Dell Chassis Management Controller Version 2.
Notes, cautions, and warnings NOTE: A NOTE indicates important information that helps you make better use of your product. CAUTION: A CAUTION indicates either potential damage to hardware or loss of data and tells you how to avoid the problem. WARNING: A WARNING indicates a potential for property damage, personal injury, or death. © 2008 - 2019 Dell Inc. or its subsidiaries. All rights reserved. Dell, EMC, and other trademarks are trademarks of Dell Inc. or its subsidiaries.
Contents 1 Overview.....................................................................................................................................11 Key Features......................................................................................................................................................................... 12 What is new in this release............................................................................................................................................
3 Logging into CMC.......................................................................................................................34 Configure public key authentication over SSH................................................................................................................ 34 Generating public keys for systems running Windows............................................................................................. 34 Generating public keys for systems running Linux.................
Viewing information and health status of fans................................................................................................................ 56 Configuring fans............................................................................................................................................................ 56 Viewing front panel properties...........................................................................................................................................
Parsing rules................................................................................................................................................................... 72 Modifying the CMC IP address....................................................................................................................................73 7 Configuring servers.................................................................................................................... 75 Configuring slot names......
Launching remote console from server status page...................................................................................................... 92 8 Configuring storage sleds........................................................................................................... 93 Configuring storage sleds in split-single mode................................................................................................................ 93 Configuring storage sleds in split-dual mode..............
Configuring CMC SSO Or Smart Card Login For Active Directory Users Using Web Interface.............................109 Uploading Keytab file..........................................................................................................................................................110 Configuring CMC SSO login or Smart Card login for Active Directory users using RACADM.................................110 12 Configuring CMC to use Command Line consoles.............................................
Viewing the VLAN settings on IOMs using CMC web interface................................................................................. 132 Viewing the current VLAN settings on IOMs using CMC web interface....................................................................132 Removing VLANs for IOMs using CMC web interface................................................................................................. 132 Updating untagged VLANs for IOMs using CMC web interface...........................
Resetting Forgotten Administrator Password............................................................................................................... 152 19 Frequently asked questions...................................................................................................... 154 RACADM.............................................................................................................................................................................
1 Overview The Dell Chassis Management Controller (CMC) for Dell EMC PowerEdge FX2/FX2s is a Systems Management hardware and software solution for managing the PowerEdge FX2/FX2s chassis. The CMC has its own microprocessor and memory and is powered by the modular chassis into which it is plugged. The CMC enables an IT administrator to: • • • • • • View inventory. Perform configuration and monitoring tasks. Remotely turn on and turn off chassis and servers.
• Accessing documents from the Dell EMC support site Key Features The CMC features are grouped into management and security features. What is new in this release This release of CMC for Dell EMC PowerEdge FX2/FX2s supports: • • • • Enabling forced password change to comply with SB-327 Regulations of California, USA. Regenerating SSH self-signed-key using CLI command. Updating OpenSSH open-source package to version 7.9p1. Updating OpenSSH open-source package to version 1.0.2r.
• • • Active Directory using Standard Schema or an Extended Schema (optional). • Hardware-stored user IDs and passwords. Role-based authority — Enables an administrator to configure specific privileges for each user. User ID and password configuration through the web interface. Web interface supports 128-bit SSL 3.0 encryption and 40-bit SSL 3.0 encryption (for countries where 128-bit is not acceptable). NOTE: Telnet does not support SSL encryption. • • • • • • • Configurable IP ports (if applicable).
Figure 2. Chassis front panel Table 2. Chassis front panel — components Item Indicator, Button, or Connector 1 System identification button 2 Enclosure power-on indicator, power button 3 Diagnostic indicators 4 KVM select button 5 Compute sled 6 Video connector 7 USB connector 8 Storage sled Supported remote access connections The following table lists the supported remote access connections. Table 3.
Connection Features • • • • Serial port • • • chained between chassis in the Stacking mode. Ensure that the cabling model matches the CMC setting for the intended usage. DHCP support. SNMP traps and e-mail event notification. Network interface for the iDRAC and I/O Modules (IOMs). Support for Telnet/SSH command console and RACADM CLI commands including system boot, reset, power-on, and shutdown commands.
Supported Firmware Versions for Server Component Update The following table lists the supported firmware versions for server components when CMC PowerEdge FX2/FX2s firmware is updated from 2.0 to 2.1 version but the server components are not updated to the next version. Table 5. Supported Server Component Versions for Server Component Update to N version Platform Server Component Previous Component Version (N-1 Version) Updated Component Version (N Version) FD332 SAS RAID FW 25.2.2-0004 25.4.0.
Table 6.
Platforms Model FC430 FC630 FC830 FC640 QLE2562 FC8 HBA Yes Yes Yes Yes QLE2690 FC16 SP HBA No Yes Yes Yes QLE2742 FC32 SFP+ HBA No Yes Yes Yes QLE2740 FC32 SP HBA No Yes Yes Yes QLE2692 FC16 DP HBA Yes Yes Yes Yes PCIE SF852P DP 10G Yes Yes Yes Yes INTEL OPA x16 LP No No Yes Yes Managing licenses The CMC features are available based on the license (CMC Express or CMC Enterprise) purchased.
License operations Before you perform the license management tasks, make sure to acquire the licenses. For more information, see the Acquiring Licenses section and Overview and Feature Guide available at dell.com/support.
Feature Express Enterprise Email Alerts Yes Yes CMC Settings Backup No Yes CMC Settings Restore Yes Yes Remote Syslog No Yes Directory Services No Yes Single Sign-On Support No Yes Two-Factor Authentication No Yes PK Authentication No Yes Remote File Share No Yes Enclosure level power capping No Yes Multi-chassis management No Yes FlexAddress Enablement No Yes One-to-many Server Firware Update No Yes One-to-many configuration for iDRAC No Yes License component st
How to use this Guide The contents of this User's Guide enable you to perform the tasks by using: • • The Web interface: Only the task-related information is given here. For information about the fields and options, see the CMC for Dell PowerEdge FX2/FX2s Online Help that you can open from the Web interface. The RACADM commands: The RACADM command or the object that you must use is provided here.
• • • • For Dell EMC OpenManage Connections Enterprise Systems Management documents — www.dell.com/ OMConnectionsEnterpriseSystemsManagement For Dell EMC Serviceability Tools documents — www.dell.com/ServiceabilityTools 1. Go to www.support.dell.com . 2. Click Browse all products. 3.
2 Installing and setting up CMC This section provides information about how to install your CMC hardware, establish access to CMC, configure your management environment to use CMC, and guides you through the tasks for configuring a CMC: • • • • Set up initial access to CMC. Access CMC through a network. Add and configure CMC users. Update CMC firmware.
You can also power on the chassis using the command line interface, use racadm chassisaction powerup command to accomplish it. NOTE: Do not turn on the servers. 7. The default CMC network configuration is Static with the CMC IP address 192.168.0.120. If you want to change the network configuration to DHCP, connect a serial cable to serial port on the CMC. For more information on serial connection, refer to Serial interface/protocol setup in Using Remote Access Software From a Management Station section.
Table 9. Daisy-chained storage sleds Component number in image Component name 1 Management Network 2 Active CMC The following figure illustrates an example of incorrect cabling of CMC in stacking mode.
Following are the steps to daisy-chain four FX2 CMC modules: 1. 2. 3. 4. Connect the GB port of the FX2 CMC in the first chassis to the management network. Connect the GB port of the FX2 CMC in the second chassis to the STK port of the FX2 CMC in the first chassis. If you have a third chassis, connect the GB port of its FX2 CMC to the STK port of the FX2 CMC in the second chassis. If you have a fourth chassis, connect the GB port of its FX2 CMC to the STK port of the FX2 CMC in the third chassis.
Interface/ Protocol Description Remote RACADM CLI Remote RACADM is a client utility that runs on a management station. It uses the out-of-band network interface to run RACADM commands on the managed system and uses the HTTPs channel. The –r option runs the RACADM command over a network, it requires CMC IP, username and password. To use remote RACADM from your management station, install remote RACADM using the Dell Systems Management Tools and Documentation DVD that is available with your system.
Interface/ Protocol Description For client connection using Microsoft WinRM, the minimum required version is 2.0. For more information, refer to the Microsoft article, . Launching CMC using other systems management tools You can also launch CMC from the Dell Server Administrator or Dell OpenManage Essentials. To access CMC interface using Dell Server Administrator, launch Server Administrator on your management station.
NOTE: When using the RACADM remote capability, you must have the 'write' permission on the folders where you are using the RACADM subcommands, involving the file operations. For example, racadm getconfig -f . Uninstalling remote RACADM from a Linux management station 1. Log in as root to the system where you want to uninstall the management station features. 2. Run the following rpm query command to determine which version of the DRAC tools is installed: rpm -qa | grep mgmtst-racadm 3.
Enabling animations in Internet Explorer When transferring files to and from the web interface, a file transfer icon spins to show transfer activity. While using Internet explorer, you have to configure the browser to play animations. To configure Internet Explorer to play animations: 1. Start Internet Explorer. 2. Click Tools > Internet Options > Advanced. 3. Go to the Multimedia section, and then select the Play animations in web pages option.
Setting date and time on CMC using RACADM To set the date and time using the command line interface, see the config command and cfgRemoteHosts database property group sections in the Chassis Management Controller for PowerEdge FX2/FX2s RACADM Command Line Reference Guide available at dell.com/support/manuals. For example racadm setractime -l 20140207111030. To read the date and time use racadm getractime command.
• • Power button KVM Configuring power button To configure the chassis power button: 1. In the left pane, click Chassis Overview > Front Panel > Setup. 2. On the Front Panel Configuration page, under the Power Button Configuration section, select the Disable Chassis Power Button option, and then click Apply. The chassis power button is disabled. Accessing a server using KVM To map a Server to KVM from web interface: 1. 2. 3. 4.
• To change Chassis Management at Server mode to monitor, use: racadm config –g cfgRacTuning – cfgRacTuneChassisMgmtAtServer 1 • To change Chassis Management at server mode to manage and monitor, use: racadm config –g cfgRacTuning – cfgRacTuneChassisMgmtAtServer 2 Installing and setting up CMC 33
3 Logging into CMC You can log in to CMC as a CMC local user, as a Microsoft Active Directory user, or as an LDAP user. You can also log in using Single SignOn or a Smart Card.
2. Enter the number of bits for the key. Ensure that the RSA key size is between 1024 and 4096. NOTE: • CMC may not display a message if you add keys less than 1024 or greater than 4096, but when you try to log in with these keys, it fails. • CMC accepts RSA keys up to key strength 4096, but the recommended key strength is 1024. 3. Click Generate, and move the mouse in the window as directed. After the key is created, you can modify the key comment field.
Logging into CMC as a local user, active directory user, or LDAP user To log in to CMC, you must have a CMC account with the Log In to CMC privilege. The default root account is the default administrative account that ships with CMC. NOTE: For added security, it is recommended that you change the default password of the root account during initial setup. NOTE: When Certificate Validation is enabled, FQDN of the system should be provided.
• Enable Smart Card login. To log in to CMC as an Active Directory user using a smart card: 1. Log in to CMC using the link https://. The CMC Login page is displayed asking you to insert a smart card. NOTE: If you changed the default HTTPS port number (port 80), access the CMC web page using :, where cmcname is the CMC host name for CMC, domain-name is the domain name, and port number is the HTTPS port number. 2. Insert the smart card and click Login.
Before logging in to CMC over SSH, make sure that the public keys are uploaded. To use this feature, you must have an Enterprise License. For example: • Logging in: ssh service@ or ssh service@, where IP_address is the CMC IP address.
4 Updating firmware You can update firmware for: • • • The CMC Chassis infrastructure I/O Module You can update firmware for the following server components: • • • • • • • • BIOS iDRAC7 iDRAC8 Lifecycle Controller 32–bit diagnostics Operating system Drivers Pack Network Interface Controllers RAID controllers Topics: • • • • • • • Signed CMC firmware image Downloading CMC firmware Viewing currently installed firmware versions Updating the CMC firmware Updating the CMC using DUP Updating chassis infrastr
Viewing currently installed firmware versions using CMC web interface In the CMC web interface, go to any of the following pages to view the current firmware versions: • • • Chassis Overview > Update Chassis Overview > Chassis Controller > Update Chassis Overview > Server Overview > Server Component Update The Firmware Update page displays the current version of the firmware for each listed component and allows you to update the firmware to the latest version.
• • Chassis Overview > Update Chassis Overview > Chassis Controller > Update 2. On the Firmware Update page, in the CMC Firmware section, select the required components under the Update Targets column for the CMC you want to update, and then click Apply CMC Update. 3. In the Firmware Image field, enter the path to the firmware image file on the management station or shared network, or click Browse to browse through to the file location. The default name of the CMC firmware image file is fx2_cmc.bin. 4.
Updating chassis infrastructure firmware using CMC web interface 1. Go to any of the following pages: • • Chassis Overview > Update. Chassis Overview > Chassis Controller > Update. 2. On the Firmware Update page, in the Chassis Infrastructure Firmware section, in the Update Targets column, select the option, and then click Apply Chassis Infrastructure Firmware. 3. On the Firmware Update page, click Browse, and then select the appropriate chassis infrastructure firmware. 4.
The Server Component Update page is displayed. To continue, see Updating Server Component Firmware. Updating server component firmware The one-to-many update feature in CMC enables you to update server component firmware across multiple servers. You can update the server components using the Dell Update Packages available on the local system or on a network share. This operation is enabled by leveraging the Lifecycle Controller functionality on the server.
• Enables you to maintain a standard image with the required updates versions of the server components that can be used to update multiple servers in a single operation. • You can copy the directories of updates from the Dell Server Update Utility (SUU) download DVD or create and customize the required update versions in the Dell Repository Manager (DRM). You do not need the latest version of the Dell Repository Manager to create this directory. However, Dell Repository Manager version 1.
• The Server Component Update page enables you to update various firmware components on the server. To use the features and functions on this page, you must have: • • For CMC: The Server Administrator privilege. For iDRAC: The configure iDRAC privilege and log in to iDRAC privilege. In case of insufficient privileges, you can only view the firmware inventory of components and devices on the server. You cannot select any components or devices for any type of Lifecycle Controller operation on the server.
1. In the left pane, click Server Overview, and then click Update. 2. On the Server Component Update page, view the firmware inventory details in the Component/Device Firmware Inventory section. On this page, you can view the following information: • • • If the server is listed as Not Ready, it indicates that when the firmware inventory was retrieved, the iDRAC on the server was still initializing.
Saving chassis inventory report using CMC web interface To save the chassis inventory report: 1. In the system tree, go to Server Overview, and then click Update > Server Component Update. The Server Component Update page is displayed. 2. Click Save Inventory Report. The Inventory.xml file is saved on an external system. NOTE: The Dell Repository Manager Application uses the Inventory.xml file as an input to create a repository of updates for all the blades available in the chassis.
• Delete Jobs Only one type of operation can be performed at a time. Components and devices that are not supported may be listed as part of the inventory, but do not permit Lifecycle Controller operations. To perform the Lifecycle Controller operations, you must have: • • For CMC: Server Administrator privilege. For iDRAC: Configure iDRAC privilege and Log in to iDRAC. A Lifecycle Controller operation scheduled on a server may take 10 to 15 minutes to complete.
Upgrading server component firmware You can install the next version of the firmware image for selected components or devices across one or more servers. The firmware image is available within the Lifecycle Controller for a rollback operation. To use this feature, you must have an Enterprise License. NOTE: For iDRAC and Operating System Driver packs firmware update, make sure the Extended Storage feature is enabled.
a network share provides flexibility to update all the 12G server components at the same time with a single catalog either from a CIFS or from a NFS. This method provides a quick and easy way to build a custom repository for connected systems that you own using the Dell Repository Manager and the chassis inventory file exported using the CMC Web interface. DRM enables you to create a fully customized repository that only includes the update packages for the specific system configuration.
Deleting scheduled server component firmware jobs using the web interface To delete scheduled server component firmware jobs: 1. In the left pane, click Server Overview, and then click Update. 2. On the Server Component Update page, filter the component or device (optional). 3. In the Job Status column, if a check box is displayed next to the job status, it implies that a Lifecycle Controller job is in progress and currently in the indicated state. It can be selected for a job-deletion operation. 4.
5 Viewing chassis information and monitoring chassis and component health You can view information and monitor the health of the following: • • • • • • • • CMC All severs and individual servers IO Modules Fans Power Supply Units (PSUs) Temperature sensors PCIe devices Storage sleds Topics: • • • • • • • • • • Viewing chassis and component summaries Viewing chassis summary Viewing chassis controller information and status Viewing information and health status of all servers Viewing information and health
Server Icon States in 13th generation systems Image Description A server is present, turned on, and is operating normally. A server is present, but turned off. A server is present, but reporting a noncritical error. A server is present, but reporting a critical error. Server Icon States in 14th generation systems Image Description A server is present, turned on, and is operating normally. A server is present, but turned off. A server is present, but reporting a noncritical error.
Component All Storage and Individual Storage Sleds Health and Performance Properties Properties Quick Links • • • • • • • • • • • Service Tag Host Name iDRAC CPLD BIOS OS CPU Information Total System Memory • • • • • • • • • • • Name Model Service Tag Asset Tag Number of Controllers • • Storage Array Status Storage Array Setup Health Power Allocated Temperature Health Launch iDRAC GUI Power Off Server Graceful Shutdown Remote File Share Deploy iDRAC Network Server Component Update NOTE: Quick
Viewing storage model name and Service Tag You can view the model name and Service Tag of each storage sled using the following steps: 1. In the left pane, under the Server Overview tree node, all the storage sleds appear in the list. If a storage sled is not present in a slot, the corresponding image in the graphic is grayed out. 2. Point the cursor to the storage sled slot number. A tool tip, if available, is displayed with the model name and Service Tag of the storage sled.
Viewing information and health status of fans CMC controls the speed of the chassis fan by increasing or decreasing the fan speed on the basis of system events. You can run the fan in three modes such as Low, Medium, and High (fan offset). For more information about configuring a fan, see the CMC for Dell PowerEdge FX2/FX2s Online Help. To set up the properties of fans by using RACADM commands, type the following command at the CLI interface.
For setting up these features by using RACADM commands, user the following command: racadm fanoffset [-s ] Viewing front panel properties To view the front panel properties: 1. In the left pane, click Chassis Overview > Front Panel. 2.
6 Configuring CMC Chassis Management Controller enables you to configure properties, set up users, and alerts to perform remote management tasks. Before you begin configuring the CMC, you must first configure the CMC network settings to allow CMC to be managed remotely. This initial configuration assigns the TCP/IP networking parameters that enable access to the CMC. You can configure CMC using Web interface or Setting up Initial Access to CMC RACADM.
You can enable the DHCP to obtain an IP address from the DHCP server automatically. Enabling or disabling DHCP for DNS IP addresses By default, the CMC’s DHCP for DNS address feature is disabled. When enabled, this feature obtains the primary and secondary DNS server addresses from the DHCP server. While using this feature, you do not have to configure static DNS server IP addresses.
Viewing CMC network LAN settings using RACADM To view IPv4 settings, use the object cfgCurrentLanNetworking with the following subcommands: • • getniccfg getconfig To view IPv6 settings, use the cfgIpv6LanNetworking with the getconfig subcommand. To view IPv4 and IPv6 addressing information for the chassis, use the getsysinfo subcommand. For more information about the subcommands and objects, see the Chassis Management Controller for PowerEdge FX2/FX2s RACADM Command Line Reference Guide.
racadm config -g cfgIPv6LanNetworking -o cfgIPv6PrefixLength 64 racadm config -g cfgIPv6LanNetworking -o cfgIPv6Gateway Configuring IPv4 and IPv6 DNS settings • CMC Registration — To register the CMC on the DNS server, type: racadm config -g cfgLanNetworking -o cfgDNSRegisterRac 1 NOTE: Some DNS servers only register names of 31 characters or fewer. Make sure the designated name is within the DNS required limit.
The CMC cannot be cabled for Management Network Port redundancy prior to actually configuring it for this operation. The CMC must use the standard single network connection for deployment, after which the second redundant connection may be made. NOTE: When Management Port 2 is set for Redundant but is cabled for Stacking, the downstream CMCs (further from the TOR switch) will not have a network link.
• • • Kerberos NTP Client NFS NOTE: SNMP is not FIPS-compliant. In FIPS mode, all SNMP features except Message Digest algorithm version 5 (MD5) authentication work. Enabling FIPS Mode Using CMC Web Interface To enable FIPS: 1. In the left pane, click Chassis Overview. The Chassis Health page is displayed. 2. On the menu bar, click Network. The Network Configuration page is displayed. 3. Under the Federal Information Processing Standards (FIPS) section, from the FIPS Mode drop-down menu, select Enabled.
NOTE: To modify service settings, you must have the Chassis Configuration Administrator privilege. Remote syslog is an additional log target for CMC. After you configure the remote syslog, each new log entry generated by CMC is forwarded to the respective destinations. NOTE: Because the network transport for the forwarded log entries is UDP, there is no guaranteed delivery of log entries, nor is there any feedback to CMC about whether the log entries were received successfully.
• • • Quick launch links are available to open web pages for member chassis or servers. A server and Input/Output inventory is available for a group. A selectable option is available to synchronize a new member’s properties to the leader’s properties when the new member is added to the group. A chassis group may contain a maximum of 19 members. Also, a leader or member can only participate in one group. You cannot join a chassis, either as a leader or member, that is part of a group to another group.
Disbanding a Chassis Group To disband a chassis group from the lead chassis: 1. Log in with administrator privileges to the leader chassis. 2. Select the lead chassis in the left pane. 3. Click Setup > Group Administration. 4. In the Chassis Group page, under Role, select None, and then click Apply. The lead chassis then communicates to all the members that they have been removed from the group. The lead chassis can be assigned as a leader or member of a new group.
• Manual Propagation — Select this option for manual propagation of the chassis group leader properties with its members. The lead chassis property settings are propagated to group members only when a lead chassis administrator clicks Propagate. 5. In the Propagation Properties section, select the categories of lead configuration properties to be propagated to member chassis. Select only those setting categories that you want identically configured, across all members of the chassis group.
Chassis Configuration Profiles The Chassis Configuration Profiles feature enables you to configure the chassis with the chassis configuration profiles stored in the network share or local management station, and also restore configuration of the chassis. To access the Chassis Configuration Profiles page in the CMC web interface, in the system tree, go to Chassis Overview and click Setup > Profiles. The Chassis Configuration Profiles page is displayed.
NOTE: If the backup files (.bak) of the earlier versions of CMC, are loaded on the latest version of CMC where FIPS is enabled, reconfigure all the 16 CMC local user passwords. However, the password of the first user is reset to "calvin". NOTE: When a chassis configuration profile is imported from a CMC, which does not support the FIPS feature, to a CMC where FIPS is enabled, the FIPS remains enabled in the CMC.
The Edit Profile window is displayed. 2. Enter a desired profile name in the Profile Name field and click Edit Profile. Operation Successful message is displayed. 3. Click OK. Deleting Chassis Configuration Profiles You can delete a chassis configuration profile that is stored on the network share. To delete a chassis configuration profile, perform the following tasks: 1. Go to the Chassis Configuration Profiles page.
Importing Chassis Configuration profiles You can import chassis configuration profiles from network share to another chassis by using the set command. 1. To import the chassis configuration profiles from CIFS network share, type the following: racadm set –f clone.xml –t xml –l //xx.xx.xx.xx/PATH –u USERNAME –p PASSWORDCMC 2. To import the chassis configuration profiles from NFS network share, type the following: racadm set –f clone.xml –t xml –l xx.xx.xx.
When you query a specific CMC card using its group ID and object ID, RACADM creates the racadm.cfg configuration file from the retrieved information. By exporting the file to one or more CMCs, you can configure your controllers with identical properties in a minimal amount of time. NOTE: Some configuration files contain unique CMC information (such as the static IP address) that must be modified before you export the file to other CMCs. 1.
• All parameters are specified as "object=value" pairs with no white space between the object, =, or value. White spaces that are included after the value are ignored. A white space inside a value string remains unmodified. Any character to the right of the = (for example, a second =, a #, [, ], and so on) is taken as-is. These characters are valid modem chat script characters. [cfgLanNetworking] -{group name} cfgNicIpAddress=143.154.133.121 {object value} • The .cfg parser ignores an index object entry.
This file is updated as follows: # # Object Group "cfgLanNetworking" # [cfgLanNetworking] cfgNicIpAddress=10.35.9.143 # comment, the rest of this line is ignored cfgNicGateway=10.35.9.1 The command racadm config -f .cfg parses the file and identifies any errors by line number. A correct file updates the proper entries. Additionally, you can use the same getconfig command from the previous example to confirm the update.
7 Configuring servers You can configure the following settings of a server: • • • • • • • Slot Names iDRAC Network Settings DRAC VLAN Tag Settings First Boot Device Server FlexAddress Remote File Share BIOS Settings Using Server Clone Topics: • • • • • • • • • Configuring slot names Configuring iDRAC network settings Setting first boot device Configuring sled network uplink Deploying remote file share Configuring server FlexAddress Configuring profile settings using server configuration replication Launc
3. To use a server’s host name as slot name, select the Use Host Name for the Slot name option. This overrides the static slot names with the server’s Host Name (or system name), if available. This requires the OMSA agent to be installed on the server. For more information about the OMSA agent, see the Dell OpenManage Server Administrator User's Guide available at dell.com/support/ manuals. 4. To use the iDRAC DNS name as slot name, select Use iDRAC DNS Name for Slot Name option.
Setting Description Enable iDRAC IPv4 DHCP Enables or disables DHCP for each iDRAC present in the chassis. If this option is enabled, the fields QuickDeploy IP, QuickDeploy Subnet Mask, and QuickDeploy Gateway are disabled, and cannot be modified since DHCP is used to automatically assign these settings for each iDRAC. To select this option, you must select the Enable iDRAC IPv4 option. Quick Deploy IP address option is provided with two values 4 and 2.
NOTE: Changes that are made to QuickDeploy fields are immediate, but changes that are made to one or more iDRAC server network configuration settings may require a couple of minutes to propagate from CMC to iDRAC. Clicking Refresh early may display only partially correct data for one or more iDRAC servers.
Figure 9. Full-width sleds in top row and quarter-width sleds in bottom row Modifying iDRAC Network Settings for individual server iDRAC Using this feature, you can configure the iDRAC network configurations settings for each installed server. The initial values displayed for each of the fields are the current values read from the iDRAC. To use this feature, you must have an Enterprise License. To modify the iDRAC Network Settings: 1. In the left pane, click Server Overview, and then click Setup.
1. Go to any of the following pages: • • In the left pane, click Chassis Overview > Network > VLAN. In the left pane, click Chassis Overview > Server Overview and click Setup > VLAN. 2. On the VLAN Tag Settings page, in the iDRAC section, enable VLAN for the servers, set the priority and enter the ID. For more information about the fields, see the CMC for Dell PowerEdge FX2/FX2s Online Help. 3. Click Apply to save the settings.
Boot Device Description BIOS Setup Boot during the BIOS setup. Virtual Floppy Boot from a virtual floppy disk. Virtual CD/DVD Boot from a Virtual CD or DVD drive. Local SD Card Boot from the local SD (Secure Digital) card. Remote File Share Boot from remote file share. BIOS Boot Manager Boot using the BIOS boot manager. Lifecycle Controller Boot using the Lifecycle controller. Local Floppy Boot from a floppy disk in the local floppy disk drive.
Configuring sled network uplink You can configure the Sled Network Uplink only on the PowerEdge FM120x4 sleds that contain an internal network switch. To configure the Sled Network Uplink, go to Chassis Overview > Server Overview > Setup > Sled Network Uplink Select one of the following values for Sled network uplink configuration Property: • • • • Standard (aggregated): Uplink configuration where all four IOM uplink ports are configured in a single trunk group and all LOMs are mapped to that group.
Configuring profile settings using server configuration replication The server configurations replicating feature allows you to apply all profile settings from a specified server to one or more servers. Profile settings that can be replicated are those profile settings which can be modified and are intended to be replicated across servers. The following three profile groups for servers are displayed and can be replicated: • • • BIOS — This group includes only the BIOS settings of a server.
Removing or disabling the non-volatile extended storage media prevents access to Stored Profiles, and disables the Server Cloning feature. To add a profile: 1. Go to the Server Profiles page. In the Server Profiles section, click Apply and Save Profiles. 2. Select the server from whose settings you want to generate the profile, and then click Save Profile. The Save Profile section is displayed. 3. Select Extended Storage or Network Share as the location to save the profile.
Importing profile You can import a server profile that is stored on a management station to CMC. To import a stored profile from CMC: 1. In the Server Profiles page, in the Stored Profiles section, click Import Profile. The Import Server Profile section is displayed. 2. Click Browse to access the profile from the required location and then click Import Profile. For more information, see the Online Help. Exporting profile You can export a stored server profile to a specified path on a management station.
For more information on the displayed settings, see the Online Help. NOTE: The CMC Server Configuration Replication feature retrieves and displays the settings for a specific server, only if the Collect System Inventory on Restart (CSIOR) option is enabled. To enable CSIOR, after rebooting the server, from the F2 setup, select iDRAC Settings > Lifecycle Controller, enable CSIOR and save the changes. To enable CSIOR on: 1.
NOTE: You can perform the Quick Deploy action only if the Action When Server is Inserted option in the Deploy iDRAC page is set to Server Profile or Quick Deploy then Server Profile. Selecting this option allows you to apply the server profile assigned when a new server is inserted in the chassis. 2. From the drop-down menu, select the profile to assign to the required slot. You can select profiles to apply to multiple slots. 3. Click Assign Profile. The profile gets applied to the selected slots.
Saving Boot Identity Profiles You can save boot identity profiles in the CMC network share. Number of profiles that you can store depends on the availability of MAC addresses. For more information, see Configuring Network Share Using CMC Web Interface. For Emulex Fibre Channel (FC) cards, the Enable/Disable Boot From SAN attribute in the Option ROM is disabled by default. Enable the attribute in the Option ROM and apply the boot identify profile to the server for booting from SAN.
Clearing Boot Identity Profiles Before applying a new boot identity profile to a standby server, you can clear the existing boot identity configurations of a selected server by using the Clear Identity option available in the CMC web interface. To clear boot identity profiles: 1. Go to the Server Profiles page. In the Boot Identity profiles section, select the server from which you want to clear the boot identity profile.
• • • • 02:00:00:00:00:00 - F2:FF:FF:FF:FF:FF 06:00:00:00:00:00 - F6:FF:FF:FF:FF:FF 0A:00:00:00:00:00 - FA:FF:FF:FF:FF:FF 0E:00:00:00:00:00 - FE:FF:FF:FF:FF:FF To view the Manage Virtual MAC Address option by the CMC web interface, in the system tree, go to Chassis Overview > Server Overview. Click Setup > Profiles > Boot Identity Profiles. The Manage Virtual MAC Address Pool section is displayed. NOTE: The virtual MAC Addresses are managed in the vmacdb.xml file in the network share.
Deactivating MAC Addresses You can deactivate MAC addresses that are active by using the Deactivate MAC Address(es) option in the CMC web interface. NOTE: Use the Deactivate MAC Address(es) option only if the server is not responding to the Clear Identity action or the MAC address is not used in any server. To remove MAC addresses from the network share: 1. Go to the Server Profiles page.
Launching remote console from server status page To launch a remote console for an individual server: 1. In the left pane, expand Server Overview. All the four servers appear in the expanded servers' list. 2. Click the server for which you want to launch the remote console. 3. On the Server Status page, click Launch Remote Console. NOTE: The Launch Remote Console button or link is enabled only if the server has Enterprise license installed.
8 Configuring storage sleds Half-width storage sleds that are used in the FX2s chassis contain the following: • • One or two RAID controllers Maximum of 16 disk drives You can configure individual storage sleds containing two RAID controllers to operate in the following modes: • • • Split-single Split-dual Joined NOTE: Do not insert a storage sled in slot 1 of the chassis as it is not a valid location for storage sleds. NOTE: This section is applicable only to dual-controller storage modules.
Configuring storage sleds using CMC web interface 1. In the left pane, click Chassis Overview > Server Overview and click a storage sled. The details of the storage sled are displayed. 2. In the menu on the right side, click Setup. The Storage Configuration page is displayed. You can also access the Storage Configuration page by selecting a storage sled on the Chassis Health page. Under Quick Links, click Storage Array Setup. 3.
9 Configuring CMC to send alerts You can set alerts and actions for certain events that occur on the chassis. An event occurs when the status of a system component is greater than the pre-defined condition. If an event matches an event filter and you have configured this filter to generate an alert message (email alert or SNMP trap), then an alert is sent to one or more configured destinations such as email address, IP address, or an external server. To configure CMC to send alerts: 1. 2. 3. 4.
NOTE: For more information on configuring SNMP protocol and trap format, see the Dell Chassis Management Controller for PowerEdge FX2/FX2s RACADM Command Line Reference Guide. Configuring SNMP Trap Alert Destinations Using CMC Web Interface To configure IPv4 or IPv6 alert destination settings using CMC Web interface: 1. In the system tree, go to Chassis Overview, and then click Alerts > Trap Settings. The Chassis Event Alert Destinations page is displayed. 2.
You can configure up to four destinations to receive traps alerts. To add more destinations, repeat steps 2–5. NOTE: The commands in steps 2–5 overwrites any existing settings configured for the index specified (1–4). To determine whether an index has previously configured values, type: racadm getconfig -g cfgTraps -i . If the index is configured, values appear for the cfgTrapsAlertDestIPAddr and cfgTrapsCommunityName objects. 6.
where is a valid email address, and is the index value you specified in step 4. 5. Specify the name of the person receiving the email alert: racadm config -g cfgEmailAlert -o cfgEmailAlertEmailName -i where is the name of the person or group receiving the email alert, and is the index value specified in step 4 and step 5. The email name can contain up to 32 alphanumeric characters, dashes, underscores, and periods. Spaces are not valid. 6.
10 Configuring user accounts and privileges You can setup user accounts with specific privileges (role-based authority) to manage your system with CMC and maintain system security. By default, CMC is configured with a default root account. As an administrator, you can set up user accounts to allow other users to access the CMC. You can set up a maximum of 16 local users, or use directory services such as Microsoft Active Directory or LDAP to setup additional user accounts.
Privilege Description NOTE: CMC users with the Chassis Configuration Administrator privilege can configure power settings. However, the Chassis Control Administrator privilege is required to perform chassis power operations, including power on, power off, and power cycle. User Configuration Administrator User can: • • • • Add a new user. Change the password of a user. Change the privileges of a user.
Privilege Description Debug Command Administrator User can execute system diagnostic commands. Fabric A Administrator User can set and configure the Fabric A IOM. The CMC user groups provide a series of user groups that have pre-assigned user privileges. NOTE: If you select Administrator, Power User, or Guest User, and then add or remove a privilege from the pre-defined set, the CMC Group automatically changes to Custom. Table 18.
Privilege Set Administrator Permissions Power User Permissions Guest User Permissions Debug Command Administrator Yes No No Fabric A Administrator Yes Yes No Modifying root user administrator account settings For added security, it is strongly recommended that you change the default password of the root (User 1) account. The root account is the default administrative account that is shipped with CMC. To change the default password for the root account: 1.
NOTE: You can also type racadm getconfig -f and view or edit the myfile.cfg file, which includes all the CMC configuration parameters. Several parameters and object IDs are displayed with their current values. Two objects of importance are: # cfgUserAdminIndex=XX cfgUserAdminUserName= If the cfgUserAdminUserName object has no value, that index number, which is indicated by the cfgUserAdminIndex object, is available for use.
Role Group Default Privilege Level Permissions Granted Bit Mask 2 None • • • • • • 0x00000ed9 3 None CMC Login User 0x00000001 4 None No assigned permissions 0x00000000 5 None No assigned permissions 0x00000000 CMC Login User Clear Logs Administrator Chassis Control Administrator (Power Commands) Server Administrator Test Alert User Fabric A Administrator NOTE: The Bit Mask values are used only when setting Standard Schema with the RACADM.
Configuring the generic LDAP directory to access CMC The CMC's Generic LDAP implementation uses two phases in granting access to a user—user authentication, and then the user authorization. Configuring generic LDAP directory service using CMC web interface To configure the generic LDAP directory service: NOTE: You must have the Chassis Configuration Administrator privilege. 1. In the left pane, click Chassis Overview > User Authentication > Directory Services. 2. Select Generic LDAP.
NOTE: It is highly recommended to use the racadm testfeature -f LDAP command to test the LDAP settings for first time setups. This feature supports both IPv4 and IPv6. The required property changes include enabling LDAP logins, setting the server FQDN or IP, and configuring the base DN of the LDAP server. • $ racadm config -g cfgLDAP -o cfgLDAPEnable 1 • $ racadm config -g cfgLDAP -o cfgLDAPServer 192.168.0.
11 Configuring CMC for Single Sign-On or Smart Card login This section provides information to configure CMC for Smart Card login and Single Sign-On (SSO) login for Active Directory users. SSO uses Kerberos as an authentication method allowing users, who have signed in as an automatic- or single sign-on to subsequent applications such as Exchange.
• For Single Sign-On or smart card login, the client system must be a part of the Active Directory domain and Kerberos Realm. CMC • • Each CMC must have an Active Directory account. CMC must be a part of the Active Directory domain and Kerberos Realm. Prerequisites for Single Sign-On or Smart Card login The pre-requisites to configure SSO or Smart Card logins are: • • • • • • Setup the Kerberos realm and Key Distribution Center (KDC) for Active Directory (ksetup).
Internet Explorer To edit the exception list in Internet Explorer: 1. Start Internet Explorer. 2. Click Tools > Internet Options > Connections. 3. In the Local Area Network (LAN) settings section, click LAN Settings. 4. In the Proxy server section, select the Use a proxy server for your LAN (These settings will not apply to dial-up or VPN connections) option, and then click Advanced. 5.
You can test the Active Directory using Kerberos authentication using the RACADM command: testfeature -f adkrb -u @ where is a valid Active Directory user account. A command success indicates that CMC is able to acquire Kerberos credentials and access the user's Active Directory account. If the command is not successful, resolve the error and run the command again.
12 Configuring CMC to use Command Line consoles This section provides information about the CMC command line console (or serial/Telnet/Secure Shell console) features, and explains how to set up the system so that you can perform systems management actions through the console. For information about using the RACADM commands in CMC through the command line console, see Chassis Management Controller for PowerEdge FX2/FX2s RACADM Command Line Reference Guide.
To fix this issue, download hotfix 824810 from support.microsoft.com. For more information, you can also see Microsoft Knowledge Base article 824810. Using SSH with CMC SSH is a command line session that includes the same capabilities as a Telnet session, but with session negotiation and encryption to improve security. CMC supports SSH version 2 with password authentication. SSH is enabled on the CMC by default. NOTE: CMC does not support SSH version 1.
NOTE: There is no GUI support for managing this feature, you can use only the RACADM. When adding new public keys, make sure that the existing keys are not already at the index, where the new key is added. CMC does not perform checks to ensure previous keys are deleted before a new one is added. As soon as a new key is added, it is automatically in effect as long as the SSH interface is enabled.
NOTE: The connect command provides the –b (binary) option. The –b option passes raw binary data, and cfgSerialConsoleQuitKey is not used. Additionally, when connecting to a server using the CMC serial console, transitions in the DTR signal (for example, if the serial cable is removed to connect a debugger) will not result in you exiting the application. NOTE: If the IOM does not support console redirection, the connect command displays an empty console.
5. Save the changes and exit. The managed system restarts. Configuring Windows for serial console redirection There is no configuration necessary for servers running the Microsoft Windows Server versions, starting with Windows Server 2003. Windows receives information from the BIOS, and enable the Special Administration Console (SAC) console one COM1. Configuring Linux for server serial console redirection during boot The following steps are specific to the Linux GRand Unified Bootloader (GRUB).
• • Disable GRUB's graphical interface and use the text-based interface. Else, the GRUB screen is not displayed in console redirection. To disable the graphical interface, comment out the line starting with splashimage. To start multiple GRUB options to start console sessions through the serial connection, add the following line to all options: console=ttyS1,57600 The example shows console=ttyS1,57600 added to only the first option.
1:2345:respawn:/sbin/mingetty 2:2345:respawn:/sbin/mingetty 3:2345:respawn:/sbin/mingetty 4:2345:respawn:/sbin/mingetty 5:2345:respawn:/sbin/mingetty 6:2345:respawn:/sbin/mingetty tty1 tty2 tty3 tty4 tty5 tty6 # Run xdm in runlevel 5 # xdm is now a separate service x:5:respawn:/etc/X11/prefdm -nodaemon Edit the /etc/securettyfile as follows: Add a new line, with the name of the serial tty for COM2: ttyS1 The following example shows a sample file with the new line.
13 Using FlexAddress and FlexAddress Plus cards This section provides information about FlexAddress and how to use FlexAddress Plus card to configure FlexAddress. NOTE: The FlexAddress feature is licensed. This feature license is included in the Enterprise License.
For example: (starting_mac)00:18:8B:FF:DC:FA + (mac_count)0xCF – 1 = (ending_mac)00:18:8B:FF:DD:C8 NOTE: Lock the SD card prior to inserting in the USB Memory Card Reader to prevent accidently modifying any of the contents. You must unlock the SD card before inserting into CMC.
Dell Feature Cards may contain more than one feature. Once any feature included on a Dell Feature Card has been activated on a chassis, any other features that may be included on that Dell Feature Card cannot be activated on a different chassis.
Configuring FlexAddress for chassis-level fabric and slots At the chassis level, you can enable or disable the FlexAddress feature for fabrics and slots. FlexAddress is enabled on a per-fabric–basis and then slots are selected for participation in the feature. Both fabrics and slots must be enabled to successfully configure FlexAddress.
Situation Command Output Changing the Flexaddress settings of slot or fabric, when the CMC Enterprise License is not installed. $racadm setflexaddr -i ERROR: SWC0242 : A required license is missing or expired. Obtain an appropriate license and try again, or contact your service provider for additional details. $racadm setflexaddr f NOTE: To resolve this issue, you must have a FlexAddress Enablement license.
IN NO EVENT SHALL DELL OR ITS SUPPLIERS BE LIABLE FOR ANY DAMAGES WHATSOEVER (INCLUDING, WITHOUT LIMITATION, DAMAGES FOR LOSS OF BUSINESS PROFITS, BUSINESS INTERRUPTION, LOSS OF BUSINESS INFORMATION, OR OTHER PECUNIARY LOSS) ARISING OUT OF USE OR INABILITY TO USE THE SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGES. Because some jurisdictions do not allow an exclusion or limitation of liability for consequential or incidental damages, the above limitation may not apply to you.
• • Basic Mode — In this mode you can view Server Slot, Fabric, Protocol, WWN/MAC addresses, and Partition Status. Only Active MAC addresses are displayed in WWN/MAC address field. You can filter using any or all of the fields displayed. Advanced Mode — In this mode you can view all the fields displayed in the basic mode and all the MAC types (Server Assigned, Flex Address, and IO Identity). You can filter using any or all of the fields displayed.
6. From the Fabric drop-down menu, select one of the fabric types to view details for all or specific type of management or I/O fabric associated with the servers. 7. From the Protocol drop-down menu, select All Protocols or one of the listed network protocols to view all the MACS or the MACs associated with the selected protocol. 8. In the WWN/MAC Addresses field, enter the MAC address to view only the slots associated with the specific MAC address.
To display the MAC/WWN addresses for all LOMs or mezzanine cards, use the following RACADM command: racadm getmacaddress -c factory For more information on the getflexaddr and getmacaddress subcommand, see the Dell Chassis Management Controller for PowerEdge FX2/FX2s RACADM Command Line Reference Guide.
14 Managing Fabrics The chassis supports two fabric types: Fabric A1 and Fabric A2, which are used by the two I/O Modules, and are always connected to the on-board Ethernet adapters of the servers. NOTE: In the PowerEdge FX2s chassis, fabrics B and C are the PCIe connection to the PCIe Extension cards. Following IO Modules are supported: • • • 1GbE pass-through 10GbE pass-through I/O Aggregator Both the Fabrics support only Ethernet.
On the Configure I/O Module Network Settings page, type appropriate data, and then click Apply. 2. If allowed, type the root password, SNMP RO Community string, and Syslog Server IP Address for the IOM. For more information about the field descriptions, see the Online Help. NOTE: The IP address set on the IOM from CMC is not saved to the permanent startup configuration of the switch.
Resetting IOM to factory default settings You can reset IOM to the factory default settings using the Deploy I/O Modules page. NOTE: This feature is supported on PowerEdge M I/O Aggregator IOM only. Other IOMs including MXL 10/40GbE are not supported. To reset the selected IOMs to factory default settings using the CMC Web interface: 1. In the system tree, go to I/O Module Overview and click Setup or expand I/O Module Overview in the system tree, select the IOM, and click Setup.
Launching IOA/MXL GUI from the I/O Module Overview page In the directory tree, go to I/O Module Overview. On the I/O Module Status page, click Launch I/O Module GUI. The IOA/MXL login page is displayed. Launching IOA/MXL GUI from the I/O Module Status page In the directory tree, under the I/O Module Overview, click an IOA/MXL switch. On the I/O Module Status page, click Launch I/O Module GUI. The IOA/MXL login page is displayed.
15 Using VLAN Manager You can assign or view the VLAN settings on the IOMs by using the VLAN Manager option. NOTE: This feature is supported only on Dell PowerEdge I/O Aggregator. After the mode of the I/O Aggregator is changed to standalone from stacking, remove the startup configuration and reload the I/O Aggregator. You need not save the system configuration while reloading the I/O Aggregator.
NOTE: The Summary VLANs of All Ports section displays information about the IOMs present in the Chassis and the assigned VLANs. Click Save to save a csv file of the summary of the current VLAN settings. NOTE: The CMC Managed VLANs section displays the summary of all VLANs assigned to the IOMs. 8. Click Apply. The network settings are configured for the IOM(s). Viewing the VLAN settings on IOMs using CMC web interface To view the VLAN settings on IOM(s) using the CMC Web interface: 1.
or Select the check box against the specific slots to select the required IOMs. 5. In the Edit VLANs section, select Update the Untagged VLANs in the drop down list and click Apply. A warning message is displayed that the configurations of the existing untagged VLAN will be overwritten with the configurations of the newly assigned untagged VLAN. 6. Click OK to confirm. The untagged VLANs are updated with the configurations of the newly assigned untagged VLAN. An Operation Successful message is displayed.
16 Managing and monitoring power The PowerEdge FX2/FX2s chassis is the most power-efficient server enclosure. It is designed to include highly efficient power supplies and fans, has an optimized layout for the air to flow more easily through the system, and contains power-optimized components throughout the enclosure.
Grid Redundancy policy The Grid Redundancy policy is also knows as 1+1 policy, for one active and one spare PSU. The purpose of the Grid Redundancy policy is to enable an enclosure system to operate in a mode in which the enclosure can tolerate AC power failures. These failures may originate in the AC power grid, the cabling and delivery, or a Power Supply Unit (PSU) itself. When you configure a system for Grid Redundancy, connect PSUs 1 and 2 to separate power grids.
Viewing power consumption status CMC provides the actual input power consumption for the entire system. Viewing power consumption status using CMC web interface In the left pane, click Chassis Overview > Power > Power Monitoring. The Power Monitoring page displays the power health, system power status, real-time power statistics, and real-time energy statistics. For more information, see the Online Help. NOTE: You can also view the power redundancy status under Power Supplies.
Power management after PSU failure In the event of a PSU failure or removal, the power supplied to servers may be reduced. In extreme cases servers could be powered off in an attempt to sustain operation. Configuring and maintaining Grid Redundancy avoids any impact to servers for a single PSU failure. Power supply and Redundancy policy changes in system event log Changes in the power supply state and power redundancy policy are recorded as events.
Configuring power budget and Redundancy using CMC web interface NOTE: To perform power management actions, you must have the Chassis Configuration Administrator privilege. To configure power budget: 1. In the left pane, click Chassis Overview > Power > Configuration. 2. On the Budget/Redundancy Configuration page, select any or all of the following properties as appropriate. For information about the field descriptions, see the Online Help.
• To enable the power remote logging feature, enter the following command: racadm config -g cfgRemoteHosts -o cfgRhostsSyslogPowerLoggingEnabled 1 • To specify the desired logging interval, enter the following command: racadm config -g cfgRemoteHosts -o cfgRhostsSyslogPowerLoggingInterval n • where n is 1-1440 minutes.
Executing Power Control Operations on the Chassis Using RACADM Open a serial/Telnet/SSH text console to CMC, log in, and type: racadm chassisaction -m chassis where is powerup, powerdown, powercycle, nongraceshutdown, or reset. Executing Power Control Operations for Multiple Servers Using CMC Web Interface To execute power control operation for multiple servers using the Web interface: 1. In the left pane, click Server Overview > Power. The Power Control page is displayed. 2.
Configuring Sled Power Button You can configure the Sled Power Button to disable, so that when you press the Sled power button, it has no effect. To configure the Sled Power Button, go to Chassis Overview > Server Overview > Power > Control. Under the Property section, select the check box to disable or clear the check box to enable. NOTE: This setting is applicable only to multi-node Sleds present in the chassis. Other Sleds are not affected.
17 Configuring PCIe slots The PowerEdge FX2/FX2s chassis optionally contain eight PCIe slots where each PCIe slot is assigned to a specific sled. By default, all PCIe slots are mapped. You can enable or disable the assignment of PCIe slots to the servers using the CMC web interface or RACADM commands. The following tables list the PCIe mapping for full-width, half-width, and quarter-width compute sleds. Table 29.
For more information about mapping PCIe slots, see the Dell PowerEdge FD332 Owner’s Manual. For more information about managing PCIe slots, see the CMC for Dell PowerEdge FX2/FX2s Online Help. NOTE: The Agent-free monitoring feature is not available for the PCIe PERC and Network cards in the Chassis PCIe slots. Agent-free monitoring is the systems management solution for Dell’s 12th generation of PowerEdge servers. It is out-of-band with no dependence on any operating system agents.
in the lower bay earlier, are mapped to corresponding compute sleds in the upper bay. Following are some examples for PCIe reassignment: • PCIe reassignment in full-width (FW) FC830: • • PCIe slots mapped to FW sled-3 (PCIe slots 1 through 4) are reassigned to sled–1. Sled-1 now maps to PCIe slots 1 though 8. PCIe reassignment in half-width (HW) FC630: • • PCIe slots mapped to HW sled-3 (PCIe slots 5 and 6) are reassigned to sled-1. Sled-1 now maps to PCIe slots 5 through 8.
18 Troubleshooting and recovery This section explains how to perform tasks related to recovering and troubleshooting problems on the remote system using the CMC web interface. • • • • • • • • • • • • • Viewing chassis information. Viewing the event logs. Gathering configuration information, error status, and error logs. Using the diagnostic console. Managing power on a remote system. Managing Lifecycle Controller jobs on a remote system. Reset components.
Subsystem RACADM Command Session information getssninfo Sensor information getsensorinfo Switches information (IO Module) getioinfo Mezzanine card information (Daughter card) getdcinfo All modules information getmodinfo Power budget information getpbinfo NIC information (CMC module) getniccfg Trace log information gettracelog RAC event log getraclog System event log getsel Downloading SNMP Management Information Base file The CMC SNMP Management Information Base (MIB) file defines the
• • Resolution: CMC has dynamic fan power management that reduces server allocations briefly if the enclosure is operating near the peak user configured power cap; it causes the fans to be allocated power by reducing server performance to keep the input power draw below System Input Power Cap. This is normal behavior. Problem: Overall server performance decreases when the ambient temperature increases in the data center.
Resetting Components You can reset the CMC, or to virtually reset servers making them to behave as if they were removed and reinserted. NOTE: To reset components, you must have Debug Command Administrator privilege. NOTE: Virtual reseat is not available for the individual nodes of the PowerEdge FM120x4. To reset the components using the CMC Web interface, 1. In the left pane, click Chassis Overview > Troubleshooting > Reset Components. The Reset Components page is displayed. 2.
After making the change, disable NTP, wait for 5-10 seconds, then enable NTP again: NOTE: NTP may take an additional three minutes to synchronize again. To disable NTP, type: racadm config –g cfgRemoteHosts –o cfgRhostsNtpEnable 0 To enable NTP, type: racadm config –g cfgRemoteHosts –o cfgRhostsNtpEnable 1 If the NTP servers are configured correctly and this entry is present in the trace log, then this confirms that CMC is not able to synchronize with any of the configured NTP servers.
Component IOM (Common) IOM (Pass through) Fan PSU PCI Storage sled LED Color, Blinking Pattern Status Blue, dark No fault Green, glowing steadily Turned on Green, blinking Firmware is being uploaded Green, dark Turned off Blue, glowing steadily Normal/stack master Blue, blinking User-enabled module identifier Amber, glowing steadily Not used Amber, blinking Fault Blue, dark No fault/stack slave Green, glowing steadily Turned on Green, blinking Not used Green, dark Powered off
Observing LEDs to Isolate the Problem The CMC has an LED which changes color to indicate: Table 34. LED color indicators Color Description Blue Normal operation Blue, blinking ID (0.5 second on, 0.5 second off) Amber Chassis fault summary Amber, blinking Chassis fault with concurrent ID Troubleshooting Network Problems The internal CMC trace log allows you to debug CMC alerts and networking. You can access the trace log using the CMC Web interface or RACADM.
• Problem: Not able to import, export, or delete storage module licenses. Resolution: Chassis configuration privilege is required to import, export, and delete storage module licenses. Resetting Forgotten Administrator Password CAUTION: Many repairs may only be done by a certified service technician. Perform troubleshooting and simple repairs as authorized in your product documentation, or as directed by the online or telephone service and support team.
Table 35. CMC Password Jumper Settings Jumper command J_PWORD Jumper image Jumper state Jumper reset status (default) The password reset feature is disabled. The password reset feature is enabled. 3. Slide the CMC module into the enclosure. Reattach any cables that were disconnected. NOTE: Make sure that the CMC module is active until the remaining steps are completed. 4. Wait for the CMC to finish rebooting.
19 Frequently asked questions This section lists the frequently asked questions about the following: • • • • RACADM Managing and Recovering a Remote System Active Directory IOM Topics: • • • • • RACADM Managing and recovering a remote system Active Directory IOM Event and error messages RACADM After performing a CMC reset (using the RACADM racreset subcommand), when a command is entered, the following message is displayed: racadm Transport: ERROR: (RC=-1) What does this message mean? Anothe
CMC includes a default CMC server certificate to ensure network security for the web interface and remote RACADM features. When this certificate is used, the web browser displays a security warning because the default certificate is issued to CMC default certificate which does not match the host name of CMC (for example, the IP address). To address this security concern, upload a CMC server certificate issued to the IP address of CMC.
The Dell-extended Active Directory Users and Computers Snap-In checks the mode and limits users in order to create objects across domains, if in a mixed mode. Does using CMC with Active Directory support multiple domain environments? Yes. The domain forest function level must be in Native mode or Windows 2003 mode. In addition, the groups among Association Object, RAC user objects, and RAC Device Objects (including Association Object) must be universal groups.