Owners Manual
Table Of Contents
- About your system
- Performing initial system configuration
- Pre-operating system management applications
- Navigation keys
- About system setup
- Entering System Setup
- System Setup main screen
- System BIOS screen
- System Information screen
- Memory Settings screen
- Processor Settings screen
- SATA Settings screen
- Boot Settings screen
- Integrated Devices screen
- Serial Communications screen
- System Profile Settings screen
- System Security screen
- Miscellaneous Settings screen
- About Boot Manager
- About Dell Lifecycle Controller
- Changing the boot order
- Choosing the system boot mode
- Assigning a system or setup password
- Using your system password to secure your system
- Deleting or changing an existing system and/or setup password
- Operating with a setup password enabled
- Embedded system management
- iDRAC Settings utility
- Processor core licensing
- Networking configurations
- Installing sled components
- Recommended tools
- Removing the sled
- Installing the sled
- Inside the sled
- Cable cover
- Cooling shroud
- System memory
- Hard drives/SSDs
- Hard drive/SSD to node assignment
- Removing a hard drive/SSD
- Installing a hard drive/SSD
- Shutdown procedure for servicing a hard drive/SSD
- Configuring the boot drive
- Removing a 2.5 inch hard drive/SSD from a hard-drive/SSD carrier
- Installing a 2.5 inch hard drive/SSD in a hard-drive/SSD carrier
- Removing a 1.8 inch SSD from the SSD carrier
- Installing a 1.8 inch SSD in the SSD carrier
- Hard-drive/SSD backplane
- SSD cage assembly
- Easy restore module
- System battery
- System board
- Control panel
- Troubleshooting your system
- Using system diagnostics
- Jumpers and connectors
- Technical specifications
- Getting help
Figure 7. Isolated networks configuration
Table 7. Isolated networks configuration icon description
Icon Description
Network path
Trunk configuration or LAG
Local Area Network 1
Local Area Network 2
Enhanced network adapter isolation configuration
In this configuration, the individual node network adapters are isolated from other nodes in the sled, with a dedicated pass-
through module (PTM) port mapped to LAN on motherboard (LOM) on each nodes. The LOM1 on each node is operational,
and it is recommended that the LOM2 must be disabled in the operating system. This configuration functions when the TOR
connections for each node within a sled are on the network layer 2 domain.
This configuration enhances security, as security features like firewalls are installed in the external rack switches, and is useful in
multi-tenant configurations.
Pre-operating system management applications
23