Dell Chassis Management Controller Version 3.
Notes, cautions, and warnings NOTE: A NOTE indicates important information that helps you make better use of your product. CAUTION: A CAUTION indicates either potential damage to hardware or loss of data and tells you how to avoid the problem. WARNING: A WARNING indicates a potential for property damage, personal injury, or death. © 2013 - 2018 Dell Inc. or its subsidiaries. All rights reserved. Dell, EMC, and other trademarks are trademarks of Dell Inc. or its subsidiaries.
Contents 1 Overview.......................................................................................................................................................14 What is new in this release.............................................................................................................................................. 15 Key Features..........................................................................................................................................................
Launching CMC Using Other Systems Management Tools................................................................................. 36 Downloading and Updating CMC Firmware................................................................................................................. 36 Setting Chassis Physical Location and Chassis Name................................................................................................ 36 Setting Chassis Physical Location and Chassis Name Using Web Interface...
Conversion of External Shared PERC 8 card High Availability to Non-High Availability Mode using RACADM.....................................................................................................................................................................49 Conversion of External Shared PERC 8 card Non-High Availability to High Availability Mode using RACADM............................................................................................................................................
Viewing Chassis and Component Summaries.............................................................................................................. 70 Chassis Graphics.........................................................................................................................................................71 Selected Component Information............................................................................................................................
Disabling an Individual Member at the Member Chassis....................................................................................... 91 Accessing the Web page of a Member Chassis or Server.................................................................................... 91 Propagating Leader Chassis Properties to Member Chassis................................................................................ 91 Server Inventory for MCM group............................................................
Accessing Server Profiles Page................................................................................................................................111 Adding or Saving Profile............................................................................................................................................ 111 Applying Profile..........................................................................................................................................................
Configuring Standard Schema Active Directory................................................................................................... 134 Extended Schema Active Directory Overview......................................................................................................136 Configuring Extended Schema Active Directory.................................................................................................. 137 Configuring Generic LDAP Users........................................
Fabric Configuration.................................................................................................................................................166 Viewing WWN or MAC Address Information.............................................................................................................. 166 Viewing Basic WWN or MAC Address Information Using Web Interface................................................................
Remote Logging....................................................................................................................................................... 185 External Power Management................................................................................................................................. 185 Configuring Power Budget and Redundancy Using CMC Web Interface......................................................... 186 Configuring Power Budget and Redundancy Using RACADM......
Deleting Encryption Key Using CMC Web Interface............................................................................................201 Deleting Encryption Key Using RACADM............................................................................................................. 202 Encrypting Virtual Disks................................................................................................................................................
Troubleshooting Network Time Protocol Errors......................................................................................................... 219 Interpreting LED Colors and Blinking Patterns...........................................................................................................220 Troubleshooting Non-responsive CMC........................................................................................................................221 Observing LEDs to Isolate the Problem.......
1 Overview The Dell Chassis Management Controller (CMC) for Dell EMC PowerEdge VRTX is a Systems Management hardware and software solution for managing the PowerEdge VRTX chassis. The CMC has its own microprocessor and memory and is powered by the modular chassis into which it is plugged.
Topics: • What is new in this release • Key Features • Chassis Overview • Minimum CMC Version • Supported Remote Access Connections • Supported Platforms • Supported Web Browsers • Managing Licenses • Viewing Localized Versions of the CMC Web Interface • Supported Management Console Applications • How to use this Guide • Other Documents You May Need • Accessing documents from the Dell EMC support site What is new in this release This release of CMC for Dell EMC PowerEdge VRTX suppo
• Firmware update of server components such as BIOS, network controllers, storage controllers, and so on across multiple servers in the chassis using Lifecycle Controller. • Dell OpenManage software integration — Enables you to launch the CMC web interface from Dell OpenManage Server Administrator or OpenManage Essentials (OME) 1.2. • CMC alert — Alerts you about potential managed node issues through Remote syslog email message or SNMP trap.
Figure 1. CMC connectors and LEDs Table 1. CMC connectors and LEDs Item Indicator, Button, or Connector 1 Status/identification indicator (CMC 1) 2 Power indicator (CMC 1) 3 CMC connector ports (2) 4 Power indicator (CMC 2) 5 Status/identification indicator (CMC 2) A Back Panel view of the chassis is given here with a table that lists the parts and devices available in the CMC.
Figure 2. CMC back panel Table 2. CMC back panel — parts Item Indicator, Button, or Connector 1 PCIe expansion card slots low-profile (5) 2 PCIe expansion card slots full height (3) 3 CMC GB Ethernet port (CMC-2) 4 CMC GB Ethernet port (CMC-1) 5 Serial Connector 6 Blower modules (4) 7 I/O module ports 8 PSU 4 9 PSU 3 10 PSU 1 11 PSU 2 A Front Panel view of the chassis is given here with a table that lists the parts and devices available in the CMC.
Figure 3. Front-Panel Features And Indicators—3.5 Inch Hard Disk Drive Chassis Table 3. Front panel — features and indicators Item Indicator, Button, or Connector Description 1 USB connectors (2) Allows a keyboard and mouse to be connected to the system. 2 LCD panel Provides system information and status, and error messages to indicate when the system is operating correctly or when the system needs attention. 3 LCD menu scroll buttons (4) Moves the cursor in one-step increments.
Item Indicator, Button, or Connector Description 10 Video connector Allows a monitor to be connected to the system. 11 Server modules Up to four PowerEdge M520, M620, M630, or M640 server modules or 2 M820 server modules configured for the enclosure. Minimum CMC Version The following table lists the minimum CMC version required to enable the listed server modules. Table 4. Minimum CMC Version for server modules Servers Minimum version of CMC PowerEdge M520 CMC 1.36 PowerEdge M620 CMC 1.
Connection Features • Provides access only to the active CMC. Supported Platforms CMC supports modular servers designed for the PowerEdge VRTX platform. For information about compatibility with CMC, see the documentation for your device. For the latest supported platforms, see the Dell Chassis Management Controller (CMC) Version 3.0 for Dell PowerEdge VRTX Release Notes available at dell.com/support/manuals.
• Self-service portal — A link to the Self-Service Portal is available from CMC. Click this link to open the licensing Self-Service Portal on the internet from where you can purchase licenses. For more information, see the online help for the self-service portal page. • Point-of-sale — License is acquired while placing the order for a system. License Operations Before you perform the license management tasks, make sure to acquire the licenses.
Managing Licenses Using CMC Web Interface To manage the licenses using the CMC Web interface, go to Chassis Overview > Setup > Licenses. Before importing a license, make sure to store a valid license file on the local system or on a network share that is accessible from the CMC. The license is either embedded, or sent through an email from the Self-Service Web Portal, or from the License Key Management tool.
Feature Express Enterprise Extended iDRAC Management Yes Yes Remote Syslog No Yes Directory Services No* Yes iDRAC Single Sign-On No Yes Two-Factor Authentication No Yes PK Authentication No Yes Remote File Share Yes Yes Slot Resource Management No Yes Enclosure-level power capping No* Yes *For non-default power cap setting, only Restore Power Cap is allowed with an Express license. Restore Power Cap will reset the Power Cap settings to factory default.
Feature Express Enterprise Quick Deploy No Yes Notes Viewing Localized Versions of the CMC Web Interface To view localized versions of the CMC web interface, read through your web browser's documentations. Supported Management Console Applications CMC supports integration with Dell OpenManage Console. For more information, see the OpenManage Console documentation available at dell.com/support/manuals.
• The Dell PowerEdge VRTX Getting Started Guide shipped with your system provides an overview of system features, setting up your system, and technical specifications. • The setup placemat shipped with your system provides information about the initial system setup and configuration. • The server module's Owner's Manual provides information about the server module's features and describes how to troubleshoot the server module and install or replace the server module's components.
2 Installing and Setting Up CMC This section provides information about how to install your CMC hardware, establish access to CMC, configure your management environment to use CMC, and guides you through the tasks for configuring a CMC: • Set up initial access to CMC. • Access CMC through a network. • Add and configure CMC users. • Update CMC firmware. For more information about installing and setting up redundant CMC environments, see Understanding Redundant CMC Environment.
Checklist To Set up Chassis The following tasks enable you to accurately set up the chassis: 1 CMC and the management station, where you use your browser, must be on the same network, which is called the management network. Connect an Ethernet network cable from the CMC active port to the management network. 2 Install the I/O module in the chassis and connect the network cable to the chassis. 3 Insert the servers in the chassis. 4 Connect the chassis to the power source.
For information about installing Dell OpenManage software components, see the Dell OpenManage Installation and Security User's Guide available on the DVD or at dell.com/support/manuals. You can also download the latest version of the Dell DRAC Tools from support.dell.com. Installing RACADM on a Linux Management Station 1 Log in as root to the system running a supported Red Hat Enterprise Linux or SUSE Linux Enterprise Server operating system where you want to install the managed system components.
Proxy Server To browse through a proxy server that does not have access to the management network, you can add the management network addresses to the exception list of the browser. This instructs the browser to bypass the proxy server while accessing the management network. Internet Explorer To edit the exception list in Internet Explorer: 1 Start Internet Explorer. 2 Click Tools > Internet Options > Connections. 3 In the Local Area Network (LAN) settings section, click LAN Settings.
To disable CRL fetching: 1 Start Internet Explorer. 2 Click Tools > Internet Options, and then click Advanced. 3 Go to the Security section, clear the Check for publisher’s certificate revocation option, and then click OK. Downloading Files From CMC With Internet Explorer When you use Internet Explorer to download files from the CMC, you may experience problems when the Do not save encrypted pages to disk option is not enabled.
Configuring Initial CMC Network NOTE: Changing your CMC Network settings may disconnect your current network connection. You can perform the initial network configuration of CMC before or after CMC has an IP address.
Configuring CMC Using Advanced Setup 1 On the Network Settings panel, if you select Advanced Setup, the following message is displayed to confirm if want to configure CMC: Configure CMC? 2 To configure CMC by using advanced setup properties, click the center button selecting the check icon. NOTE: To skip the CMC configuration navigate to the ‘X’ icon and then press the center button.
• Both — The options DHCP or Static are displayed. • IPv6 — The iDRAC Configuration panel is displayed. Go to step 15. 13 Select DHCP or Static. Table 9. Network mode Dynamic Host Configuration Protocol (DHCP) iDRAC retrieves IP configuration (IP address, mask, and gateway) automatically from a DHCP server on your network. The iDRAC is assigned a unique IP address allotted over your network. Press the center button. The IPMI Over LAN panel is displayed.
CMC and iDRACs are now available on the network. You can access the CMC on the assigned IP address using the Web interface or CLIs such as a serial console, Telnet, and SSH. Interfaces and Protocols to Access CMC After you have configured the CMC network settings, you can remotely access CMC using various interfaces. The following table lists the interfaces that you can use to remotely access CMC. NOTE: Telnet is not as secure as the other interfaces, hence it is disabled by default.
Interface Description (DMTF) Common Information Model (CIM)–based management information. The CIM information defines the semantics and information types that can be modified in a managed system. The CMC WSMan implementation uses SSL on port 443 for transport security, and supports basic authentication. The data available through WS-Management is provided by CMC instrumentation interface mapped to the DMTF profiles and extension profiles.
Setting Chassis Physical Location and Chassis Name Using Web Interface To set the chassis location and chassis name using the CMC web interface: 1 In the left pane, go to Chassis Overview, and then click Setup . 2 On the General Chassis Settings page, type the location properties and the chassis name. For more information about setting chassis properties, see the CMC Online Help. NOTE: The Chassis Location field is optional.
Configuring LED Blinking Using CMC Web Interface To enable blinking for one, multiple, or all component LEDs: • In the left pane, go to any of the following pages: – Chassis Overview > Troubleshooting. – Chassis Overview > Chassis Controller > Troubleshooting. – Chassis Overview > Server Overview > Troubleshooting. NOTE: Only servers can be selected on this page. – Chassis Overview > I/O Module Overview > Troubleshooting. – Storage > Troubleshooting > Identify.
The General Chassis Settings page is displayed. 2 In the drop-down menu for the iDRAC Launch Method property, select IP Address or DNS. 3 Click Apply. NOTE: A DNS-based launch is used for any particular iDRAC only if: • The chassis setting is DNS. • CMC has detected that the specific iDRAC is configured with a DNS name. Configuring iDRAC Launch Method Using RACADM To update CMC firmware using RACADM, use the cfgRacTuneIdracDNSLaunchEnable subcommand.
• To specify the time span within which, lockout fail count failures must occur, use: racadm config –g cfgRacTuning –o cfgRacTuneIpBlkFailWindow • To specify value for lockout penalty time, use: racadm config –g cfgRacTuning –o cfgRacTuneIpBlkPenaltyTime For more information about these objects, see the Chassis Management Controller for PowerEdge VRTX RACADM Command Line Reference Guide available at dell.com/support/manuals.
• CMC reset — Chassis management resumes after CMC reboots or chassis fails over to the standby CMC. • CMC failover command issued — Chassis management resumes after the chassis fails over to the standby CMC. • CMC firmware update — Chassis management resumes after CMC reboots or chassis fails over to the standby CMC. It is recommended that you update the standby CMC first so that there is only one failover event.
NOTE: When you configure the chassis by using the LCD wizard, if you select the Auto-Apply settings to newly inserted servers option, you cannot disable the Auto-Apply settings to newly inserted servers function by using a basic license. If you do not want the function to take effect, either ignore the message displayed on the LCD, which will automatically disappear; or, press the Do not accept button on the LCD, and then push the center button. 3 Click Apply.
3 Logging in to CMC You can log in to CMC as a CMC local user, as a Microsoft Active Directory user, or as an LDAP user. The default user name and password is root and calvin respectively. You can also log in using Single Sign-On or a Smart Card. NOTE: CMC does not support the following special characters as user name or password from chassis profile using XML: " , ! , #, $, %, ^, &, *, (, ), -, _, +, =, ?, {, }, +, &, >, |, .
Logging in to CMC as a Local User, Active Directory User, or LDAP User To log in to CMC, you must have a CMC account with the Log In to CMC privilege. The default CMC user name is root, and the password is calvin. The root account is the default administrative account that ships with CMC. NOTE: • For added security, it is strongly recommended that you change the default password of the root account during initial set up. • When Certificate Validation is enabled, FQDN of the system should be provided.
To log in to CMC as an Active Directory user using a smart card: 1 Log in to CMC using the link https://. The CMC Login page is displayed asking you to insert a smart card. NOTE: If you changed the default HTTPS port number (port 80), access the CMC web page using :, where cmcname is the CMC host name for CMC, domain-nameis the domain name, and port number is the HTTPS port number. 2 Insert the smart card and click Login.
You are logged in to CMC. Related links Using Telnet console with CMC Configuring Linux Minicom Using SSH with CMC Accessing CMC Using RACADM RACADM provides a set of commands that allow you to configure and manage CMC through a text-based interface. RACADM can be accessed using a Telnet/SSH or serial connection, using the Dell CMC console on the KVM, or remotely using the RACADM command line interface installed on a management station.
Table 11. Multiple CMC sessions Interface Number of Sessions CMC web interface 4 RACADM 4 Telnet 4 SSH 4 Changing Default Login Password The warning message that prompts you to change the default password is displayed if: • You log in to CMC with Configure Users privilege. • Default password warning feature is enabled. • Default user name and password for any currently enabled account are root and calvin respectively.
For more information, see the Chassis Management Controller for PowerEdge VRTX RACADM Command Line Reference Guide available at dell.com/support/manuals. Enabling or Disabling Default Password Warning Message You can enable or disable the display of the default password warning message. To do this, you must have Configure Users privilege.
7 External Shared PERC 8 card is not in HighAvailabiltiy Mode and navigate to Storage→ Troubleshooting→ Setup Troubleshooting to view the Non-HA status. Conversion of External Shared PERC 8 card Non-High Availability to High Availability Mode using Web Interface Dell PowerEdge VRTX chassis must have 2 External Shared PERC 8 cards in PCI slot 5 and PCI slot 6. Workflow 1 Power down chassis. Disconnect all SAS cables from External Shared PERC 8 cards to MD12x0 enclosures. 2 Power Up chassis.
2 Power Up chassis. 3 Login to CMC Racadm and run the following command when the servers are in powered off state: racadm raid set controllers:RAID.ChassisSlot.5-1 –p HighAvailabilityMode ha 4 Run the command racadm raid set controllers:RAID.ChassisSlot.6-1 –p HighAvailabilityMode ha on External Shared PERC 8 card in slot 6. 5 Resetting both the PERCs may take two minutes to reflect in HA mode. 6 Power down chassis and connect the enclosures in HA Mode. 7 Power Up chassis.
4 Updating Firmware You can update firmware for: • CMC • Chassis infrastructure • VRTX Expander or Storage Backplane Expander Firmware of Inegrated or external enclosures • Physical Disks (HDD) per enclosure NOTE: You can update the HDD firmware only if required.
While updating VRTX Chassis firmware, it is recommended to update the firmware versions of the chassis components in the following order: 1 Blade components firmware 2 CMC firmware 3 Chassis infrastructure firmware 4 Shared PERC8 firmware (integrated and external) 5 Internal Storage Backplane firmware and external enclosure's expanders 6 HDD firmware (external and integrated enclosures) For more information about the update sequence for VRTX chassis, see the CMC Firmware 3.
If you have redundant CMCs installed in the chassis, it is recommended to update both the CMCs to the same firmware version, at the same time, with a single operation. If CMCs have different firmware and a failover occurs, unexpected results may occur. NOTE: • The CMC firmware cannot be updated to any earlier version other than 2.0 for a chassis that is configured with 1600W PSU. • CMC firmware update or roll back is supported only for firmware versions 1.2, 1.25, 1.3, 1.31, 1.35, 1.36, 2.0, 2.01 and 2.
NOTE: • To view the MD12x0 cabling diagram, refer to Upgrading PowerEdge VRTX to Support Shared Storage Expansion User's Guide or Dell Shared PowerEdge RAID Controller (PERC) 8 Cards For Dell PowerEdge VRTX Systems User’s Guide available at dell.com/ support/manuals. • The external shared storage adapter requires that you update the CMC v2.20 or later and mainboard v2.21 or later to support External Shared PERC 8 card. • You cannot downgrade the CMC firmware prior to 2.2 with external shared adapters.
5 For a standby CMC, when the update is complete, the Update State field displays Done. For an active CMC, during the final phases of the firmware update process, the browser session and connection with CMC is lost temporarily because the active CMC is not connected to the network. You must log in after a few minutes, when the active CMC has restarted. After CMC resets, the new firmware is displayed on the Firmware Update page. NOTE: After the firmware update, delete the files from the web browser cache.
Updating Chassis Infrastructure Firmware Using RACADM To update chassis infrastructure firmware using RACADM, use the fwupdate sub-command. For more information about using the RACADM commands, see the Chassis Management Controller for PowerEdge VRTX RACADM Command Line Reference Guide. Updating Server iDRAC Firmware You can update firmware for iDRAC using the CMC Web interface or the RACADM. To use this feature, you must have an Enterprise License. The iDRAC firmware version must be 1.40.
Updating Server Component Firmware The one-to-many update feature in CMC enables you to update server component firmware across multiple servers. You can update the server components using the Dell Update Packages available on the local system or on a network share. This operation is enabled by leveraging the Lifecycle Controller functionality on the server. The Lifecycle Controller service is available on each server and is facilitated by iDRAC.
NOTE: The Single Click all blade update method has the following benefits: • Enables you to update all the components on all the blade servers with minimal clicks. • All the updates are packaged in a directory. This avoids individual upload of each component’s firmware. • Faster and consistent method of updating the server components • Enables you to maintain a standard image with the required updates versions of the server components that can be used to update multiple servers in a single operation.
Enabling Lifecycle Controller You can enable the Lifecycle Controller service when turning on a server: • For iDRAC servers, on the boot console, to access System Setup, press the key. • On the System Setup Main Menu page, go to iDRAC Settings > Lifecycle Controller, click Enabled. Go to the System Setup Main Menu page and click Finish to save the settings. Canceling System Services enables you to cancel all scheduled jobs that are pending and remove them from the queue.
NOTE: Automatic filtering feature is important while using the Dell Update Package (DUP). The update programming of a DUP can be based on the type or model of a component or device. The automatic filtering behavior is designed to minimize the subsequent selection decisions after an initial selection is made. Following are some examples where the filtering mechanisms are applied: • If the BIOS filter is selected, only the BIOS inventory of all the servers is displayed.
Viewing Firmware Inventory You can view the summary of the firmware versions for all components and devices for all servers currently present in the chassis along with their status. NOTE: To use this feature, you must have an Enterprise License. Viewing Firmware Inventory Using CMC Web Interface To view the firmware inventory: 1 In the left pane, click Server Overview, and then click Update.
Field Description Job Status Displays the job status of any operations that are scheduled on the server. The job status is continuously updated dynamically. If a job completion with state completed is detected, then the firmware versions for the components and devices on that server are automatically refreshed in case there has been a change of firmware version on any of the components or devices.
• Profile Folder • Domain Name • User Name • Password • SMB Version NOTE: The SMB Version option is available only if the Protocol type is CIFS. NOTE: If you are using CIFS that is registered with a domain, and are accessing the CIFS using the IP with the CIFS local user credentials, it is mandatory to enter the hostname or host IP in the Domain Name field. For more information, see the CMC Online Help. 3 Click Test Directory to verify whether the directories are readable and writeable.
Reinstalling Server Component Firmware You can reinstall the firmware image of the currently installed firmware for selected components or devices across one or more servers. The firmware image is available within the Lifecycle Controller. Re-installing Server Component Firmware Using Web Interface To reinstall a server component firmware: 1 In the left pane, click Server Overview > Update. 2 On the Server Component Update page, in the Choose Update Type section, select Update from File.
BIOS updates are specific to the model of the server. Sometimes, even though a single Network Interface Controller (NIC) device is selected for firmware update on a server, the update may get applied to all the NIC devices on the server. This behavior is inherent in the Lifecycle Controller functionality and particularly the programming contained with the Dell Update Package (DUP). Currently, Dell Update Packages (DUP) that are less than 48 MB in size are supported.
Server Component Single Click Update Using Network Share The Servers or server component update from a network share using Dell Repository Manager and Dell PowerEdge VRTX chassis integration simplifies the update by using customized bundle firmware, so that you can deploy faster and more easily. Update from a network share provides flexibility to update all the 12G server components at the same time with a single catalog either from a CIFS or from a NFS.
NOTE: Click Collapse against a slot to collapse the component and device firmware details for the specific slot. Alternatively, to view all the details again, click Expand. 6 In the Component/Device Firmware Inventory section, select the check box against Select/Deselect All to select all the supported servers. Alternatively, select the check box against the server for which you want to update the server component firmware. You cannot select individual components for the server.
Platform M630 M830 M640 Server Component Previous Component Version (N-1 Version) Updated Component Version (N Version) BIOS 2.6.1 2.6.1 iDRAC 2.52.52.52 2.60.60.60 Lifecycle Controller 2.52.52.52 2.60.60.60 Diagnostics 4239.44 4239A36 BIOS 2.6.0 2.7.1 iDRAC 2.52.52.52 2.60.60.60 Lifecycle Controller 2.52.52.52 2.60.60.60 Diagnostics 4239.44 4239A36 BIOS 2.5.4 2.7.1 iDRAC 3.15.15.15 3.21.21.21 Lifecycle Controller 3.15.15.15 3.21.21.
To update the storage components: 1 In the left pane, click Chassis Overview > Storage > Update. 2 On the Storage Component Update page, click Browse. The Choose to Upload File dialog box is displayed 3 Browse to location where the required DUP file was downloaded and saved from the Dell support Site and select the DUP file, and click Open. 4 Click Upload. The DUP file name and path are displayed in the Browse field. The DUP is uploaded to CMC.
5 Viewing Chassis Information and Monitoring Chassis and Component Health You can view information and monitor the health of the following: • Active and standby CMCs • All severs and individual servers • IO Module • Fans • Power Supply Units (PSUs) • Temperature sensors • Hard disk drives • LCD assembly • Storage controllers • PCIe devices NOTE: The health of external components impacts the overall health of the storage component with existing storage health and integrated storage compone
To view the chassis health, click Chassis Overview. The system displays the overall health status of the chassis, active and standby CMCs, server modules, IO Module (IOM), fans, blowers, power supply units (PSUs), LCD assembly, storage controller, and PCIe devices. Detailed information about each component is displayed when you click that component. In addition, the latest events in the CMC Hardware Log are also displayed. For more information, see the Online Help.
Icon Description A server is present, but reporting a noncritical error. A server is present, but reporting a critical error. A server is not present. Table 15. Server Icon States in 14th generation systems Icon Description A server is present, turned on, and is operating normally. A server is present, but turned off. A server is present, but reporting a noncritical error. A server is present, but reporting a critical error.
Icon Description A server is not present. NOTE: By default, the server state icons for Dell's 13th generation PowerEdge systems are displayed if, you insert a 14th generation PowerEdge server when the chassis is turned off.
NOTE: Quick links for Power Off Server and Graceful Shutdown are displayed only if the server power state is On. If the server power state is Off, the quick link for Power On Server is displayed.
Blower SPERC Slot External Shared PERC 8 card slot IOM Slot • Speed • Warning Threshold • Fans Status • PWM (% of Max) • Critical Threshold • Fan Configuration • Enhanced Cooling Mode • Installed • Model • Controller Status • Assigned • Controller Setup • Installed • Assigned • Server Slot Mapping • Vendor ID • Device ID • Slot Type • Allocated Power • Fabric • Power Status • Model • PCIe Slot Status • PCIe Setup • Server Slot Mapping • Vendor ID • De
• Click Chassis Overview. The Chassis Health page displays a graphical overview of all the servers installed in the chassis. Server health status is indicated by the overlay of the server subgraphic. For more information about the chassis health, see the Online Help. • Click Chassis Overview > Server Overview. The Servers Status page provides an overview of the servers in the chassis. For more information, see the Online Help.
• A fan stops functioning. • A fan is removed from the chassis. NOTE: During updates of CMC or iDRAC firmware on a server, some or all of the fan units in the chassis rotates at 100%. This is normal. To view the health status of fans, in the CMC Web interface, do any of the following: 1 Go to Chassis Overview. The Chassis Health page is displayed. The lower section of chassis graphics provides the left view of the chassis and contains the health status of the fans.
When enabled, ECM will only increase the cooling capacity to the server slots within the chassis. It is also important to note that ECM is not designed to provide increased cooling to the servers at all times. Even with ECM enabled, the higher blower speeds will only be seen when the increased cooling is needed. Examples of this situation include high levels of server utilization or stress, and high ambient temperatures. By default, ECM is off.
Viewing Information and Health Status of Temperature Sensors To view the health status of the temperature sensors: In the left pane, click Chassis Overview > Temperature Sensors. The Temperature Sensors Status page displays the status and readings of the temperature probes on the entire chassis (chassis and servers). For more information, see Online Help. NOTE: The temperature probes value cannot be edited. Any change beyond the threshold generates an alert that causes the fan speed to vary.
6 Configuring CMC Chassis Management Controller enables you to configure properties, set up users, and alerts to perform remote management tasks. Before you begin configuring the CMC, you must first configure the CMC network settings to allow CMC to be managed remotely. This initial configuration assigns the TCP/IP networking parameters that enable access to the CMC. For more information, see Setting Up Initial Access to CMC. You can configure CMC using Web interface or RACADM.
Viewing and Modifying CMC Network LAN Settings The LAN settings, such as community string and SMTP server IP address, affect both the CMC and the external settings of the chassis. If you have two CMCs (active and standby) on the chassis that are connected to the network, the standby CMC automatically assumes the network settings of the active CMC in the event of failover. When IPv6 is enabled at boot time, three router solicitations are sent after every four seconds.
To enable or disable the CMC IPv4 addressing, type: racadm config -g cfgLanNetworking -o cfgNicIPv4Enable 1 racadm config -g cfgLanNetworking -o cfgNicIPv4Enable 0 NOTE: The CMC IPv4 addressing is enabled by default. To enable or disable the CMC IPv6 addressing, type: racadm config -g cfgIpv6LanNetworking -o cfgIPv6Enable 1 racadm config -g cfgIpv6LanNetworking -o cfgIPv6Enable 0 NOTE: Note the following: • There is a 30 seconds delay between changing a network setting and actually applying it.
To disable the DHCP for DNS address feature and specify the static preferred and alternate DNS server addresses, type: racadm config -g cfgLanNetworking -o cfgDNSServersFromDHCP 0 To disable the DHCP for DNS address feature for IPv6 and specify the static preferred and alternate DNS server addresses, type: racadm config -g cfgIPv6LanNetworking -o cfgIPv6DNSServersFromDHCP6 0 Setting Static DNS IP addresses NOTE: The static DNS IP addresses settings are not valid unless the DCHP for DNS address feature is d
You can disable auto negotiation and specify the duplex mode and network speed by typing: racadm config -g cfgNetTuning -o cfgNetTuningNicAutoneg 0 racadm config -g cfgNetTuning -o cfgNetTuningNicFullDuplex where: is 0 (half duplex) or 1 (full duplex, default) racadm config -g cfgNetTuning -o cfgNetTuningNicSpeed where: is 10 or 100 (default).
5 Click Apply to save your settings. Configuring IP Range Attributes Using RACADM You can configure the following IP Range attributes for CMC using RACADM: • IP range checking feature • Range of IP addresses that you want to block from accessing CMC • IP Range Mask that you want to block from accessing CMC IP filtering compares the IP address of an incoming login to the IP address range that is specified.
For example: racadm config -g cfgLanNetworking -o cfgNicVLanPriority 7 You can also specify both the VLAN ID and the VLAN priority with a single command: racadm setniccfg -v For example: racadm setniccfg -v 1 7 4 To remove the CMC VLAN, disable the VLAN capabilities of the external chassis management network: racadm config -g cfgLanNetworking -o cfgNicVLanEnable 0 You can also remove the CMC VLAN using the following command: racadm setniccfg -v Configuring Virtual LAN Tag Propert
The following features/applications support FIPS. • • • • • • • • Web GUI RACADM WSMan SSH v2 SMTP Kerberos NTP Client NFS NOTE: SNMP is not FIPS-compliant. In FIPS mode, all SNMP features except Message Digest algorithm version 5 (MD5) authentication work. Enabling FIPS Mode Using CMC Web Interface To enable FIPS: 1 In the left pane, click Chassis Overview. The Chassis Health page is displayed. 2 On the menu bar, click Network. The Network Configuration page is displayed.
accepting and responding to secure HTTP requests from clients. This service is required by the web interface and remote RACADM CLI tool for communicating with CMC. If the web server resets, wait at least one minute for the services to become available again. A web server reset usually happens as a result of any of the following events: • • • • Network configuration or network security properties are changed through the CMC web user interface or RACADM.
# # # # # # # # cfgSsnMgtWebServerActiveSessions=N/A cfgSsnMgtWebServerTimeout=N/A cfgSsnMgtSSHMaxSessions=N/A cfgSsnMgtSSHActiveSessions=N/A cfgSsnMgtSSHTimeout=N/A cfgSsnMgtTelnetMaxSessions=N/A cfgSsnMgtTelnetActiveSessions=N/A cfgSsnMgtTelnetTimeout=N/A Configuring CMC Extended Storage Card You can enable or repair the optional Removable Flash Media for use as an extended non-volatile storage. Some CMC features depend on extended nonvolatile storage for their operation.
Adding Members To Chassis Group After the Chassis Group is set up, to add members to the group: 1 Log in with chassis administrator privileges to the leader chassis. 2 Select the lead chassis in the tree. 3 Click Setup > Group Administration. 4 Under Group Management, enter the member’s IP address or DNS name in the Hostname/IP Address field. 5 In the User Name field, enter a user name with chassis administrator privileges for the member chassis.
Disabling an Individual Member at the Member Chassis Sometimes a member cannot be removed from a group by the lead chassis. This can happen if network connectivity to the member is lost. To remove a member from a group at the member chassis: 1 Log in with chassis administrator privileges to the member chassis. 2 In the left pane, click Chassis Overview > Setup > Group Administration. 3 Select None, and then click Apply.
If On-Change Propagation is selected, the member chassis take on the properties of the leader. If Manual Propagation is selected, click Propagate whenever you want to propagate the chosen settings to member chassis. For more information on propagation of leader chassis properties to member chassis, see the Online Help. Server Inventory for MCM group A group is a lead chassis that has 0 to 8 chassis group members.
Data Field Example Slot Name SLOT-01 Host Name Corporate Webserver NOTE: Requires a Server Administrator agent running on the Server; otherwise shown as blank. Operating System Windows Server 2008 NOTE: Requires a Server Administrator agent running on the Server; otherwise shown as blank. Model PowerEdgeM610 Service Tag 1PB8VF1 Total System Memory 4.0 GB NOTE: Requires VRTX CMC 1.0 (or later) on member; otherwise shown as blank. # of CPUs 2 NOTE: Requires VRTX CMC 1.
Viewing Selected Chassis Inventory Using Web Interface To view the selected chassis inventory using CMC Web interface: 1 In the system tree, select Group. click Properties > Firmware Version. The Chassis Group Firmware Version page displays all the chassis in the group. 2 In the Select a Chassis section, select the member chassis for which you want to view the inventory.
To save the current chassis configuration, perform the following tasks: 1 Go to the Chassis Configuration Profiles page. In the Save and Backup > Save Current Configuration section, enter a name for the profile in the Profile Name field. NOTE: While saving the current chassis configuration, the standard ASCII extended character set is supported. However, the following special characters are not supported: “, ., *, >, <, \, /, :, and | 2 Select one of the following profile types from the Profile Type opti
Applying Chassis Configuration Profiles You can apply chassis configuration to the chassis if the chassis configuration profiles are available as stored profiles on the network share. To initiate a chassis configuration operation, you can apply a stored profile to a chassis. To apply a profile to a chassis, perform the following tasks: 1 Go to the Chassis Configuration Profiles page. In the Stored Profiles section, select the stored profile that you want to apply. 2 Click Apply Profile.
Configuring Multiple CMCs Using RACADM Using RACADM, you can configure one or more CMCs with identical properties. When you query a specific CMC card using its group ID and object ID, RACADM creates the racadm.cfg configuration file from the retrieved information. By exporting the file to one or more CMCs, you can configure your controllers with identical properties in a minimal amount of time.
Follow these guidelines when you create a .cfg file: • If the parser encounters an indexed group, it is the value of the anchored object that differentiates the various indexes. The parser reads in all of the indexes from the CMC for that group. Any objects within that group are modifications when the CMC is configured. If a modified object represents a new index, the index is created on the CMC during configuration. • You cannot specify a desired index in a .cfg file. Indexes may be created and deleted.
You cannot specify which index is used. If the index already exists, it is either used or the new entry is created in the first available index for that group. The racadm getconfig -f .cfg command places a comment in front of index objects, allowing you to see the included comments.
# comment, the rest of this line is ignored cfgNicGateway=10.35.9.1 The command racadm config -f .cfg parses the file and identifies any errors by line number. A correct file updates the proper entries. Additionally, you can use the same getconfig command from the previous example to confirm the update. Use this file to download company-wide changes or to configure new systems over the network with the command, racadm getconfig -f .cfg.
2 To import the chassis configuration profiles from NFS network share, type the following: racadm set –f clone.xml –t xml –l xx.xx.xx.xx:/PATH You can import chassis configuration profiles from network share through remote RACADM interface. 1 To import the chassis configuration profiles from CIFS network share, type the following: racadm –r xx.xx.xx.xx –u USERNAMECMC –p PASSWORDCMC set –f clone.xml –t xml –l // xx.xx.xx.
The Sessions page displays the session ID, username, IP address, and session type. For more information about these properties, see the Online Help. 2 To end the session, click Terminate for a session. Viewing and Ending CMC Sessions Using RACADM You must have administrator privileges to end CMC sessions using RACADM. To view the current user sessions, use the getssninfo command. To end a user session, use the closessn command.
7 Configuring Servers You can configure the following settings of a server: • Slot Names • iDRAC Network Settings • DRAC Virtual LAN Tag Settings • First Boot Device • Server FlexAddress • Remote File Share • BIOS Settings Using Server Clone Topics: • Configuring Slot Names • Configuring iDRAC Network Settings • Configuring iDRAC Virtual LAN Tag Settings • Setting First Boot Device • Configuring Server FlexAddress • Configuring Remote File Share • Configuring Profile Settings Usin
The slot name setting in the web interface resides on CMC only. If a server is removed from the chassis, the slot name setting does not remain with the server. The slot name setting in the CMC web interface always overrides any change you make to the display name in the iDRAC interface. To edit a slot name using the CMC Web interface: 1 In the left pane, go to Chassis Overview > Server Overview > Setup > Slot Names. 2 On the Slot Names page, edit the slot name, in the Slot Name field.
Setting Description . Set iDRAC Root Password on Server Insertion Select the option to change iDRAC root password to match the value provided in the iDRAC Root Password field, when a server is inserted. iDRAC Root Password When the Set iDRAC Root Password on Server Insertion and QuickDeploy Enabled options are selected, this password value is assigned to a server's iDRAC root user password when the server is inserted into a chassis.
3 Click Save QuickDeploy Settings to save the settings. If you have made changes to the iDRAC network setting, click Apply iDRAC Network Settings to deploy the settings to the iDRAC. The QuickDeploy feature only executes when it is enabled, and a server is inserted in the chassis. If Set iDRAC Root Password on Server Insertion and QuickDeploy Enabled are enabled, the user is prompted using the LCD interface to allow or not allow the password change.
NOTE: You must select the Enable LAN option to specify the IPv4 or IPv6 settings. For information about the fields, see the Online Help. 3 To deploy the setting to iDRAC, click Apply iDRAC Network Settings. Any changes made to the QuickDeploy Settings are also saved. The iDRAC Network Settings table reflects future network configuration settings; the values shown for installed servers may or may not be the same as the currently installed iDRAC network configuration settings.
The valid values for are 1–4. For example: racadm setniccfg -m server-1 -v Configuring iDRAC Virtual LAN Tag Settings Using Web Interface To configure Vitual LAN(VLAN) for server: 1 Go to any of the following pages: • In the left pane, click Chassis Overview > Network > VLAN. 2 • In the left pane, click Chassis Overview > Server Overview and click Setup > VLAN. On the VLAN Tag Settings page, in the iDRAC section, enable VLAN for the server(s), set the priority and enter the ID.
Setting First Boot Device For Multiple Servers Using CMC Web Interface NOTE: To set the first boot device for servers, you must have the Server Administrator privileges or Chassis Configuration Administrator privileges, and the iDRAC login privileges. To set the first boot device for multiple servers: 1 In the left pane, click Server Overview > Setup > First Boot Device. A list of servers is displayed.
Configuring Remote File Share The Remote Virtual Media File Share feature maps a file from a share drive on the network to one or more servers through CMC to deploy or update an operating system. When connected, the remote file is accessible similar to a file that you can access on a local server. Two types of media are supported: floppy drives and CD/DVD drives.
• Server must be powered on. You can: • View profile settings on a server or from a saved profile. • Save a profile from a server. • Apply a profile to other servers. • Import stored profiles from a management station or remote file share. • Edit the profile name and description. • Export stored profiles to a management station or remote file share. • Delete stored profiles. • Deploy selected profiles to the target devices using Quick Deploy option.
NOTE: The process to gather the settings runs in the background. Hence, it may take some time before the new profile is displayed. If the new profile is not displayed, check the profile log for errors. Applying Profile Server configuration replication is possible only when server profiles are available as stored profiles in the nonvolatile media on the CMC or stored on the remote share. To initiate a server configuration replication operation, you can apply a stored profile to one or more servers.
NOTE: If the source profile is on the SD card, a message is displayed indicating that if the profile is exported, then the description is lost. Press OK to continue exporting the profile. A message is displayed prompting you to select the destination of the file: • Local or Network Share if the source file is on an SD card. NOTE: The Network Share option is enabled and the details are displayed in the Stored Profiles section only if the network share is mounted and is accessible.
For more information about the displayed settings, see the Online Help. NOTE: The CMC Server Configuration Replication feature retrieves and displays the settings for a specific server, only if the Collect System Inventory on Restart (CSIOR) option is enabled. To enable CSIOR on: • 12th generation servers — After restarting the server, when the company logo is displayed, select F2. On the iDRAC Settings page, in the left pane, click Lifecycle Controller, and then click CSIOR to enable the changes.
Assigning Server Profiles to Slots The Server Profiles page enables you to assign server profiles to slots. To assign a profile to the chassis slots: 1 On the Server Profiles page, click Profiles for QuickDeploy. The current profile assignments are displayed for the slots in the select boxes contained in the Assign Profile column.
– Save boot identity profile templates and customize the boot identity profiles on the network share by editing and including the SAN boot parameters that are used by each server. – Prepare the servers that use initial configuration before applying their Boot Identity profiles. – Apply Boot Identity profiles to each server and boot them from SAN. • Configure one or more spare standby servers for quick recovery.
To apply a profile to a server, perform the following tasks: 1 Go to the Server Profiles page. In the Boot Identity profiles section, select the server on which you want to apply the selected profile. The Select Profile drop-down menu gets enabled. NOTE: The Select Profile drop-down menu displays all available profiles that are sorted by type from the network share. 2 From the Select Profile drop-down menu, select the profile that you want to apply. The Apply Identity option is enabled.
The Import Profile section is displayed. 2 Click Browse to access the profile from the required location and then click Import Profile. For more information, see the CMC Online Help. Exporting Boot Identity Profiles You can export a boot identity profiles that are saved on the network share to a specified path on a management station. To export a stored profile, perform the following tasks: 1 Go to the Server Profiles page.
To create a MAC pool: 1 Go to the Server Profiles page. In the Boot Identity Profiles > Manage Virtual MAC Address Pool section. 2 Enter the starting MAC address of the MAC address pool in the Starting MAC Address field. 3 Enter the count of the MAC addresses in the Number of MAC Addresses field. 4 Click Create MAC Pool to create the MAC address pool.
To remove MAC addresses from the network share: 1 Go to the Server Profiles page. In the Boot Identity Profiles > Manage Virtual MAC Address Pool section, select the active MAC address(es) that you want to deactivate. 2 Click Deactivate MAC Address(es). Launching iDRAC using Single Sign-On CMC provides limited management of individual chassis components, such as servers.
Launching Remote Console You can launch a Keyboard-Video-Mouse (KVM) session directly on the server. The remote console feature is supported only when all of the following conditions are met: • The chassis power is on. • Servers that support iDRAC7 and iDRAC8. • The LAN interface on the server is enabled. • The host system is installed with JRE (Java Runtime Environment) 6 Update 16 or later. • The browser on host system allows pop-up windows (pop-up blocking is disabled).
8 Configuring CMC To Send Alerts You can set alerts and actions for certain events that occur on the chassis. An event is generated when a device or service’s status has changed or an error condition is detected. If an event matches an event filter and you have configured this filter to generate an alert message (email alert or SNMP trap), then an alert is sent to one or more configured destinations such as email address, IP address, or an external server.
NOTE: To apply chassis events configuration changes, you must have the Alert Configuration privilege. 1 In the left pane, click Chassis Overview > Alerts.
on the Chassis Overview > Network > Services page is the community string that management stations use to query the SNMP daemon on CMC. • 3 Under Enabled , select the option corresponding to the destination IP to enable the IP address to receive the traps. You can specify up to four IP addresses. Click Apply to save the settings. 4 To test whether the IP address is receiving the SNMP traps, click Send in the Test SNMP Trap column. The IP alert destinations are configured.
where is a value between 1–4 representing the alert destination you want to test. If you are not sure about the index number, run the following command: racadm getconfig -g cfgTraps -i Configuring Email Alert Settings When CMC detects a chassis event, such as an environmental warning or a component failure, it can be configured to send an email alert to one or more email addresses.
where is a value between 1–4. CMC uses the index number to distinguish up to four destination email addresses that can be configured. 5 Specify a destination email address to receive the email alerts: racadm config -g cfgEmailAlert -o cfgEmailAlertAddress -i where is a valid email address, and is the index value you specified in step 4.
9 Configuring User Accounts and Privileges You can set up user accounts with specific privileges (role-based authority) to manage your system with CMC and maintain system security. By default, CMC is configured with a local administrator account. The default user name is rootand the password is calvin. As an administrator, you can set up user accounts to allow other users to access the CMC.
Privilege Description • • Provides services to the chassis, such as date and time, firmware update, and CMC reset. Is associated with the chassis, such as slot name and slot priority. Although these properties apply to the servers, they are strictly chassis properties relating to the slots rather than the servers themselves. For this reason, slot names and slot priorities can be added or changed whether or not servers are present in the slots.
Privilege Description Configure Users: • • Set iDRAC root password iDRAC reset Server Control Administrator: • • • • • Power on Power off Power cycle Graceful shutdown Server Reboot Test Alert User User can send test alert messages. Debug Command Administrator User can execute system diagnostic commands. Fabric A Administrator User can set and configure the Fabric A IOM.
User Group Privileges Granted • • • • • • None Clear Logs Administrator Chassis Control Administrator (Power commands) Server Administrator Test Alert User Debug Command Administrator Fabric A Administrator No assigned permissions Table 22.
To add and configure local CMC users: 1 In the left pane, click Chassis Overview, and then click User Authentication. 2 On the Local Users page, in the User ID column, click a user ID number. The User Configuration page is displayed. NOTE: User ID 1 is the root user account that is shipped by default with a CMC. This cannot be changed. 3 Enable the user ID and specify the user name, password, and access privileges for the user. For more information about the options, see the Online Help.
The following example describes how to add a new user named "John" with a "123456" password and login privileges to the CMC.
NOTE: On the following Operating Systems, you can recognize the users of CMC users by using Active Directory. • Microsoft Windows 2000 • Microsoft Windows Server 2003 • Microsoft Windows Server 2008 You can configure user authentication through Active Directory to log in to the CMC. You can also provide role-based authority, which enables an administrator to configure specific privileges for each user.
NOTE: The Bit Mask values are used only when setting Standard Schema with the RACADM. NOTE: For more information about user privileges, see Types of Users. Configuring Standard Schema Active Directory To configure CMC for an Active Directory login access: 1 On an Active Directory server (domain controller), open Active Directory Users and Computers Snap-in. 2 Using the CMC Web interface or RACADM: a b 3 Create a group or select an existing group. Configure the role privileges.
11 Log out and then log in to CMC to complete the CMC Active Directory configuration. 12 Select Chassis in the system tree, and navigate to the Network tab. The Network Configuration page is displayed. 13 Under Network Settings, if Use DHCP (for CMC Network Interface IP Address) is selected, select Use DHCP to obtain DNS server address. To manually enter a DNS server IP address, clear Use DHCP to obtain DNS server addresses and type the primary and alternate DNS server IP addresses.
In this case, you must upload the CA certificate using the following RACADM command: racadm sslcertupload -t 0x2 -f NOTE: If certificate validation is enabled, specify the Domain Controller Server addresses and the Global Catalog FQDN. Make sure that DNS is correctly configured. Extended Schema Active Directory Overview Using the extended schema solution requires the Active Directory schema extension.
You can create as many or as few association objects as required. However, you must create at least one Association Object, and you must have one RAC device object for each RAC (CMC) on the network that you want to integrate with Active Directory. The Association Object allows as many or as few users and/or groups as well as RAC Device Objects. However, the Association Object only includes one Privilege Object per Association Object.
• LDIF script file If you use the LDIF script file, the Dell organizational unit is not added to the schema. The LDIF files and Dell Schema Extender are located on your Dell Systems Management Tools and Documentation DVD in the following respective directories: • DVDdrive:\SYSMGMT\ManagementStation\support\OMActiveDirectory_Tools\Remote_Management_Advanced\LDIF_Files • :\SYSMGMT\ManagementStation\support\OMActiveDirector y_Tools\Remote_Management_Advanced\Schema Extender To use the LDIF file
Table 26. delliDRACAssociationObject Class OID 1.2.840.113556.1.8000.1280.1.7.1.2 Description Represents the Dell Association Object. The Association Object provides the connection between the users and the devices. Class Type Structural Class SuperClasses Group Attributes dellProductMembers dellPrivilegeMember Table 27. dellRAC4Privileges Class OID 1.2.840.113556.1.8000.1280.1.1.1.3 Description Defines the privileges (Authorization Rights) for CMC device.
OID 1.2.840.113556.1.8000.1280.1.1.1.5 Attributes dellAssociationMembers Table 30. List of Attributes Added to the Active Directory Schema Assigned OID/Syntax Object Identifier Single Valued Attribute: dellPrivilegeMember FALSE Description: List of dellPrivilege objects that belong to this attribute. OID: 1.2.840.113556.1.8000.1280.1.1.2.1 Distinguished Name: (LDAPTYPE_DN 1.3.6.1.4.1.1466.115.121.1.
Assigned OID/Syntax Object Identifier Single Valued Boolean (LDAPTYPE_BOOLEAN 1.3.6.1.4.1.1466.115.121.1.7) Attribute: dellIsTestAlertUser TRUE Description: TRUE if the user has Test Alert User rights on the device. OID: 1.2.840.113556.1.8000.1280.1.1.2.10 Boolean (LDAPTYPE_BOOLEAN 1.3.6.1.4.1.1466.115.121.1.7) Attribute: dellIsDebugCommandAdmin TRUE Description: TRUE if the user has Debug Command Admin rights on the device. OID: 1.2.840.113556.1.8000.1280.1.1.2.11 Boolean (LDAPTYPE_BOOLEAN 1.3.6.1.4.
When you install your systems management software using the Dell Systems Management Tools and Documentation DVD, you can extend the Snap-in by selecting the Active Directory Users and Computers Snap-in option during the installation procedure. See the Dell OpenManage Software Quick Installation Guide for additional instructions about installing systems management software. For 64-bit Windows Operating Systems, the Snap-in installer is located at :\SYSMGMT\ManagementStation\support\OMActiveDirect o
Adding Objects To Association Object Using the Association Object Properties window, you can associate users or user groups, privilege objects, and RAC devices or RAC device groups. If your system is running on Microsoft Windows 2000 operating system or later version, use Universal Groups to span domains with your user or RAC objects. You can add groups of Users and RAC devices. Adding Users Or User Groups To add users or user groups: 1 Right-click the Association Object and select Properties.
– Specify a Domain — enter the domain name to use for the DNS lookup • 4 To enable CMC to use the specified Active Directory Domain Controller server addresses, select Specify Domain Controller Addresses . These are the addresses of the domain controllers where the CMC device object and the associated objects are located. Click Apply to save the settings. NOTE: You must apply the settings before continuing. If you do not apply the settings, the settings are lost when you navigate to the next page.
To disable the certificate validation during an handshake (optional): racadm config -g cfgActiveDirectory -o cfgADCertValidationEnable 0 NOTE: In this case, you do not have to upload a CA certificate.
Authorization Of LDAP Users To authorize a user: 1 Search each configured group for the user's domain name within the member or uniqueMember attributes. An administrator can configure a user domain. 2 For every user group that the user belongs to, give the user appropriate user access rights and privileges. Configuring Generic LDAP Directory Service Using CMC Web Interface To configure the generic LDAP directory service: NOTE: You must have the Chassis Configuration Administrator privilege.
Configuring Generic LDAP Directory Service Using RACADM To configure the LDAP directory service, use the objects in cfgLdap and cfgLdapRoleGroup RACADM groups. There are many options to configure LDAP logins. In most of the cases, some options can be used with their default settings. NOTE: It is highly recommended to use the racadm testfeature -f LDAP command to test the LDAP settings for first time setups. This feature supports both IPv4 and IPv6.
10 Configuring CMC For Single Sign-On Or Smart Card Login This section provides information to configure CMC for Smart Card login and Single Sign-On (SSO) login for Active Directory users. SSO uses Kerberos as an authentication method allowing users, who have signed in as an automatic- or single sign-on to subsequent applications such as Exchange.
• The DNS server reverse zone must have an entry for the Active Directory server and CMC. Client Systems • For only Smart Card login, the client system must have the Microsoft Visual C++ 2005 redistributable. For more information see www.microsoft.com/downloads/details.aspx?FamilyID= 32BC1BEEA3F9-4C13-9C99-220B62A191EE&displaylang=en • For Single Sign-On or smart card login, the client system must be a part of the Active Directory domain and Kerberos Realm.
For information about configuring CMC for Extended Schema Active Directory, see Extended Schema Active Directory Overview. Configuring Browser For SSO Login Single Sign-On (SSO) is supported on Internet Explorer versions 6.0 and later, and Firefox versions 3.0 and later. NOTE: The following instructions are applicable only if CMC uses Single Sign-On with Kerberos authentication.
NOTE: For information about the options, see the Online Help. 1 2 While configuring Active Directory to set up user account, perform the following additional steps: • Upload the keytab file. • To enable SSO, select the Enable Single Sign-On option. • To enable smart card login, select the Enable Smart-Card Login option. NOTE: If these two options are selected, all command line out-of-band interfaces, including secure shell (SSH), Telnet, Serial, and remote RACADM remain unchanged . Click Apply.
11 Configuring CMC to Use Command Line Consoles This section provides information about the CMC command line console (or serial/Telnet/Secure Shell console) features, and explains how to set up the system so that you can perform systems management actions through the console. For information about using the RACADM commands in CMC through the command line console, see the Chassis Management Controller for PowerEdge VRTX RACADM Command Line Reference Guide.
Using Telnet Console With CMC You can have up to four Telnet sessions with CMC at a time. If your management station is running Microsoft Windows XP or Microsoft Windows Server 2003, you may experience an issue with the characters in a CMC Telnet session. This issue may occur as a frozen login where the return key does not respond and the password prompt does not appear. To fix this issue, download hotfix 824810 from support.microsoft.com.
Table 32.
Generating Public Keys for Systems Running Windows Before adding an account, a public key is required from the system that accesses the CMC over SSH. There are two ways to generate the public/private key pair: using PuTTY Key Generator application for clients running Windows or ssh-keygen CLI for clients running Linux. This section describes simple instructions to generate a public/private key pair for both applications. For additional or advanced usage of these tools, see the application Help.
• To log in to the CMC, the user must be service. Users of the other categories do have access to the public keys entered using the sshpkauth command. Viewing Public Keys To view the public keys that you have added to the CMC, type: racadm sshpkauth –i svcacct –k all –v To view one key at a time, replace all with a number from 1 – 6.
Configuring Minicom Version 2.0 NOTE: For best results, set the cfgSerialConsoleColumns property to match the number of columns. Be aware that the prompt consumes two characters. For example, for an 80-column terminal window: racadm config –g cfgSerial –o cfgSerialConsoleColumns 80. 1 If you do not have a Minicom configuration file, go to the next step. If you have a Minicom configuration file, type minicom, and then go to step 12. 2 At the Linux command prompt, type minicom -s.
• iDRAC Web interface serial console redirection feature. • iDRAC Serial Over LAN (SOL) functionality. In a serial, Telnet, SSH console, CMC supports the connect command to establish a serial connection to a server or I/O module. The server serial console contains both the BIOS boot and setup screens, and the operating system serial console. For the I/O module, the switch serial console is available. There is a single IOM on the chassis.
By default, the Serial communication in the BIOS is turned off. To redirect host text console data to Serial over LAN, you must enable console redirection through COM1. To change the BIOS setting: 1 Turn on the managed server. 2 Press the key to enter the BIOS setup utility during POST. 3 Go to Serial Communication , and then press .
# #boot=/dev/sda default=0 timeout=10 #splashimage=(hd0,2)/grub/splash.xpm.gz serial --unit=1 --speed=57600 terminal --timeout=10 serial title Red Hat Linux Advanced Server (2.4.9-e.3smp) root (hd0,0) kernel /boot/vmlinuz-2.4.9-e.3smp ro root= /dev/sda1 hda=ide-scsi console=ttyS0 console= ttyS1,57600 initrd /boot/initrd-2.4.9-e.3smp.img title Red Hat Linux Advanced Server-up (2.4.9-e.3) root (hd0,00) kernel /boot/vmlinuz-2.4.9-e.3 ro root=/dev/sda1 initrd /boot/initrd-2.4.9-e.3.
l3:3:wait:/etc/rc.d/rc 3 l4:4:wait:/etc/rc.d/rc 4 l5:5:wait:/etc/rc.d/rc 5 l6:6:wait:/etc/rc.d/rc 6 # Things to run in every runlevel. ud::once:/sbin/update # Trap CTRL-ALT-DELETE ca::ctrlaltdel:/sbin/shutdown -t3 -r now # When our UPS tells us power has failed, assume we have a few # minutes of power left. Schedule a shutdown for 2 minutes from now. # This does, of course, assume you have power installed and your # UPS is connected and working correctly.
12 Using FlexAddress and FlexAdress Plus This section provides information about FlexAddress, FlexAddress Plus, and configuring. NOTE: An Enterprise License must be installed on the CMC to use the Flexaddress feature.
pwwn_mac.xml file. This clear text XML file on the SD card contains an XML tag mac_start that is the first starting hex MAC address that is used for this unique MAC address range. The mac_count tag is the total number of MAC addresses that the SD card allocates. The total MAC range allocated can be determined by: + - 1 = For example: (starting_mac)00188BFFDCFA + (mac_count)0xCF - 1 = (ending_mac)00188BFFDDC8 .
Status Message Actions the SD feature card installed is the active CMC and not the standby CMC. The feature card inserted is valid and contains the following feature(s) FlexAddress: bound. No action required. The feature card inserted is valid and contains the following feature(s) FlexAddress: bound to another chassis, svctag=ABC1234, SD card SN = 1122334455. Remove the SD card; locate and install the SD card for the current chassis.
NOTE: By using the racresetcfg subcommand, you can reset the Flex Address of a CMC to its factory-default setting, which is “disabled”. The RACADM syntax is: racadm racresetcfg -c flex For more information about the FlexAddress-related RACADM commands and data about the other factory-default properties, see the Chassis Management Controller for PowerEdge VRTX RACADM Command Line Reference Guide available at dell.com/ cmcmanuals. The server must be turned off before you begin configuration.
where, = A or iDRAC and = 0 or 1 0 is disable and 1 is enable. To enable or disable slots, use the following RACADM command: racadm setflexaddr [-i where, = 1 or 4 and = 0 or 1 0 is disable and 1 is enable. For more information about the setflexaddr command, see the Chassis Management Controller for PowerEdge VRTX RACADM Command Line Reference Guide.
• Protocol that is being used on the NIC Adapter port. For example, LAN, ISCI, and FCoE. • Fibre Channel World Wide Name (WWN) configuration and Media Access Control (MAC) addresses of a slot in the chassis. • MAC address assignment type and the current active address type — Server assigned, FlexAddress, or I/O Identity MAC. A black check mark indicates the active address type, either server-assigned, chassis-assigned, or remote assigned.
For information about the fields, see the Online Help. Viewing Advanced WWN or MAC Address Information Using Web Interface To view WWN/MAC Address Information for each server slot or all servers in a chassis, in the advanced mode: 1 Click Server Overview > Properties > WWN/MAC The WWN/MAC Summary page displays the WWN/MAC Address Information. 2 From the View drop-down menu, select Advanced, to view the WWN/MAC Addresses attributes in detailed view.
To display the iSCSI MAC for a specific server, use the following RACADM command: racadm getmacaddress [-m [-x]] [-t iscsi] To display the user-defined MAC and WWN address, use the following RACADM command: racadm getmacaddress -c io-identity racadm getmacaddress -c io-identity -m server -2 To display the console assigned MAC/WWN of all LOMs or mezzanine cards, use the following RACADM command: racadm getmacaddress -c all To display the chassis assigned WWN/MAC address, use the following RACADM com
Situation Command Output Guest user attempts to set FlexAddress on slots/fabrics. $racadm setflexaddr [-f ] ERROR: Insufficient user privileges to perform operation $racadm setflexaddr [-i ] $racadm feature -d -c flexaddress ERROR: Unable to deactivate the feature because the chassis is powered ON Guest user tries to deactivate the feature $racadm feature -d -c flexaddress on the chassis.
product if you retain no copies and the recipient agrees to the terms hereof. Any transfer must include the most recent update and all prior versions. You may not reverse engineer, decompile or disassemble the Software. If the package accompanying your computer contains compact discs, 3.5" and/or 5.25" disks, you may use only the disks appropriate for your computer.
This license is effective until terminated. It terminates upon the conditions set forth above or if you fail to comply with any of its terms. Upon termination, you agree that the Software and accompanying materials, and all copies thereof, is destroyed. This agreement is governed by the laws of the State of Texas. Each provision of this agreement is severable.
13 Managing Fabrics The chassis supports a fabric type, which is Fabric A. Fabric A is used by the single I/O Module, and is always connected to the on-board Ethernet adapters of the servers. The chassis has only one I/O module (IOM), where the IOM is a pass-through or switch module. The I/O Module is classified as group A. Chassis IOM uses a discrete data path called Fabric, and it is named A. The Fabric A supports only Ethernet.
NOTE: For Ethernet switches, the in-band (VLAN1) and out-of-band management IP addresses cannot be the same, or cannot be on the same network. This results in the out-of-band IP address in being not set. See the IOM documentation for the default in-band management IP address. NOTE: Do not configure I/O module network settings for Ethernet pass-through and Infiniband switches.
14 Managing and Monitoring Power The PowerEdge VRTX chassis is the most power-efficient modular server enclosure. It is designed to include highly efficient power supplies and fans, has an optimized layout for the air to flow more easily through the system, and contains power-optimized components throughout the enclosure.
• Assigning Priority Levels To Servers Using CMC Web Interface • Assigning Priority Levels To Servers Using RACADM • Viewing Power Consumption Status • Viewing Power Budget Status Using CMC Web Interface • Redundancy Status and Overall Power Health • Configuring power budget and redundancy • Executing Power Control Operations • Executing Power Control Operations on a Server • Executing Power Control Operations for Multiple Servers Using CMC Web Interface • Executing Power Control Operatio
Power Supply Redundancy Policy The power supply redundancy policy is useful when redundant power grids are not available, but you may want to be protected against a single PSU failure bringing down your servers in a modular enclosure. The highest capacity PSU is kept in online reserve for this purpose. This forms a Power Supply redundancy pool. PSUs beyond those required for power and redundancy are still available and is added to the pool in the event of a failure.
NOTE: With DPSE in enabled state, if power demand increases in both the two Power Redundancy policy modes, the standby PSUs are brought Online to reclaim power. Default Redundancy Configuration As shown in the table here, the default redundancy configuration for a chassis depends on the number of PSUs that it contains. Table 37.
When a server is turned on in an enclosure, the iDRAC software reestimates the power requirements and requests a subsequent change in the power envelope. CMC supplies the requested power to the server, and the allocated wattage is subtracted from the available budget. After the server is granted a power request, the server's iDRAC software continuously monitors the actual power consumption. On the basis of actual power requirements, the iDRAC power envelope may change over a period of time.
enough power to run at their maximum performance or they may not even power on at all, depending on how low the system input power cap is set and the server power requirements. If an administrator manually powers on the low priority server modules before the higher priority ones, then the low priority server modules are the first modules to have their power allocation lowered down to the minimum value, in order to accommodate the higher priority servers.
Viewing Power Consumption Status Using RACADM To view power consumption status using RACADM: Open a serial/Telnet/SSH text console to CMC, log in, and type: racadm getpminfo AC Power Recovery If the AC power supply of a system is disrupted, the chassis is restored to the previous power state before the AC power loss. The restoration to the previous power state is the default behavior.
Power Management After PSU Failure When an insufficient-power event occurs, such as a PSU failure, CMC reduces power supply to the servers . After reducing the power, CMC reevaluates the power needs of the chassis. If power requirements are still not met, CMC turns off the lower priority servers. However, this is done on the basis of power redundancy policy that you set on your CMC. A redundant server can tolerate the loss of power without impacting the performance of the servers.
If the subsequent power capacity or the user power capacity is greater than the server allocations, servers have degraded performance or, in an extrement case, servers may be turned off. Both conditions are in reverse-priority order; that is, the low-priority servers are turned off first. The following table provides the firmware response to a PSU turnoff, or removal as it applies to various PSU redundancy configurations. Table 39.
Configuring power budget and redundancy You can configure the power budget, redundancy, and dynamic power of the entire chassis (chassis, servers, I/O module, KVM, CMC, and power supplies), which uses four power supply units (PSUs). The power management service optimizes power consumption and reallocates power to different modules based on the requirement.
Server Power Reduction to Maintain Power Budget CMC reduces power allocations of low-priority servers, when additional power is required to maintain the system power consumption within the user-configured System Input Power Cap. For example, when a new server is engaged, CMC may decrease power to lowpriority servers to allow more power for the new server.
When the Maximum Power Conservation Mode is enabled, the CMC sets the System Input Power Capacity to the maximum that the chassis can handle. CMC does not allow power to exceed the highest capacity. However, PM3 handles all other power capacity limitations. When PM3 management of power is disabled, the CMC reverts to the server priority settings before the external management was enabled. NOTE: When PM3 management is disabled, CMC does not revert to the earlier setting of the maximum chassis power.
For example, the following command sets the maximum power budget to 4800 Watt: racadm config -g cfgChassisPower -o cfgChassisPowerCap 4800 • To enable or disable dynamic PSU engagement, type: racadm config -g cfgChassisPower -o cfgChassisDynamicPSUEngagementEnable where is 0 (disable), 1 (enable). The default is 0.
Executing Power Control Operations on the Chassis CMC enables you to remotely perform several power management actions, such as an orderly shutdown on the entire chassis (chassis, servers, IOM, and PSUs). NOTE: To perform power management actions, you must have the Chassis Configuration Administrator privilege.
The Power Control page is displayed. 2 In the Operations column, from the drop-down menu, select one of the following power control operations for the required servers: • No Operation • Power On Server • Power Off Server • Graceful Shutdown • Reset Server (warm boot) • Power Cycle Server (cold boot) For information about the options, see the Online Help. 3 Click Apply. A dialog box appears requesting for confirmation.
15 Managing Chassis Storage On the Dell PowerEdge VRTX, you can perform the following operations: • View the status of physical disks drives and storage controllers. • View the properties of controllers, physical disk drives, virtual disks, and enclosures. • Set up controllers, physical disk drives, and virtual disks. • Assign virtual adapters. • Troubleshoot controller, physical disk drives, and virtual disks. • Update storage components.
• Cryptographic Erase • Applying Virtual Adapter Access Policy To Virtual Disks • Modifying Virtual Disk Properties Using CMC Web Interface • Enclosure Management Module • Viewing Enclosure Properties Using CMC Web Interface Viewing Status of the Storage Components To view the status of the storage components: 1 In the left pane, click Chassis Overview > Storage > Properties > Storage Overview.
– Correct Firmware on Expanders – Correct Firmware on Chassis Infrastructure – Shared PERCs have the same settings: Indicates whether or not SPERCs have the same settings.
NOTE: • You can map only one virtual adapter to one server at a time. • Without an appropriate license, you can unmap a VA–server assignment, or map the VA to the default serve, only. • The default mapping is VA1–Server Slot 1, VA2–Server Slot 2, VA3–Server Slot 3, and VA4–Server Slot 4. • If full height server is inserted, then the upper slot has the VA mapped to it while the bottom slot is still unmapped. For example, a full height in slot 1 has VA1 assigned to slot 1 and VA3 is still unmapped.
• Provides uptime for all storage applications even when a controller stops functioning. • Provides access to critical functions of the chassis at all times. • Enables server to handle situations when controller stops functioning are becomes faulty. • Makes use of component redundancy Using the fault-tolerant feature of controllers, you can manage the tasks associated with shared storage that are achieved by having an active and passive (peer) controller.
NOTE: If the Controllers are in fault-tolerant mode, then the following information regarding the fault-tolerant status and mode is also displayed: • Fault Tolerant Mode – Shared, Active/Passive • Fault Tolerant Status – Healthy/Normal, or Lost/Degraded • Peer Controller - Indicates the name of controller that acts as the peer (stand-by) in case of a fault-tolerant mode supported by two controllers NOTE: If the peer controller is disabled, the name is displayed as Disabled PERC (Integrated 2) or Disab
The attribute values for the selected controller are updated in the table. 3 Type or select appropriate data, and then click Apply. NOTE: For information about the attributes and other field descriptions, see Online Help. The newly set properties are applied to the selected controllers and the Current Value field displays the updated values for the attributes. Configuring Storage Controller Settings Using RACADM To set up the storage controller by running a RACADM command, use the following syntax.
NOTE: • The chassis must be turned on and all server modules must be turned off before you run the enable or disable commands. The chassis is automatically power cycled as part of this operation. After changing the Shared PERC operation mode, it is recommended to reset the CMC using the Troubleshooting page or the racadm racreset command. • By default if second integrated PERC 8 cards are detected, then the mode displays high availability mode.
◦ Enable RAID Controller — Enables the RAID controller. If the PERC is already disabled, then Enable Raid Controller option is available in the drop-down menu. • Reset Configuration — Select this option to delete virtual drive and unassign all the hot spares attached to the controller. However, this only removes the disks from the configuration and does not delete any data. NOTE: Reset Configuration does not remove any foreign configurations. Use Clear Foreign Configuration to reset.
NOTE: The following attributes are displayed for fault-tolerant mode of integrated shared adapters: • Active controller — Shared PERC8 (Integrated 1) • Redundant/Failover controller — Shared PERC8 (Integrated 2) The following attributes are displayed for fault-tolerant mode of external shared adapters: • Active controller — Shared PERC8 (SPERC Slot 5) • Redundant/Failover controller — Shared PERC8 (SPERC Slot 6) You can also use the following filters to view specific physical disk drive's properties
Viewing Virtual Disk Properties Using CMC Web Interface Make sure that the virtual disks are created. To view the virtual disk properties: 1 In the left pane, click Chassis Overview > Storage > Virtual Disks > Properties. 2 On the Properties page, under the Virtual Disks section, click the properties: . You can also use the following filters to view specific virtual disk • Under Basic Virtual Disks Filter section, from the Controller drop-down menut, select controller name, and then click Apply.
Creating Encryption Key Using CMC Web Interface You can create encryption or security keys for controllers if the encryption key is Unconfigured. To create an encryption key: 1 In the left pane, go to Storage > Controllers > Setup. 2 From the Security Key drop-down, select Create Security Key. A pop-up window is displayed. 3 Enter the security key and password and click OK. 4 On the Controller Setup page, click Apply.
After you delete the encryption key, all the SEDs that are not part of the virtual disks are secure-erased. For more information, see the Online Help. Deleting Encryption Key Using RACADM To delete an encryption key by running a RACADM command, use the following syntax: racadm raid deletesecuritykey:RAID.ChassisIntegrated.1-1 For more information, see the Chassis Management Controller PowerEdge VRTX RACADM Command Line Reference Guide.
Once drives are unlocked, you can import the foreign configuration using the CMC web interface or RACADM. If the controller is power cycled after the unlock and before the import phase, the drives are locked again. If the system has multiple foreign configurations, unlock and import each foreign configuration before unlocking the foreign configuration. The key ID used in unlocking is used only to identify the drives with matching the key ID.
Performing Cryptographic Erase If the physical disk is part of a virtual disk, remove it from the virtual disk before performing cryptographic erase. To perform a cryptographic erase: 1 In the left pane, go to Storage > Physical Disks > Setup. 2 Select the physical disk from which you want to erase the data. 3 From the Physical Disk Actions drop-down, select Cryptographic Erase and click Apply. The Configure Physical Disks page is displayed. A message is displayed prompting you to confirm the action.
Enclosure Management Module Enclosure Management Module (EMM) provides data path and enclosure management tasks for enclosure. EMM monitors and controls the enclosure components and access to the drives. EMM communicates enclosure attributes and states to the host server.
NOTE: The rollup status of the enclosure turns critical when the EMM, PSU, or Fan is removed but the primary Status remains unchanged. After the CMC or chassis is power cycled, the primary status also changes to critical. Viewing Status and Attributes of Enclosure Using RACADM To view the status of the enclosure, use racadm raid get enclosures —o —p Status command. To view the attributes of the enclosure, use racadm raid get enclosures —o command.
Viewing Temperature Probe Status and attributes of the Enclosure Temperature probe status displays the status of the temperature sensors of the enclosure. Sensors contain a status value that is unique from the enclosure. You can have up to four temperature sensors or probes and enclosure firmware creates a status for each sensor. You must have CMC Login privileges to view probe status.
To set the maximum warning threshold of temperature probe in the enclosure, use racadm raid set tempprobes:TempSensor.Embedded.0:Enclosure.External.1-0:RAID.ChassisSlot.6-1 –p MaximumWarningThreshold command. For more information, see the Chassis Management Controller for PowerEdge VRTX RACADM Command Line Reference Guide available at dell.com/support/manuals.
16 Managing PCIe Slots By default, all slots are unmapped. You can do the following: • View the status of all PCIe Slots in the chassis. • Assign or remove an assigned PCIe slot from the servers. Consider the following before assigning a PCIe slot to a server: • An empty PCIe slot cannot be assigned to a server that is turned on. • A PCIe slot with an adapter assigned to a server cannot be assigned to another server if the currently-assigned server (source) is turned on.
• To view the information about one PCIe slot, click Chassis Overview > PCIe Slot > Properties > Status. NOTE: User Interface differentiates the external PCIe slots which contains SPERC (or any shared) devices installed from external PCIE slots with dedicated adapters as these shared devices have different properties.
PCIe Power Ride-Through Newly assigned PCIe cards in CMC VRTX must be discovered and initialized before a server node is powered on.
Configuring PCIe Ride-through Properties Using CMC Web Interface To configure the PCIe Ride-through properties for CMC VRTX: 1 In the left pane, click Chassis Overview > Setup > Ridethrough. The PCIe Ridethrough Settings page is displayed. 2 To enable or disable the PCIe Ride-through feature, select or clear the Enable PCIe Ridethrough option. NOTE: By default, the Ride-through feature is enabled and the time period set for 300 seconds.
17 Troubleshooting and Recovery This section explains how to perform tasks related to recovering and troubleshooting problems on the remote system using the CMC web interface. • Viewing chassis information. • Viewing the event logs. • Gathering configuration information, error status, and error logs. • Using the diagnostic console. • Managing power on a remote system. • Managing Lifecycle Controller jobs on a remote system. • Reset components.
• Short the Password recovery header pins using jumper • Re-insert the CMC module to chassis, after the CMC is in online state, the default credential is active (User Name: root/ Password: calvin) • Login to CMC using default credential and change the password • After the password is changed, remove CMC module and jumper from Password recovery header • Re-insert the CMC module to chassis, after the CMC is in online state, the new credential is active Gathering Configuration Information, Chassis St
Subsystem RACADM Command RAC event log getraclog System event log getsel Downloading SNMP Management Information Base File The CMC SNMP Management Information Base (MIB) file defines the chassis types, events, and indicators. CMC enables you to download the MIB file using the web interface. To download the CMC's SNMP MIB file using the CMC web interface: 1 In the left pane, click Chassis Overview > Network > Services > SNMP.
– Resolution B: Check for the maximum power conservation setting. If this is set, then this issue occurs. For more details, see the power configuration settings. – Resolution C: Check for the server slot power priority of the slot associated with the newly-inserted server, and then ensure it is not lesser than any other server slot power priority. • Problem: Available power keeps changing, even when the modular enclosure configuration has not changed.
Wed May 09 15:47:23 2007 unknown System Software event: unknown event Viewing Hardware Logs Using CMC Web Interface You can view, save, and clear the hardware log. You can sort the log entries based on Severity, Date/Time, or Description by clicking the column heading. Subsequent clicks on the column headings reverse the sort. To view the hardware logs using CMC Web interface, in the left pane, click Chassis Overview > Logs. The Hardware Log page is displayed.
Viewing Chassis Logs Using the Web Interface You can view, save, and clear the chassis log. You can filter the logs based on the log type and filter. Additionally, you can even perform a search based on a keyword or view the logs on specified days. In the left pane, click Chassis Overview > Logs > Chassis Log. The Chassis Log page is displayed. To save a copy of the chassis log to your managed station or network, click Save Log and then specify a location save the log file.
NOTE: • CMC does not reset upon restoring configuration, however CMC services may take some time to effectively impose any changed or new configuration. After successful completion, all current sessions are closed. • Flexaddress information, server profiles, and extended storage are not saved or restored with the Chassis Configuration.
Interpreting LED Colors and Blinking Patterns The LEDs on the chassis provide the following status of a component: • Steadily glowing green LEDs indicate that the component is turned on. If the green LED is blinking, it indicates a critical but routine event, such as a firmware upload, during which the unit is not operational. It does not indicate a fault. • A blinking amber LED on a module indicates a fault on that module. • Blue, blinking LEDs are configurable by the user and used for identification.
Component Blower PSU Enclosure LED Color, Blinking Pattern Status Blue, glowing steadily Normal Blue, blinking User-enabled module identifier Amber, glowing steadily Not used Amber, blinking Fault Blue, dark No fault Green, glowing steadily Fan working Green, blinking Not used Green, dark Turned off Amber, glowing steadily Fan type not recognized, update the CMC firmware Amber, blinking Fan fault; tachometer out of range Amber, dark Not used (Oval) Green, glowing steadily AC OK
– A self-test failure. In this case, the CMC board must be replaced. – An image corruption. In this case, upload the CMC firmware image to recover the CMC. NOTE: A normal CMC boot or reset takes over a minute to fully boot into its operating system and be available for login. The blue LED is enabled on the active CMC. In a redundant, two-CMC configuration, only the upper-right green LED is enabled on the standby CMC.
• DHCP — Traces packets sent to and received from a DHCP server. • DDNS — Traces dynamic DNS update requests and responses. • Configuration changes to the network interfaces. The trace log may also contain CMC firmware-specific error codes that are related to the integrated CMC firmware, not the managed system’s operating system. Troubleshooting Controller To troubleshoot a controller: 1 In the left pane, click Chassis Overview > Storage > Controllers > Troubleshooting.
18 Using LCD Panel Interface You can use the LCD panel on the chassis to perform configuration and diagnostics, and to obtain status information about the chassis and its contents. The following figure illustrates the LCD panel. The LCD screen displays menus, icons, pictures, and messages. Figure 4.
The icons described in the following table are used to navigate between LCD screens. Table 44. LCD Panel Navigational Icons Icon Normal Icon Highlighted Icon Name and Description Back — Highlight and press the center button to return to the previous screen. Accept/Yes — Highlight and press the center button to accept a change and return to the previous screen. Skip/Next — Highlight and press the center button to skip any changes and go to the next screen.
The DVD drive can be mapped to the server slot only if the DVD is enabled for that server slot. DVD drive can also be unmapped to prevent the use by any of the server slots. The health of the DVD drive will be critical if the SATA cable is not properly connected between the DVD drive and the mainboard. If the health of the DVD drive is critical, the server cannot access the DVD drive. NOTE: The DVD Mapping feature is displayed on the LCD Main Menu screen only if you have a DVD drive installed.
3 Press the center button to confirm the change. The LCD Setup menu is displayed. Default Screen The Default Screen allows you to change the screen that the LCD panel displays when there is no activity at the panel. The factory default screen is the Main Menu.
Table 45. CMC Status Item Description Name/Location Example: CMC1, CMC2. No Errors If there are no errors, No Errors is displayed. Else, error messages are listed where critical ones are first listed, and then the warning-related. Firmware Version Only displays on an active CMC. Displays Standby for the standby CMC. IP4 Displays current IPv4 enabled state only on an active CMC. IP4 Address: Only displays if IPv4 is enabled only on an active CMC.
Item Description Status Offline, Online, or Standby — Indicates the power status of a PSU. Maximum Wattage Maximum Wattage that PSU can supply to the system. Table 49. IOM Status Item Description Name/Location IOM A Error Messages If there are no errors, No Errors is displayed. Else, error messages are listed where critical ones are first listed, and then the warning-related. Status Off or On — Indicates whether the IOM is functioning. Model Model of the IOM. Fabric Type Networking type.
Item Description RPM Current blower speed in RPM. Table 53. SPERC Status Item Description SPERC: Displays the SPERC name in the format SPERC n, where 'n' is the SPERC number. Example: SPERC 1, SPERC 2, and so on. Error Messages If there are no errors, No Errors is displayed. Else, error messages are listed where critical ones are first listed, and then the warning-related. Working Status On or Off — Indicates whether the SPERC is functioning. Name: Name of the shared PERC.
Item Description Firmware version Firmware version of the Hard Disk Drive State Offline, Online, or Standby — Indicates the power status of the hard disk drive. Table 56. Server Status Item Description Name/Location Example: Server 1, Server 2, and so on. No Errors If there are no errors, No Errors is displayed. Else, error messages are listed where critical ones are first listed, and then the warning-related. For more information, see "LCD Error Messages". Slot Name Chassis slot name.
The information is displayed only if iDRAC has completed booting. For more information on this feature, see the RACADM Command Line Reference Guide for CMC in PowerEdge VRTX.
19 Frequently Asked Questions This section lists the frequently asked questions about the following: • RACADM • Managing and Recovering a Remote System • Active Directory • FlexAddress and FlexAddressPlus • IOM Topics: • RACADM • Managing and Recovering a Remote System • Active Directory • FlexAddress and FlexAddressPlus • IOM RACADM After performing a CMC reset (using the RACADM racreset subcommand), when a command is entered, the following message is displayed: racadm Tran
An error message Not Found is displayed while using the $ logout and $ quit commands. Managing and Recovering a Remote System Why are the remote RACADM and Web-based services unavailable after a property change? It may take a minute for the remote RACADM services and the web interface to become available after the CMC Web server resets. The CMC web server is reset after the following occurrences: • Changing the network configuration or network security properties using the CMC web user interface.
To ensure that the CSR matches the registered DNS CMC name: 1 In the left pane, click Chassis Overview. 2 Click Network. The Network Configuration page appears. 3 Select the Register CMC on DNS option. 4 Type a CMC name in the DNS CMC Name field. 5 Click Apply Changes. Active Directory Does Active Directory support CMC login across multiple trees? Yes. The CMC’s Active Directory querying algorithm supports multiple trees in a single forest.
FlexAddress and FlexAddressPlus What happens if a feature card is removed? There is no visible change if a feature card is removed. Feature cards can be removed and stored, or can be left in place. What happens if a feature card that was used in one chassis is removed and put into another chassis? The Web interface displays the following error message: This feature card was activated with a different chassis. It must be removed before accessing the FlexAddress feature.
No feature card inserted. What happens to FlexAddress feature if the server BIOS is updated from version 1.xx to version 2.xx? The server module must be turned off before it can be used with FlexAddress. After the server BIOS update is complete, the server module does not get chassis-assigned addresses until the server is power cycled.