is inherent in the lifecycle controller functionality and particularly the programming contained with the Dell Update Package (DUP). Currently, Dell Update Packages (DUP) that are less than 48MB in size are supported.
  • Page 55: Recovering Idrac Firmware Using Cmc

    Storage feature is installed and enabled. For information on enabling extended storage, see Configuring CMC Extended Storage Card. Specify the firmware image file for the selected component(s) or devic(es). This is a Microsoft Windows Dell Update Package (DUP) file. Select one of the following options: –...
  • Page 57: Viewing Chassis Information And Monitoring Chassis And Component Health

    Viewing Chassis Information and Monitoring Chassis and Component Health You can view information and monitor the health for the following: • Active and standby CMCs • All severs and individual servers • Storage arrays • All IO Modules (IOMs) and individual IOMs •...
  • Page 58: Chassis Graphics

    Chassis Graphics The chassis is represented by front and back views (the upper and lower images, respectively). Servers and the LCD are shown in the front view and the remaining components are shown in the back view. Component selection is indicated by a blue cast and is controlled by clicking the image of the required component.
  • Page 59: Selected Component Information

    Icon Description No server is present. Selected Component Information Information for the selected component is displayed in three independent sections: • Health and Performance and Properties — Displays the active critical and non-critical events as shown by the hardware logs and the performance data that vary with time. •...
  • Page 60: Viewing Health Status And Information For Individual Server

    NOTE: To use the iDRAC Web interface, you must have an iDRAC user name and password. For more Integrated Dell Remote Access information about iDRAC and the using the iDRAC Web interface, see the Controller User’s Guide .
  • Page 61: Viewing Information And Health Status For Individual Iom

    For more information, see the Viewing iKVM Information and Health Status The local access KVM module for the Dell M1000e server chassis is called the Avocent Integrated KVM Switch Module, or iKVM. To view the health status of the iKVMs associated with the chassis, do any of the following: Go to Chassis Overview →...
  • Page 62: Viewing Psu Information And Health Status

    Move the cursor over an iKVM subgraphic and a corresponding text hint or screen tip is displayed. The text hint provides additional information for the iKVM. Click the iKVM subgraphic to view the iKVM information on the right. Go to Chassis Overview → iKVM → Properties . The iKVM Status page displays the status and readings of the iKVM associated with the chassis.
  • Page 63: Configuring Cmc

    Configuring CMC CMC enables you to configure CMC properties, set up users, and set up alerts to perform remote management tasks. Before you begin configuring the CMC, you must first configure the CMC network settings to allow the CMC to be managed remotely.
  • Page 64: Viewing And Modifying Cmc Network Lan Settings

    Viewing and Modifying CMC Network LAN Settings The LAN settings, such as community string and SMTP server IP address, affect both the CMC and the external settings of the chassis. If you have two CMCs (active and standby) on the chassis, and they are connected to the network, the standby CMC automatically assumes the network settings of the active CMC in the event of failover.
  • Page 65: Enabling Or Disabling Dhcp For The Cmc Network Interface Address

    To enable/disable the CMC IPv4 addressing, type: racadm config -g cfgLanNetworking -o cfgNicIPv4Enable racadm config -g cfgLanNetworking -o cfgNicIPv4Enable NOTE: The CMC IPv4 addressing is enabled by default. To enable/disable the CMC IPv6 addressing, type: racadm config -g cfgIpv6LanNetworking -o cfgIPv6Enable racadm config -g cfgIpv6LanNetworking -o cfgIPv6Enable NOTE: The CMC IPv6 addressing is disabled by default.
  • Page 66: Setting Static Dns Ip Addresses

    To disable the DHCP for DNS address feature for IPv6 and specify static preferred and alternate DNS server addresses, type: racadm config -g cfgIPv6LanNetworking -o cfgIPv6DNSServersFromDHCP6 0 Setting Static DNS IP addresses NOTE: The Static DNS IP addresses settings are not valid unless the DCHP for DNS address feature is disabled. For IPv4, to set the preferred primary and secondary DNS IP server addresses, type: racadm config -g cfgLanNetworking -o cfgDNSServer1 <IP-address>...
  • Page 67: Setting The Maximum Transmission Unit (Mtu) (Ipv4 And Ipv6)

    where: <speed> is 10 or 100 (default). Setting the Maximum Transmission Unit (MTU) (IPv4 and IPv6) The MTU property allows you to set a limit for the largest packet that can be passed through the interface. To set the MTU, type: racadm config -g cfgNetTuning -o cfgNetTuningMtu <mtu>...
  • Page 68: Configuring Virtual Lan Tag Properties For Cmc Using Web Interface

    Configuring Virtual LAN Tag Properties for CMC Using Web Interface To configure VLAN for CMC using the CMC Web interface: Go to any of the following pages: – In the system tree, go to Chassis Overview and click Network → VLAN . –...
  • Page 69: Configuring Services

    CMC includes a Web server that is configured to use the industry-standard SSL security protocol to accept and transfer encrypted data from and to clients over the Internet. The Web server includes a Dell self-signed SSL digital certificate (Server ID) and is responsible for accepting and responding to secure HTTP requests from clients. This service is required by the Web interface and remote RACADM CLI tool for communicating with CMC.
  • Page 70: Configuring Services Using Racadm

    Click Apply to apply the selected option. If two CMCs are present in the chassis, both CMCs must contain flash media. CMC features which depend on flash media (except for Flexaddress) do not function properly until the Dell-authorized media is installed and enabled on this page.
  • Page 71: Setting Up Chassis Group

    Setting Up Chassis Group CMC enables you to monitor multiple chassis from a single lead chassis. When a Chassis Group is enabled, CMC in the lead chassis generates a graphical display of the status of the lead chassis and all member chassis within the Chassis Group.
  • Page 72: Removing A Member From The Leader

    Enter the corresponding password in the Password field. Click Apply. Repeat step 4 through step 8 to add a maximum of eight members. The new members’ Chassis Names appear in the Members dialog box. The status of the new member is displayed by selecting the Group in the tree. Details are available by clicking on the chassis image or the details button.
  • Page 73: Launching A Member Chassis's Or Server's Web Page

    Select None, and then click Apply. Launching a Member Chassis’s or Server’s Web page Links to a member chassis’s Web page, a server’s Remote Console or the server iDRAC’s Web page within the group are available through the lead chassis’s group page. You can use the same user name and password that was used to log in to the lead chassis, to log in to the member device.
  • Page 74: Server Inventory For Mcm Group

    Server Inventory for MCM group The Chassis Group Health page displays all the member chassis and allows you to save the server inventory report to a file, using standard browser download capability. The report contains data for: • All servers currently in all the group chassis (including the leader.) •...
  • Page 75: Obtaining Certificates

    Data Field Example Operating System Windows Server 2008 NOTE: Requires a Server Administrator agent running on the Server; otherwise shown as blank. Model PowerEdgeM610 Service Tag 1PB8VF1 Total System Memory 4.0 GB NOTE: Requires CMC 4.0 (or higher) on member; otherwise shown as blank.
  • Page 76: Secure Sockets Layer (Ssl) Server Certificates

    Internet browsers in North America. The CMC Web server includes a Dell self-signed SSL digital certificate (Server ID). To ensure high security over the Internet, replace the Web server SSL certificate by submitting a request to CMC to generate a new Certificate Signing Request (CSR).
  • Page 77: Uploading Server Certificate

    RACADM Command Line Reference Guide for iDRAC7 and command to generate the CSR. For more information, see the CMC available at dell.com/support/manuals. Uploading Server Certificate After generating a CSR, you can upload the signed SSL server certificate to the CMC firmware. CMC resets after the certificate is uploaded.
  • Page 78: Uploading Webserver Key And Certificate

    To upload SSL key from the client to iDRAC, type the following command: racadm sslkeyupload -t <type> -f <filename> For more information, see the RACADM Command Line Reference Guide for iDRAC7 and CMC available at dell.com/ support/manuals. Viewing Server Certificate...
  • Page 79: Configuring Multiple Cmcs Using Racadm

    RACADM To view the SSL server certificate, use the sslcertview command. For more information, see the Command Line Reference Guide for iDRAC7 and CMC available at dell.com/support/manuals. Configuring Multiple CMCs Using RACADM Using RACADM, you can configure one or more CMCs with identical properties.
  • Page 80: Creating A Cmc Configuration File

    Creating a CMC Configuration File The CMC configuration file, <filename>.cfg, is used with the racadm config -f <filename>.cfgcommand to create a simple text file. The command allows you to build a configuration file (similar to a .ini file) and configure the CMC from this file.
  • Page 81: Parsing Rules

    Parsing Rules • Lines that start with a hash character (#) are treated as comments. A comment line must start in column one. A "#" character in any other column is treated as a # character. Some modem parameters may include # characters in their strings. An escape character is not required. You may want to generate a .cfg from a racadm getconfig -f <filename>...
  • Page 82: Modifying The Cmc Ip Address

    • For indexed groups the object anchor must be the first object after the [ ] pair. The following are examples of the current indexed groups: [cfgUserAdmin] cfgUserAdminUserName= <USER_NAME> • When using remote RACADM to capture the configuration groups into a file, if a key property within a group is not set, the configuration group is not saved as part of the configuration file.
  • Page 83: Viewing And Terminating Cmc Sessions Using Web Interface

    You must have administrator privileges to terminate CMC sessions using RACADM. To view the current user sessions, use the getssninfo command. To terminate a user session, use the closessn command. For more information about these commands, see the RACADM Command Line Reference Guide for iDRAC7 and CMC available at dell.com/support/manuals.
  • Page 85: Configuring Server

    Configuring Server You can do the following for the server: • Configuring Slot Names • Configuring iDRAC Network Settings • Configuring iDRAC VLAN Tag Settings • Setting First Boot Device • Configuring Server FlexAddress • Configuring Remote File Share • Configuring BIOS Settings Using Server Clone Configuring Slot Names Slot names are used to identify individual servers.
  • Page 86: Configuring Idrac Network Settings

    The user can also configure the default iDRAC network configuration settings and root password for severs that are installed later; these default settings are the iDRAC QuickDeploy settings. For more information about iDRAC, see the iDRAC7 User’s Guide at dell.com/support/manuals. Related Links Configuring iDRAC QuickDeploy Network Settings...
  • Page 87 Setting Description password value is assigned to a server's iDRAC root user password when the server is inserted into chassis. The password can have 1 to 20 printable (including spaces) characters. Confirm iDRAC Root Password Verifies the password entered into the iDRAC Root Password field.
  • Page 88: Modifying Idrac Network Settings For Individual Server Idrac

    Setting Description stateless address auto configuration. By default, this option is enabled. iDRAC IPv6 Gateway Specifies the default IPv6 gateway to be assigned to the iDRACs. The default value is "::". iDRAC IPv6 Prefix Length Specifies the prefix length to be assigned for the IPv6 addresses on the iDRAC.
  • Page 89: Modifying Idrac Network Settings Using Racadm

    Modifying iDRAC Network Settings Using RACADM RACADM config or getconfig commands support the -m <module> option for the following configuration groups: • cfgLanNetworking • cfgIPv6LanNetworking • cfgRacTuning • cfgRemoteHosts • cfgSerial • cfgSessionManagement RACADM Command Line Reference Guide for For more information on the property default values and ranges, see the iDRAC7 and CMC .
  • Page 90: Setting First Boot Device

    • To remove a server VLAN, disable the VLAN capabilities of the specified server's network: racadm setniccfg -m server-<n> -v The valid values for <n> are 1-16. For example: racadm setniccfg -m server-1 -v Setting First Boot Device You can specify the CMC first boot device for each server. This may not be the actual first boot device for the server or even represent a device present in that server;...
  • Page 91: Setting First Boot Device For Multiple Servers Using Cmc Web Interface

    To enable boot once for a device, use the cfgServerBootOnce object. For more information about these objects, see the RACADM Command Line Reference Guide for iDRAC and CMC available at dell.com/support/manuals. Configuring Server FlexAddress For information to configure FlexAddress for servers, see Configuring FlexAddress for Server-Level Slots.
  • Page 92: Configuring Bios Settings Using Server Clone

    To configure the remote file share using CMC Web interface: In the system tree, go to Server Overview, and then click Setup → Remote File Sharing. The Deploy Remote File Share page is displayed. Enter the result of your step here (optional). CMC Online Help .
  • Page 93: Accessing Bios Profile Page

    Viewing Profile Log Completion Status and Troubleshooting Accessing BIOS Profile Page You can add, manage, and apply BIOS profiles to one or more servers using the BIOS Profile page. To access the BIOS Profile page using the CMC Web interface, in the system tree, go to Chassis Overview → Server Overview and click Setup →...
  • Page 94: Applying Profile

    Applying Profile When stored profiles are available in the non-volatile media on the CMC, to initiate a server cloning operation, you can apply a Stored Profile to one or more servers. NOTE: If a server does not support Lifecycle Controller or the chassis is powered off, you cannot apply a profile to the server.
  • Page 95: Editing Profile

    CMC Online Help . For more information, see the Editing Profile You can edit the name and description of a BIOS profile that is stored on the CMC non-volatile media (SD Card). To edit a stored profile: In the BIOS Profile page, in the Manage Profiles on SD Card section, select the required profile and then click Edit Profile.
  • Page 96: Viewing Profile Log

    Viewing Profile Log To view the profile log, in the BIOS Profiles page, see the Recent Profile Log section that lists the 10 latest profile log entries directly from server cloning operations. Each recent profile log displays the severity, the time and date when server cloning operation was submitted, and the description of the cloning log message.
  • Page 97: Launching Remote Console From Cmc Web Interface

    Launching iDRAC from Server Status Page To launch the iDRAC management console for an individual server: In the system tree, expand Server Overview. All of the servers (1–16) appear in the expanded Servers list. Click the server for which you want to launch the iDRAC Web interface. The Server Status page is displayed. Click Launch iDRAC GUI.
  • Page 99: Configuring Cmc To Send Alerts

    Configuring CMC To Send Alerts You can set alerts and actions for certain events that occur on the managed system. An event occurs when the status of a system component is greater than the pre-defined condition. If an event matches an event filter and you have configured this filter to generate an alert (e-mail alert or SNMP trap), then an alert is sent to one or more configured destinations.
  • Page 100: Configuring Alert Destinations

    In the Destination field, enter a valid IP address. Use the quad-dot IPv4 format, standard IPv6 address notation, or FQDN. For example: 123.123.123.123 or 2001:db8:85a3::8a2e:370:7334 or dell.com . Choose a format that is consistent with the networking technology or infrastructure. The Test Trap functionality cannot detect incorrect choices based on the current network configuration (example, use of an IPv6 destination in an IPv4-only environment).
  • Page 101 Specify the events for which alerts must be generated: racadm config -g cfgAlerting -o cfgAlertingFilterMask <mask value> where <mask value> is a hex value between 0x0 and 0xffffffff. To obtain the mask value, use a scientific calculator in hex mode and add the second values of the individual masks (1, 2, 4, and so on) using the <OR>...
  • Page 102: Configuring E-Mail Alert Settings

    where<index> is a value between 1–4. CMC uses the index number to distinguish up to four configurable destinations for traps alerts. Destinations may be specified as appropriately formatted numeric addresses (IPv6 or IPv4), or Fully-Qualified Domain Names (FQDNs). Specify a destination IP address to receive the traps alert: racadm config -g cfgTraps -o cfgTrapsAlertDestIPAddr <IP address>...
  • Page 103 To determine whether an index has previously configured values, type:xracadm getconfig -g cfgEmailAlert — I <index> . If the index is configured, values appear for the cfgEmailAlertAddress and cfgEmailAlertEmailName objects. RACADM Command Line Reference Guide for iDRAC7 and CMC available at dell.com/ For more information, see the support/manuals.
  • Page 105: Configuring User Accounts And Privileges

    Configuring User Accounts and Privileges role-based authority ) to manage your system with CMC and You can setup user accounts with specific privileges ( maintain system security. By default CMC is configured with a local administrator account. This default user name is root and the password is calvin .
  • Page 106 Privilege Description • Provides services to the chassis, such as date and time, firmware update, and CMC reset. • Is associated with the chassis, such as slot name and slot priority. Although these properties apply to the servers, they are strictly chassis properties relating to the slots rather than the servers themselves.
  • Page 107 Privilege Description Based on the privileges responding from the server, CMC firmware decides if the user has the right to perform the action. Listed below are the privileges and the actions on the server to which the Server Administrator is entitled. These rights are applied only when the chassis user does not have the Server Administrative privilege on the chassis.
  • Page 108 User Group Privileges Granted • Debug Command Administrator • Fabric A Administrator • Fabric B Administrator • Fabric C Administrator Power User • Login • Clear Logs Administrator • Chassis Control Administrator (Power commands) • Server Administrator • Test Alert User •...
  • Page 109: Modifying Root User Administrator Account Settings

    Privilege Set Administrator Permissions Power User Permissions Guest User Permissions Debug Command Administrator Fabric A Administrator Fabric B Administrator Fabric C Administrator Modifying Root User Administrator Account Settings For added security, it is strongly recommended that you change the default password of the root (User 1) account. The root account is the default administrative account that ships with CMC.
  • Page 110: Configure Local Users Using Racadm

    Configure Local Users Using RACADM NOTE: You must be logged in as user root to execute RACADM commands on a remote Linux system. You can configure up to 16 users in the CMC property database. Before you manually enable a CMC user, verify if any current users exist.
  • Page 111: Configuring Active Directory Users

    RACADM Command Line NOTE: For a list of valid bit mask values for specific user privileges, see the Reference Guide for iDRAC7 and CMC available at dell.com/support/manuals. The default privilege value is 0, which indicates the user has no privileges enabled.
  • Page 112: Supported Active Directory Authentication Mechanisms

    Standard schema solution that uses Microsoft’s default Active Directory group objects only. • • Extended schema solution that has customized Active Directory objects provided by Dell. All the access control objects are maintained in Active Directory. It provides maximum flexibility to configure user access on different CMCs with varying privilege levels.
  • Page 113: Configuring Standard Schema Active Directory

    Role Group Default Privilege Level Permissions Granted Bit Mask • Chassis Control Administrator (Power Commands) • Server Administrator • Test Alert User • Debug Command Administrator • Fabric A Administrator • Fabric B Administrator • Fabric C Administrator None 0x00000ed9 •...
  • Page 114 Configuring Active Directory With Standard Schema Using CMC Web Interface CMC Online Help . NOTE: For information about the various fields, see the In the system tree, go to Chassis Overview, and then click User Authentication → Directory Services. The Directory Services page is displayed.
  • Page 115: Extended Schema Active Directory Overview

    To extend the schema in Microsoft's Active Directory, Dell received unique OIDs, unique name extensions, and uniquely linked attribute IDs for the attributes and classes that are added into the directory service.
  • Page 116 Active Directory objects in this scenario. When adding Universal Groups from separate domains, create an Association Object with Universal Scope. The Default Association objects created by the Dell Schema Extender Utility are Domain Local Groups and does not work with Universal Groups from other domains.
  • Page 117 To configure the objects for the single domain scenario: 1. Create two Association Objects. 2. Create two RAC Device Objects, RAC1 and RAC2, to represent the two CMCs. 3. Create two Privilege Objects, Priv1 and Priv2, in which Priv1 has all privileges (administrator) and Priv2 has login privilege.
  • Page 118: Configuring Extended Schema Active Directory

    Dell Schema Extender utility • LDIF script file If you use the LDIF script file, the Dell organizational unit is not added to the schema. Dell Systems Management Tools and Documentation DVD The LDIF files and Dell Schema Extender are located on your in the following respective directories: •...
  • Page 119 Using Dell Schema Extender CAUTION: The Dell Schema Extender uses the SchemaExtenderOem.ini file. To make sure that the Dell Schema Extender utility functions properly, do not modify the name of this file. In the Welcome screen, click Next. Read and understand the warning and click Next.
  • Page 120 SuperClasses User Attributes dellRAC4Privileges Table 24. : dellProduct Class 1.2.840.113556.1.8000.1280.1.1.1.5 Description The main class from which all Dell products are derived. Class Type Structural Class SuperClasses Computer Attributes dellAssociationMembers Table 25. : List of Attributes Added to the Active Directory Schema...
  • Page 121 Assigned OID/Syntax Object Identifier Single Valued OID: 1.2.840.113556.1.8000.1280.1.1.2.1 Distinguished Name: (LDAPTYPE_DN 1.3.6.1.4.1.1466.115.121.1.12) Attribute: dellProductMembers FALSE Description: List of dellRacDevices objects that belong to this role. This attribute is the forward link to the dellAssociationMembers backward link. Link ID: 12070 OID: 1.2.840.113556.1.8000.1280.1.1.2.2 Distinguished Name: (LDAPTYPE_DN 1.3.6.1.4.1.1466.115.121.1.12) Attribute: dellIsCardConfigAdmin...
  • Page 122 For more information about the Active Directory Users and Computers Snap-in, see Microsoft documentation. Adding CMC Users and Privileges to Active Directory Using the Dell-extended Active Directory Users and Computers Snap-in, you can add CMC users and privileges by creating RAC device, association, and privilege objects. To add each object, perform the following: •...
  • Page 123 RAC device groups. If your system is running Windows 2000 mode or higher, use Universal Groups to span domains with your user or RAC objects. You can add groups of Users and RAC devices. The procedure for creating Dell-related groups and non-Dell-related groups is identical.
  • Page 124 Adding RAC Devices or RAC Device Groups Adding Users or User Groups To add users or user groups: Right-click the Association Object and select Properties. Select the Users tab and click Add. Enter the user or user group name and click OK. Adding Privileges To add privileges: Select the Privileges Object tab and click Add.
  • Page 125 In the Extended Schema Settings section, enter the CMC device name and the domain name. If you have enabled certificate validation, you must upload the domain forest root certificate authority-signed certificate to CMC. In the Manage Certificates section, type the file path of the certificate or browse to the certificate file.
  • Page 126: Configuring Generic Ldap Users

    After you enable the Specify Server option, you can specify an LDAP server and global catalog with IP addresses or fully qualified domain names (FQDNs) of the servers. The FQDNs consist of the host names and the domain names of the servers. To specify an LDAP server, type: racadm config -g cfgActiveDirectory -o cfgADDomainController <AD domain controller IP address>...
  • Page 127: Configuring The Generic Ldap Directory To Access Cmc

    Figure 2. Configuration of CMC with Generic LDAP Configuring the Generic LDAP Directory to Access CMC The CMC's Generic LDAP implementation uses two phases in granting access to a user—user authentication and then user authorization. Authentication of LDAP Users Some directory servers require a bind before any searches can be performed against a specific LDAP server. To authenticate a user: Optionally bind to the Directory Service.
  • Page 128: Configuring Generic Ldap Directory Service Using Racadm

    For example: _ldap._tcp.dell.com where ldap is the service name and dell.com is the search domain. Click Apply to save the settings. NOTE: You must apply the settings before continuing. If you do not apply the settings, the settings are lost when you navigate to the next page.
  • Page 129 The following query is used to search the DNS for SRV records: _ldap._tcp.domainname.com ldap in the above query is the cfgLDAPSRVLookupServiceName property. cfgLDAPSRVLookupDomainName is configured to be domainname.com. RACADM Command Line Reference Guide for iDRAC7 and For more information about the RACADM objects, see the CMC available at dell.com/support/manuals.
  • Page 131: Configuring Cmc For Single Sign-On Or Smart Card Login

    Configuring CMC For Single Sign-On Or Smart Card Login This section provides information to configure CMC for Smart Card login and Single Sign-On (SSO) login for Active Directory users. Starting with CMC version 2.10, CMC supports Kerberos based Active Directory authentication to support Smart Card and SSO logins.
  • Page 132: Client Systems

    Client Systems • For only Smart Card login, the client system must have the Microsoft Visual C++ 2005 redistributable. For more information see www.microsoft.com/downloads/details.aspx?FamilyID= 32BC1BEEA3F9-4C13-9C99-220B62A191EE&displaylang=en • For Single Sign-On or smart card login, the client system must be a part of the Active Directory domain and Kerberos Realm.
  • Page 133: Configuring Cmc For Active Directory Schema

    ktpass utility on the domain controller (Active Directory server) where you want to map CMC to a user Run the account in Active Directory. Use the following ktpass command to create the Kerberos keytab file: C:\>ktpass -princ HTTP/cmcname.domain_name.com@REALM_NAME.COM - mapuser dracname -crypto DES-CBC-MD5 -ptype KRB5_NT_PRINCIPAL -pass * -out c: \krbkeytab NOTE: The cmcname.domainname.com must be lower case as required by RFC and the @REALM_NAME...
  • Page 134: Configuring Browser For Smart Card Login

    Directory account. If the command is not successful, resolve the error and run the command again. For more information, see RACADM Command Line Reference Guide for iDRAC7 and CMC on dell.com/support/manuals. Uploading Keytab File The Kerberos keytab file serves as the CMC's user name and password credentials to the Kerberos Data Center (KDC), which in turns allows access to the Active Directory.
  • Page 135: Configuring Cmc Sso Login Or Smart Card Login For Active Directory Users Using Racadm

    In the Kerberos Keytab section, click Browse, select keytab file, and click Upload . When the upload is complete, a message is displayed indicating whether the keytab file is successfully uploaded or not. Configuring CMC SSO Login Or Smart Card Login For Active Directory Users Using RACADM In addition to the steps performed while configuring Active Directory, run the following command to enable SSO: racadm -g cfgActiveDirectory -o cfgADSSOEnable 1...
  • Page 137: Configuring Cmc To Use Command Line Consoles

    Configuring CMC to Use Command Line Consoles This section provides information about the CMC command line console (or serial/Telnet/Secure Shell console) features, and explains how to set up the system so that you can perform systems management actions through the console. For RACADM Command Line information on using the RACADM commands in CMC through the command line console, see Reference Guide for iDRAC7 and CMC .
  • Page 138: Using Telnet Console With Cmc

    Using Telnet Console With CMC You can have up to four Telnet sessions with CMC at a time. If your management station is running Windows XP or Windows 2003, you may experience an issue with the characters in a CMC Telnet session. This issue may occur as a frozen login where the return key does not respond and the password prompt does not appear.
  • Page 139: Configure Public Key Authentication Over Ssh

    Scheme Type Scheme • RIJNDAEL192-CBC • AES128-CBC • RIJNDAEL128-CBC • BLOWFISH-128-CBC • 3DES-192-CBC • ARCFOUR-128 Message Integrity • HMAC-SHA1-160 • HMAC-SHA1-96 • HMAC-MD5-128 • HMAC-MD5-96 Authentication Password Configure Public Key Authentication over SSH You can configure up to 6 public keys that can be used with the service username over SSH interface. Before adding or deleting public keys, be sure to use the view command to see what keys are already set up so a key is not accidentally overwritten or deleted.
  • Page 140 Generating Public Keys for Windows Before adding an account, a public key is required from the system that accesses the CMC over SSH. There are two ways to generate the public/private key pair: using PuTTY Key Generator application for clients running Windows or ssh- keygen CLI for clients running Linux.
  • Page 141: Enabling Front Panel To Ikvm Connection

    Adding Public Keys To add a public key to the CMC using the file upload -f option, type: racadm sshpkauth –i svcacct –k 1 –p 0xfff –f <public key file> RACADM NOTE: You can only use the file upload option with remote RACADM. For more information, see Command Line Reference Guide for iDRAC7 and CMC .
  • Page 142: Connecting To Servers Or I/O Modules Using Connect Command

    Press <e>, and then set the Bps/Par/Bits option to 115200 8N1. Press <f>, and then set Hardware Flow Control to Yes and set Software Flow Control to No. To exit the Serial Port Setup menu, press <Enter>. Select Modem and Dialing and press <Enter>. In the Modem Dialing and Parameter Setup menu, press <Backspace>...
  • Page 143: Configuring The Managed Server Bios For Serial Console Redirection

    Managing Servers With iKVM ) or establish a iDRAC7 User’s Guide on dell.com/support/manuals). Remote Console session from the iDRAC7 Web interface (see the Serial communication in the BIOS is OFF by default. To redirect host text console data to Serial over LAN, you must enable console redirection through COM1.
  • Page 144: Configuring Windows For Serial Console Redirection

    Scroll down to Serial Communication and press <Enter> . In the pop-up dialog box, the serial communication list displays these options: – – on without console redirection – on with console redirection via COM1 Use the arrow keys to navigate between these options. Ensure that On with console redirection via COM1 is enabled.
  • Page 145: Configuring Linux For Server Serial Console Redirection After Boot

    timeout=10 #splashimage=(hd0,2)/grub/splash.xpm.gz serial --unit=1 --speed=57600 terminal --timeout=10 serial title Red Hat Linux Advanced Server (2.4.9-e.3smp) root (hd0,0) kernel /boot/vmlinuz-2.4.9-e.3smp ro root= /dev/sda1 hda=ide-scsi console=ttyS0 console= ttyS1,57600 initrd /boot/initrd-2.4.9-e.3smp.img title Red Hat Linux Advanced Server-up (2.4.9-e.3) root (hd0,00) kernel /boot/vmlinuz-2.4.9-e.3 ro root=/dev/sda1 initrd /boot/initrd-2.4.9-e.3.img When you edit the /etc/grub.conf file, follow these guidelines: –...
  • Page 146 l4:4:wait:/etc/rc.d/rc 4 l5:5:wait:/etc/rc.d/rc 5 l6:6:wait:/etc/rc.d/rc 6 # Things to run in every runlevel. ud::once:/sbin/update # Trap CTRL-ALT-DELETE ca::ctrlaltdel:/sbin/shutdown -t3 -r now # When our UPS tells us power has failed, assume we have a few # minutes of power left. Schedule a shutdown for 2 minutes from now.
  • Page 147: Using Flexaddress And Flexadress Plus Cards

    Using FlexAddress and FlexAdress Plus Cards This section provides information about FlexAddress and FlexAddress Plus cards, how to configure and use these cards. Related Links About Flexaddress About FlexAddress Plus FlexAddress and FlexAddress Plus Comparison About Flexaddress The FlexAddress feature is an optional upgrade that allows server modules to replace the factory-assigned World Wide Name and Media Access Control (WWN/MAC) network IDs with WWN/MAC IDs provided by the chassis.
  • Page 148: Flexaddress And Flexaddress Plus Comparison

    FlexAddress and FlexAddress Plus Comparison FlexAddress has 208 addresses divided into 16 server slots, thus each slot is allocated with 13 MACs. FlexAddress Plus has 2928 addresses divided into 16 server slots, thus each slot is allocated with 183 MACs. The following table shows the provision of the MAC addresses in both the features.
  • Page 149 Component Minimum Required Version FC Mezzanine card - Emulex LPe1105- BIOS 3.03a3 and firmware 2.72A2 or later M4, FC8 Server Module BIOS • PowerEdge M600 – BIOS 2.02 or later • PowerEdge M605 – BIOS 2.03 or later • PowerEdge M805 •...
  • Page 150: Activating Flexaddress Plus

    For these servers, upgrading to FA+ enables full optimization of the WWN/MACs configuration. Contact Dell to obtain support for the FlexAddress Plus feature. To activate the FlexAddress Plus feature, the following software updates are required: server BIOS, server iDRAC, and CMC firmware.
  • Page 151: Deactivating Flexaddress

    Dell Feature Cards may contain more than one feature. Once any feature included on a Dell Feature Card has been activated on a chassis, any other features that may be included on that Dell Feature Card cannot be activated on a different chassis.
  • Page 152: Viewing Flexaddress Information For All Servers

    The General Chassis Settings page is displayed. The FlexAddress has a value Active or Not Active. The value Active indicates the feature is installed on the chassis and Not Active indicates the feature is not installed and not in use on the chassis. Use the following RACADM command to display FlexAddress status for the entire chassis: racadm getflexaddr To display FlexAddress status for a particular slot:...
  • Page 153: Configuring Flexaddress

    FlexAddress separately, you must install the SD feature card using the instructions in the Management Controller (CMC) Secure Digital (SD) Card Technical Specification document at dell.com/support/manuals. The server must be turned off before you begin configuration. You can enable or disable FlexAddress on a per fabric basis.
  • Page 154: Configuring Flexaddress For Server-Level Slots

    The Deploy FlexAddress page is displayed. In the Select Fabrics for Chassis-Assigned WWN/MACs section, select the fabric type for which you want to enable FlexAddress. To disable, clear the option. NOTE: If no fabrics are selected, FlexAddress is not enabled for the selected slots. The Select Slots for Chassis-Assigned WWN/MACs page is displayed.
  • Page 155: Additional Flexaddress Configuration For Linux

    where, <slot#> = 1 to 16 <fabricName> = A, B, C <state> = 0 or 1 0 is disable and 1 is enable. Additional FlexAddress Configuration for Linux When changing from a server-assigned MAC ID to chassis-assigned MAC ID on Linux-based operating systems, additional configuration steps may be required: •...
  • Page 156: Flexaddress Dell Software License Agreement

    FlexAddress DELL SOFTWARE LICENSE AGREEMENT This is a legal agreement between you, the user, and Dell Products L.P. or Dell Global B.V. ("Dell"). This agreement covers all software that is distributed with the Dell product, for which there is no separate license agreement between you and the manufacturer or owner of the software (collectively the "Software").
  • Page 157 Software. If you are a commercial customer of Dell or a Dell affiliate, you hereby grant Dell, or an agent...
  • Page 158 If a provision is found to be unenforceable, this finding does not affect the enforceability of the remaining provisions, terms, or conditions of this agreement. This agreement is binding on successors and assigns. Dell agrees and you agree to waive, to the maximum extent permitted by law, any right to a jury trial with respect to the Software or this agreement.
  • Page 159: Managing I/O Fabric

    Managing I/O Fabric The chassis can have up to six I/O modules (IOMs), where each IOM is a pass-through or switch module. The IOMs are classified into three groups—A, B, and C. Each group has two slots—Slot 1 and Slot 2. The slots are designated with letters, from left to right, across the back of the chassis: A1 | B1 | C1 | C2 | B2 | A2.
  • Page 160 The following figure shows the location of IOMs in the chassis. The location of each IOM is indicated by its group number (A, B, or C). These discrete fabric paths are split into two IO Banks, bank one and two. On the chassis, the IOM slot names are marked A1, A2, B1, B2, C1, and C2.
  • Page 161: Invalid Configurations

    Fabric verification for server IOMs and MCs is performed only when the chassis is powered on. When the chassis is on standby power, the iDRACs on the server modules remain powered off and thus are unable to report the server's MC fabric type. The MC fabric type may not be reported in the CMC user interface until the iDRAC on the server is powered on.
  • Page 162: Configuring Network Settings For Ioms Using Cmc Web Interface

    NOTE: For Ethernet switches, the in-band (VLAN1) and out-of-band management IP addresses cannot be the same or on the same network; this results in the out-of-band IP address not being set. See the IOM documentation for the default in-band management IP address. NOTE: Do not configure I/O module network settings for Ethernet pass-through and Infiniband switches.
  • Page 163: Updating Iom Software Using Cmc Web Interface

    In the system tree, go to I/O Module Overview and click Setup or expand I/O Module Overview in the system tree, select the IOM, and click Setup. The Deploy I/O Modules page displays the IOM(s) that are powered on. For the required IOM(s), click Reset. A warning message is displayed.
  • Page 164: Managing Vlan For Iom

    Managing VLAN for IOM Virtual LANs (VLANs) for IOMs allow you to separate users into individual network segments for security and other reasons. By using VLANs you can isolate the networks for individual users on a 32 port switch. You can associate selected ports on a switch with selected VLAN and treat these ports as a separate switch.
  • Page 165: Viewing The Vlan Settings On Ioms Using Cmc Web Interface

    Click Apply. The network settings are configured for the IOM(s). Viewing the VLAN settings on IOMs Using CMC Web Interface To view the VLAN settings on IOM(s) using the CMC Web interface: In the system tree, go to I/O Module Overview and click Setup → VLAN Manager. The VLAN Manager page is displayed.
  • Page 166: Updating Untagged Vlans For Ioms Using Cmc Web Interface

    The VLANs assigned to the selected IOMs are removed. An Operation Successful message is displayed. The current VLAN settings that are assigned to the IOMs are displayed in the VLAN Assignment Summary field. Updating Untagged VLANs for IOMs Using CMC Web Interface To update untagged VLANs for IOM(s) using the CMC Web interface: In the system tree, go to I/O Module Overview and click Setup →...
  • Page 167: Configuring And Using Ikvm

    The iKVM uses the On Screen Configuration and Reporting (OSCAR) graphical user interface, which is activated using a hot key. OSCAR allows you to select one of the servers or the Dell CMC command line you want to access with the local keyboard, display, and mouse.
  • Page 168: Physical Connection Interfaces

    Avocent AMX switching system NOTE: 2161DS does not support the Dell CMC console connection. NOTE: The iKVM also supports an ACI connection to the Dell 180ES and 2160ES, but the tiering is non-seamless. This connection requires a USB to PS2 SIP.
  • Page 169: Navigation Basics

    Press <Print Screen>. The Main dialog box is displayed. If a password is assigned, the Password dialog box appears after clicking <Print Screen>. Type the password and click OK. The Main dialog box appears. NOTE: There are four options for invoking OSCAR. You can enable one, multiple, or all of these key sequences by selecting boxes in the Invoke OSCAR section of the Main dialog box.
  • Page 170: Configuring Oscar

    Key or Key Sequence Result <Home>/<End> Moves the cursor to the top (Home) or bottom (End) of a list. <Delete> Deletes characters in a text box. Number Keys Type from the keyboard or keypad. <Caps Lock> Disabled. To change case, use the <Shift> key. Configuring Oscar You can configure the OSCAR settings using the Setup dialog box.
  • Page 171 To choose the default display order of servers, do one of the following: – Select Name to display servers alphabetically based on the name. – Select Slot to display servers numerically by slot number. Click OK. Assigning Key Sequences for OSCAR To assign one or more key sequences for OSCAR activation, select a key sequence from the Invoke OSCAR menu and click OK.
  • Page 172: Managing Servers With Ikvm

    The Slot column indicates the slot number in which a server is installed. NOTE: The Dell CMC command line occupies Slot 17. Selecting this slot displays the CMC command line, where you can execute RACADM commands or connect to the serial console of server or I/O modules.
  • Page 173 Viewing Server Status The right columns of the Main dialog box indicates the server status in the chassis. The following table describe the status symbols. Table 33. OSCAR Interface Status Symbols Symbols Description Server is online. Server is offline or absent from chassis. Server is not available.
  • Page 174: Video Connections

    The Main dialog box appears. Click Setup and then Menu. The Menu dialog box appears. Select Name or Slot for the Display/Sort Key. Type the desired delay time in seconds in the Screen Delay Time field. Click OK. Soft Switching to a Server To soft switch to a server: •...
  • Page 175: Setting Console Security

    Setting Console Security OSCAR enables you to configure security settings on the iKVM console. You can setup a screen saver mode that engages after the console remains unused for a specified delay time. Once engaged, the console remains locked until you press any key or move the mouse.
  • Page 176 – If the mode is set to Screen, the OSCAR flag bounces around the screen for the duration of the test. Before the test starts, a warning popup box displays the following message: "Energy mode may damage a monitor that is not ENERGY STAR compliant. However, once started, the test can be quit immediately via mouse or keyboard interaction."...
  • Page 177: Changing The Language

    To reset a lost or forgotten password using RACADM, open a serial/Telnet/SSH text console to CMC, log in, and type: racadm racresetcfg -m kvm NOTE: Using the racresetcfg command resets the Front Panel Enable and Dell CMC Console Enable settings, if they are different from the default values.
  • Page 178 Adding Servers to the Scan List Removing Server from Scan List Starting the Scan Mode Cancelling Scan Mode Adding Servers to the Scan List To add servers to the scan list: Press <Print Screen>. The Main dialog box is displayed. Click Setup and then Scan.
  • Page 179: Broadcasting To Servers

    If OSCAR is not open, move the mouse or press any key on the keyboard The Main dialog box is displayed. Select a server in the list. Click Commands. The Commands dialog box is displayed. Clear the Scan Enable option and click OK. Broadcasting to Servers You can simultaneously control more than one server in the system to make sure that all selected servers receive identical input.
  • Page 180: Enabling Or Disabling Access To Ikvm From Front Panel

    Update iKVM Firmware • Enable or disable access to iKVM from front panel • Enable or disable access to iKVM from the Dell CMC console Related Links Updating iKVM Firmware Enabling or Disabling Access to iKVM from Front Panel Viewing iKVM Information and Health Status...
  • Page 181: Managing And Monitoring Power

    Managing and Monitoring Power The Dell PowerEdge M1000e server enclosure is the most power-efficient modular server enclosure. It is designed to include highly-efficient power supplies and fans, has an optimized layout for the air ro flow more easily through the system, and contains power-optimized components throughout the enclosure.
  • Page 182: Redundancy Policies

    Viewing Power Budget Status Redundancy Status and Overall Power Health Configuring Power Budget and Redundancy Executing Power Control Operations You can execute the following power control operation for the chassis, servers, and IOMs. Redundancy Policies Redundancy policy is a configurable set of properties that determine how CMC manages power to the chassis. The following redundancy policies are configurable with or without dynamic PSU engagement: •...
  • Page 183: Power Supply Redundancy Policy

    In the event of a single PSU failure in this configuration, the remaining PSUs in the failing grid are marked as Online. In this state, any of the remaining PSUs can fail without interrupting operation of the system. If a PSU fails, the chassis health is marked non-critical.
  • Page 184: Dynamic Power Supply Engagement

    Figure 7. No Redundancy with three PSUs in the chassis A PSU failure brings other PSUs out of Standby mode, as needed, to support the chassis power allocations. If you have four PSUs, and require only three, then in the event that one fails, the fourth PSU is brought online. A chassis can have all six PSUs online.
  • Page 185: Default Redundancy Configuration

    NOTE: In a three PSU configuration, server load may prevent any PSUs from transitioning to Standby • In a Power Supply Redundancy configuration, the enclosure always keeps an additional PSU powered on and marked Online in addition to the PSUs required to power the enclosure. Power utilization is monitored and up to 284 Managing and Monitoring Power four PSUs could be moved to Standby state depending on the overall system load.
  • Page 186: No Redundancy

    CMC allocates power to the CMC infrastructure and the servers in the chassis. CMC infrastructure consists of components in the chassis, such as fans, I/O modules, and iKVM (if present). The chassis may have up to 16 servers that iDRAC7 User’s Guide at support.dell.com/ communicate to the chassis through the iDRAC. For more information, see the manuals.
  • Page 187: Server Slot Power Priority Settings

    consumption. Depending on the actual power requirements, the iDRAC power envelope may change over time. iDRAC requests a power step-up only if the servers are fully consuming the allocated power. Under heavy load the performance of the server’s processors may be degraded to ensure power consumption stays System Input Power Cap .
  • Page 188: Assigning Priority Levels To Servers

    to accommodate the higher priority servers. Therefore, after the available power for allocation is exhausted, then CMC reclaims power from lower or equal priority servers until they are at their minimum power level. NOTE: I/O modules, fans, and iKVM (if present) are given the highest priority. CMC reclaims power only from lower priority devices to meet the power needs of a higher priority module or server.
  • Page 189: Viewing Power Budget Status

    Viewing Power Budget Status You can view the power budget status using the CMC Web interface or RACADM. Viewing Power Budget Status Using CMC Web Interface To view power budget status using CMC Web interface, in the system tree go to Chassis Overview and click Power → Budget Status.
  • Page 190: New Server Engagement Policy

    PSU, CMC evaluates power needs again when the second PSU is removed to determine the firmware response. If power requirements are still not met, CMC may power off the lower priority servers. Limits • CMC does not support automated power-down of a lower priority server to allow power up of a higher priority server;...
  • Page 191: Power Supply And Redundancy Policy Changes In System Event Log

    PSU Configuration Dynamic PSU Firmware Response Engagement No Redundancy Disabled Decrease power to low priority servers, if needed. AC Redundancy Enabled CMC alerts you of loss of AC Redundancy. PSUs in standby mode (if any) are turned on to compensate for power budget lost from the PSU failure or removal.
  • Page 192: Power Conservation And Power Budget

    You can configure the following: • System Input Power Cap • Redundancy Policy • Server Performance Over Power Redundancy • Enable Dynamic Power Supply Engagement • Disable Chassis Power Button • Allow 110 VAC Operation • Max Power Conservation Mode •...
  • Page 193: Server Power Reduction To Maintain Power Budget

    The system is restored to full performance when the maximum conservation mode is cleared. Server Power Reduction to Maintain Power Budget CMC reduces power allocations of lower priority servers when additional power is needed to maintain the system power consumption within the user-configured System Input Power Cap .
  • Page 194: External Power Management

    External Power Management CMC Power management is optionally controlled by the Power Measure, Mitigate, and Manage Console (PM3). For PM3 User’s Guide . more information, see the When external power management is enabled, PM3 manages: • Server Power of 12th generation servers •...
  • Page 195: Configuring Power Budget And Redundancy Using Racadm

    – Server Performance Over Power Redundancy – Enable Dynamic Power Supply Engagement – Disable Chassis Power Button – Allow 110 VAC Operation – Max Power Conservation Mode – Enable Remote Power Logging 300 Managing and Monitoring Power – Remote Power Logging Interval Click Apply to save the changes.
  • Page 196: Executing Power Control Operations

    – Enable 110 VAC PSUs: racadm config -g cfgChassisPower -o cfgChassisAllow110VACOperation 1 – Enable Server Performance Over Power Redundancy: racadm config -g cfgChassisPower -o cfgChassisPerformanceOverRedundancy 1 – Disable Server Performance Over Power Redundancy: racadm config -g cfgChassisPower -o cfgChassisPerformanceOverRedundancy 0 –...
  • Page 197: Executing Power Control Operations On A Server

    NOTE: To perform power management actions, you must have Chassis Configuration Administrator privilege. Executing Power Control Operations on the Chassis Using Web Interface To execute power control operations on the chassis using the CMC Web interface: In the system tree, go to Chassis Overview and click Power → Control . The Chassis Power Control page is displayed.
  • Page 198: Executing Power Control Operations On An Iom

    A dialog box appears requesting confirmation. Click OK to perform the power management action (for example, cause the server to reset). Executing Power Control Operations on a Server Using CMC Web Interface To execute power control operation for an individual server using the CMC Web interface: In the system tree, go to Chassis Overview and click Server Overview.
  • Page 199 Executing Power Control Operations on IOMs Using RACADM To execute power control operations on an IOM using RACADM, open a serial/Telnet/SSH text console to CMC, log in, and type: racadm chassisaction -m switch-<n><action> where < n > is a number 1-6 and specifies the IOM (A1, A2, B1, B2, C1, C2), and <action> indicates the operation you want to execute: powercycle or reset.
  • Page 201: Troubleshooting And Recovery

    Troubleshooting and Recovery This section explains how to perform tasks related to recovering and troubleshooting problems on the remote system using the CMC Web interface. • Viewing chassis information. • Viewing the event logs. • Gathering Configuration information, error status and error logs. •...
  • Page 202: Downloading Snmp Management Information Base (Mib) File

    In the system tree, go to Chassis Overview and click Network → Services → SNMP. The SNMP Configuration section is displayed. Click Save to download the CMC MIB file to your local system. Dell OpenManage Server Administrator SNMP Reference For more information on the SNMP MIB file, see the Guide at dell.com/support/manuals.
  • Page 203 Resolution A: Check and replace the AC cord. Check and confirm that the power distribution unit providing power to the power supply is operating as expected. If the failure still persists, call Dell customer service for replacement of the power supply.
  • Page 204: Troubleshooting Alerts

    • Problem: The least priority servers lost power after a PSU failure. – Resolution: This is expected behavior if the enclosure power policy was configured to No Redundancy. To avoid a future power supply failure causing servers to power off, ensure that the chassis has at least four power supplies and is configured for the Power Supply Redundancy policy to prevent PSU failure from impacting server operation.
  • Page 205: Viewing Cmc Log

    Viewing Hardware Logs Using CMC Web Interface You can view, save, and clear the hardware log. You can sort the log entries based on Severity, Date/Time, or Description by clicking the column heading. Subsequent clicks on the column headings reverse the sort. To view the hardware logs using CMC Web interface, in the system tree, go to Chassis Overview and click Logs →...
  • Page 206: Using Diagnostic Console

    Using Diagnostic Console You can diagnose issues related to the chassis hardware using CLI commands if you an advanced user or a user under the direction of technical support. NOTE: To modify these settings, you must have Debug Command Administrator privilege. To access the Diagnostic Console using the CMC Web interface: In the system tree, go to Chassis Overview and click Troubleshooting →...
  • Page 207: Troubleshooting Network Time Protocol (Ntp) Errors

    NOTE: The default backup file name contains the Chassis' service tag. This backup file can be used later, to restore the settings and certificates for this chassis only. To restore the chassis configuration, click Choose File, specify the backup file, and click Restore. NOTE: CMC does not reset upon restoring configuration, however CMC services may take some time to effectively impose any changed or new configuration.
  • Page 208: Interpreting Led Colors And Blinking Patterns

    For information on how to enter the gettracelog command to review the trace log using the CMC Web interface, Using Diagnostic Console. Interpreting LED Colors and Blinking Patterns The LEDs on the chassis provide the component status as per the following: •...
  • Page 209 Component LED Color, Blinking Pattern Meaning Green, blinking Firmware is being uploaded Green, dark Powered off Blue, glowing steadily Normal/stack master Blue, blinking User-enabled module identifier Amber, glowing steadily Not used Amber, blinking Fault Blue, dark No fault/stack slave IOM (Pass through) Green, glowing steadily Powered on Green, blinking...
  • Page 210: Troubleshooting Non-Responsive Cmc

    FW images] CMC2 has corrupted images – If the prompt indicates a self test failure, there are no serviceable components on CMC. CMC is bad and must be returned to Dell. – If the prompt indicates Bad FW Images, then follow the steps in...
  • Page 211: Recovering Firmware Image

    Damage due to servicing that is not authorized by Dell is not covered by your warranty. Read and follow the safety instructions that came with the product.
  • Page 212 To perform management actions, a user with Administrator privileges is required. If the administrator account password is forgotten, it can be reset using the PASSWORD_RST jumper on the CMC board. The PASSWORD_RST jumper uses a two-pin connector as shown in the following figure. While the PASSWORD_RST jumper is installed, the default administrator account and password is enabled and set to the following default values: username: root...
  • Page 213 Table 39. CMC Password Jumper Settings PASSWORD_RSE (default) The password reset feature is disabled. The password reset feature is enabled. Slide the CMC module into the enclosure. Reattach any cables that were disconnected. NOTE: Make sure that the CMC module becomes the active CMC, and remains the active CMC until the remaining steps are completed.
  • Page 215: Using Lcd Panel Interface

    Using LCD Panel Interface You can use the LCD panel on the chassis to perform configuration and diagnostics, and to obtain status information about the chassis and its contents. The following figure illustrates the LCD panel. The LCD screen displays menus, icons, pictures, and messages. Figure 10.
  • Page 216 To scroll through options on a screen, use the down and up arrow buttons. • To select and save an item on a screen and move to the next screen, use the center button. • The up, down, left, and right arrow buttons change the selected menu items or icons on the screen. The selected item is shown with a light blue background or border.
  • Page 217: Main Menu

    The factory default screen is the Main Menu. You can choose from the following screens to display: • Main Menu • Server Status (front graphical view of the chassis) • Module Status (rear graphical view of the chassis) • Custom (Dell logo with chassis name) The currently active default screen is highlighted in light blue.
  • Page 218: Graphical Server Status Screen

    1. Use the up and down arrow buttons to highlight the screen you want to set to the default. 2. Press the center button. The Accept icon is highlighted. 3. Press the center button again to confirm the change. The Default Screen is displayed. Graphical Server Status Screen The Graphical Server Status screen displays icons for each server installed in the chassis and indicates the general health status for each server.
  • Page 219: Module Status Screen

    Use the navigation buttons to highlight the desired item (highlight the Back icon to return to the Main Menu) and press the center button. The selected screen displays. Module Status Screen The Module Status screen displays information and error messages about a module. For messages that can appear on this screen, see LCD Module and Server Status Information LCD Error...
  • Page 220 Figure 11. Removing and Installing LCD Module cable cover LCD module ribbon cable hinges (2) screws (2) Table 41. LCD Hardware Troubleshooting Items Symptom Issue Recovery Action Alert screen message CMC Not Loss of communication from CMC Check that CMC is booting; then, reset CMC to the LCD front panel.
  • Page 221: Front Panel Lcd Messages

    • The control panel cable is not connected, or is improperly connected. Reseat cables. LCD screen message No CMC No CMC is present in the chassis. Insert a CMC into the chassis or reseat existing CMC if present. Found. Front Panel LCD Messages This section contains two subsections that list error and status information that is displayed on the front panel LCD.
  • Page 222 Severity Message Cause Critical The power supplies are not redundant. One or more PSU have failed or removed and the Insufficient resources to maintain normal system lacks sufficient power to maintain normal operations. operations. This could cause servers to power down. Warning The control panel ambient temperature is Chassis/Enclosure intake temperature exceeded the...
  • Page 223 Table 47. PSU Status Screens Severity Message Cause Critical Power supply <number> failed. The PSU has failed. Critical The power input for power supply <number> is Loss of AC power or AC cord unplugged. lost. Warning Power supply <number> is operating at 110 volts, Power supply is plug into a 110 volt source.
  • Page 224 Severity Message Cause Critical Mezz B<slot number> Status: Add-in Card Incorrect Mezzanine card installed for IO fabric. sensor for Mezz B<slot number>, install error was asserted. Critical Mezz C<slot number> Status: Add-in Card Incorrect Mezzanine card installed for IO fabric. sensor for Mezz C<slot number>, install error was asserted.
  • Page 225: Lcd Module And Server Status Information

    Severity Message Cause Critical A PCI parity error was detected on a Parity error was detected on the PCI bus. component at slot <number>. Critical A PCI system error was detected on a PCI error detected by device. component at bus <number> device <number> function <number>.
  • Page 226 Table 50. Chassis/Enclosure Status Item Description User Define Name Example: “Dell Rack System”. This is settable via CMC CLI or Web GUI. Error Messages If no errors occur then No Errors is displayed; otherwise error messages are listed, critical errors first, then warnings.
  • Page 227 Table 52. PSU Status Item Description Name/Location Example: PSU1, PSU2, etc. Error Messages If no error then "No Errors" is shown; otherwise error messages are listed, critical errors first, then warnings. Status Offline, Online, or Standby. Maximum Wattage Maximum Wattage that PSU can supply to the system. Table 53.
  • Page 228 NOTE: You can set this table through the CMC CLI or Web GUI. Name Name of the server, which the user can set through Dell OpenManage. The name is displayed only if iDRAC has finished booting, and the server supports this feature, else iDRAC booting messages are displayed.
  • Page 229: Frequently Asked Questions

    Frequently Asked Questions This section lists the frequently asked questions for the following: • RACADM • Managing and Recovering a Remote System • Active Directory • FlexAddress and FlexAddressPlus • iKVM • RACADM After performing a CMC reset (using the RACADM racreset subcommand), when a command is entered, the following message is displayed: racadm <subcommand>...
  • Page 230 To address this security concern, upload a CMC server certificate issued to the IP address of CMC. When generating the certificate signing request (CSR) to be used for issuing the certificate, ensure that the common name (CN) of the CSR matches the IP address of CMC (for example, 192.168.0.120) or the registered DNS CMC name.
  • Page 231: Active Directory

    Yes. In mixed mode, all objects used by the CMC querying process (among user, RAC Device Object, and Association Object) must be in the same domain. The Dell-extended Active Directory Users and Computers Snap-In checks the mode and limits users in order to create objects across domains if in mixed mode.
  • Page 232 Feature Card Chassis Service Tag = YYYYYYYY The original feature card is no longer eligible for deactivation on that or any other chassis, unless Dell Service re-programs the original chassis service tag back into a chassis, and CMC that has the original feature card is made active on that chassis.
  • Page 233: Ikvm

    How can a SD card be recovered if the SD card was not in the chassis when the deactivation command was executed on the FlexAddress? The issue is that the SD card cannot be used to install FlexAddress on another chassis if it was not in CMC when FlexAddress was deactivated.
  • Page 234: Iom

    To disable the front panel using RACADM, open a serial/Telnet/SSH text console to CMC, log in, and type: racadm config -g cfgKVMInfo -o cfgKVMFrontPanelEnable 0 In the OSCAR menu, the Dell CMC connection displays a red X, and it is not possible to connect to CMC. Why? There are two possible causes: •...

This manual is also suitable for:

Chassis management controller

Table of Contents