Dell Chassis Management Controller Version 3.3 for Dell EMC PowerEdge VRTX User's Guide July 2020 Rev.
Notes, cautions, and warnings NOTE: A NOTE indicates important information that helps you make better use of your product. CAUTION: A CAUTION indicates either potential damage to hardware or loss of data and tells you how to avoid the problem. WARNING: A WARNING indicates a potential for property damage, personal injury, or death. © 2014 - 2020 Dell Inc. or its subsidiaries. All rights reserved. Dell, EMC, and other trademarks are trademarks of Dell Inc. or its subsidiaries.
Contents Chapter 1: Overview.......................................................................................................................13 What is new in this release..................................................................................................................................................14 Key Features.........................................................................................................................................................................
Setting Chassis Physical Location and Chassis Name Using Web Interface......................................................... 33 Setting Chassis Physical Location and Chassis Name Using RACADM................................................................. 34 Setting Date and Time on CMC........................................................................................................................................ 34 Setting Date and Time on CMC Using CMC Web Interface.............................
Downloading CMC Firmware............................................................................................................................................. 47 Viewing Currently Installed Firmware Versions............................................................................................................... 48 Viewing Currently Installed Firmware Versions Using CMC Web Interface...........................................................
Viewing Front Panel Properties.......................................................................................................................................... 71 Viewing KVM Information and Health Status................................................................................................................... 71 Viewing LCD Information and Health................................................................................................................................
Editing Chassis Configuration Profiles........................................................................................................................ 87 Deleting Chassis Configuration Profiles...................................................................................................................... 87 Configuring Multiple CMCs Using RACADM...................................................................................................................
Exporting Boot Identity Profiles................................................................................................................................. 107 Deleting Boot Identity Profiles.................................................................................................................................... 107 Managing Virtual MAC Address Pool.........................................................................................................................107 Creating MAC Pool...
Configuring CMC SSO Or Smart Card Login For Active Directory Users Using RACADM............................... 137 Chapter 11: Configuring CMC to Use Command Line Consoles......................................................... 138 CMC Command Line Console Features..........................................................................................................................138 CMC Command Line Interface Commands.....................................................................................
Power Budgeting For Hardware Modules...................................................................................................................... 162 Server Slot Power Priority Settings................................................................................................................................ 162 Assigning Priority Levels To Servers...............................................................................................................................
Enabling or Disabling RAID Controller Using CMC Web Interface...............................................................................179 Enabling or Disabling RAID Controller Using RACADM.................................................................................................180 Enabling or disabling fault tolerance of external RAID controller using RACADM.....................................................180 Viewing Physical Disk Properties Using the CMC Web Interface......................
Chapter 17: Troubleshooting and Recovery.................................................................................... 194 Resetting Forgotten Administrative Password.............................................................................................................. 194 Gathering Configuration Information, Chassis Status, and Logs Using RACDUMP................................................. 195 Supported Interfaces............................................................................
1 Overview The Dell Chassis Management Controller (CMC) for Dell EMC PowerEdge VRTX is a Systems Management hardware and software solution for managing the PowerEdge VRTX chassis. The CMC has its own microprocessor and memory and is powered by the modular chassis into which it is plugged.
• • • • • • Managing Licenses Viewing Localized Versions of the CMC Web Interface Supported Management Console Applications How to use this Guide Other Documents You May Need Accessing documents from the Dell EMC support site What is new in this release This release of CMC for Dell EMC PowerEdge VRTX supports: • • • Enhancing chassis profile to configure iDRAC network parameters. Applying server profiles using racadm interface. Handling Open Source security vulnerabilities.
Security Features The CMC provides the following security features: • • • • Password-level security management — Prevents unauthorized access to a remote system. Centralized user authentication through: ○ Active Directory using Standard Schema or an Extended Schema (optional). ○ Hardware-stored user IDs and passwords. Role-based authority — Enables an administrator to configure specific privileges for each user. User ID and password configuration through the web interface.
Figure 2. CMC back panel Table 2. CMC back panel — parts Item Indicator, Button, or Connector 1 PCIe expansion card slots low-profile (5) 2 PCIe expansion card slots full height (3) 3 CMC GB Ethernet port (CMC-2) 4 CMC GB Ethernet port (CMC-1) 5 Serial Connector 6 Blower modules (4) 7 I/O module ports 8 PSU 4 9 PSU 3 10 PSU 1 11 PSU 2 A Front Panel view of the chassis is given here with a table that lists the parts and devices available in the CMC.
Figure 3. Front-Panel Features And Indicators—3.5 Inch Hard Disk Drive Chassis Table 3. Front panel — features and indicators Item Indicator, Button, or Connector Description 1 USB connectors (2) Allows a keyboard and mouse to be connected to the system. 2 LCD panel Provides system information and status, and error messages to indicate when the system is operating correctly or when the system needs attention. 3 LCD menu scroll buttons (4) Moves the cursor in one-step increments.
Table 3. Front panel — features and indicators (continued) Item Indicator, Button, or Connector Description 11 Server modules Up to four PowerEdge M520, M620, M630, or M640 server modules or 2 M820 server modules configured for the enclosure. Minimum CMC Version The following table lists the minimum CMC version required to enable the listed server modules. Table 4. Minimum CMC Version for server modules Servers Minimum version of CMC PowerEdge M520 CMC 1.36 PowerEdge M620 CMC 1.
Supported Platforms CMC supports modular servers that are designed for the PowerEdge VRTX platform. For information about compatibility with CMC, see the documentation for your device. For the latest supported platforms, see the Dell Chassis Management Controller (CMC) Version 3.3 for Dell PowerEdge VRTX Release Notes available at dell.com/support/manuals.
• • View — View the current license information. Import — After acquiring the license, store the license in a local storage and import it into CMC using one of the supported interfaces. The license is imported if it passes the validation checks. NOTE: For a few features, a CMC restart may be required to enable the features. • Export — Export the installed license into an external storage device back up or to reinstall it after a service part is replaced.
Licensable Features in CMC A list of CMC features that are enabled on the basis of your license is given here in the table. Table 8.
Table 8. Licensable features (continued) Feature Express Enterprise Notes Enclosure-level backup No Yes FlexAddress Enablement No* Yes *For non-default FlexAddress settings, only Restore Default is allowed with Express license. Restore Default will reset the FlexAddress settings to the factory default. PCIe Adapter Mapping Yes* Yes *A maximum of two PCIe Adapters can be assigned per Server with Express License.
• • • • • • • • • • The VRTX CMC Online Help provides information about using the Web interface. To access the Online Help, click Help on the CMC web interface. The Chassis Management Controller Version 3.3 for Dell PowerEdge VRTX RACADM Command Line Reference Guide provides information about using the VRTX–related RACADM features. The Dell Chassis Management Controller (CMC) for Dell PowerEdge VRTX Version 3.3 Release Notes, available at dell.
○ Analytics ○ Client Systems Management ○ Enterprise Applications ○ Enterprise Systems Management ○ Mainframe ○ Operating Systems ○ Public Sector Solutions ○ Serviceability Tools ○ Support ○ Utilities ○ Virtualization Solutions 4. To view a document, click the required product and then click the required version. • Using search engines: ○ Type the name and version of the document in the search box.
2 Installing and Setting Up CMC This section provides information about how to install your CMC hardware, establish access to CMC, configure your management environment to use CMC, and guides you through the tasks for configuring a CMC: • • • • Set up initial access to CMC. Access CMC through a network. Add and configure CMC users. Update CMC firmware. For more information about installing and setting up redundant CMC environments, see Understanding Redundant CMC Environment.
6. Using the LCD panel, navigate to the IP Summary and click on the Check button to select. Use the IP address for the CMC in the management system browser (IE, Chrome, or Mozilla). To set up DHCP for CMC, use LCD panel to, click Main Menu > Settings > Network Settings. 7. Connect to the CMC IP address by using a web browser by typing the default username (root) and password (calvin). 8. Provide each iDRAC with an IP address in the CMC web interface, and enable the LAN and IPMI interface.
NOTE: When using the RACADM remote capability, you must have the 'write' permission on the folders where you are using the RACADM subcommands, involving the file operations. For example, racadm getconfig -f . Uninstalling RACADM From a Linux Management Station 1. Log in as root to the system where you want to uninstall the management station features. 2. Run the following rpm query command to determine which version of the DRAC tools is installed: rpm -qa | grep mgmtst-racadm 3.
Microsoft Phishing Filter If the Microsoft Phishing Filter is enabled in Internet Explorer on your management system, and your CMC does not have Internet access, accessing CMC may be delayed by a few seconds. This delay can happen if you are using the browser or another interface such as remote RACADM. To disable the phishing filter: 1. Start Internet Explorer. 2. Click Tools > Phishing Filter, and then click Phishing Filter Settings. 3. Select the Disable Phishing Filter option and click OK.
iDRAC communication delays. These delays may cause unpredictable chassis behavior, such as CMC displaying iDRAC as offline even when it is up and running, which in turn causes other unwanted behavior. If physically isolating the management network is impractical, the other option is to separate CMC and iDRAC traffic to a separate VLAN. CMC and individual iDRAC network interfaces can be configured to use a VLAN.
3. If you are asked to select an appropriate network speed, select a network speed (Auto (1Gb), 10Mb, or 100Mb) using appropriate buttons. For effective network throughput, the network speed setting must match your network configuration. Setting the network speed lower than the speed of your network configuration increases bandwidth consumption and slows down the network communication. Determine whether or not your network supports the above network speeds and set it accordingly.
Table 9. Network mode (continued) Network mode Description If you have selected the Static option, press the center button, and then do the following: a. The following message asks you whether or not you want to automatically increment by using the IP of Slot–1. IPs will auto-increment by slot number. Click the center button. The following message asks you to enter the slot–1 IP number. Enter slot 1 (starting) IP Enter the slot–1 IP number, and then press the center button. b.
Table 10. CMC Interfaces Interface Description Web interface Provides remote access to CMC using a graphical user interface. The Web interface is built into the CMC firmware and is accessed through the NIC interface from a supported web browser on the management station. For a list of supported Web browsers, see the “Supported Browsers” section in the Dell System Software Support Matrix at dell.com/support/manuals.
Table 10. CMC Interfaces (continued) Interface Description WinRM tool sets a default response timeout of 60 seconds for all WSMan commands it sends out. WinRM does not allow varying this timeout interval. Using “winrm set winrm/config @{MaxTimeoutms ="80000"}” does not change the timeout due to a bug in the WinRM tool. Therefore, it is recommended that WinRM is not used for commands that may take more than one minute to complete execution.
Setting Chassis Physical Location and Chassis Name Using RACADM To set the chassis name, location, date, and time by using the command line interface, see the setsysinfo and setchassisname commands. For more information, see the Chassis Management Controller for PowerEdge VRTX RACADM Command Line Reference Guide. Setting Date and Time on CMC You can manually set the date and time, or you can synchronize the date and time with a Network Time Protocol (NTP) server.
Configuring LED Blinking Using RACADM Open a serial/Telnet/SSH text console to CMC, log in, and type: racadm setled -m [-l ], where specifies the module whose LED you want to configure. Configuration options: • • • server-n where n = 1-4 switch-1 cmc-active and specifies whether or not the LED should blink.
2. In the IPv4 Settings section, click Advanced Settings. Alternatively, to access the Log in Security page, in the left pane, go to Chassis Overview, click Security > Log in. The Log in Security page is displayed. 3. To enable the user blocking or IP blocking feature, in the Login Lockout Policy section, select Lockout by User Name or Lockout by IP Address (IPV4) . The options to set the other login lockout policy attributes are activated. 4.
NOTE: In the event of a CMC failover, all iDRAC connections and all active CMC sessions are logged off. Users with logged-off sessions must reconnect to the new active CMC. About Standby CMC The standby CMC is identical to and is maintained as a mirror of the active CMC. The active and standby CMCs must both be installed with the same firmware revision. If the firmware revisions differ, the system reports as “redundancy degraded”. The standby CMC assumes the same settings and properties of the active CMC.
Configuring Power Button To configure the chassis power button: 1. In the left pane, click Chassis Overview > Front Panel > Setup. 2. On the Front Panel Configuration page, under the Power Button Configuration section, select the Disable Chassis Power Button option, and then click Apply. The chassis power button is disabled. Configuring LCD 1. In the left pane, clickChassis Overview > Front Panel > Setup . 2.
The DVD allows mapping to all the server slots. Inserting a full–height or replacing a half–height server with full–height server does not change the mapping behavior. However, if the DVD is mapped to a lower slot and the slot has a full–height server, then the DVD is available only through the upper slot. You must remap the DVD to the upper slots.
3 Logging in to CMC You can log in to CMC as a CMC local user, as a Microsoft Active Directory user, or as an LDAP user. The default user name and password is root and calvin respectively. You can also log in using Single Sign-On or a Smart Card. NOTE: CMC does not support the following special characters as user name or password from chassis profile using XML: " , ! , #, $, %, ^, &, *, (, ), -, _, +, =, ?, {, }, +, &, >, |, .
Logging in to CMC as a Local User, Active Directory User, or LDAP User To log in to CMC, you must have a CMC account with the Log In to CMC privilege. The default CMC user name is root, and the password is calvin. The root account is the default administrative account that ships with CMC. NOTE: • For added security, it is strongly recommended that you change the default password of the root account during initial set up. • When Certificate Validation is enabled, FQDN of the system should be provided.
NOTE: If you changed the default HTTPS port number (port 80), access the CMC web page using :, where cmcname is the CMC host name for CMC, domain-nameis the domain name, and port number is the HTTPS port number. 2. Insert the smart card and click Login. The PIN dialog box is displayed. 3. Type the PIN and click Submit. NOTE: If the smart card user is present in Active Directory, an Active Directory password is not required.
• NOTE: Remote RACADM is included on the Dell Systems Management Tools and Documentation DVD and is installed on a management station. Firmware RACADM — Allows you to log in to the CMC using Telnet, SSH, or a serial connection. With firmware RACADM, you can the RACADM implementation that is part of the CMC firmware. You can use remote RACADM commands in scripts to configure multiple CMCs. You cannot run the scripts directly on the CMC web interface, because CMC does not support it.
NOTE: A CMC log message is generated if the Do not show this warning again option is selected on the CMC Login page. Changing Default Login Password Using Web Interface When you log in to the CMC web interface, if the Default Password Warning page is displayed, you can change the password. To do this: 1. Select the Change Default Password option. 2. In the New Password field, type the new password. The maximum characters for the password are 20. The characters are masked.
Enabling or Disabling Warning Message to Change Default Login Password Using RACADM To enable the display of the warning message to change the default login password using RACADM, use racadm config -g cfgRacTuning -o cfgRacTuneDefCredentialWarningEnable<0> or <1> object. For more information, see the Chassis Management Controller for PowerEdge VRTX RACADM Command Line Reference Guide available at dell.com/support/manuals.
1. Power down chassis. Disconnect all SAS cables from External Shared PERC 8 cards to MD12x0 enclosures. 2. Power Up chassis. 3. Login to CMC web interface and navigate to the Storage→ Controllers→ Troubleshooting and enable Fault tolerance from the drop-down menu for External Shared PERC 8 card in slot 5, click Apply and select disable for slot 6, and then click Apply. 4. Resetting both the PERCs may take two minutes to reflect in HA mode. 5. Power down chassis and connect the enclosures in HA Mode. 6.
4 Updating Firmware You can update firmware for: • • • • CMC Chassis infrastructure VRTX Expander or Storage Backplane Expander Firmware of Inegrated or external enclosures Physical Disks (HDD) per enclosure NOTE: You can update the HDD firmware only if required.
Viewing Currently Installed Firmware Versions You can view the currently installed firmware versions using the CMC web interface or RACADM.
CMC. When both CMCs are updated, you can use the cmcchangeover command to restore the CMCs to their previous roles. CMC firmware revision 2.x updates both the primary CMC and the redundant CMC without running the cmcchangeover command. During the final phases of the firmware update process in CMC, the browser session and connection with CMC is lost temporarily as the CMC is not connected to the network. CMC generates the chassis overall health as critical owing to the temporary network loss.
If the processes are not followed in order, system behavior becomes random and parts of the system may become unstable. The CMC logs IOV or RAID controller messages. Only shared storage VA mappings for PERC 1 and PERC 2 are visible in the older version of CMC. All external shared storage VA mappings do not exist in the previous version of the CMC. If an External Shared PERC 8 card is inserted after the rollback, the CMC treats it as a non-shared adapter.
Updating Chassis Infrastructure Firmware Using CMC Web Interface 1. Go to any of the following pages: • • Chassis Overview > Update. Chassis Overview > Chassis Controller > Update. 2. On the Firmware Update page, in the Chassis Infrastructure Firmware section, in the Update Targets column, select the option, and then click Apply Chassis Infrastructure Firmware. 3. On the Firmware Update page, click Browse, and then select the appropriate chassis infrastructure firmware. 4.
The Firmware Update Progress section provides firmware update status information. A progress bar indicates the status of the upload process. File transfer time varies on the basis of connection speed. When the internal update process begins, the page automatically refreshes and the firmware update timer is displayed. NOTE: Additional instructions to follow: • Do not click the Refresh icon or navigate to another page during the file transfer. • To cancel the process, click Cancel File Transfer and Update.
Dell Repository Manager to Search for the Latest Updates on the Dell Support Site on https://www.kb.dell.com/. For information about saving the inventory file that DRM uses as input to create the repositories, see Saving chassis inventory report using CMC web interface. NOTE: The Single Click all blade update method has the following benefits: • Enables you to update all the components on all the blade servers with minimal clicks. • All the updates are packaged in a directory.
NOTE: When you update the firmware versions for all the server components at one time, the update sequence is handled by Lifecycle Controller. Enabling Lifecycle Controller You can enable the Lifecycle Controller service when turning on a server: • • For iDRAC servers, on the boot console, to access System Setup, press the key. On the System Setup Main Menu page, go to iDRAC Settings > Lifecycle Controller, click Enabled. Go to the System Setup Main Menu page and click Finish to save the settings.
• Sometimes, a BIOS firmware update image may be compatible across a number of server models. Such optimizations are ignored in case this compatibility is no longer true in the future. Automatic filtering is important for firmware updates of Network Interface Controllers (NIC) and RAID Controllers. These device categories have different types and models.
• • If the server is listed as Not Ready, it indicates that when the firmware inventory was retrieved, the iDRAC on the server was still initializing. Wait for the iDRAC to be fully operational, and then refresh the page to retrieve the firmware inventory again. If the inventory of components and devices does not reflect what is physically installed on the server, invoke the Lifecycle Controller when the server is in the boot process.
2. Click Save Inventory Report. The Inventory.xml file is saved on an external system. NOTE: The Dell Repository Manager Application uses the Inventory.xml file as an input to create a repository of updates for all the blades available in the chassis. This repository can be later exported to a network share. Update from Network Share mode of firmware update uses this network share to update the components of all the servers.
Only one type of operation can be performed at a time. Components and devices that are not supported may be listed as part of the inventory, but do not permit Lifecycle Controller operations. To perform the Lifecycle Controller operations, you must have: • • For CMC: Server Administrator privilege. For iDRAC: Configure iDRAC privilege and Log in to iDRAC privilege. A Lifecycle Controller operation scheduled on a server may take 10 to 15 minutes to complete.
Upgrading Server Component Firmware You can install the next version of the firmware image for selected components or devices across one or more servers. The firmware image is available within the Lifecycle Controller for a rollback operation. To use this feature, you must have an Enterprise License. NOTE: For iDRAC and Operating System Driver packs firmware update, make sure the Extended Storage feature is enabled.
Server Component Single Click Update Using Network Share The Servers or server component update from a network share using Dell Repository Manager and Dell PowerEdge VRTX chassis integration simplifies the update by using customized bundle firmware, so that you can deploy faster and more easily. Update from a network share provides flexibility to update all the 12G server components at the same time with a single catalog either from a CIFS or from a NFS.
NOTE: The Job Status column displays the job status of the operations scheduled on the server. The job status is dynamically updated. Supported Firmware Versions for Server Component Update The following section provides the Server Component Update for CMC. The following table lists the supported firmware versions for server components in a scenario where the existing CMC Firmware version is 3.1 and the server components are updated from N-1 version to N version.
Table 13. Supported Server Component Versions For Server Component Update to N version (continued) Platform M640 Server Component Previous Component Version (N-1 Version) Updated Component Version (N Version) BIOS 2.5.4 2.7.1 iDRAC 3.15.15.15 3.21.21.21 Lifecycle Controller 3.15.15.15 3.21.21.21 Diagnostics 4301A13 4301A13 BIOS 1.3.7 1.4.8 Deleting Scheduled Server Component Firmware Jobs NOTE: To use this feature, you must have an Enterprise License.
• Component updates other corresponding components in the system similarly. For example The SPERC’s updates similarly to the existing SPERCs and the EMMs updates similarly to the integrated EMMs. • Click to view the HDD of different enclosures.
5 Viewing Chassis Information and Monitoring Chassis and Component Health You can view information and monitor the health of the following: • • • • • • • • • • Active and standby CMCs All severs and individual servers IO Module Fans Power Supply Units (PSUs) Temperature sensors Hard disk drives LCD assembly Storage controllers PCIe devices NOTE: The health of external components impacts the overall health of the storage component with existing storage health and integrated storage components in VRTX.
To view the chassis health, click Chassis Overview. The system displays the overall health status of the chassis, active and standby CMCs, server modules, IO Module (IOM), fans, blowers, power supply units (PSUs), LCD assembly, storage controller, and PCIe devices. Detailed information about each component is displayed when you click that component. In addition, the latest events in the CMC Hardware Log are also displayed. For more information, see the Online Help.
Table 14. Server Icon States in 13th generation systems (continued) Icon Description A server is present, but reporting a critical error. A server is not present. Table 15. Server Icon States in 14th generation systems Icon Description A server is present, turned on, and is operating normally. A server is present, but turned off. A server is present, but reporting a noncritical error. A server is present, but reporting a critical error. A server is not present.
NOTE: By default, the server state icons for Dell's 13th generation PowerEdge systems are displayed if, you insert a 14th generation PowerEdge server when the chassis is turned off. Selected Component Information Information for the selected component is displayed in three independent sections: • • • Health and Performance, and Properties — Displays the active, critical, and non-critical events as displayed by the hardware logs and the performance data that vary with time.
Table 16.
Table 16. Component properties (continued) Component Health and Performance Properties Properties Quick Links • • Launch IOM GUI Role Service Tag Viewing Server Model Name and Service Tag You can view the model name and service tag of each server instantly using the following steps: 1. In the left pane, under Server Overview tree node, all the servers (SLOT-01 to SLOT-04) appear in the servers list. If a server is not present in a slot, the corresponding image in the graphic is grayed out.
Viewing Information and Health Status of the IOM To view health status of the IOMs, in the CMC Web interface, do any of the following: 1. Click Chassis Overview. The Chassis Health page is displayed. The graphics in the left pane displays the rear, front, and side view of the chassis and contains the health status for the IOM. IOM health status is indicated by the overlay of the IOM sub-graphic. Move the cursor over the individual IOM sub-graphic.
Configuring Fans Fan Offset — A feature to provide increased cooling to the storage and PCIe regions of the chassis. This feature allows you to increase the airflow delivery to the HDDs, Shared PERC controllers, and PCIe card slots. An example usage of the Fan Offset is when you use highpower or custom PCIe cards that require more cooling than normal. The Fan Offset feature has options of Off, Low, Medium, and High.
On the Status page, under the KVM Properties section, you can view the status and properties of a KVM associated with the chassis. For more information, see the Online Help. Viewing LCD Information and Health To view the health status of an LCD: 1. In the left pane, click Chassis Overview. The Chassis Health page is displayed. The left pane displays the front view of the chassis. LCD health status is indicated by the overlay of the LCD sub-graphic. 2. Move the cursor over the LCD subgraphic.
6 Configuring CMC Chassis Management Controller enables you to configure properties, set up users, and alerts to perform remote management tasks. Before you begin configuring the CMC, you must first configure the CMC network settings to allow CMC to be managed remotely. This initial configuration assigns the TCP/IP networking parameters that enable access to the CMC. For more information, see Setting Up Initial Access to CMC. You can configure CMC using Web interface or RACADM.
solicitations are sent. In such cases, there may be a period when IPv6 connectivity is limited, until router advertisements are gratuitously sent by the IPv6 routers. NOTE: Changing the CMC network settings may disconnect your current network connection. NOTE: You must have Chassis Configuration Administrator privilege to set up CMC network settings. Viewing and Modifying CMC Network LAN Settings Using CMC Web Interface To view and modify the CMC LAN network settings using CMC Web interface: 1.
By default, for IPv4, the CMC requests and automatically obtains a CMC IP address from the Dynamic Host Configuration Protocol (DHCP) server. You can disable the DHCP feature and specify static CMC IP address, gateway, and subnet mask.
Configuring IPv4 and IPv6 DNS Settings • CMC Registration — To register the CMC on the DNS server, type: racadm config -g cfgLanNetworking -o cfgDNSRegisterRac 1 NOTE: Some DNS servers only register names of 31 characters or fewer. Make sure the designated name is within the DNS required limit. NOTE: The following settings are valid only if you have registered the CMC on the DNS server by setting cfgDNSRegisterRac to 1. CMC Name — By default, the CMC name on the DNS server is cmc-.
Configuring CMC Network and Login Security Settings The IP address blocking and User blocking features in CMC allow you to prevent security issues due to password guessing attempts. This feature enables you to block a range of IP addresses and users who can access CMC. By deafult, the IP address blocking feature is enabled in CMC. You can set the IP range attributes using CMC web interface or RACADM.
Configuring Virtual LAN Tag Properties for CMC Virtual LANfunctionality enables multiple VLANs to coexist on the same physical network cable and to segregate the network traffic for security or load management purposes. When you enable the VLAN functionality, each network packet is assigned a VLAN tag. Configuring Virtual LAN Tag Properties for CMC Using RACADM 1.
• • In the left pane, click Chassis Overview and click Network > VLAN. In the left pane, click Chassis Overview > Server Overview and click Network > VLAN. The VLAN Tag Settings page is displayed. VLAN tags are chassis properties. They remain with the chassis even when a component is removed. 2. In the CMC section, enable VLAN for CMC, set the priority and assign the ID. For more information about the fields, see the Online Help. 3. Click Apply. The VLAN tag settings are saved.
Enabling FIPS Mode Using RACADM To enable FIPS mode, run the following command: racadm config –g cfgRacTuning –o cfgRacTuneFipsModeEnable 1 . Disabling FIPS Mode To disable FIPS mode, reset CMC to the default factory settings. Configuring Services You can configure and enable the following services on CMC: • • • • • • • CMC serial console — Enable access to CMC using the serial console. Web Server — Enable access to CMC web interface. Disabling the web server also disables Remote RACADM.
Configuring Services Using RACADM To enable and configure the various services, use the following RACADM objects: • • cfgRacTuning cfgRacTuneRemoteRacadmEnable For more information about these objects, see the Chassis Management Controller for PowerEdge VRTX RACADM Command Line Reference Guide available at dell.com/support/manuals. If the firmware on the server does not support a feature, configuring a property related to that feature displays an error.
To set up the Chassis Group using the CMC web interface: 1. 2. 3. 4. Log in with chassis administrator privileges to the leader chassis. Click Setup > Group Administration. On the Chassis Group page, under Role, select Leader. A field to add the group name is displayed. Type the group name in the Group Name field, and then click Apply. NOTE: The same rules that apply for a domain name apply to the group name. When the chassis group is created, the GUI automatically switches to the Chassis Group page.
Disabling an Individual Member at the Member Chassis Sometimes a member cannot be removed from a group by the lead chassis. This can happen if network connectivity to the member is lost. To remove a member from a group at the member chassis: 1. Log in with chassis administrator privileges to the member chassis. 2. In the left pane, click Chassis Overview > Setup > Group Administration. 3. Select None, and then click Apply.
• Empty slots and extension slots (including full height and double width server modules). Saving Server Inventory Report To save the server inventory report using the CMC web interface: 1. In the left pane, select the Group. 2. On the Chassis Group Health page, click Save Inventory Report. The File Download dialog box is displayed asking you to open or save the file. 3. Click Save and specify the path and file name for the server module inventory report.
Table 17. Server Module Inventory Field Descriptions (continued) Data Field Example NOTE: Requires VRTX CMC 1.0 (or later) on member; otherwise shown as blank. Data Format The inventory report is generated in a .CSV file format such that it can be imported to various tools, such as Microsoft Excel. The inventory report .CSV file can be imported into the template by selecting the Data > From Text in MS Excel.
Chassis Configuration Profiles The Chassis Configuration Profiles feature enables you to configure the chassis with the chassis configuration profiles stored in the network share or local management station, and also restore configuration of the chassis. To access the Chassis Configuration Profiles page in the CMC web interface, in the system tree, go to Chassis Overview and click Setup > Profiles. The Chassis Configuration Profiles page is displayed.
NOTE: If the backup files (.bak) of the earlier versions of CMC, are loaded on the latest version of CMC where FIPS is enabled, reconfigure all the 16 CMC local user passwords. However, the password of the first user is reset to "calvin". NOTE: When a chassis configuration profile is imported from a CMC, which does not support the FIPS feature, to a CMC where FIPS is enabled, the FIPS remains enabled in the CMC.
2. Click OK to delete the selected profile. Configuring Multiple CMCs Using RACADM Using RACADM, you can configure one or more CMCs with identical properties. When you query a specific CMC card using its group ID and object ID, RACADM creates the racadm.cfg configuration file from the retrieved information. By exporting the file to one or more CMCs, you can configure your controllers with identical properties in a minimal amount of time.
Follow these guidelines when you create a .cfg file: • If the parser encounters an indexed group, it is the value of the anchored object that differentiates the various indexes. • The parser reads in all of the indexes from the CMC for that group. Any objects within that group are modifications when the CMC is configured. If a modified object represents a new index, the index is created on the CMC during configuration. You cannot specify a desired index in a .cfg file. Indexes may be created and deleted.
NOTE: You may create an indexed group manually using the following command: racadm config -g • -o -i The line for an indexed group cannot be deleted from a .cfg file. If you do delete the line with a text editor, RACADM stops when it parses the configuration file and alert you of the error.
NOTE: Anchor is a reserved word and should not be used in the .cfg file. Configuring Multiple CMCs through RACADM Using Chassis Configuration Profiles By using chassis configuration profiles, you can export the chassis configuration profiles as an XML file and import it to another chassis. Use RACADM get command for export operation and set command for import operation.
1. To import the chassis configuration profiles from CIFS network share, type the following: racadm –r xx.xx.xx.xx –u USERNAMECMC –p PASSWORDCMC xx.xx.xx.xx/PATH –u USERNAME –p PASSWORD set –f clone.xml –t xml –l // 2. To import the chassis configuration profiles from NFS network share, type the following: racadm –r xx.xx.xx.xx –u USERNAMECMC –p PASSWORDCMC set –f clone.xml –t xml –l xx.xx.xx.
Viewing and Ending CMC Sessions Using RACADM You must have administrator privileges to end CMC sessions using RACADM. To view the current user sessions, use the getssninfo command. To end a user session, use the closessn command. For more information about these commands, see the Chassis Management Controller for PowerEdge VRTX RACADM Command Line Reference Guide available at dell.com/support/manuals.
7 Configuring Servers You can configure the following settings of a server: • • • • • • • Slot Names iDRAC Network Settings DRAC Virtual LAN Tag Settings First Boot Device Server FlexAddress Remote File Share BIOS Settings Using Server Clone Topics: • • • • • • • Configuring Slot Names Configuring iDRAC Network Settings Configuring iDRAC Virtual LAN Tag Settings Setting First Boot Device Configuring Server FlexAddress Configuring Remote File Share Configuring Profile Settings Using Server Configuration R
information about the OMSA agent, see the Dell OpenManage Server Administrator User's Guide available at dell.com/support/ manuals. 4. To use the iDRAC DNS name as slot name, select the Use iDRAC DNS Name for Slot Name option. This option replaces the static slot names with the respective iDRAC DNS names, if it is available. If iDRAC DNS names are not available, the default or edited slot names are displayed.
Table 18. QuickDeploy Settings (continued) Setting Description Enable iDRAC IPv4 DHCP Enables or disables DHCP for each iDRAC present in the chassis. If this option is enabled, the fields QuickDeploy IP, QuickDeploy Subnet Mask, and QuickDeploy Gateway are disabled, and cannot be modified since DHCP is used to automatically assign these settings for each iDRAC. To select this option, you must select the Enable iDRAC IPv4 option. Quick Deploy IP address is provided with two options — 2 and 4.
To copy the QuickDeploy settings into the iDRAC Network Settings section, click Auto-Populate Using QuickDeploy Settings. The QuickDeploy network configurations settings are copied into the corresponding fields in the iDRAC Network Configuration Settings table. NOTE: Changes that are made to QuickDeploy fields are immediate, but changes that are made to one or more iDRAC server network configuration settings may require a couple of minutes to propagate from CMC to iDRAC.
Modifying iDRAC Network Settings Using RACADM RACADM config or getconfig commands support the -m option for the following configuration groups: • • • • • • cfgLanNetworking cfgIPv6LanNetworking cfgRacTuning cfgRemoteHosts cfgSerial cfgSessionManagement For more information about the property default values and ranges, see the Chassis Management Controller for PowerEdge VRTX RACADM Command Line Reference Guide available at dell.com/support/manuals.
• In the left pane, click Chassis Overview > Server Overview and click Setup > VLAN. 2. On the VLAN Tag Settings page, in the iDRAC section, enable VLAN for the server(s), set the priority and enter the ID. For more information about the fields, see the Online Help. 3. Click Apply to save the settings. Setting First Boot Device You can specify the CMC first boot device for each server. This may not be the actual first boot device for the server, or may not even represent a device present in that server.
Setting First Boot Device For Individual Server Using CMC Web Interface NOTE: To set the first boot device for servers, you must have Server Administrator privileges or Chassis Configuration Administrator privileges and iDRAC login privileges. To set the first boot device for individual servers: 1. 2. 3. 4. In the left pane, click Server Overview, and then click the server for which you want to set the first boot device. Go to Setup > First Boot Device. The First Boot Device page is displayed.
Configuring Profile Settings Using Server Configuration Replication The server configurations replicating feature allows you to apply all profile settings from a specified server to one or more servers. Profile settings that can be replicated are those profile settings which can be modified and are intended to be replicated across servers. The following three profile groups for servers are displayed and can be replicated: • • • BIOS — This group includes only the BIOS settings of a server.
the chassis. To configure the Network Share, click Edit in the Stored Profiles section. For more information about configuring the network share, see Configuring Network Share Using CMC Web Interface. 4. In the Profile Name and Description fields, type the profile name and description (optional), and then click Save Profile. NOTE: When saving a Server Profile, the standard ASCII extended character set is supported. However, the following special characters are not supported: ), “, ., *, >, <, \, /, :, |, #,
2. Click Save or Open to export the profile to the required location. NOTE: If the source profile is on the SD card, a message is displayed indicating that if the profile is exported, then the description is lost. Press OK to continue exporting the profile. A message is displayed prompting you to select the destination of the file: • Local or Network Share if the source file is on an SD card.
• • 12th generation servers — After restarting the server, when the company logo is displayed, select F2. On the iDRAC Settings page, in the left pane, click Lifecycle Controller, and then click CSIOR to enable the changes. 13th generation servers —After restarting the server, when prompted, press F10 to access Dell Lifecycle Controller. Go to the Hardware Inventory page by clicking Hardware Configuration > Hardware Inventory. On the Hardware Inventory page, click Collect System Inventory on Restart.
• To remove a profile assignment from one or more slots, select the slots and click Remove Assignment A message is displayed warning you that removing a profile from the slot or slots removes the configuration settings in the profile from any server (s) inserted in the slot (s) when Quick Deploy Profiles feature is enabled. Click OK to remove the profile assignments. • To remove all profile assignments from a slot, in the drop-down menu, select No Profile Selected.
NOTE: Boot identity is saved only if the Network Share option is enabled and accessible, the details are displayed in the Stored Profiles section. If the Network Share is not connected, configure the network share for the chassis. To configure the network share, click Edit in the Stored Profiles section. For more information, see Configuring Network Share Using CMC Web Interface. 3.
NOTE: This option is enabled only if any of the servers are selected and boot identity profiles are applied to the selected servers. 2. Click Clear Identity. 3. Click OK to clear the boot identity profile from the selected server. The clear operation disables the IO Identity and persistence policy of the server. On completion of the clear operation, the server is powered off.
NOTE: The virtual MAC Addresses are managed in the vmacdb.xml file in the network share. A hidden lock file (.vmacdb.lock) is added and removed from the network share to serialize boot identity operations from multiple chassis. Creating MAC Pool You can create MAC pool in the network by using the Manage Virtual MAC Address Pool option available in the CMC web interface. NOTE: The Create MAC Pool section is displayed only if the MAC address database (vmacdb.xml) is not available in the network share.
1. Go to the Server Profiles page. In the Boot Identity Profiles > Manage Virtual MAC Address Pool section, select the active MAC address(es) that you want to deactivate. 2. Click Deactivate MAC Address(es). Launching iDRAC using Single Sign-On CMC provides limited management of individual chassis components, such as servers. For complete management of these individual components, CMC provides a launch point for the server’s management controller (iDRAC) web-based interface.
Remote Console can also be launched from the iDRAC Web interface. For more details, see the iDRAC User’s Guide available at dell.com/ support/manuals. Launching Remote Console from Chassis Health Page To launch a remote console from the CMC Web interface: 1. In the left pane, click Chassis Overview, and then click Properties. 2. On the Chassis Health page, click the specified server in the chassis graphic. 3. In the Quicklinks section, click the Remote Console link to launch the remote console.
8 Configuring CMC To Send Alerts You can set alerts and actions for certain events that occur on the chassis. An event is generated when a device or service’s status has changed or an error condition is detected. If an event matches an event filter and you have configured this filter to generate an alert message (email alert or SNMP trap), then an alert is sent to one or more configured destinations such as email address, IP address, or an external server. To configure CMC to send alerts: 1. 2. 3. 4.
• Informational The Monitored Alerts section displays the results based on the selected category and severity. For information about the field descriptions on the this page, see the Online Help. 4. Click Apply. Setting Event Alerts Using RACADM To set an event alert, run the eventfilters command. For more information, see the Chassis Management Controller for PowerEdge VRTX RACADM Command Line Reference Guide available at dell.com/support//manuals.
b. Configure using severity as a parameter. For example, all informational events in storage category are assigned poweroff as action, and email and SNMP as notifications: racadm eventfilters set -c cmc.alert.storage.info -n email,snmp c. Configure using subcategory as a parameter. For example, all configurations under the licensing subcategory in the audit category are assigned poweroff as action and all notifications are enabled: racadm eventfilters set -c cmc.alert.audit.lic -n all d.
Configuring Email Alert Settings Using CMC Web Interface To configure the email alert settings using Web interface: 1. In the left pane, click Chassis Overview > Alerts > E-mail Alert Settings. 2. Specify the SMTP email server settings and the email addresses to receive the alerts. For information about the field descriptions, see the Online Help. 3. Click Apply to save the settings. 4. Click Send under Test E-mail to send a test email to the specified email alert destination.
9 Configuring User Accounts and Privileges You can set up user accounts with specific privileges (role-based authority) to manage your system with CMC and maintain system security. By default, CMC is configured with a local administrator account. The default user name is rootand the password is calvin. As an administrator, you can set up user accounts to allow other users to access the CMC.
Table 20. User Types (continued) Privilege Description NOTE: CMC users with the Chassis Configuration Administrator privilege can configure power settings. However, the Chassis Control Administrator privilege is required to perform chassis power operations, including power on, power off, and power cycle. User Configuration Administrator User can: Clear Logs Administrator User can clear the hardware log and CMC log.
Table 20. User Types (continued) Privilege Description • • • Power cycle Graceful shutdown Server Reboot Test Alert User User can send test alert messages. Debug Command Administrator User can execute system diagnostic commands. Fabric A Administrator User can set and configure the Fabric A IOM.
Table 22.
Configure Local Users Using RACADM NOTE: You must be logged in as a root user to execute RACADM commands on a remote Linux system. You can configure up to 16 users in the CMC property database. Before you manually enable a CMC user, verify if any current users exist. If you are configuring a new CMC or if you have used the racadm racresetcfg command, the only current user is root with the password calvin. The racresetcfg subcommand resets all configuration parameters to the default values.
For more information about the RACADM commands, see the Chassis Management Controller for PowerEdge VRTX RACADM Command Line Reference Guide available at dell.com/support/manuals. Disabling CMC User When using RACADM, users must be disabled manually on an individual-basis. Users cannot be deleted using a configuration file.
In Active Directory, a standard group object is used as a role group. A user who has CMC access is a member of the role group. To give this user access to a specific CMC card, the role group name and its domain name need to be configured on the specific CMC card. The role and the privilege level is defined on each CMC card and not in the Active Directory. You can configure up to five role groups in each CMC. The following table shows the default role group privileges. Table 23.
• ○ User Domain from Login — to perform the DNS lookup with the domain name of the login user. ○ Specify a Domain — enter the domain name to use for the DNS lookup To enable CMC to use the specified Active Directory Domain Controller server addresses, select Specify Domain Controller Addresses . These server addresses are the addresses of the domain controllers where the user accounts and the role groups are located. 4. Click Apply to save the settings. NOTE: You must apply the settings before continuing.
At least one of the three addresses is required to be configured. CMC attempts to connect to each of the configured addresses one-by-one until it makes a successful connection. With Standard Schema, these are the addresses of the domain controllers where the user accounts and the role groups are located.
object can be linked to as many users, groups of users, or RAC device objects as required. The users and RAC device objects can be members of any domain in the enterprise. However, each association object can be linked (or, may link users, groups of users, or RAC device objects) to only one privilege object. This example allows an administrator to control each user’s privileges on specific CMCs.
• LDIF script file If you use the LDIF script file, the Dell organizational unit is not added to the schema. The LDIF files and Dell Schema Extender are located on your Dell Systems Management Tools and Documentation DVD in the following respective directories: • DVDdrive:\SYSMGMT\ManagementStation\support\OMActiveDirectory_Tools \Remote_Management_Advanced\LDIF_Files :\SYSMGMT\ManagementStation\support\OMActiveDirector y_Tools \Remote_Management_Advanced\Schema Extender • To use the LDIF fil
Table 26. delliDRACAssociationObject Class (continued) OID 1.2.840.113556.1.8000.1280.1.7.1.2 Attributes dellProductMembers dellPrivilegeMember Table 27. dellRAC4Privileges Class OID 1.2.840.113556.1.8000.1280.1.1.1.3 Description Defines the privileges (Authorization Rights) for CMC device.
Table 30. List of Attributes Added to the Active Directory Schema (continued) Assigned OID/Syntax Object Identifier Single Valued Description: List of dellRacDevices objects that belong to this role. This attribute is the forward link to the dellAssociationMembers backward link. Link ID: 12070 OID: 1.2.840.113556.1.8000.1280.1.1.2.2 Distinguished Name: (LDAPTYPE_DN 1.3.6.1.4.1.1466.115.121.1.
Table 30. List of Attributes Added to the Active Directory Schema (continued) Assigned OID/Syntax Object Identifier Single Valued Description: This attribute is the Current Rac Type for the dellRacDevice object and the backward link to the dellAssociationObjectMembers forward link. OID: 1.2.840.113556.1.8000.1280.1.1.2.13 Case Ignore String(LDAPTYPE_CASEIGNORESTRING 1.2.840.113556.1.4.
1. 2. 3. 4. 5. 6. In the MMC Console Root window, right-click a container. Select New > Dell Remote Management Object Advanced. On the New Object page, type a name for the new object. Select Privilege Object and click OK. Right-click the privilege object that you created, and then select Properties. Click the RAC Privileges tab and assign the privileges for the user or group. For more information about CMC user privileges, see Types of Users.
2. Select Microsoft Active Directory (Extended Schema). The settings to be configured for extended schema is displayed on the same page. 3. In the Common Settings section, specify the following: • • • Select Enable Active Directory and enter the timeout value for Active Directory in the AD Timeout field.
NOTE: You must configure at least one of the three addresses. CMC attempts to connect to each of the configured addresses one-by-one until it makes a successful connection. With Extended Schema, these are the FQDN or IP addresses of the domain controllers where this CMC device is located. To disable the certificate validation during an handshake (optional): racadm config -g cfgActiveDirectory -o cfgADCertValidationEnable 0 NOTE: In this case, you do not have to upload a CA certificate.
Authorization Of LDAP Users To authorize a user: 1. Search each configured group for the user's domain name within the member or uniqueMember attributes. An administrator can configure a user domain. 2. For every user group that the user belongs to, give the user appropriate user access rights and privileges. Configuring Generic LDAP Directory Service Using CMC Web Interface To configure the generic LDAP directory service: NOTE: You must have the Chassis Configuration Administrator privilege. 1.
NOTE: It is highly recommended to use the racadm testfeature -f LDAP command to test the LDAP settings for first time setups. This feature supports both IPv4 and IPv6. The required property changes include enabling LDAP logins, setting the server FQDN or IP, and configuring the base DN of the LDAP server. • $ racadm config -g cfgLDAP -o cfgLDAPEnable 1 • $ racadm config -g cfgLDAP -o cfgLDAPServer 192.168.0.
10 Configuring CMC For Single Sign-On Or Smart Card Login This section provides information to configure CMC for Smart Card login and Single Sign-On (SSO) login for Active Directory users. SSO uses Kerberos as an authentication method allowing users, who have signed in as an automatic- or single sign-on to subsequent applications such as Exchange.
CMC • • Each CMC must have an Active Directory account. CMC must be a part of the Active Directory domain and Kerberos Realm. Prerequisites For Single Sign-On Or Smart Card Login The pre-requisites to configure SSO or Smart Card logins are: • • • • • • Set up the kerberos realm and Key Distribution Center (KDC) for Active Directory (ksetup). A robust NTP and DNS infrastructure to avoid issues with clock drift and reverse lookup.
Internet Explorer To configure Internet Explorer for Single Sign-On: 1. In the Internet Explorer, select Tools > Internet Options. 2. On the Security tab, under Select a zone to view or change security settings, select Local Intranet. 3. Click Sites. The Local Intranet dialog box is displayed. 4. Click Advanced . The Local Intranet Advance Settings dialog box is displayed. 5. In the Add this site to the zone, type the name of CMC and the domain it belongs to and click Add.
A command success indicates that CMC is able to acquire Kerberos credentials and access the user's Active Directory account. If the command is not successful, resolve the error and run the command again. For more information, see the Chassis Management Controller for PowerEdge VRTX RACADM Command Line Reference Guide on dell.com/support/manuals.
11 Configuring CMC to Use Command Line Consoles This section provides information about the CMC command line console (or serial/Telnet/Secure Shell console) features, and explains how to set up the system so that you can perform systems management actions through the console. For information about using the RACADM commands in CMC through the command line console, see the Chassis Management Controller for PowerEdge VRTX RACADM Command Line Reference Guide.
To fix this issue, download hotfix 824810 from support.microsoft.com. For more information, you can also see Microsoft Knowledge Base article 824810. In the command line interface, you can manage session timeouts using the racadm command, racadm getconfig -g cfgSessionManagement. For more information, see the Chassis Management Controller Version for Dell PowerEdge VRTX Command Line Reference Guide.
Table 32. Cryptography Schemes (continued) Scheme Type Scheme • • Authentication HMAC-MD5-128 HMAC-MD5-96 Password Configure Public Key Authentication Over SSH You can configure up to six public keys that can be used with the service username over an SSH interface. Before adding or deleting public keys, make sure to use the view command to see what keys are already set up, so that a key is not accidentally overwritten or deleted.
You can also enter a passphrase to make the key secure. Ensure that you save the private key. 4. You have two options for using the public key: • • Save the public key to a file to upload later. Copy and paste the text from the Public key for pasting window when adding the account using the text option. Generating Public Keys for Systems Running Linux The ssh-keygen application for Linux clients is a command line tool with no graphical user interface.
To delete all public keys, run the following command: racadm sshpkauth –i svcacct –k all –d Configuring Terminal Emulation Software CMC supports a serial text console from a management station running one of the following types of terminal emulation software: • • Linux Minicom. Hilgraeve’s HyperTerminal Private Edition (version 6.3). Complete the tasks in the following subsections to configure the required type of terminal software.
Table 33. Minicom Settings (continued) Setting Description Required Setting Modem dialing and parameter settings Clear the init, reset, connect, and hangup settings so that they are blank. Connecting to Servers or Input Output Module Using Connect Command CMC can establish a connection to redirect the serial console of a server or I/O module. For servers, serial console redirection can be accomplished using: • CMC command line interface (CLI) or the RACADM connect command.
Configuring the Managed Server BIOS for Serial Console Redirection You can use a Remote Console session to connect to the managed system using the iDRAC web interface (see the iDRAC User’s Guide on dell.com/support/manuals). By default, the Serial communication in the BIOS is turned off. To redirect host text console data to Serial over LAN, you must enable console redirection through COM1. To change the BIOS setting: 1. Turn on the managed server. 2.
# all kernel and initrd paths are relative to /, e.g. # root (hd0,0) # kernel /boot/vmlinuz-version ro root= /dev/sdal # initrd /boot/initrd-version.img # #boot=/dev/sda default=0 timeout=10 #splashimage=(hd0,2)/grub/splash.xpm.gz serial --unit=1 --speed=57600 terminal --timeout=10 serial title Red Hat Linux Advanced Server (2.4.9-e.3smp) root (hd0,0) kernel /boot/vmlinuz-2.4.9-e.3smp ro root= /dev/sda1 hda=ide-scsi console=ttyS0 console= ttyS1,57600 initrd /boot/initrd-2.4.9-e.3smp.
l0:0:wait:/etc/rc.d/rc 0 l1:1:wait:/etc/rc.d/rc 1 l2:2:wait:/etc/rc.d/rc 2 l3:3:wait:/etc/rc.d/rc 3 l4:4:wait:/etc/rc.d/rc 4 l5:5:wait:/etc/rc.d/rc 5 l6:6:wait:/etc/rc.d/rc 6 # Things to run in every runlevel. ud::once:/sbin/update # Trap CTRL-ALT-DELETE ca::ctrlaltdel:/sbin/shutdown -t3 -r now # When our UPS tells us power has failed, assume we have a few # minutes of power left. Schedule a shutdown for 2 minutes from now.
12 Using FlexAddress and FlexAdress Plus This section provides information about FlexAddress, FlexAddress Plus, and configuring. NOTE: An Enterprise License must be installed on the CMC to use the Flexaddress feature.
. NOTE: Lock the SD card prior to inserting in the USB Memory Card Reader to prevent accidentally modifying any contents. Unlock the SD card before inserting into CMC. About FlexAddress Plus The FlexAddress Plus is a new feature added to the feature card version 2.0. It is an upgrade from FlexAddress feature card version 1.0. FlexAddress Plus contains more MAC addresses than the FlexAddress feature.
Use the following RACADM command to display all activated features on the chassis: racadm feature -s The command returns the following status message: Feature Name = FlexAddress Date/time Activated = 05 Oct 2013 - 11:50:49 Feature installed from SD-card serial number = CN0H871T1374036T00MXA00 Feature Name = FlexAddressPlus Date/time Activated = 05 Oct 2013 - 11:50:49 Feature installed from SD-card serial number = CN0H871T1374036T00MXA00 Feature Name = ExtendedStorage Current Status = redundant, active Date/
Configuring FlexAddress for Chassis-Level Fabric and Slots At the chassis level, you can enable or disable the FlexAddress feature for fabrics and slots. FlexAddress is enabled on a per-fabric–basis and then slots are selected for participation in the feature. Both fabrics and slots must be enabled to successfully configure FlexAddress.
For more information about the FlexAddress-related RACADM commands and data about the other factory-default properties, see the Chassis Management Controller for PowerEdge VRTX RACADM Command Line Reference Guide available at dell.com/cmcmanuals. Viewing World Wide Name or Media Access Control Addresses The WWN/MAC Summary page allows you to view the World Wide Name (WWN) configuration and Media Access Control (MAC) address of a slot in the chassis.
Viewing Basic WWN or MAC Address Information Using Web Interface To view WWN/MAC Address information for each server slot or all servers in a chassis, in the basic mode: 1. Click Server Overview > Properties > WWN/MAC The WWN/MAC Summary page displays the WWN/MAC Address Information. Alternatively, click Server Overview > Slot > Setup > FlexAddress to view the WWN/MAC Address information for a specific server slot. The FlexAddress page is displayed. 2.
Viewing WWN or MAC Address Information Using RACADM To view WWN/MAC address information for all servers or specific servers using RACADM, use the getflexaddr and getmacaddress subcommands. To display Flexaddress for the entire chassis, use the following RACADM command: racadm getflexaddr To display Flexaddress status for a particular slot, use the following RACADM command: racadm getflexaddr [-i ] where is a value from 1 to 4.
Table 36. FlexAddress Commands and Output Situation Command Output SD card in the active CMC module is bound to another service tag. $racadm featurecard -s The feature card inserted is valid and contains the following feature(s) FlexAddress: bound to another chassis, svctag = SD card SN = SD card in the active CMC module that is $racadm featurecard -s bound to the same service tag.
FlexAddress DELL SOFTWARE LICENSE AGREEMENT This is a legal agreement between you, the user, and Dell Products L.P. or Dell Global B.V. ("Dell"). This agreement covers all software that is distributed with the Dell product, for which there is no separate license agreement between you and the manufacturer or owner of the software (collectively the "Software"). This agreement is not for the sale of Software or any other intellectual property.
INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY OF LIABILTIY, WHETHER IN CONTRACT, STRICT LIABITLY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILTIY OF SUCH DAMAGE. U.S. GOVERNMENT RESTRICTED RIGHTS The software and documentation are "commercial items" as that term is defined at 48 C.F.R. 2.101, consisting of "commercial computer software" and "commercial computer software documentation" as such terms are used in 48 C.F.R. 12.
13 Managing Fabrics The chassis supports a fabric type, which is Fabric A. Fabric A is used by the single I/O Module, and is always connected to the on-board Ethernet adapters of the servers. The chassis has only one I/O module (IOM), where the IOM is a pass-through or switch module. The I/O Module is classified as group A. Chassis IOM uses a discrete data path called Fabric, and it is named A. The Fabric A supports only Ethernet.
Configuring Network Settings for IOM Using CMC Web Interface To configure the network settings for I/O Module: 1. In the left pane, click Chassis Overview, click I/O Module Overview, and then click Setup. Alternatively, to configure the network settings of the only available I/O module that is A, click A Gigabit Ethernet, and then click Setup. On the Configure I/O Module Network Settings page, type appropriate data, and then click Apply. 2.
14 Managing and Monitoring Power The PowerEdge VRTX chassis is the most power-efficient modular server enclosure. It is designed to include highly efficient power supplies and fans, has an optimized layout for the air to flow more easily through the system, and contains power-optimized components throughout the enclosure.
Redundancy Policies Redundancy policy is a configurable set of properties that determine how CMC manages power to the chassis. The following redundancy policies are configurable with or without dynamic PSU engagement: • • Grid redundancy Power supply redundancy Grid Redundancy Policy The purpose of the Grid redundancy policy is to enable a modular enclosure system to operate in a mode in which it can tolerate AC power failures.
To operate remaining PSUs at their maximum efficiency, use the following power redundancy modes: • • • PSU Redundancy mode with DPSE provides power efficiency. At least two supplies are online, with one PSU required to power the configuration, and one to provide redundancy in case of a PSU failure. PSU Redundancy mode offers protection against the failure of any one PSU, but offers no protection in the event of an AC grid loss.
Power Budgeting For Hardware Modules CMC offers a power budgeting service that allows you to configure power budget, redundancy, and dynamic power for the chassis. The power management service enables optimization of power consumption and reallocation of power to different modules on the basis of demand. CMC maintains a power budget for the enclosure that reserves the necessary wattage for all installed servers and components. CMC allocates power to the CMC infrastructure and the servers in the chassis.
According to the default server slot priority setting, power is equally apportioned to all slots. Changing the slot priorities allows administrators to prioritize the servers that are given preference for power allocations. If the more critical server modules are left at their default slot priority of 1, and the less critical server modules are changed to lower priority value of 2 or higher, the priority 1 server modules is powered on first.
Viewing Power Consumption Status Using CMC Web Interface In the left pane, click Chassis Overview > Power > Power Monitoring. The Power Monitoring page displays the power health, system power status, real-time power statistics, and real-time energy statistics. For more information, see the Online Help. NOTE: You can also view the power redundancy status under Power Supplies.
wait for eight-and-a-half minutes to determine if redundancy exists. Ensure that the redundancy state is healthy before initiating any failover owing to the health changes. NOTE: CMC does not perform a pre-check of these conditions when you change the redundancy policy to or from Grid redundancy. So, configuring the redundancy policy may immediately result in redundancy lost or a regained condition.
Table 39. Chassis Impact from PSU Failure or Removal PSU Configuration Dynamic PSU Engagement Firmware Response Grid Redundancy Disabled CMC alerts you about loss of Grid redundancy. Power Supply Redundancy Disabled CMC alerts you about loss of power supply redundancy. Grid Redundancy Enabled CMC alerts you about loss of Grid Redundancy. PSUs in standby mode (if any) are turned on to compensate for power budget lost from the PSU failure or removal.
• • • Remote Power Logging Interval Server Based Power Management Disable AC Power Recovery Power Conservation and Power Budget CMC conserves power when the user-configured maximum power limit is reached. When the demand for power exceeds the user configured System Input Power Cap, CMC reduces power to servers in reverse-priority order to free power for higher priority servers and other modules in the chassis.
External Power Management CMC power management is optionally controlled by the OpenManage Power Center (OMPC). For more information, see the OMPC User’s Guide.
To enable and set the redundancy policy: 1. Open a serial/Telnet/SSH text console to CMC and log in. 2. Set properties as needed: • To select a redundancy policy, type: racadm config -g cfgChassisPower -o cfgChassisRedundancyPolicy where is 1 (Grid Redundancy), and 2 (Power Supply Redundancy). The default value is 2.
• To determine the power remote logging interval, enter the following command: racadm getconfig -g cfgRemoteHosts -o cfgRhostsSyslogPowerLoggingInterval • The power remote logging feature is dependent on previously configured remote syslog hosts having been . Logging to one or more remote syslog hosts must be enabled, otherwise power consumption is logged. This can be done either through the web GUI or the RACADM CLI. For more information, see the remote syslog configuration instructions.
Executing Power Control Operations on the Chassis Using RACADM Open a serial/Telnet/SSH text console to CMC, log in, and type: racadm chassisaction -m chassis where is powerup, powerdown, powercycle, nongraceshutdown, or reset. Executing Power Control Operations on a Server You can remotely perform power management actions for multiple servers at a time or an individual server in the chassis. NOTE: The modular blade servers are in throttle state during CMC reboot or failover.
Executing Power Control Operations on the IOM Using RACADM To execute power control operations on the IOM using RACADM, open a serial/Telnet/SSH text console to CMC, log in, and type: racadm chassisaction -m switch where indicates the operation you want to execute: power cycle.
15 Managing Chassis Storage On the Dell PowerEdge VRTX, you can perform the following operations: • • • • • • • • View the status of physical disks drives and storage controllers. View the properties of controllers, physical disk drives, virtual disks, and enclosures. Set up controllers, physical disk drives, and virtual disks. Assign virtual adapters. Troubleshoot controller, physical disk drives, and virtual disks. Update storage components.
1. In the left pane, click Chassis Overview > Storage > Properties > Storage Overview. 2. On the Storage Overview page, you can: • • • • View the graphic summary of the physical disk drives installed in the chassis and their status. View the summary of all the storage components with links to their respective pages. View the used capacity and total capacity of the storage. View controller information.
• • Click to view the following attributes when the external controller is not in fault-tolerant mode: ○ One Shared PERC detected ○ One expanders detected ○ Shared PERC and expanders correctly cabled View the status of each attribute that indicates if the fault-tolerant criteria is fulfilled. NOTE: If the attribute in a fault-tolerant environment is not matching the criterion, then an Update Now option is displayed for that attribute. NOTE: A Learn How option is displayed against some of the attributes.
NOTE: Consider a VA assigned to server in the lower slot (3 or 4). When a half height server (slot 3 or 4) is replaced with a full height server, the full height server does not access the VA assigned to lower slots. Inserting a half height server again, provides access to the VA. Map or un-map a PERC Virtual Controller to blade: • • • Each External Shared PERC 8 card has four virtual adapters (VA).
1. 2. 3. 4. 5. Turn off the server modules. Click Server Overview > Power > Control > Power Off Server. Modify the security key on one or both of the existing non-fault-tolerant controllers so that the keys match. Power cycle the chassis. Verify if the controllers have matching keys. Viewing Controller Properties Using CMC Web Interface To view the controller properties: 1. In the left pane, click Chassis Overview > Controller. 2.
Configuring Storage Controller Settings Using CMC Web Interface Make sure at least one storage controller is installed in the chassis. Toconfigure the storage controller settings: 1. In the CMC Web interface, go to Chassis Overview > Storage > Controllers > Setup. 2. On the Controller Setup page, from the Controller drop-down menu, select the controller.
To change the operation mode using the CMC Web Interface, go to the Controllers Troubleshooting page by navigating to Chassis Overview > Storage Controllers, in the left pane and select the Disable Raid Controller or Enable Raid Controller option. To change the operational mode using the RACADM CLI: • • • Run the racadm raid enableperc:RAID.ChassisIntegrated.2-1 command to enable the Integrated 2 shared PERC 8 and Fault Tolerant mode, if second integrated shared PERC8 is disabled.
• • Enable RAID Controller — Enables the peer controller in fault-tolerant mode. If the Integrated 2 PERC is already disabled, then the Enable Raid Controller option is available in the drop-down menu. To enable or disable External Shared PERC 8 card controllers : ○ On the Controller Troubleshooting page, from the Actions drop-down menu for External Shared PERC 8 card in slot 5 or slot 6, select one of the following, and then click Apply.
Viewing Physical Disk Properties Using the CMC Web Interface Make sure that physical disks are installed on the chassis. To view the properties of physical disk drives: 1. In the left pane, go to Chassis Overview > Storage > Physical Disks. The Properties page is displayed. 2. To view properties of all the physical disk drives, under the Physical Disks section, click the .
For more information about using RACADM commands, see the Chassis Management Controller for PowerEdge VRTX RACADM Command Line Reference Guide. Recovering Physical Disks To recover a physical disks: 1. In the CMC Web Interface, go to Chassis Overview > Storage > Physical Disks > Setup. 2.
Managing Encryption Keys An encryption or security key, created on a controller, is used to lock or unlock access to secure virtual disks created on SEDs. You can create only one encryption key for an encryption-capable controller. You can create encryption keys by entering an encryption key identifier and passphrase, on the Controller Setup page. CMC also allows you to modify encryption key passphrases and delete encryption keys.
3. Click OK to proceed. After you delete the encryption key, all the SEDs that are not part of the virtual disks are secure-erased. For more information, see the Online Help. Deleting Encryption Key Using RACADM To delete an encryption key by running a RACADM command, use the following syntax: racadm raid deletesecuritykey:RAID.ChassisIntegrated.1-1 For more information, see the Chassis Management Controller PowerEdge VRTX RACADM Command Line Reference Guide.
The key ID used in unlocking is used only to identify the drives with matching the key ID. After the matching drives are found, the passphrase is used for unlocking the drives. Unlocking Foreign Configuration Using CMC Web Interface To unlock the foreign configuration: 1. In the left pane, click Chassis Overview > Storage > Controllers > Setup. 2. Navigate to the Setup page. 3. Click Click here to Unlock. The Physical Disks page is displayed. 4. Select the physical disks that you want to unlock. 5.
Applying Virtual Adapter Access Policy To Virtual Disks Make sure that physical disk drives are installed and the virtual disks are created. To apply the virtual adapter access policy: 1. In the left pane, click Chassis Overview > Storage > Virtual Disks > Assign. 2. On the Assign Virtual Disks page, under the Access Policy for Virtual Adapters section, from the Virtual Adapter drop-down menu, select Full Access to each physical disk drive. 3. Click Apply.
Viewing EMM Status and Attributes Using Web Interface To view the status and attributes of the EMM: Click Chassis Overview → Storage → Enclosures → Properties. The Enclosures page provides the EMM status and attributes of the enclosures in the chassis. Expand the integrated enclosure or external enclosures to view the status and attributes of the EMM. For more information, see the CMC Online Help.
Setting Asset Tag and Asset Name of the Enclosure Using Web Interface To set the asset tag and asset name of the enclosure, click Chassis Overview → Storage → Enclosures → Setup. Type the Asset Tag and Asset Name in the appropriate fields, and then click Apply. For more information, see the CMC Online Help. Setting Asset Tag and Asset Name of the Enclosure Using RACADM To set asset tag of the enclosure, use racadm raid set enclosures: Enclosure.External.0-0:RAID.ChassisSlot.5-1 –p AssetTag command.
Click Chassis Overview → Storage → Enclosures → Setup. Select the enclosure from the Enclosure drop-down menu, then enter the appropriate values for minimum and maximum for warning threshold temperatures of temp sensor 2 and 3. Type the Asset tag and Asset name in the appropriate fields, and then click Apply. For more information, see the CMC Online Help.
16 Managing PCIe Slots By default, all slots are unmapped. You can do the following: • • View the status of all PCIe Slots in the chassis. Assign or remove an assigned PCIe slot from the servers. Consider the following before assigning a PCIe slot to a server: • • • An empty PCIe slot cannot be assigned to a server that is turned on. A PCIe slot with an adapter assigned to a server cannot be assigned to another server if the currently-assigned server (source) is turned on.
Assigning PCIe Slots To Servers Using CMC Web Interface To assign PCIe slots to the servers: • In the left pane, click Chassis Overview > PCIe Overview > Setup > Mapping: PCIe Slots to Server Slots. On the Mapping: PCIe Slots to Server Slots page, in the Action column, from the Action drop-down menu, select the appropriate server name, and then click Apply. Note the following: • • • • • • • Without a license, the maximum number of PCIe slots that maybe mapped to a half-height server is two.
• • Preparing multiple cards for configuration by server BIOS Initializing all cards prior to blade node power-on All these processes require few seconds to complete which causes a delay in initialization of the PCIe cards. The PCIe Ride-through feature in CMC VRTX reduces this process cycle time. The PCIe Ride-through feature enables the following: • • The Server nodes are turned on quickly, thus turning on the PCIe cards quickly.
Configuring PCIe Ride-through Properties Status Using RACADM You can configure the PCIe power ride-through properties, by running the following commands: • • • • To disable the Ride-through feature, run the command, racadm setpciecfg ridethru –d To enable the Ride-through feature, run the command, racadm setpciecfg ridethru –e To reset the Ride-through timeout property, run the command, racadm setpciecfg ridethru –t To set the acceptable timeout range, run the command, racadm setpciecfg help ride
17 Troubleshooting and Recovery This section explains how to perform tasks related to recovering and troubleshooting problems on the remote system using the CMC web interface. • • • • • • • • • • • • • Viewing chassis information. Viewing the event logs. Gathering configuration information, error status, and error logs. Using the diagnostic console. Managing power on a remote system. Managing Lifecycle Controller jobs on a remote system. Reset components.
NOTE: Make sure that the CMC module is in a passive state before you begin. While the J_PWORD jumper is installed, the default administrator account and password is enabled and set to the following default values: username: root password: calvin The administrator account is reset regardless of whether the account has been removed, or the password was changed.
Supported Interfaces • • • CLI RACADM Remote RACADM Telnet RACADM racdump includes the following subsystems and aggregates the following RACADM commands. For more information about racdump, see the RACADM Command Line Reference Guide for CMC in PowerEdge VRTX. Table 43.
• ○ Resolution A: This configuration requires at least one power supply in side 1 (the left two slots) and one power supply in side 2 (the right two slots) to be present and functional in the modular enclosure. Additionally the capacity of each side must be enough to support the total power allocations for the chassis to maintain Grid redundancy. (For full Grid Redundancy operation, make sure that a full PSU configuration of four power supplies is available.
Viewing Event Logs You can view hardware- and chassis logs for information on system-critical events that occur on the managed system. Viewing Hardware Log CMC generates a hardware log of events that occur on the chassis. You can view the hardware log using the web interface and remote RACADM. NOTE: To clear the hardware log, you must have Clear Logs Administrator privilege. NOTE: You can configure CMC to send email or SNMP traps when specific events occur.
NOTE: • To clear the chassis log, you must have the Clear Logs Administrator privilege. Viewing Chassis Logs Using RACADM To view the chassis log information using RACADM, open a serial, Telnet, SSH text console to CMC, log in, and enter the following: racadm chassislog view This command displays the latest 25 chassis log entries.
1. In the left pane, click Chassis Overview > Setup > Chassis Backup. The Chassis Backup page is displayed. To save the chassis configuration, click Save. Override the default file path (optional) and click OK to save the file. The default backup file name contains the service tag of the chassis. This backup file can be used later to restore the settings and certificates for this chassis only. 2.
If an NTP server setting was configured with an invalid host name, you may see a trace log entry as follows: Aug 21 14:34:27 cmc ntpd_initres[1298]: host name not found: blabla Aug 21 14:34:27 cmc ntpd_initres[1298]: couldn't resolve `blabla', giving up on it For information on how to enter the gettracelog command to review the trace log using the CMC Web interface, see Using Diagnostic Console.
Table 44.
• Lower-left LED — This LED is multi-colored. When CMC is active and running, and there are no problems, the bottom LED is blue. If it is amber, a fault is detected. The fault may be caused by any of the following three events: ○ A core failure. In this case, the CMC board must be replaced. ○ A self-test failure. In this case, the CMC board must be replaced. ○ An image corruption. In this case, upload the CMC firmware image to recover the CMC.
2. Disconnect the enclosures. 3. Change the status of slots 5 and 6 to fault-tolerant mode. 4. Reconnect the enclosures in fault-tolerant cabling. Power cycle the chassis after disconnecting the enclosures and before reconnecting enclosures as, the drives retain the previous SCSI-3 Reservation until the chassis is power cycled.
18 Using LCD Panel Interface You can use the LCD panel on the chassis to perform configuration and diagnostics, and to obtain status information about the chassis and its contents. The following figure illustrates the LCD panel. The LCD screen displays menus, icons, pictures, and messages. Figure 4. LCD Display 1. LCD screen 2. Selection ("check") button 3.
Table 45. LCD Panel Navigational Icons (continued) Icon Normal Icon Highlighted Icon Name and Description Skip/Next — Highlight and press the center button to skip any changes and go to the next screen. No — Highlight and press the center button to answer "No" to a question and go to the next screen. Component Identify — Blinks the blue LED on a component. NOTE: There is a blinking blue rectangle around this icon when Component Identify is enabled.
IP Summary Menu The IP Summary screen displays the IP information about the CMC (IPv4 and IPv6), and each server that is installed on the chassis. Use the up and down arrow buttons to scroll through the list. Use the left and right arrow buttons to scroll selected messages that are longer than the screen. Use the up and down arrow buttons to select the Back icon and press the center button to return to the Enclosure menu.
Front Panel LCD Messages This section contains two subsections that list error and status information that is displayed on the front panel LCD. Error messages on the LCD have a format that is similar to the System Event Log (SEL) viewed from the CLI or Web interface. The tables in the error section list the error and warning messages that are displayed on the various LCD screens and the possible cause of the message. Text enclosed in angled brackets (< >) indicates that the text may vary.
Table 48. Fan Status (continued) Item Description RPM Current fan speed in RPM. Table 49. PSU Status Item Description Name/Location Example: PSU1, PSU2, and so on. Error Messages If there are no errors, No Errors is displayed. Else, error messages are listed where critical ones are first listed, and then the warning-related. Status Offline, Online, or Standby — Indicates the power status of a PSU. Maximum Wattage Maximum Wattage that PSU can supply to the system. Table 50.
Table 53. Blower Status (continued) Item Description Error Messages If there are no errors, No Errors is displayed. Else, error messages are listed where critical ones are first listed, and then the warning-related. RPM Current blower speed in RPM. Table 54. SPERC Status Item Description SPERC: Displays the SPERC name in the format SPERC n, where 'n' is the SPERC number. Example: SPERC 1, SPERC 2, and so on. Error Messages If there are no errors, No Errors is displayed.
Table 56. Hard Disk Drive Status (continued) Item Description State Offline, Online, or Standby — Indicates the power status of the hard disk drive. Table 57. Server Status Item Description Name/Location Example: Server 1, Server 2, and so on. No Errors If there are no errors, No Errors is displayed. Else, error messages are listed where critical ones are first listed, and then the warning-related. For more information, see "LCD Error Messages". Slot Name Chassis slot name. For example, SLOT-01.
19 Frequently Asked Questions This section lists the frequently asked questions about the following: • • • • • RACADM Managing and Recovering a Remote System Active Directory FlexAddress and FlexAddressPlus IOM Topics: • • • • • RACADM Managing and Recovering a Remote System Active Directory FlexAddress and FlexAddressPlus IOM RACADM After performing a CMC reset (using the RACADM racreset subcommand), when a command is entered, the following message is displayed: racadm Transport: ERROR: (R
The CMC web server is reset after the following occurrences: • • • • • Changing the network configuration or network security properties using the CMC web user interface. The cfgRacTuneHttpsPort property is changed (including when a config -f changes it). racresetcfg is used or a chassis configuration backup is restored. CMC is reset. A new SSL server certificate is uploaded. My DNS server doesn’t register my CMC? Some DNS servers only register names with a maximum of 31 characters.
The Dell-extended Active Directory Users and Computers Snap-In checks the mode and limits users in order to create objects across domains, if in a mixed mode. Does using CMC with Active Directory support multiple domain environments? Yes. The domain forest function level must be in Native mode or Windows 2003 mode. In addition, the groups among Association Object, RAC user objects, and RAC Device Objects (including Association Object) must be universal groups.
A feature card in the active CMC is active and installed in the chassis. The second card is ignored by CMC. Does the SD card have a write-protection lock on it? Yes it does. Before installing the SD card into the CMC module, verify the write protection latch is in the unlock position. The FlexAddress feature cannot be activated if the SD card is write protected. In this situation, the $racadm feature -s command returns this message: No features active on the chassis.