Dell Chassis Management Controller Version 2.3 for PowerEdge FX2 and FX2s User's Guide July 2020 Rev.
Notes, cautions, and warnings NOTE: A NOTE indicates important information that helps you make better use of your product. CAUTION: A CAUTION indicates either potential damage to hardware or loss of data and tells you how to avoid the problem. WARNING: A WARNING indicates a potential for property damage, personal injury, or death. © 2014 - 2019 Dell Inc. or its subsidiaries. All rights reserved. Dell, EMC, and other trademarks are trademarks of Dell Inc. or its subsidiaries.
Contents Chapter 1: Overview....................................................................................................................... 11 Key Features......................................................................................................................................................................... 12 What is new in this release............................................................................................................................................
Chapter 3: Logging into CMC......................................................................................................... 34 Configure public key authentication over SSH................................................................................................................ 34 Generating public keys for systems running Windows............................................................................................. 34 Generating public keys for systems running Linux.....................
Viewing information and health status of fans................................................................................................................ 56 Configuring fans............................................................................................................................................................ 56 Viewing front panel properties...........................................................................................................................................
Parsing rules................................................................................................................................................................... 72 Modifying the CMC IP address....................................................................................................................................73 Chapter 7: Configuring servers.......................................................................................................75 Configuring slot names...........
Launching remote console from server status page...................................................................................................... 92 Chapter 8: Configuring storage sleds..............................................................................................93 Configuring storage sleds in split-single mode................................................................................................................ 93 Configuring storage sleds in split-dual mode...................
Configuring CMC SSO Or Smart Card Login For Active Directory Users Using Web Interface.............................109 Uploading Keytab file..........................................................................................................................................................110 Configuring CMC SSO login or Smart Card login for Active Directory users using RACADM.................................110 Chapter 12: Configuring CMC to use Command Line consoles....................................
Viewing the VLAN settings on IOMs using CMC web interface................................................................................. 133 Viewing the current VLAN settings on IOMs using CMC web interface....................................................................133 Removing VLANs for IOMs using CMC web interface................................................................................................. 133 Updating untagged VLANs for IOMs using CMC web interface...........................
Resetting Forgotten Administrator Password............................................................................................................... 153 Chapter 19: Frequently asked questions.........................................................................................155 RACADM.............................................................................................................................................................................155 Managing and recovering a remote system.
1 Overview The Dell Chassis Management Controller (CMC) for Dell EMC PowerEdge FX2/FX2s is a Systems Management hardware and software solution for managing the PowerEdge FX2/FX2s chassis. The CMC has its own microprocessor and memory and is powered by the modular chassis into which it is plugged. The CMC enables an IT administrator to: • • • • • • View inventory. Perform configuration and monitoring tasks. Remotely turn on and turn off chassis and servers.
• Accessing documents from the Dell EMC support site Key Features The CMC features are grouped into management and security features. What is new in this release This release of CMC for Dell EMC PowerEdge FX2/FX2s supports: • • • Enhancing chassis profile to configure iDRAC network parameters. Applying Server Profiles using racadm interface. Addressing Open Source security vulnerabilities.
• • ○ Hardware-stored user IDs and passwords. Role-based authority — Enables an administrator to configure specific privileges for each user. User ID and password configuration through the web interface. Web interface supports 128-bit SSL 3.0 encryption and 40-bit SSL 3.0 encryption (for countries where 128-bit is not acceptable). NOTE: Telnet does not support SSL encryption. • • • • • • • Configurable IP ports (if applicable).
Figure 2. Chassis front panel Table 2. Chassis front panel — components Item Indicator, Button, or Connector 1 System identification button 2 Enclosure power-on indicator, power button 3 Diagnostic indicators 4 KVM select button 5 Compute sled 6 Video connector 7 USB connector 8 Storage sled Supported remote access connections The following table lists the supported remote access connections. Table 3.
Table 3. Supported remote access connections (continued) Connection Features • • • • Serial port • • • chained between chassis in the Stacking mode. Ensure that the cabling model matches the CMC setting for the intended usage. DHCP support. SNMP traps and e-mail event notification. Network interface for the iDRAC and I/O Modules (IOMs). Support for Telnet/SSH command console and RACADM CLI commands including system boot, reset, power-on, and shutdown commands.
Table 4. Latest Firmware Versions for BIOS, iDRAC, and Lifecycle Controller (continued) Servers BIOS iDRAC Lifecycle Controller PowerEdge FM120 1.70 2.52.52.52 2.52.52.52 PowerEdge FC640 1.37 3.18.18.18 3.18.18.18 Supported Firmware Versions for Server Component Update The following table lists the supported firmware versions for server components when CMC PowerEdge FX2/FX2s firmware is updated from 2.0 to 2.1 version but the server components are not updated to the next version. Table 5.
Supported Network Adapters The following table lists the supported network adapters for PowerEdge FX2/FX2s. Table 6.
Table 6.
Acquiring licenses Use any of the following methods to acquire the licenses: • • • E-mail — License is attached to an e-mail that is sent after requesting it from the technical support center. Self-service portal — A link to the Self-Service Portal is available from CMC. Click this link to open the licensing Self-Service Portal on the internet from where you can purchase licenses. For more information, see the online help for the self-service portal page.
Table 7.
Table 8. License Operations Based on State and Condition (continued) License/Component state or condition Import Export Delete Replace Learn More License installed but component missing No Yes Yes No Yes Viewing localized versions of the CMC web interface To view localized versions of the CMC web interface, read through your web browser's documentations. To view the localized versions, set the browser to the desired language.
• • • • • The rack documentation included with your rack solution describes how to install your system into a rack, if required. For the full name of an abbreviation or acronym used in this document, see the Glossary at dell.com/support/manuals. Systems management software documentation describes the features, requirements, installation, and basic operation of the software. Documentation for any components you purchased separately provides information to configure and install these options.
2 Installing and setting up CMC This section provides information about how to install your CMC hardware, establish access to CMC, configure your management environment to use CMC, and guides you through the tasks for configuring a CMC: • • • • Set up initial access to CMC. Access CMC through a network. Add and configure CMC users. Update CMC firmware.
You can also power on the chassis using the command line interface, use racadm chassisaction powerup command to accomplish it. NOTE: Do not turn on the servers. 7. The default CMC network configuration is Static with the CMC IP address 192.168.0.120. If you want to change the network configuration to DHCP, connect a serial cable to serial port on the CMC. For more information on serial connection, refer to Serial interface/protocol setup in Using Remote Access Software From a Management Station section.
Table 9. Daisy-chained storage sleds Component number in image Component name 1 Management Network 2 Active CMC The following figure illustrates an example of incorrect cabling of CMC in stacking mode.
Following are the steps to daisy-chain four FX2 CMC modules: 1. 2. 3. 4. Connect the GB port of the FX2 CMC in the first chassis to the management network. Connect the GB port of the FX2 CMC in the second chassis to the STK port of the FX2 CMC in the first chassis. If you have a third chassis, connect the GB port of its FX2 CMC to the STK port of the FX2 CMC in the second chassis. If you have a fourth chassis, connect the GB port of its FX2 CMC to the STK port of the FX2 CMC in the third chassis.
Table 10. CMC Interfaces (continued) Interface/ Protocol Description Remote RACADM CLI Remote RACADM is a client utility that runs on a management station. It uses the out-of-band network interface to run RACADM commands on the managed system and uses the HTTPs channel. The –r option runs the RACADM command over a network, it requires CMC IP, username and password.
Table 10. CMC Interfaces (continued) Interface/ Protocol Description The use of libraries that create SOAP-XML packets is recommended since users can configure the timeout duration using these libraries. For client connection using Microsoft WinRM, the minimum required version is 2.0. For more information, refer to the Microsoft article, .
rpm -ivh *.rpm 5. For help about the RACADM command, type racadm help after you run the previous commands. For more information about RACADM, see the Chassis Management Controller for Dell PowerEdge FX2/FX2s RACADM Command Line Reference Guide. NOTE: When using the RACADM remote capability, you must have the 'write' permission on the folders where you are using the RACADM subcommands, involving the file operations. For example, racadm getconfig -f .
Enabling animations in Internet Explorer When transferring files to and from the web interface, a file transfer icon spins to show transfer activity. While using Internet explorer, you have to configure the browser to play animations. To configure Internet Explorer to play animations: 1. Start Internet Explorer. 2. Click Tools > Internet Options > Advanced. 3. Go to the Multimedia section, and then select the Play animations in web pages option.
2. To synchronize the date and time with a Network Time Protocol (NTP) server, on the Date/Time page, select Enable NTP and specify up to three NTP servers. To manually set the date and time, clear the Enable NTP option, and then edit the Date and Time fields. 3. Select the Time Zone from the drop-down menu, and then click Apply.
Configuring front panel You can use the front panel page to configure: • • Power button KVM Configuring power button To configure the chassis power button: 1. In the left pane, click Chassis Overview > Front Panel > Setup. 2. On the Front Panel Configuration page, under the Power Button Configuration section, select the Disable Chassis Power Button option, and then click Apply. The chassis power button is disabled. Accessing a server using KVM To map a Server to KVM from web interface: 1. 2. 3. 4.
• To disable Chassis Management at Server mode, use: racadm config –g cfgRacTuning – cfgRacTuneChassisMgmtAtServer 0 • To change Chassis Management at Server mode to monitor, use: racadm config –g cfgRacTuning – cfgRacTuneChassisMgmtAtServer 1 • To change Chassis Management at server mode to manage and monitor, use: racadm config –g cfgRacTuning – cfgRacTuneChassisMgmtAtServer 2 Installing and setting up CMC 33
3 Logging into CMC You can log in to CMC as a CMC local user, as a Microsoft Active Directory user, or as an LDAP user. You can also log in using Single SignOn or a Smart Card.
2. Enter the number of bits for the key. Ensure that the RSA key size is between 1024 and 4096. NOTE: • CMC may not display a message if you add keys less than 1024 or greater than 4096, but when you try to log in with these keys, it fails. • CMC accepts RSA keys up to key strength 4096, but the recommended key strength is 1024. 3. Click Generate, and move the mouse in the window as directed. After the key is created, you can modify the key comment field.
Logging into CMC as a local user, active directory user, or LDAP user To log in to CMC, you must have a CMC account with the Log In to CMC privilege. The default root account is the default administrative account that ships with CMC. NOTE: For added security, it is recommended that you change the default password of the root account during initial setup. NOTE: When Certificate Validation is enabled, provide the FQDN of the system.
NOTE: You cannot use the IP address to log in to CMC using the Smart Card login. Kerberos validates your credentials based on the Fully Qualified Domain Name (FQDN). Before you log in as an Active Directory user using a Smart Card, make sure to: • • • • Upload a Trusted Certificate Authority (CA) certificate (CA-signed Active Directory certificate) to CMC Configure the DNS server. Enable Active Directory login. Enable Smart Card login. To log in to CMC as an Active Directory user using a smart card: 1.
Logging into CMC using public key authentication You can log in to the CMC over SSH without typing a password. You can also send a single RACADM command as a command line argument to the SSH application. The command line options behave similar to the remote RACADM, because the session ends after the command is completed. Before logging in to CMC over SSH, make sure that the public keys are uploaded. To use this feature, you must have an Enterprise License.
4 Updating firmware You can update firmware for: • • • The CMC Chassis infrastructure I/O Module You can update firmware for the following server components: • • • • • • • • BIOS iDRAC7 iDRAC8 Lifecycle Controller 32–bit diagnostics Operating system Drivers Pack Network Interface Controllers RAID controllers Topics: • • • • • • • Signed CMC firmware image Downloading CMC firmware Viewing currently installed firmware versions Updating the CMC firmware Updating the CMC using DUP Updating chassis infrastr
Viewing currently installed firmware versions using CMC web interface In the CMC web interface, go to any of the following pages to view the current firmware versions: • • • Chassis Overview > Update Chassis Overview > Chassis Controller > Update Chassis Overview > Server Overview > Server Component Update The Firmware Update page displays the current version of the firmware for each listed component and allows you to update the firmware to the latest version.
• • Chassis Overview > Update Chassis Overview > Chassis Controller > Update 2. On the Firmware Update page, in the CMC Firmware section, select the required components under the Update Targets column for the CMC you want to update, and then click Apply CMC Update. 3. In the Firmware Image field, enter the path to the firmware image file on the management station or shared network, or click Browse to browse through to the file location. The default name of the CMC firmware image file is fx2_cmc.bin. 4.
Updating chassis infrastructure firmware using CMC web interface 1. Go to any of the following pages: • • Chassis Overview > Update. Chassis Overview > Chassis Controller > Update. 2. On the Firmware Update page, in the Chassis Infrastructure Firmware section, in the Update Targets column, select the option, and then click Apply Chassis Infrastructure Firmware. 3. On the Firmware Update page, click Browse, and then select the appropriate chassis infrastructure firmware. 4.
The Server Component Update page is displayed. To continue, see Updating Server Component Firmware. Updating server component firmware The one-to-many update feature in CMC enables you to update server component firmware across multiple servers. You can update the server components using the Dell Update Packages available on the local system or on a network share. This operation is enabled by leveraging the Lifecycle Controller functionality on the server.
• Faster and consistent method of updating the server components. • Enables you to maintain a standard image with the required updates versions of the server components that can be used to update multiple servers in a single operation. • You can copy the directories of updates from the Dell Server Update Utility (SUU) download DVD or create and customize the required update versions in the Dell Repository Manager (DRM).
• • Cancelling System Services enables you to cancel all scheduled jobs that are pending and remove them from the queue. For more information about the Lifecycle Controller and supported server components, and device firmware management, see Lifecycle Controller-Remote Services Quick Start Guide or delltechcenter.com/page/Lifecycle+Controller. The Server Component Update page enables you to update various firmware components on the server.
Viewing firmware inventory using CMC web interface To view the firmware inventory: 1. In the left pane, click Server Overview, and then click Update. 2. On the Server Component Update page, view the firmware inventory details in the Component/Device Firmware Inventory section. On this page, you can view the following information: • • • If the server is listed as Not Ready, it indicates that when the firmware inventory was retrieved, the iDRAC on the server was still initializing.
Viewing firmware inventory using RACADM To view firmware inventory using RACADM, use the getversion command: racadm getversion -l [-m ] [-f ] For more information, see the Chassis Management Controller for PowerEdge FX2/FX2s RACADM Command Line Reference Guide available at dell.com/support/manuals. Saving chassis inventory report using CMC web interface To save the chassis inventory report: 1. In the system tree, go to Server Overview, and then click Update > Server Component Update.
Lifecycle Controller job operations NOTE: To use this feature, you must have an Enterprise License. You can perform Lifecycle Controller operations such as: • • • • Re-install Rollback Update Delete Jobs Only one type of operation can be performed at a time. Components and devices that are not supported may be listed as part of the inventory, but do not permit Lifecycle Controller operations. To perform the Lifecycle Controller operations, you must have: • • For CMC: Server Administrator privilege.
4. Select one of the following options: • • Reboot Now — Restart the server immediately. On Next Reboot - Manually restart the server at a later time. 5. Click Rollback. The previously installed firmware version is reinstalled for the selected component or device. Upgrading server component firmware You can install the next version of the firmware image for selected components or devices across one or more servers. The firmware image is available within the Lifecycle Controller for a rollback operation.
NOTE: This step is not valid for Lifecycle Controller and 32-bit Diagnostics firmware update. A server reboot is not required for these devices. 7. Click Update. The firmware version is updated for the selected component or device.
NOTE: The Job Status column displays the job status of the operations scheduled on the server. The job status is dynamically updated. Deleting Scheduled Server Component Firmware Jobs NOTE: To use this feature, you must have an Enterprise License. You can delete jobs scheduled for the selected components and/or devices across one or more servers. Deleting scheduled server component firmware jobs using the web interface To delete scheduled server component firmware jobs: 1.
5 Viewing chassis information and monitoring chassis and component health You can view information and monitor the health of the following: • • • • • • • • CMC All severs and individual servers IO Modules Fans Power Supply Units (PSUs) Temperature sensors PCIe devices Storage sleds Topics: • • • • • • • • • • Viewing chassis and component summaries Viewing chassis summary Viewing chassis controller information and status Viewing information and health status of all servers Viewing information and health
Server Icon States in 13th generation systems Image Description A server is present, turned on, and is operating normally. A server is present, but turned off. A server is present, but reporting a noncritical error. A server is present, but reporting a critical error. Server Icon States in 14th generation systems Image Description A server is present, turned on, and is operating normally. A server is present, but turned off. A server is present, but reporting a noncritical error.
Table 13.
Viewing storage model name and Service Tag You can view the model name and Service Tag of each storage sled using the following steps: 1. In the left pane, under the Server Overview tree node, all the storage sleds appear in the list. If a storage sled is not present in a slot, the corresponding image in the graphic is grayed out. 2. Point the cursor to the storage sled slot number. A tool tip, if available, is displayed with the model name and Service Tag of the storage sled.
Viewing information and health status of fans CMC controls the speed of the chassis fan by increasing or decreasing the fan speed on the basis of system events. You can run the fan in three modes such as Low, Medium, and High (fan offset). For more information about configuring a fan, see the CMC for Dell PowerEdge FX2/FX2s Online Help. To set up the properties of fans by using RACADM commands, type the following command at the CLI interface.
For setting up these features by using RACADM commands, user the following command: racadm fanoffset [-s ] Viewing front panel properties To view the front panel properties: 1. In the left pane, click Chassis Overview > Front Panel. 2.
6 Configuring CMC Chassis Management Controller enables you to configure properties, set up users, and alerts to perform remote management tasks. Before you begin configuring the CMC, you must first configure the CMC network settings to allow CMC to be managed remotely. This initial configuration assigns the TCP/IP networking parameters that enable access to the CMC. You can configure CMC using Web interface or Setting up Initial Access to CMC RACADM.
You can enable the DHCP to obtain an IP address from the DHCP server automatically. Enabling or disabling DHCP for DNS IP addresses By default, the CMC’s DHCP for DNS address feature is disabled. When enabled, this feature obtains the primary and secondary DNS server addresses from the DHCP server. While using this feature, you do not have to configure static DNS server IP addresses.
Viewing CMC network LAN settings using RACADM To view IPv4 settings, use the object cfgCurrentLanNetworking with the following subcommands: • • getniccfg getconfig To view IPv6 settings, use the cfgIpv6LanNetworking with the getconfig subcommand. To view IPv4 and IPv6 addressing information for the chassis, use the getsysinfo subcommand. For more information about the subcommands and objects, see the Chassis Management Controller for PowerEdge FX2/FX2s RACADM Command Line Reference Guide.
racadm config -g cfgIPv6LanNetworking -o cfgIPv6PrefixLength 64 racadm config -g cfgIPv6LanNetworking -o cfgIPv6Gateway Configuring IPv4 and IPv6 DNS settings • CMC Registration — To register the CMC on the DNS server, type: racadm config -g cfgLanNetworking -o cfgDNSRegisterRac 1 NOTE: Some DNS servers only register names of 31 characters or fewer. Make sure the designated name is within the DNS required limit.
The CMC cannot be cabled for Management Network Port redundancy prior to actually configuring it for this operation. The CMC must use the standard single network connection for deployment, after which the second redundant connection may be made. NOTE: When Management Port 2 is set for Redundant but is cabled for Stacking, the downstream CMCs (further from the TOR switch) will not have a network link.
• • • Kerberos NTP Client NFS NOTE: SNMP is not FIPS-compliant. In FIPS mode, all SNMP features except Message Digest algorithm version 5 (MD5) authentication work. Enabling FIPS Mode Using CMC Web Interface To enable FIPS: 1. In the left pane, click Chassis Overview. The Chassis Health page is displayed. 2. On the menu bar, click Network. The Network Configuration page is displayed. 3. Under the Federal Information Processing Standards (FIPS) section, from the FIPS Mode drop-down menu, select Enabled.
Remote syslog is an additional log target for CMC. After you configure the remote syslog, each new log entry generated by CMC is forwarded to the respective destinations. NOTE: Because the network transport for the forwarded log entries is UDP, there is no guaranteed delivery of log entries, nor is there any feedback to CMC about whether the log entries were received successfully.
• • A server and Input/Output inventory is available for a group. A selectable option is available to synchronize a new member’s properties to the leader’s properties when the new member is added to the group. A chassis group may contain a maximum of 19 members. Also, a leader or member can only participate in one group. You cannot join a chassis, either as a leader or member, that is part of a group to another group. You can delete the chassis from a group and add it later to a different group.
Disbanding a Chassis Group To disband a chassis group from the lead chassis: 1. 2. 3. 4. Log in with administrator privileges to the leader chassis. Select the lead chassis in the left pane. Click Setup > Group Administration. In the Chassis Group page, under Role, select None, and then click Apply. The lead chassis then communicates to all the members that they have been removed from the group. The lead chassis can be assigned as a leader or member of a new group.
• Manual Propagation — Select this option for manual propagation of the chassis group leader properties with its members. The lead chassis property settings are propagated to group members only when a lead chassis administrator clicks Propagate. 5. In the Propagation Properties section, select the categories of lead configuration properties to be propagated to member chassis. Select only those setting categories that you want identically configured, across all members of the chassis group.
Chassis Configuration Profiles The Chassis Configuration Profiles feature enables you to configure the chassis with the chassis configuration profiles stored in the network share or local management station, and also restore configuration of the chassis. To access the Chassis Configuration Profiles page in the CMC web interface, in the system tree, go to Chassis Overview and click Setup > Profiles. The Chassis Configuration Profiles page is displayed.
NOTE: If the backup files (.bak) of the earlier versions of CMC, are loaded on the latest version of CMC where FIPS is enabled, reconfigure all the 16 CMC local user passwords. However, the password of the first user is reset to "calvin". NOTE: When a chassis configuration profile is imported from a CMC, which does not support the FIPS feature, to a CMC where FIPS is enabled, the FIPS remains enabled in the CMC.
2. Enter a desired profile name in the Profile Name field and click Edit Profile. Operation Successful message is displayed. 3. Click OK. Deleting Chassis Configuration Profiles You can delete a chassis configuration profile that is stored on the network share. To delete a chassis configuration profile, perform the following tasks: 1. Go to the Chassis Configuration Profiles page. In the Chassis Configuration Profiles > Stored Profiles section, select the required profile and then click Delete Profile.
1. To import the chassis configuration profiles from CIFS network share, type the following: racadm set –f clone.xml –t xml –l //xx.xx.xx.xx/PATH –u USERNAME –p PASSWORDCMC 2. To import the chassis configuration profiles from NFS network share, type the following: racadm set –f clone.xml –t xml –l xx.xx.xx.xx:/PATH You can import chassis configuration profiles from network share through remote RACADM interface. 1.
1. Use RACADM to query the target CMC that contains the desired configuration. NOTE: The generated configuration file is myfile.cfg. You can rename the file. The .cfg file does not contain user passwords. When the .cfg file is uploaded to the new CMC, you must re-add all passwords. 2. Open a Telnet/SSH text console to the CMC, log in, and type: racadm getconfig -f myfile.cfg NOTE: Redirecting the CMC configuration to a file using getconfig -f is only supported with the remote RACADM interface. 3.
• All parameters are specified as "object=value" pairs with no white space between the object, =, or value. White spaces that are included after the value are ignored. A white space inside a value string remains unmodified. Any character to the right of the = (for example, a second =, a #, [, ], and so on) is taken as-is. These characters are valid modem chat script characters. [cfgLanNetworking] -{group name} cfgNicIpAddress=143.154.133.121 {object value} • The .cfg parser ignores an index object entry.
This file is updated as follows: # # Object Group "cfgLanNetworking" # [cfgLanNetworking] cfgNicIpAddress=10.35.9.143 # comment, the rest of this line is ignored cfgNicGateway=10.35.9.1 The command racadm config -f .cfg parses the file and identifies any errors by line number. A correct file updates the proper entries. Additionally, you can use the same getconfig command from the previous example to confirm the update.
7 Configuring servers You can configure the following settings of a server: • • • • • • • Slot Names iDRAC Network Settings DRAC VLAN Tag Settings First Boot Device Server FlexAddress Remote File Share BIOS Settings Using Server Clone Topics: • • • • • • • • • Configuring slot names Configuring iDRAC network settings Setting first boot device Configuring sled network uplink Deploying remote file share Configuring server FlexAddress Configuring profile settings using server configuration replication Launc
3. To use a server’s host name as slot name, select the Use Host Name for the Slot name option. This overrides the static slot names with the server’s Host Name (or system name), if available. This requires the OMSA agent to be installed on the server. For more information about the OMSA agent, see the Dell OpenManage Server Administrator User's Guide available at dell.com/support/ manuals. 4. To use the iDRAC DNS name as slot name, select Use iDRAC DNS Name for Slot Name option.
Table 15. QuickDeploy settings (continued) Setting Description • • • • No Action — No action is performed when the server is inserted. QuickDeploy Only — Select this option to apply iDRAC network settings when a new server is inserted in the chassis. The specified auto-deployment settings are used to configure the new iDRAC, which includes the root user password if Change Root Password is selected.
Table 15. QuickDeploy settings (continued) Setting Description iDRAC IPv6 Gateway Specifies the default IPv6 gateway to be assigned to the iDRACs. The default value is "::". iDRAC IPv6 Prefix Length Specifies the prefix length to be assigned for the IPv6 addresses on the iDRAC. The default value is 64. Use CMC DNS Settings Enables the CMC DNS Server settings ( IPv4 and IPv6) that are propagated to iDRAC when a blade server is inserted in the chassis.
• Figure 5. Eight quarter-width sleds in the chassis Four FM120x4 sleds in the chassis: NOTE: The Reserved QuickDeploy IPAddresses must be set to 16. • Figure 6. Four FM120x4 sleds in the chassis Top row contains only quarter-width sleds and bottom row contains only half-width sleds: NOTE: The Reserved QuickDeploy IPAddresses must be set to a minimum of 8. • Figure 7.
Modifying iDRAC network settings using RACADM RACADM config or getconfig commands support the -m option for the following configuration groups: • • • • • • cfgLanNetworking cfgIPv6LanNetworking cfgRacTuning cfgRemoteHosts cfgSerial cfgSessionManagement For more information about the property default values and ranges, see the Dell Integrated Dell Remote Access Controller (iDRAC) RACADM Command Line Reference Guide and Chassis Management Controller for PowerEdge FX2/FX2s RACADM Command Line Refere
The valid values for are 1–16. For example: racadm setniccfg -m server-1 -v Setting first boot device You can specify the CMC first boot device for each server. This may not be the actual first boot device for the server, or may not even represent a device present in that server. It represents a device sent by CMC to the server and used as its first boot device of that server.
3. If you want the server to boot from the selected device every time it boots, clear the Boot Once option for the server. If you want the server to boot from the selected device only on the next boot cycle, select the Boot Once option for the server. 4. Click Apply to save the settings.
1. In the left pane, click Server Overview > Setup > Remote File Share. 2. On the Deploy Remote File Share page, type appropriate data in the fields. For more information about the field descriptions, see the CMC for Dell PowerEdge FX2/FX2s Online Help. 3. To connect to a remote file share, click Connect. To connect a remote file share, you must provide the path, user name, and password. A successful operation allows access to the media.
To access the Profile page using the CMC Web interface, in the left pane, click Chassis Overview > Server Overview > Setup > Profiles. The Profiles page is displayed. Managing stored profiles You can edit, view, or delete BIOS profiles. To manage the stored profiles of a CMC: 1. In the left pane, click Chassis Overview > Server Overview > Setup > Profiles. 2. On the Profiles page, in the Apply Profile section, click Manage Profiles. The Manage BIOS Profiles page is displayed.
NOTE: If a server does not support Lifecycle Controller or the chassis is turned off, you cannot apply a profile to the server. To apply a profile to one or more servers: 1. Go to the Server Profiles page. In the Save and Apply Profiles section, select the server or servers for which you want to apply the selected profile. The Select Profile drop-down menu gets enabled.
NOTE: The CMC web interface captures the normal server configuration profile (snapshot of the server), which can be used for replication on a target system. However, some configurations such as RAID and identity attributes are not propagated to the new server. For more information on alternate export modes for RAID configurations and identity attributes, see the white paper, Server Cloning with Server Configuration Profiles, at DellTechCenter.com.
4. Click View Log link to view the results of Lclogview from the iDRAC Lifecycle Controller for the specific server. The results displayed for the completion or failure are similar to the information displayed in the iDRAC Lifecycle Controller log for the specific server. Quick Deploy of profiles The Quick Deploy feature enables you to assign a stored profile to a server slot.
This feature allows you to manage server operations online without physical intervention if the server stops functioning. You can perform the following tasks by using the Boot Identity Profiles feature: • Initial setup • ○ Create a range of virtual MAC addresses. To create a MAC address, you must have Chassis Configuration Administrator and Server Administrator privileges.
1. Go to the Server Profiles page. In the Boot Identity profiles section, select the server on which you want to apply the selected profile. The Select Profile drop-down menu gets enabled. NOTE: The Select Profile drop-down menu displays all available profiles that are sorted by type from the network share. 2. From the Select Profile drop-down menu, select the profile that you want to apply. The Apply Identity option is enabled. 3. Click Apply Identity.
1. Go to the Server Profiles page. In the Boot Identity Profiles > Stored Profiles section, select the required profile and then click Export Profile. A File Download message is displayed prompting you to open or save the file. 2. Click Save or Open to export the profile to the required location. Deleting Boot Identity Profiles You can delete a boot identity profile that is stored on the network share. To delete a stored profile, perform the following tasks:: 1. Go to the Server Profiles page.
2. Enter the starting MAC address of the MAC address pool in the Starting MAC Address field. 3. Enter the count of the MAC addresses that you want to add, in the Number of MAC Addresses field. The valid values are from 1 to 3000. 4. Click OK to add MAC addresses. For more information, see the CMC for Dell PowerEdge FX2/FX2s Online Help. Removing MAC Addresses You can remove a range of MAC addresses from the network share by using the Remove MAC Addresses option available in the CMC web interface.
In MCM, while launching the iDRAC web interface from a member chassis, the user credentials of the leader and member chassis must be the same. Else, the current member chassis session is aborted and the member chassis login page is displayed. Launching iDRAC from Server Status page To launch the iDRAC management console for an individual server: 1. In the left pane, expand Server Overview. All four servers appear in the expanded Servers Overview list. 2.
8 Configuring storage sleds Half-width storage sleds that are used in the FX2s chassis contain the following: • • One or two RAID controllers Maximum of 16 disk drives You can configure individual storage sleds containing two RAID controllers to operate in the following modes: • • • Split-single Split-dual Joined NOTE: Do not insert a storage sled in slot 1 of the chassis as it is not a valid location for storage sleds. NOTE: This section is applicable only to dual-controller storage modules.
Configuring storage sleds using CMC web interface 1. In the left pane, click Chassis Overview > Server Overview and click a storage sled. The details of the storage sled are displayed. 2. In the menu on the right side, click Setup. The Storage Configuration page is displayed. You can also access the Storage Configuration page by selecting a storage sled on the Chassis Health page. Under Quick Links, click Storage Array Setup. 3.
9 Configuring CMC to send alerts You can set alerts and actions for certain events that occur on the chassis. An event occurs when the status of a system component is greater than the pre-defined condition. If an event matches an event filter and you have configured this filter to generate an alert message (email alert or SNMP trap), then an alert is sent to one or more configured destinations such as email address, IP address, or an external server. To configure CMC to send alerts: 1. 2. 3. 4.
NOTE: For more information on configuring SNMP protocol and trap format, see the Dell Chassis Management Controller for PowerEdge FX2/FX2s RACADM Command Line Reference Guide. Configuring SNMP Trap Alert Destinations Using CMC Web Interface To configure IPv4 or IPv6 alert destination settings using CMC Web interface: 1. In the system tree, go to Chassis Overview, and then click Alerts > Trap Settings. The Chassis Event Alert Destinations page is displayed. 2.
NOTE: CMC uses a default SNMP community string as public. To ensure higher security, it is recommended to change the default community string and set a value which is not blank. You can configure up to four destinations to receive traps alerts. To add more destinations, repeat steps 2–5. NOTE: The commands in steps 2–5 overwrites any existing settings configured for the index specified (1–4). To determine whether an index has previously configured values, type: racadm getconfig -g cfgTraps -i .
where is a value between 1–4. CMC uses the index number to distinguish up to four configurable destination email addresses. 4. Specify a destination email address to receive the email alerts: racadm config -g cfgEmailAlert -o cfgEmailAlertAddress -i where is a valid email address, and is the index value you specified in step 4. 5.
10 Configuring user accounts and privileges You can setup user accounts with specific privileges (role-based authority) to manage your system with CMC and maintain system security. By default, CMC is configured with a default root account. As an administrator, you can set up user accounts to allow other users to access the CMC. You can set up a maximum of 16 local users, or use directory services such as Microsoft Active Directory or LDAP to setup additional user accounts.
Table 17. User Types (continued) Privilege Description NOTE: CMC users with the Chassis Configuration Administrator privilege can configure power settings. However, the Chassis Control Administrator privilege is required to perform chassis power operations, including power on, power off, and power cycle. User Configuration Administrator User can: • • • • Add a new user. Change the password of a user. Change the privileges of a user.
Table 17. User Types (continued) Privilege Description • • Graceful shutdown Server Reboot Test Alert User User can send test alert messages. Debug Command Administrator User can execute system diagnostic commands. Fabric A Administrator User can set and configure the Fabric A IOM. The CMC user groups provide a series of user groups that have pre-assigned user privileges.
Table 19.
If you are configuring a new CMC or if you have used the racadm racresetcfg command, the only current user account is default root account. The racresetcfg subcommand resets all configuration parameters to the default values. Any earlier changes are lost. NOTE: Users can be enabled and disabled over time, and disabling a user does not delete the user from the database.
Table 20.
Configuring generic LDAP users CMC provides a generic solution to support Lightweight Directory Access Protocol (LDAP)-based authentication. This feature does not require any schema extension on your directory services. A CMC administrator can now integrate the LDAP server user logins with CMC. This integration requires configuration on both LDAP server and CMC. On the LDAP server, a standard group object is used as a role group. A user who has CMC access becomes a member of the role group.
8. If you have selected Certificate Validation Enabled option, then in the Manage Certificates section, specify the CA certificate to validate the LDAP server certificate during SSL handshake and click Upload. The certificate is uploaded to CMC and the details are displayed. 9. Click Apply. The generic LDAP directory service is configured. Configuring generic LDAP directory service using RACADM To configure the LDAP directory service, use the objects in cfgLdap and cfgLdapRoleGroup RACADM groups.
11 Configuring CMC for Single Sign-On or Smart Card login This section provides information to configure CMC for Smart Card login and Single Sign-On (SSO) login for Active Directory users. SSO uses Kerberos as an authentication method allowing users, who have signed in as an automatic- or single sign-on to subsequent applications such as Exchange.
• For Single Sign-On or smart card login, the client system must be a part of the Active Directory domain and Kerberos Realm. CMC • • Each CMC must have an Active Directory account. CMC must be a part of the Active Directory domain and Kerberos Realm. Prerequisites for Single Sign-On or Smart Card login The pre-requisites to configure SSO or Smart Card logins are: • • • • • • Setup the Kerberos realm and Key Distribution Center (KDC) for Active Directory (ksetup).
Internet Explorer To edit the exception list in Internet Explorer: 1. 2. 3. 4. Start Internet Explorer. Click Tools > Internet Options > Connections. In the Local Area Network (LAN) settings section, click LAN Settings. In the Proxy server section, select the Use a proxy server for your LAN (These settings will not apply to dial-up or VPN connections) option, and then click Advanced. 5.
You can test the Active Directory using Kerberos authentication using the RACADM command: testfeature -f adkrb -u @ where is a valid Active Directory user account. A command success indicates that CMC is able to acquire Kerberos credentials and access the user's Active Directory account. If the command is not successful, resolve the error and run the command again.
12 Configuring CMC to use Command Line consoles This section provides information about the CMC command line console (or serial/Telnet/Secure Shell console) features, and explains how to set up the system so that you can perform systems management actions through the console. For information about using the RACADM commands in CMC through the command line console, see Chassis Management Controller for PowerEdge FX2/FX2s RACADM Command Line Reference Guide.
To fix this issue, download hotfix 824810 from support.microsoft.com. For more information, you can also see Microsoft Knowledge Base article 824810. Using SSH with CMC SSH is a command line session that includes the same capabilities as a Telnet session, but with session negotiation and encryption to improve security. CMC supports SSH version 2 with password authentication. SSH is enabled on the CMC by default. NOTE: CMC does not support SSH version 1.
NOTE: There is no GUI support for managing this feature, you can use only the RACADM. When adding new public keys, make sure that the existing keys are not already at the index, where the new key is added. CMC does not perform checks to ensure previous keys are deleted before a new one is added. As soon as a new key is added, it is automatically in effect as long as the SSH interface is enabled.
NOTE: The connect command provides the –b (binary) option. The –b option passes raw binary data, and cfgSerialConsoleQuitKey is not used. Additionally, when connecting to a server using the CMC serial console, transitions in the DTR signal (for example, if the serial cable is removed to connect a debugger) will not result in you exiting the application. NOTE: If the IOM does not support console redirection, the connect command displays an empty console.
5. Save the changes and exit. The managed system restarts. Configuring Windows for serial console redirection There is no configuration necessary for servers running the Microsoft Windows Server versions, starting with Windows Server 2003. Windows receives information from the BIOS, and enable the Special Administration Console (SAC) console one COM1. Configuring Linux for server serial console redirection during boot The following steps are specific to the Linux GRand Unified Bootloader (GRUB).
• • Disable GRUB's graphical interface and use the text-based interface. Else, the GRUB screen is not displayed in console redirection. To disable the graphical interface, comment out the line starting with splashimage. To start multiple GRUB options to start console sessions through the serial connection, add the following line to all options: console=ttyS1,57600 The example shows console=ttyS1,57600 added to only the first option.
1:2345:respawn:/sbin/mingetty 2:2345:respawn:/sbin/mingetty 3:2345:respawn:/sbin/mingetty 4:2345:respawn:/sbin/mingetty 5:2345:respawn:/sbin/mingetty 6:2345:respawn:/sbin/mingetty tty1 tty2 tty3 tty4 tty5 tty6 # Run xdm in runlevel 5 # xdm is now a separate service x:5:respawn:/etc/X11/prefdm -nodaemon Edit the /etc/securettyfile as follows: Add a new line, with the name of the serial tty for COM2: ttyS1 The following example shows a sample file with the new line.
For more information, see the Dell Chassis Management Controller Version 2.3 for PowerEdge FX2/FX2s RACADM Command Line Reference Guide.
13 Using FlexAddress and FlexAddress Plus cards This section provides information about FlexAddress and how to use FlexAddress Plus card to configure FlexAddress. NOTE: The FlexAddress feature is licensed. This feature license is included in the Enterprise License.
For example: (starting_mac)00:18:8B:FF:DC:FA + (mac_count)0xCF – 1 = (ending_mac)00:18:8B:FF:DD:C8 NOTE: Lock the SD card prior to inserting in the USB Memory Card Reader to prevent accidently modifying any of the contents. You must unlock the SD card before inserting into CMC.
Dell Feature Cards may contain more than one feature. Once any feature included on a Dell Feature Card has been activated on a chassis, any other features that may be included on that Dell Feature Card cannot be activated on a different chassis.
Configuring FlexAddress for chassis-level fabric and slots At the chassis level, you can enable or disable the FlexAddress feature for fabrics and slots. FlexAddress is enabled on a per-fabric–basis and then slots are selected for participation in the feature. Both fabrics and slots must be enabled to successfully configure FlexAddress.
Table 26. FlexAddress commands and output (continued) Situation Command Output Changing the Flexaddress settings of slot or fabric, when the CMC Enterprise License is not installed. $racadm setflexaddr -i ERROR: SWC0242 : A required license is missing or expired. Obtain an appropriate license and try again, or contact your service provider for additional details. $racadm setflexaddr f NOTE: To resolve this issue, you must have a FlexAddress Enablement license.
IN NO EVENT SHALL DELL OR ITS SUPPLIERS BE LIABLE FOR ANY DAMAGES WHATSOEVER (INCLUDING, WITHOUT LIMITATION, DAMAGES FOR LOSS OF BUSINESS PROFITS, BUSINESS INTERRUPTION, LOSS OF BUSINESS INFORMATION, OR OTHER PECUNIARY LOSS) ARISING OUT OF USE OR INABILITY TO USE THE SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGES. Because some jurisdictions do not allow an exclusion or limitation of liability for consequential or incidental damages, the above limitation may not apply to you.
• • Basic Mode — In this mode you can view Server Slot, Fabric, Protocol, WWN/MAC addresses, and Partition Status. Only Active MAC addresses are displayed in WWN/MAC address field. You can filter using any or all of the fields displayed. Advanced Mode — In this mode you can view all the fields displayed in the basic mode and all the MAC types (Server Assigned, Flex Address, and IO Identity). You can filter using any or all of the fields displayed.
7. From the Protocol drop-down menu, select All Protocols or one of the listed network protocols to view all the MACS or the MACs associated with the selected protocol. 8. In the WWN/MAC Addresses field, enter the MAC address to view only the slots associated with the specific MAC address. Alternately, partially enter the MAC address entries to view the associated slots. For example, enter 4A to view the slots with MAC addresses that contain 4A. 9.
To display the MAC/WWN addresses for all LOMs or mezzanine cards, use the following RACADM command: racadm getmacaddress -c factory For more information on the getflexaddr and getmacaddress subcommand, see the Dell Chassis Management Controller for PowerEdge FX2/FX2s RACADM Command Line Reference Guide.
14 Managing Fabrics The chassis supports two fabric types: Fabric A1 and Fabric A2, which are used by the two I/O Modules, and are always connected to the on-board Ethernet adapters of the servers. NOTE: In the PowerEdge FX2s chassis, fabrics B and C are the PCIe connection to the PCIe Extension cards. Following IO Modules are supported: • • • 1GbE pass-through 10GbE pass-through I/O Aggregator Both the Fabrics support only Ethernet.
On the Configure I/O Module Network Settings page, type appropriate data, and then click Apply. 2. If allowed, type the root password, SNMP RO Community string, and Syslog Server IP Address for the IOM. For more information about the field descriptions, see the Online Help. NOTE: The IP address set on the IOM from CMC is not saved to the permanent startup configuration of the switch.
Resetting IOM to factory default settings You can reset IOM to the factory default settings using the Deploy I/O Modules page. NOTE: This feature is supported on PowerEdge M I/O Aggregator IOM only. Other IOMs including MXL 10/40GbE are not supported. To reset the selected IOMs to factory default settings using the CMC Web interface: 1. In the system tree, go to I/O Module Overview and click Setup or expand I/O Module Overview in the system tree, select the IOM, and click Setup.
Launching IOA/MXL GUI from the I/O Module Overview page In the directory tree, go to I/O Module Overview. On the I/O Module Status page, click Launch I/O Module GUI. The IOA/MXL login page is displayed. Launching IOA/MXL GUI from the I/O Module Status page In the directory tree, under the I/O Module Overview, click an IOA/MXL switch. On the I/O Module Status page, click Launch I/O Module GUI. The IOA/MXL login page is displayed.
15 Using VLAN Manager You can assign or view the VLAN settings on the IOMs by using the VLAN Manager option. NOTE: This feature is supported only on Dell PowerEdge I/O Aggregator. After the mode of the I/O Aggregator is changed to standalone from stacking, remove the startup configuration and reload the I/O Aggregator. You need not save the system configuration while reloading the I/O Aggregator.
NOTE: The Summary VLANs of All Ports section displays information about the IOMs present in the Chassis and the assigned VLANs. Click Save to save a csv file of the summary of the current VLAN settings. NOTE: The CMC Managed VLANs section displays the summary of all VLANs assigned to the IOMs. 8. Click Apply. The network settings are configured for the IOM(s). Viewing the VLAN settings on IOMs using CMC web interface To view the VLAN settings on IOM(s) using the CMC Web interface: 1.
Select the check box against the specific slots to select the required IOMs. 5. In the Edit VLANs section, select Update the Untagged VLANs in the drop down list and click Apply. A warning message is displayed that the configurations of the existing untagged VLAN will be overwritten with the configurations of the newly assigned untagged VLAN. 6. Click OK to confirm. The untagged VLANs are updated with the configurations of the newly assigned untagged VLAN. An Operation Successful message is displayed.
16 Managing and monitoring power The PowerEdge FX2/FX2s chassis is the most power-efficient server enclosure. It is designed to include highly efficient power supplies and fans, has an optimized layout for the air to flow more easily through the system, and contains power-optimized components throughout the enclosure.
Grid Redundancy policy The Grid Redundancy policy is also knows as 1+1 policy, for one active and one spare PSU. The purpose of the Grid Redundancy policy is to enable an enclosure system to operate in a mode in which the enclosure can tolerate AC power failures. These failures may originate in the AC power grid, the cabling and delivery, or a Power Supply Unit (PSU) itself. When you configure a system for Grid Redundancy, connect PSUs 1 and 2 to separate power grids.
Viewing power consumption status CMC provides the actual input power consumption for the entire system. Viewing power consumption status using CMC web interface In the left pane, click Chassis Overview > Power > Power Monitoring. The Power Monitoring page displays the power health, system power status, real-time power statistics, and real-time energy statistics. For more information, see the Online Help. NOTE: You can also view the power redundancy status under Power Supplies.
Power supply and Redundancy policy changes in system event log Changes in the power supply state and power redundancy policy are recorded as events. Events related to the power supply that record entries in the system event log (SEL) are power supply insertion and removal, power supply input insertion and removal, and power supply output assertion and de-assertion. The following table lists the SEL entries that are related to power supply changes: Table 27.
2. On the Budget/Redundancy Configuration page, select any or all of the following properties as appropriate. For information about the field descriptions, see the Online Help. • • • Redundancy Policy Disable Chassis Power Button Max Power Conservation Mode 3. Click Apply to save the changes. Configuring power budget and Redundancy using RACADM NOTE: To perform power management actions, you must have the Chassis Configuration Administrator privilege. To enable and set the redundancy policy: 1.
• To specify the desired logging interval, enter the following command: racadm config -g cfgRemoteHosts -o cfgRhostsSyslogPowerLoggingInterval n • where n is 1-1440 minutes.
where is powerup, powerdown, powercycle, nongraceshutdown, or reset. Executing Power Control Operations for Multiple Servers Using CMC Web Interface To execute power control operation for multiple servers using the Web interface: 1. In the left pane, click Server Overview > Power. The Power Control page is displayed. 2.
AC Power Recovery If the AC power supply of a system is disrupted, the chassis is restored to the previous power state before the AC power loss. The restoration to the previous power state is the default behavior.
17 Configuring PCIe slots The PowerEdge FX2/FX2s chassis optionally contain eight PCIe slots where each PCIe slot is assigned to a specific sled. By default, all PCIe slots are mapped. You can enable or disable the assignment of PCIe slots to the servers using the CMC web interface or RACADM commands. The following tables list the PCIe mapping for full-width, half-width, and quarter-width compute sleds. Table 29.
NOTE: PCIe management is supported only for PowerEdge FX2s and not PowerEdge FX2. For more information about mapping PCIe slots, see the Dell PowerEdge FD332 Owner’s Manual. For more information about managing PCIe slots, see the CMC for Dell PowerEdge FX2/FX2s Online Help. NOTE: The Agent-free monitoring feature is not available for the PCIe PERC and Network cards in the Chassis PCIe slots. Agent-free monitoring is the systems management solution for Dell’s 12th generation of PowerEdge servers.
reassignment settings. When the compute sleds are powered on after the reassignment changes, the slots assigned to the compute sleds in the lower bay earlier, are mapped to corresponding compute sleds in the upper bay. Following are some examples for PCIe reassignment: • PCIe reassignment in full-width (FW) FC830: • ○ PCIe slots mapped to FW sled-3 (PCIe slots 1 through 4) are reassigned to sled–1. Sled-1 now maps to PCIe slots 1 though 8.
18 Troubleshooting and recovery This section explains how to perform tasks related to recovering and troubleshooting problems on the remote system using the CMC web interface. • • • • • • • • • • • • • Viewing chassis information. Viewing the event logs. Gathering configuration information, error status, and error logs. Using the diagnostic console. Managing power on a remote system. Managing Lifecycle Controller jobs on a remote system. Reset components.
Table 32.
○ Resolution A: Check for the system input power cap setting—it might be configured too low to allow any additional servers to be powered up. Problem: Available power keeps changing, even when the enclosure configuration has not changed.
For information about the commands, see the Online Help. The diagnostic results page appears. Resetting Components You can reset the CMC, or to virtually reset servers making them to behave as if they were removed and reinserted. NOTE: To reset components, you must have Debug Command Administrator privilege. NOTE: Virtual reseat is not available for the individual nodes of the PowerEdge FM120x4. To reset the components using the CMC Web interface, 1.
To modify the parameter, type the following command: racadm config –g cfgRemoteHosts –o cfgRhostsNtpMaxDist 32 After making the change, disable NTP, wait for 5-10 seconds, then enable NTP again: NOTE: NTP may take an additional three minutes to synchronize again.
Table 33.
Table 33. LED Color and Blinking Patterns (continued) Component Storage sled LED Color, Blinking Pattern Status Amber, blinking Fault Amber, blinking Fault Solid Blue No fault Troubleshooting Non-responsive CMC If you cannot log in to CMC using any of the interfaces (the web interface, Telnet, SSH, remote RACADM, or serial), you can verify the CMC functionality observing the LEDs on CMC. Observing LEDs to Isolate the Problem The CMC has an LED which changes color to indicate: Table 34.
• Problem: Storage Amber LED blinks. Resolution: Ensure that the storage module is inserted properly and check the chassis log for warning messages. This error can be cleared only if the underlying fault is addressed and the associated host is power cycled with the sled removed or through a sled virtual reseat. Problem: Storage module RAID firmware update is not effective.
NOTE: Electrostatic discharge (ESD) events can damage CMC. Under certain conditions, ESD may build up on your body or an object, and then discharge into your CMC. To prevent ESD damage, take precautions to discharge static electricity from your body while handling and accessing CMC outside the Chassis. 2. Remove the jumper plug from the password reset connector, and insert a 2-pin jumper to enable the default administrator account. To locate the password jumper on the CMC board, see the following figure.
19 Frequently asked questions This section lists the frequently asked questions about the following: • • • • RACADM Managing and Recovering a Remote System Active Directory IOM Topics: • • • • • RACADM Managing and recovering a remote system Active Directory IOM Event and error messages RACADM After performing a CMC reset (using the RACADM racreset subcommand), when a command is entered, the following message is displayed: racadm Transport: ERROR: (RC=-1) What does this message mean? Anothe
CMC includes a default CMC server certificate to ensure network security for the web interface and remote RACADM features. When this certificate is used, the web browser displays a security warning because the default certificate is issued to CMC default certificate which does not match the host name of CMC (for example, the IP address). To address this security concern, upload a CMC server certificate issued to the IP address of CMC.
The Dell-extended Active Directory Users and Computers Snap-In checks the mode and limits users in order to create objects across domains, if in a mixed mode. Does using CMC with Active Directory support multiple domain environments? Yes. The domain forest function level must be in Native mode or Windows 2003 mode. In addition, the groups among Association Object, RAC user objects, and RAC Device Objects (including Association Object) must be universal groups.