Owners Manual
Table Of Contents
- About your system
- Performing initial system configuration
- Pre-operating system management applications
- Navigation keys
- About system setup
- Entering System Setup
- System Setup main screen
- System BIOS screen
- System Information screen
- Memory Settings screen
- Processor Settings screen
- SATA Settings screen
- Boot Settings screen
- Integrated Devices screen
- Serial Communications screen
- System Profile Settings screen
- System Security screen
- Miscellaneous Settings screen
- About Boot Manager
- About Dell Lifecycle Controller
- Changing the boot order
- Choosing the system boot mode
- Assigning a system or setup password
- Using your system password to secure your system
- Deleting or changing an existing system and/or setup password
- Operating with a setup password enabled
- Embedded system management
- iDRAC Settings utility
- Processor core licensing
- Networking configurations
- Installing sled components
- Recommended tools
- Removing the sled
- Installing the sled
- Inside the sled
- Cable cover
- Cooling shroud
- System memory
- Hard drives/SSDs
- Hard drive/SSD to node assignment
- Removing a hard drive/SSD
- Installing a hard drive/SSD
- Shutdown procedure for servicing a hard drive/SSD
- Configuring the boot drive
- Removing a 2.5 inch hard drive/SSD from a hard-drive/SSD carrier
- Installing a 2.5 inch hard drive/SSD in a hard-drive/SSD carrier
- Removing a 1.8 inch SSD from the SSD carrier
- Installing a 1.8 inch SSD in the SSD carrier
- Hard-drive/SSD backplane
- SSD cage assembly
- Easy restore module
- System battery
- System board
- Control panel
- Troubleshooting your system
- Using system diagnostics
- Jumpers and connectors
- Technical specifications
- Getting help
Network adapter isolation configuration
In this configuration, the individual node network adapters are isolated from the other nodes in the sled. Any inter-node network
traffic is routed to the external switches before being directed back to the destination nodes. The external ports on the
embedded network switch (or switches) are configured into a single trunk or LAG for throughput and redundancy. The external
rack switches are on the same network in this configuration.
NOTE: The network adapter isolation configuration also supports uplinks of all four ports to a single external rack switch.
This configuration enhances security, as security features like firewalls are installed in the external rack switches, and is useful in
multi-tenant configurations.
Figure 6. Network adapter isolation configuration
Table 6. Network adapter isolation configuration icon description
Icon Description
Network path
Single trunk configuration or LAG
Isolated networks configuration
In this configuration, each of the two LOMs on a node is mapped to separate pass-through modules (PTM) and external rack
switches, to provide maximum redundancy. The two external switches are on separate networks in this configuration.
22
Pre-operating system management applications