DellメーカーiDRAC8の使用説明書/サービス説明書
ページ先へ移動 of 344
Integrated Dell Remote Access Controller 8 (iDRAC8) Version 2.00.00.00 User's Guide.
Notes, Cautions, and Warnings NOTE: A NOTE indicates important information that helps you make better use of your computer. CAUTION: A CAUTION indicates either potential damage to hardware or loss of data and tells you how to avoid the problem. WARNING: A WARNING indicates a potential for property damage, personal injury, or death.
Contents 1 Overview............................................................................................................... 16 Benefits of Using iDRAC With Lifecycle Controller ...................................................................
Enabling or Disabling Default Password Warning Message Using Web Interface ...................... 41 Enabling or Disabling Warning Message to Change Default Login Password Using RACADM ..................................................................
Backing Up Server Profile Using iDRAC Web Interface ............................................................... 76 Backing Up Server Profile Using RACADM ................................................................................... 77 Scheduling Automatic Backup Server Profile .
Enabling or Disabling OS to iDRAC Pass-through Using iDRAC Settings Utility ........................ 97 Obtaining Certificates ......................................................................................................................... 97 SSL Server Certificates .
Switching From Serial Console to RAC Serial ............................................................................ 123 Switching From RAC Serial to Serial Console ............................................................................ 123 Communicating With iDRAC Using IPMI SOL .
Configuring Browser to Enable Active Directory SSO ............................................................... 167 Configuring iDRAC SSO Login for Active Directory Users .............................................................. 168 Configuring iDRAC SSO Login for Active Directory Users Using Web Interface .
Viewing Lifecycle Log Using Web Interface ............................................................................... 186 Viewing Lifecycle Log Using RACADM ....................................................................................... 186 Exporting Lifecycle Controller Logs .
13 Managing Storage Devices........................................................................... 203 Understanding RAID Concepts ........................................................................................................ 204 What Is RAID? .
Preparing to Remove PCIe SSD .................................................................................................. 237 Erasing PCIe SSD Device Data ..........................................................................................
15 Managing Virtual Media.................................................................................261 Supported Drives and Devices ......................................................................................................... 262 Configuring Virtual Media .
18 Using SMCLP................................................................................................... 283 System Management Capabilities Using SMCLP ............................................................................. 283 Running SMCLP Commands .
Deploying Operating System Using Remote File Share .................................................................. 306 Managing Remote File Share ......................................................................................................
Virtual Media ......................................................................................................................................332 vFlash SD Card ....................................................................................
1 Overview The Integrated Dell Remote Access Controller (iDRAC) is designed to make server administrators more productive and improve the overall availability of Dell servers. iDRAC alerts administrators to server issues, helps them perform remote server management, and reduces the need for physical access to the server.
Remote Services (WS-Management) interfaces for remote deployment integrated with Dell OpenManage Essentials and partner consoles. For more information on Lifecycle Controller GUI, see Lifecycle Controller User’s Guide and for remote services, see Lifecycle Controller Remote Services User’s Guide available at dell.
– Virtual disks: * Create virtual disks * Edit virtual disks cache policies * Check virtual disk consistency * Initialize virtual disks * Encrypt virtual disks * Assign or unassign dedicated hot spa.
• Use iDRAC Service Module to: – View Operating System (OS) information – Replicate Lifecycle Controller logs to operating system logs – Automatic system recovery options – Populate Windows Management Instrumentation (WMI) information – Integrate with Technical Support Report.
• Update device firmware using TFTP or HTTP. • Out-of-band monitor and alert the performance index of CPU, memory, and I/O modules. • Configure warning threshold for inlet Temperature. • Configure persistence policy for virtual addresses, initiator, and storage targets.
– Automatic — Using iDRAC Service Module that automatically invokes the OS Collector tool. – Manual — Using OS Collector tool • Erase system and user data • Six users can launch the Virtual Console at any point of time.
• E-mail — License is attached to an email that is sent after requesting it from the technical support center. • Self-service portal — A link to the Self-Service Portal is available from iDRAC. Click this link to open the licensing Self-Service Portal on the internet.
For more information about this utility and to download this tool, click here. License Component State or Condition and Available Operations The following table provides the list of license operations available based on the license state or condition.
Feature iDRAC8 Basic iDRAC8 Express iDRAC8 Express for Blades iDRAC8 Enterprise Web-based GUI Yes Yes Yes Yes Racadm command line (local/remote) Yes Yes Yes Yes SMASH-CLP (SSH-only) Yes Yes Yes Yes Te.
Feature iDRAC8 Basic iDRAC8 Express iDRAC8 Express for Blades iDRAC8 Enterprise Single sign-on No No No Yes PK authentication No Yes Yes Yes Remote Presence Power control Yes Yes Yes Yes Boot control .
Feature iDRAC8 Basic iDRAC8 Express iDRAC8 Express for Blades iDRAC8 Enterprise Health Monitoring Full agent-free monitoring Yes Yes Yes Yes Predictive failure monitoring Yes Yes Yes Yes SNMPv1, v2, a.
Feature iDRAC8 Basic iDRAC8 Express iDRAC8 Express for Blades iDRAC8 Enterprise Embedded configuration tools Yes Yes Yes Yes Auto-Discovery No Yes Yes Yes Remote OS deployment No Yes Yes Yes Embedded .
Feature iDRAC8 Basic iDRAC8 Express iDRAC8 Express for Blades iDRAC8 Enterprise Crash screen capture No Yes Yes Yes Crash video capture No No No Yes Boot capture No No No Yes Manual reset for iDRAC Ye.
Interface or Protocol Description are encrypted using 128-bit SSL to provide privacy and integrity. Any connection to the HTTP port is redirected to HTTPS. Administrators can upload their own SSL certificate through an SSL CSR generation process to secure the Web server.
Interface or Protocol Description Reference Guide available at dell.com/support/manuals . For details about SMCLP, see Using SMCLP . NOTE: Telnet is not a secure protocol and is disabled by default. Telnet transmits all data, including passwords in plain text.
Interface or Protocol Description • DTMF Web site — dmtf.org/standards/profiles/ iDRAC Port Information The following ports are required to remotely access iDRAC through firewalls. These are the default ports iDRAC listens to for connections. Optionally, you can modify most of the ports.
Port Number Function 445 Common Internet File System (CIFS) 636 LDAP Over SSL (LDAPS) 2049 Network File System (NFS) 123 Network Time Protocol (NTP) 3269 LDAPS for global catalog (GC) * Configurable port Other Documents You May Need In addition to this guide, the following documents available on the Dell Support website at dell.
• The Glossary provides information about the terms used in this document. The following system documents are available to provide more information: • The iDRAC Overview and Feature Guide provides information about iDRAC, its licensable features, and license upgrade options.
– For Client Systems Management documents — dell.com/clientsystemsmanagement – For Serviceability Tools documents — dell.com/serviceabilitytools – For OpenManage Connections Enterprise Systems Management documents — dell.
2 Logging into iDRAC You can log in to iDRAC as an iDRAC user, as a Microsoft Active Directory user, or as a Lightweight Directory Access Protocol (LDAP) user. The default user name and password is root and calvin, respectively. You can also log in using Single Sign-On or Smart Card.
If the domain is not specified in the user name, select the Active Directory domain from the Domain drop-down menu. 5. For an LDAP user, in the Username and Password fields, enter your LDAP user name and password. Domain name is not required for LDAP login.
3. Enter the Smart Card PIN for local Smart Card users. You are logged into the iDRAC. NOTE: If you are a local user for whom Enable CRL check for Smart Card Logon is enabled, iDRAC attempts to download the CRL and checks the CRL for the user's certificate.
• You have logged into your system using a valid Active Directory user account. • Single Sign-On option is enabled during Active Directory configuration. To login to iDRAC using Web interface: 1. Log in to your management station using a valid Active Directory account.
To validate the certificate for using remote RACADM: 1. Convert the certificate in DER format to PEM format (using openssl command line tool): openssl x509 -inform pem -in [yourdownloadedderformatcert.crt] –outform pem -out [outcertfileinpemformat.pem] –text 2.
Multiple iDRAC Sessions The following table provides the list of multiple iDRAC sessions that are possible using the various interfaces. Table 5. Multiple iDRAC Sessions Interface Number of Sessions i.
NOTE: Continue is enabled only if the passwords entered in the New Password and Confirm Password fields match. For information about the other fields, see the iDRAC Online Help . Changing Default Login Password Using RACADM To change the password, run the following RACADM command: racadm set iDRAC.
3 Setting Up Managed System and Management Station To perform out-of-band systems management using iDRAC, you must configure iDRAC for remote accessibility, set up the management station and managed system, and configure the supported Web browsers.
NOTE: In case of blade servers, you can configure the network setting using the Chassis LCD panel only during initial configuration of CMC. After the chassis is deployed, you cannot reconfigure iDRAC using the Chassis LCD panel.
IPv4 Settings IPv6 Settings IPMI Settings VLAN Settings Network Settings To configure the Network Settings: NOTE: For information about the options, see the iDRAC Settings Utility Online Help .
Common Settings If network infrastructure has DNS server, register iDRAC on the DNS. These are the initial settings requirements for advanced features such as Directory services—–Active Directory or LDAP, Single Sign On, and smart card. To register iDRAC: 1.
VLAN Settings You can configure iDRAC into the VLAN infrastructure. To configure VLAN Settings: 1. Under Enable VLAN ID , select Enabled . 2. In the VLAN ID box, enter a valid number from 1 to 4094. 3. In the Priority box, enter a number from 0 to 7 to set the priority of the VLAN ID.
You can enable auto-discovery using iDRAC Settings Utility or using Lifecycle Controller. For information on using Lifecycle Controller, see Lifecycle Controller User’s Guide available at dell.
You can configure individual servers using different configuration files mapped using individual host names. In an environment that has different servers with specific requirements, you can use different XML filenames to distinguish each server.
With Dell PowerEdge servers, the iDRAC identifies itself with vendor ID: iDRAC . Therefore, you must add a new ‘Vendor Class’ and create a ‘scope option’ under it for ‘code 60,’ and then enable the new scope option for the DHCP server.
13. Select 060iDRAC option. 14. Enter the string value that must be sent to the iDRAC (along with a standard DHCP provided IP address). The string value will help in importing the correct XML configuration file.
To enable Auto Config: 1. In the iDRAC Web interface, go to Overview → iDRAC Settings → Network . The Network page is displayed. 2. In the Auto Config section, select one of the following options to enable Auto Config : • Enable Once — Configures the component only once using the XML file referenced by the DHCP server.
NOTE: The attributes are not applicable to the INI configuration file. Hash Password in Server Configuration Profile The new hash passwords can be optionally exported in the server configuration profile. When importing server configuration profile, you can uncomment the existing password attribute or the new password hash attribute(s).
• Blade servers — The management station must be on the same network as CMC. For more information on isolating CMC network from the managed system’s network, see Chassis Management Controller User’s Guide available at dell.com/support/manuals .
For information about the options, see the iDRAC Online Help . 3. Click Apply . The system location details is saved in iDRAC. Setting Up Managed System Location Using RACADM To specify the system location details, use the System.Location group objects.
– Maximum Performance (Performance Optimized) : * Reduced probability of memory or CPU throttling. * Increased probability of turbo mode activation. * Generally, higher fan speeds at idle and stress loads. – Minimum Power (Performance per Watt Optimized) : * Optimized for lowest system power consumption based on optimum fan power state.
– Custom — Enter the percentage value. The allowable range for minimum fan speed PWM is dynamic based on the system configuration. The first value is the idle speed and the second value is the configuration max (which may or may not be 100% based on system configuration).
Object Description Usage Example The output is: Object value modified successfully. If a system does not support a particular air exhaust temperature limit, then when you run the following command: racadm set system.thermalsettings.AirE xhaustTemp 0 The following error message is displayed: ERROR: RAC947: Invalid object value specified.
Object Description Usage Example FanSpeedMax OffsetVal • Getting this variable reads the fan speed offset value in %PWM for Max Fan Speed Offset setting. • This value depends on the system. • Use FanSpeedOffset to set this value using index value 3 Values from 0-100 racadm get system.
Object Description Usage Example MFSMinimumL imit Read Minimum limit for MFS Values from 0 to MFSMaximumLimi t Default is 255 (means None) To display the lowest value that can be set using MinimumFanSpeed option.
The thermal settings are configured. Configuring Supported Web Browsers iDRAC is supported on Internet Explorer, Mozilla Firefox, Google Chrome, and Safari Web browsers. For information about the versions, see the Readme available at dell.com/support/manuals .
• Scripting of Java applets: Enable 5. Go to Tools → Internet Options → Advanced . 6. Under Browsing : • Always send URLs as UTF-8: selected • Disable script debugging (Internet Explorer): s.
NOTE: When you log in to iDRAC Web interface using Internet Explorer 9.x, sometimes contents in few pages are not shown properly. To resolve this, press <F12>. In the Internet Explorer 9 Debug window, select Document Mode as Internet Explorer 7 .
• Spanish (es) • Japanese (ja) • Simplified Chinese (zh-cn) The ISO identifiers in parentheses denote the supported language variants. For some supported languages, resizing the browser window to 1024 pixels wide is required to view all features.
Repository Manager User's Guide . iDRAC automatically provides a difference between the BIOS and the firmware that is installed on the server and the repository location or FTP site. All applicable updates contained in the repository are applied to the system.
Scheduling Automatic Firmware Updates Updating Firmware Using CMC Web Interface Updating Firmware Using DUP Updating Firmware Using Remote RACADM Updating Firmware Using Lifecycle Controller Remote Se.
When you click Install , Install and Reboot or Install Next Reboot , the message Updating Job Queue is displayed. 6. Click Job Queue to display the Job Queue page, where you can view and manage the staged firmware updates or click OK to refresh the current page and view the status of the firmware update.
When you click Install , Install and Reboot or Install Next Reboot , the message Updating Job Queue is displayed. 6. Click Job Queue to display the Job Queue page, where you can view and manage the staged firmware updates or click OK to refresh the current page and view the status of the firmware update.
Updating Device Firmware Using TFTP You can directly connect to the TFTP site from iDRAC to perform the firmware updates. You can use the Windows based update packages (DUPs) and a catalog file available on the TFTP site instead of creating custom repositories.
• You have Server Control privilege to update firmware for devices other than iDRAC. To update device firmware using HTTP: 1. In the iDRAC Web interface, go to Overview → iDRAC Settings → Update and Rollback . The Firmware Update page is displayed.
Scheduling Automatic Firmware Updates You can create a periodic recurring schedule for iDRAC to check for new firmware updates. At the scheduled day and time, iDRAC connects to the specified network share (CIFS or NFS) or the FTP, checks for new updates and applies or stages all applicable updates.
Scheduling Automatic Firmware Update Using RACADM To schedule automatic firmware update, use the following commands: • To enable automatic firmware update: racadm set lifecycleController.lcattributes.AutoUpdate.Enable 1 • To view the status of automatic firmware update: racadm get lifecycleController.
NOTE: While updating the iDRAC firmware using the DUP utility in Linux, if you see error messages such as usb 5-2: device descriptor read/64, error -71 displayed on the console, ignore them.
Viewing and Managing Staged Updates Using iDRAC Web interface To view the list of scheduled jobs using iDRAC Web interface, go to Overview → Server → Job Queue . The Job Queue page displays the status of jobs in the Lifecycle Controller job queue.
• Lifecycle Controller-Remote Services Related Links Rollback Firmware Using iDRAC Web Interface Rollback Firmware Using CMC Web Interface Rollback Firmware Using RACADM Rollback Firmware Using Life.
Rollback Firmware Using RACADM To rollback device firmware using racadm: 1. Check the rollback status and the FQDD using the swinventory command: racadm swinventory For the device for which you want to rollback the firmware, the Rollback Version must be Available .
• Install a TFTP server on the operating system. Backing Up Server Profile You can backup the system configuration, including the installed firmware images on various components such as BIOS, RAID, NIC, iDRAC, Lifecycle Controller, and Network Daughter Cards (NDCs) and the configuration settings of those components.
5. Click Backup Now . The backup operation is initiated and you can view the status on the Job Queue page. After a successful operation, the backup file is created in the specified location. Backing Up Server Profile Using RACADM To backup the server profile using RACADM, use systemconfig backup subcommand.
time period is created. The backup server profile operation is performed at the scheduled date and time. Scheduling Automatic Backup Server Profile Using RACADM To enable automatic backup use the command: racadm set lifecyclecontroller.
Import events are recorded in the Lifecycle Log. Related Links Restore Operation Sequence Importing Server Profile Using iDRAC Web Interface To import the server profile using iDRAC Web interface: 1. Go to Overview → iDRAC Settings → Server Profile → Import .
Monitoring iDRAC Using Other Systems Management Tools You can discover and monitor iDRAC using Dell Management Console or Dell OpenManage Essentials. You can also use Dell Remote Access Configuration Tool (DRACT) to discover iDRACs, update firmware, and set up Active Directory.
4 Configuring iDRAC iDRAC enables you to configure iDRAC properties, set up users, and set up alerts to perform remote management tasks. Before you configure iDRAC, make sure that the iDRAC network settings and a supported browser is configured, and the required licenses are updated.
Modifying Network Settings Configuring Services Configuring Front Panel Display Setting Up Managed System Location Configuring Time Zone and NTP Setting Up iDRAC Communication Configuring User Account.
NOTE: Changing the network settings may terminate the current network connections to iDRAC. Modifying Network Settings Using Web Interface To modify the iDRAC network settings: 1. In the iDRAC Web interface, go to Overview → iDRAC Settings → Network .
racadm set iDRAC.IPv4.Netmask 255.255.255.0 racadm set iDRAC.IPv4.Gateway 192.168.0.120 racadm set iDRAC.IPv4.DHCPEnable 0 racadm set iDRAC.IPv4.DNSFromDHCP 0 racadm set iDRAC.IPv4.DNS1 192.168.0.5 racadm set iDRAC.IPv4.DNS2 192.168.0.6 racadm set iDRAC.
– cfgRacTuneIpRangeEnable – cfgRacTuneIpRangeAddr – cfgRacTuneIpRangeMask • With set command, use the objects in the iDRAC.IPBlocking group: – RangeEnable – RangeAddr – RangeMask The cfgRacTuneIpRangeMask or the RangeMask property is applied to both the incoming IP address and to the cfgRacTuneIpRangeAddr or RangeAddr property.
• SSH — Access iDRAC through firmware RACADM. • Telnet — Access iDRAC through firmware RACADM • Remote RACADM — Remotely access iDRAC. • SNMP Agent — Enables support for SNMP queries (GET, GETNEXT, and GETBULK operations) in iDRAC. • Automated System Recovery Agent — Enable Last System Crash Screen.
– iDRAC.Racadm – iDRAC.SNMP For more information about these objects, see iDRAC8 RACADM Command Line Interface Reference Guide available at dell.com/support/manuals .
VNC server disables Virtual Console and allows only Virtual Media. After termination of the VNC session, VNC server restores the original state of Virtual Console (enabled or disabled). NOTE: • When iDRAC NIC is in shared mode and the host system is power cycled, the network connection is lost for a few seconds.
disabled when configuring the VNC server settings in iDRAC, then to connect to the VNC Viewer do the following: In the VNC Viewer dialog box, enter the iDRAC IP address and the VNC port number in the VNC Server field. The format is <iDRAC IP address:VNC port number> For example, if the iDRAC IP address is 192.
If you select None , home message is not displayed on the server LCD front panel. 3. Enable Virtual Console indication (optional). If enabled, the Live Front Panel Feed section and the LCD panel on the server displays the Virtual console session active message when there is an active Virtual Console session.
Configuring System ID LED Setting Using RACADM To configure system ID LED, use the setled command. For more information, see the iDRAC8 RACADM Command Line Interface Reference Guide available at dell.
• BIOS Boot Manager NOTE: • BIOS Setup (F2), Lifecycle Controller (F10), BIOS Boot Manager (F11) only support boot once enabled. • Virtual Console does not support permanent boot configuration. It is always boot once. • The first boot device setting in iDRAC Web Interface overrides the System BIOS boot settings.
For more information, see Windows documentation. 3. Use Server Administrator to enable the Auto Recovery timer, set the Auto Recovery action to Reset , Power Off , or Power Cycle , and set the timer in seconds (a value between 60 - 480). For more information, see the Dell OpenManage Server Administrator Installation Guide at dell.
• In shared mode, the host operating system's IP address is used. • In dedicated mode, you must provide a valid IP address of the host operating system.
• Windows Server 2012 SP1 • SLES 10 SP4 (64-bit) • SLES 11 SP2 (64-bit) • RHEL 5.9 (32-bit and 64-bit) • RHEL 6.4 • vSphere v5.0 U2 ESXi • vSphere v5.1 U1 ESXi • vSphere v5.5 ESXi On servers with Windows 2008 SP2 64-bit operating system, the iDRAC Virtual CD USB Device is not discovered automatically (or enabled).
• Turn off and turn on the system. On systems with RHEL 5.9 operating system, if the USB NIC was disabled and if you turn off the system or vice-versa, when the system is turned on and if the USB NIC is enabled, the USB NIC device is not active automatically.
Do not enter 169.254.0.3 and 169.254.0.4 IPs. These IPs are reserved for the USB NIC port on the front panel when a A/A cable is used. 5. Click Apply to apply the settings. 6. Click Test Network Configuration to check if the IP is accessible and the link is established between the iDRAC and the host operating system.
Login Type Certificate Type How to Obtain SHA-2 certificates are also supported. Smart Card login as a local or Active Directory user • User certificate • Trusted CA certificate • User Certificate — Export the smart card user certificate as Base64-encoded file using the card management software provided by the smart card vendor.
Authority is a business entity that is recognized in the Information Technology industry for meeting high standards of reliable screening, identification, and other important security criteria.
After the CA approves the CSR and issues the SSL server certificate, it can be uploaded to iDRAC. The information used to generate the CSR, stored on the iDRAC firmware, must match the information contained in the SSL server certificate, that is, the certificate must have been generated using the CSR created by iDRAC.
iDRAC resets and the new certificate is applied. The iDRAC is not available for a few minutes during the reset. NOTE: You must reset iDRAC to apply the new certificate. Until iDRAC is reset, the existing certificate is active. Uploading Server Certificate Using RACADM To upload the SSL server certificate, use the sslcertupload command.
The Upload Custom SSL Certificate Signing Certificate page is displayed. 3. Click Browse and select the custom SSL certificate signing certificate file. Only Public-Key Cryptography Standards #12 (PKCS #12) compliant certificate is supported. 4. If the certificate is password protected, in the PKCS#12 Password field, enter the password.
3. A pop-up message is displayed asking you to reset iDRAC immediately or at a later time. Click Reset iDRAC or Reset iDRAC Later as required. After iDRAC resets, a new self-signed certificate is generated.
Creating an iDRAC Configuration File The configuration file .cfg can be: • Created • Obtained from racadm getconfig -f <filename>.cfg command or racadm get -f <filename>.cfg • Obtained from racadm getconfig -f <filename>.cfg command or racadm get -f <filename>.
• Use the racresetcfg subcommand to reset the iDRAC to the default setting, and then run the racadm config -f <filename>.cfg or racadm set -f <filename>.cfg command. Make sure that the .cfg file includes all required objects, users, indexes, and other parameters.
Modifying the iDRAC IP Address When you modify the iDRAC IP address in the configuration file, remove all unnecessary <variable> = value entries. Only the actual variable group’s label with "[" and "]" remains, including the two <variable> = value entries pertaining to the IP address change.
• Disable the iDRAC Local Configuration using iDRAC Settings — Disables access to modify the configuration settings in iDRAC Settings utility. • Disable the iDRAC Local Configuration using RACADM — Disables access to modify the configuration settings in Local RACADM.
5 Viewing iDRAC and Managed System Information You can view iDRAC and managed system’s health and properties, hardware and firmware inventory, sensor health, storage devices, network devices, and view and terminate user sessions. For blade servers, you can also view the flex address information.
• RAID controller • Batteries • CPUs • DIMMs • HDDs • Backplanes • Network Interface Cards (integrated and embedded) • Video card • SD card • Power Supply Units (PSUs) • Fans •.
NOTE: The Storage ROMB battery settings are available only if the system has a ROMB with a battery. • Fan (available only for rack and tower servers) — Provides information about the system fans —fan redundancy and fans list that display fan speed and threshold values.
View Sensor Information For Using Web Interface Using RACADM For more information, see the iDRAC8 RACADM Command Line Interface Reference Guide available at dell.
The four system utilization parameters are: • CPU Utilization - There are individual Resource Monitoring counters (RMCs) for each CPU core which are aggregated to provide cumulative utilization of all the cores in the system. This utilization is based on time spent in active state and time spent in inactive state.
– You can reset the peak utilization for a particular sensor. Click Reset Historical Peak . You must have Configure privilege to reset the peak value. • Performance Metrics section: – View status and present reading – View or specify the warning threshold utilization limit.
The collected data is represented in a graphical format to track the 10% and 1% levels. The logged temperature data can be cleared only before shipping from the factory. An event is generated if the system continues to operate above the normally supported temperature threshold for a specified operational time.
centigrade, the system automatically calculates and displays the Fahrenheit value. Similarly, if you enter Fahrenheit, the value for Centigrade is displayed. 3. Click Apply . The values are configured. NOTE: Changes to default thresholds are not reflected in the historical data chart since the chart limits are for fresh air limit values only.
Viewing FlexAddress Mezzanine Card Fabric Connections In blade servers, FlexAddress allows the use of persistent, chassis-assigned World Wide Names and MAC addresses (WWN/MAC) for each managed server port connection.
The Sessions page displays the session ID, username, IP address, and session type. For more information about these properties, see the iDRAC Online Help . 2. To terminate the session, under the Terminate column, click the Trashcan icon for a session.
6 Setting Up iDRAC Communication You can communicate with iDRAC using any of the following modes: • iDRAC Web Interface • Serial connection using DB9 cable (RAC serial or IPMI serial) - For rack a.
Mode of Communication Supported Protocol Supported Commands Prerequisite Firmware RACADM SSH Telnet Firmware RACADM Firmware RACADM is installed and enabled Local RACADM IPMI Local RACADM Local RACADM is installed. Remote Services [1] WS-MAN WinRM (Windows) OpenWSMAN (Linux) WinRM is installed (Windows) or OpenWSMAN is installed (Linux).
Based on where the managed system is in its boot process, you can see either the POST screen or the operating system screen. This is based on the configuration: SAC for Windows and Linux text mode screens for Linux. 4. Enable RAC serial or IPMI serial connections in iDRAC.
• IPMI basic mode — Supports a binary interface for program access, such as the IPMI shell (ipmish) that is included with the Baseboard Management Utility (BMU).
• Using config command: racadm config -g cfgIpmiSerial -o cfgIpmiSerialFlowControl 1 • Using set command: racadm set iDRAC.IPMISerial.FlowControl 1 4. Set the IPMI serial channel minimum privilege level: • Using config command: racadm config -g cfgIpmiSerial -o cfgIpmiSerialChanPrivLimit <level> • Using set command: racadm set iDRAC.
Switching From Serial Console to RAC Serial To switch to RAC Serial Interface communication mode when in Serial Console Mode, use the following key sequence: <Esc> +<Shift> <9> The k.
NOTE: This is applicable only for iDRAC on rack and tower servers. 1. Turn on or restart the system. 2. Press <F2>. 3. Go to System BIOS Settings → Serial Communication . 4. Specify the following values: • Serial Communication — On With Console Redirection • Serial Port Address — COM2.
• Using config command: racadm config -g cfgIpmiSol o cfgIpmiSolMinPrivilege <level> • Using set command: racadm set iDRAC.IPMISol.MinPrivilege 1 where <level> is 2 (User), 3 (Operator), 4 (Administrator). NOTE: The IPMI SOL minimum privilege level determines the minimum privilege to activate IPMI SOL.
– Using set command: racadm set iDRAC.SSH.Port <port number> You can use tools such as: • IPMItool for using IPMI protocol • Putty/OpenSSH for using SSH or Telnet protocol Related Links SO.
NOTE: Run OpenSSH from a VT100 or ANSI terminal emulator on Windows. Running OpenSSH at the Windows command prompt does not result in full functionality (that is, some keys do not respond and no graphics are displayed). Before using SSH or Telnet to communicate with iDRAC, make sure to: 1.
NOTE: If required, you can change the default SSH or Telnet session time-out at Overview → iDRAC Settings → Network → Services . 1. Start a shell.
Configuring Backspace Key For Your Telnet Session Depending on the Telnet client, using the <Backspace> key may produce unexpected results. For example, the session may echo ^h . However, most Microsoft and Linux Telnet clients can be configured to use the <Backspace> key.
The iDRAC Settings Network page is displayed. 2. For IPMI Settings , specify the values. For information about the options, see the iDRAC Settings Utility Online Help . 3. Click Back , click Finish , and then click Yes . The IPMI over LAN settings are configured.
• Using config command: racadm config -g cfgRacTuning -o cfgRacTuneRemoteRacadmEnable 1 • Using set command: racadm set iDRAC.Racadm.Enable 1 To disable the remote capability, type one of the following command: • Using config command: racadm config -g cfgRacTuning -o cfgRacTuneRemoteRacadmEnable 0 • Using set command: racadm set iDRAC.
default=0 timeout=10 #splashimage=(hd0,2)/grub/splash.xpm.gz serial --unit=1 --speed=57600 terminal --timeout=10 serial title Red Hat Linux Advanced Server (2.4.9-e.3smp) root (hd0,0) kernel /boot/vmlinuz-2.4.9-e.3smp ro root=/dev/sda1 hda=ide-scsi console=ttyS0 console=ttyS1,115200n8r initrd /boot/initrd-2.
pf::powerfail:/sbin/shutdown -f -h +2 "Power Failure; System Shutting Down" #If power was restored before the shutdown kicked in, cancel it. pr:12345:powerokwait:/sbin/shutdown -c "Powe.
Table 11. SSH Cryptography Schemes Scheme Type Scheme Asymmetric Cryptography Diffie-Hellman DSA/DSS 512-1024 (random) bits per NIST specification Symmetric Cryptography • AES256-CBC • RIJNDAEL256.
Generating Public Keys for Windows To use the PuTTY Key Generator application to create the basic key: 1. Start the application and select either SSH-2 RSA or SSH-2 DSA for the type of key to generate. (SSH-1 is not supported). The supported key generation algorithms are RSA and DSA only.
3. Under SSH Key Configurations , select Upload SSH Key(s) and click Next . The Upload SSH Key(s) page is displayed. 4. Upload the SSH keys in one of the following ways: • Upload the key file. • Copy the contents of the key file into the text box For more information, see iDRAC Online Help.
Deleting SSH Keys Using Web Interface To delete the SSH key(s): 1. In Web interface, go to Overview → iDRAC Settings → Network → User Authentication → Local Users . The Users page is displayed. 2. In the User ID column, click a user ID number.
7 Configuring User Accounts and Privileges You can setup user accounts with specific privileges ( role-based authority ) to manage your system using iDRAC and maintain system security. By default iDRAC is configured with a local administrator account.
4. Enable the user ID and specify the user name, password, and access privileges for the user. You can also enable SNMPv3 authentication for the user. For more information about the options, see the iDRAC Online Help . 5. Click Apply . The user is created with the required privileges.
When you manually enable or disable a user with the racadm config subcommand, you must specify the index with the - i option. Observe that the cfgUserAdminIndex object displayed in the previous example contains a '#' character. It indicates that it is a read-only object.
NOTE: You can use the getconfig and config commands or get and set commands. 1. Locate an available user index using the command syntax: • Using getconfig command: racadm getconfig -g cfgUserAdmin -i <index> • Using get command: racadm get iDRAC.
Table 13. iDRAC User Privileges Current Generation Prior Generation Description Login Login to iDRAC Enables the user to log in to iDRAC. Configure Configure iDRAC Enables the user to configure iDRAC. Configure Users Configure Users Enables the user to allow specific users to access the system.
Certificate Authority (CA)—the root certificate of which is also uploaded into iDRAC. For iDRAC to authenticate to any domain controller—whether it is the root or the child domain controller—that domain controller must have an SSL-enabled certificate signed by the domain’s CA.
Importing iDRAC Firmware SSL Certificate iDRAC SSL certificate is the identical certificate used for iDRAC Web server. All iDRAC controllers are shipped with a default self-signed certificate.
Figure 1. Configuration of iDRAC with Active Directory Standard Schema In Active Directory, a standard group object is used as a role group. A user who has iDRAC access is a member of the role group. To give this user access to a specific iDRAC, the role group name and its domain name need to be configured on the specific iDRAC.
NOTE: The Bit Mask values are used only when setting Standard Schema with the RACADM. Single Domain Versus Multiple Domain Scenarios If all the login users and role groups, including the nested groups, are in the same domain, then only the domain controllers’ addresses must be configured on iDRAC.
The Active Directory Configuration and Management Step 4a of 4 page is displayed. 8. Enter the location of Active Directory global catalog server(s) and specify privilege groups used to authorize users. 9. Click a Role Group to configure the control authorization policy for users under the standard schema mode.
For Bit Mask values for specific Role Group permissions, see Default Role Group Privileges . Enter the FQDN of the domain controller, not the FQDN of the domain. For example, enter servername.dell.com instead of dell.com . At least one of the three addresses is required to be configured.
address> racadm config -g cfgLanNetworking -o cfgDNSServer2 <secondary DNS IP address> • Using set command: racadm set iDRAC.IPv4.DNSFromDHCP 0 racadm set iDRAC.IPv4.DNSFromDHCP.DNS1 <primary DNS IP address> racadm set iDRAC.IPv4.DNSFromDHCP.
groups of users, or iDRAC device objects as required. The users and iDRAC user groups can be members of any domain in the enterprise. However, each association object can be linked (or, may link users, groups of users, or iDRAC device objects) to only one privilege object.
Accumulating Privileges Using Extended Schema The Extended Schema Authentication mechanism supports Privilege Accumulation from different privilege objects associated with the same user through different Association Objects.
Configuring Active Directory With Extended Schema Using RACADM Extending Active Directory Schema Extending your Active Directory schema adds a Dell organizational unit, schema classes and attributes, and example privileges and association objects to the Active Directory schema.
Classes and Attributes Table 15. Class Definitions for Classes Added to the Active Directory Schema Class Name Assigned Object Identification Number (OID) delliDRACDevice 1.2.840.113556.1.8000.1280.1.7.1.1 delliDRACAssociation 1.2.840.113556.1.8000.1280.
Table 18. dellRAC4Privileges Class OID 1.2.840.113556.1.8000.1280.1.1.1.3 Description Defines the privileges (Authorization Rights) for iDRAC Class Type Auxiliary Class SuperClasses None Attributes de.
Table 21. List of Attributes Added to the Active Directory Schema Attribute Name/Description Assigned OID/Syntax Object Identifier Single Valued dellPrivilegeMember List of dellPrivilege Objects that belong to this Attribute. 1.2.840.113556.1.8000.1280.
Attribute Name/Description Assigned OID/Syntax Object Identifier Single Valued TRUE if the user has Virtual Media rights on the device. dellIsTestAlertUser TRUE if the user has Test Alert User rights on the device. 1.2.840.113556.1.8000.1280.1.1.2.1 0 Boolean (LDAPTYPE_BOOLEAN 1.
<DVDdrive>:SYSMGMTManagementStationsupportOMActiveDirectory_SnapIn64 For more information about the Active Directory Users and Computers Snap-in, see Microsoft documentation.
NOTE: iDRAC association object is derived from the group and its scope is set to Domain Local. 1. In the Console Root (MMC) window, right-click a container. 2. Select New → Dell Remote Management Object Advanced . This New Object window is displayed.
3. Click the Privilege Object tab to add the privilege object to the association that defines the user’s or user group’s privileges when authenticating to an iDRAC device. Only one privilege object can be added to an Association Object. Adding iDRAC Devices or iDRAC Device Groups To add iDRAC devices or iDRAC device groups: 1.
• Using config command: racadm config -g cfgActiveDirectory -o cfgADEnable 1 racadm config -g cfgActiveDirectory -o cfgADType 1 racadm config -g cfgActiveDirectory -o cfgADRacName <RAC common nam.
• Using config command: racadm config -g cfgLanNetworking -o cfgDNSServersFromDHCP 1 • Using set command: racadm set iDRAC.IPv4.DNSFromDHCP 1 3. If DHCP is disabled in iDRAC or you want to manuall.
Testing Active Directory Settings Using RACADM To test the Active Directory settings, use the testfeature command. For more information, see the iDRAC8 RACADM Command Line Interface Reference Guide available at dell.
7. Click Role Group . The Generic LDAP Configuration and Management Step 3b of 3 page is displayed. 8. Specify the group distinguished name, the privileges associated with the group, and click Apply .
164.
8 Configuring iDRAC for Single Sign-On or Smart Card Login This section provides information to configure iDRAC for Smart Card login (for local users and Active Directory users), and Single Sign-On (SSO) login (for Active Directory users.) SSO and smart card login are licensed features.
Registering iDRAC as a Computer in Active Directory Root Domain To register iDRAC in Active Directory root domain: 1. Click Overview → iDRAC Settings → Network → Network . The Network page is displayed. 2. Provide a valid Preferred/Alternate DNS Server IP address.
A keytab file is generated. NOTE: If you find any issues with iDRAC user for which the keytab file is created, create a new user and a new keytab file. If the same keytab file which was initially created is again executed, it does not configure correctly.
Configuring iDRAC SSO Login for Active Directory Users Before configuring iDRAC for Active Directory SSO login, make sure that you have completed all the prerequisites. You can configure iDRAC for Active Directory SSO when you setup an user account based on Active Directory.
Enabling or Disabling Smart Card Login Uploading Smart Card User Certificate Before you upload the user certificate, make sure that the user certificate from the smart card vendor is exported in Base64 format.
Uploading Trusted CA Certificate For Smart Card Using RACADM To upload trusted CA certificate for smart card login, use the usercertupload object. For more information, see the iDRAC8 RACADM Command Line Interface Reference Guide available at dell.com/ support/manuals .
Enabling or Disabling Smart Card Login Using Web Interface To enable or disable the Smart Card logon feature: 1. In the iDRAC Web interface, go to Overview → iDRAC Settings → User Authentication → Smart Card . The Smart Card page is displayed. 2.
9 Configuring iDRAC to Send Alerts You can set alerts and actions for certain events that occur on the managed system. An event occurs when the status of a system component is greater than the pre-defined condition.
• Select Enable to enable alert generation or perform an event action. • Select Disable to disable alert generation or disable an event action. 3. Click Apply to save the setting.
• Critical 4. Click Apply . The Alert Results section displays the results based on the selected category and severity. Filtering Alerts Using RACADM To filter the alerts, use the eventfilters command. For more information, see the iDRAC8 RACADM Command Line Interface Reference Guide available at dell.
Setting Alert Recurrence Event You can configure iDRAC to generate additional events at specific intervals if the system continues to operate at a temperature which is greater than the inlet temperature threshold limit. The default interval is 30 days.
• eventfilters command. • cfgIpmiPefAction object with config command. For more information, see the iDRAC8 RACADM Command Line Interface Reference Guide available at dell.
The alert destinations are configured. 7. In the SNMP Trap Format section, select the protocol version to be used to send the traps on the trap destination(s) — SNMP v1 , SNMP v2 , or SNMP v3 and click Apply . NOTE: The SNMP Trap Format option applies only for SNMP Traps and not for IPMI Traps.
Configuring IP Alert Destinations Using iDRAC Settings Utility You can configure alert destinations (IPv4, IPv6, or FQDN) using the iDRAC Settings utility. To do this: 1. In the iDRAC Settings utility , go to Alerts . The iDRAC Settings Alerts page is displayed.
where [index] is the email destination index. 0 disables the email alert and 1 enables the alert. The email destination index can be a value from 1 through 4. For example, to enable email with index 4, enter the following command: racadm set iDRAC.EmailAlert.
• Using set command: racadm set iDRAC.RemoteHosts.SMTPServerIPAddress <SMTP E-mail Server IP Address> • Using config command: racadm config -g cfgRemoteHosts -o cfgRhostsSmtpServerIpAddr <.
Message ID Description DIS Auto-Discovery ENC Storage Enclosr FAN Fan Event FSD Debug HWC Hardware Config IPA DRAC IP Change ITR Intrusion JCP Job Control LC Lifecycle Contr LIC Licensing LNK Link Sta.
Message ID Description RDU Redundancy RED FW Download RFL IDSDM Media RFLA IDSDM Absent RFM FlexAddress SD RRDU IDSDM Redundancy RSI Remote Service SEC Security Event SEL Sys Event Log SRD Software RA.
Message ID Description VME Virtual Media VRM Virtual Console WRK Work Note 183.
10 Managing Logs iDRAC provides Lifecycle log that contains events related to system, storage devices, network devices, firmware updates, configuration changes, license messages, and so on. However, the system events are also available as a separate log called System Event Log (SEL).
If no arguments are specified, the entire log is displayed. To display the number of SEL entries: racadm getsel -i To clear the SEL entries: racadm clrsel For more information, see iDRAC8 RACADM Command Line Interface Reference Guide available at dell.
Filtering Lifecycle Logs Exporting Lifecycle Controller Logs Using Web Interface Adding Comments to Lifecycle Logs Viewing Lifecycle Log Using Web Interface To view the Lifecycle Logs, click Overview → Server → Logs → Lifecycle Log .The Lifecycle Log page is displayed.
• Local — Export the Lifecycle Controller logs to a location on the local system. NOTE: While specifying the network share settings, it is recommended to avoid special characters for user name and password or percent encode the special characters.
Configuring Remote System Logging Using RACADM To configure the remote syslog server settings, use one of the following: • Objects in the cfgRemoteHosts group with the config command. • Objects in the iDRAC.SysLog group with the set command. For more information, see the iDRAC8 RACADM Command Line Interface Reference Guide available at dell.
11 Monitoring and Managing Power You can use iDRAC to monitor and manage the power requirements of the managed system. This helps to protect the system from power outages by appropriately distributing and regulating the power consumption on the system.
Monitoring Power Using RACADM To view the power monitoring information, use the System.Power group objects with the get command or the cfgServerPower object with the getconfig command. For more information, see the iDRAC8 RACADM Command Line Interface Reference Guide available at dell.
• Power Off System • NMI (Non-Masking Interrupt) • Graceful Shutdown • Reset System (warm boot) • Power Cycle System (cold boot) 3. Click Apply . For more information, see the iDRAC Online Help . Executing Power Control Operations Using RACADM To perform power actions, use the serveraction command.
650W to 525W. From that point onwards, the system's performance is dynamically adjusted to maintain power consumption so as to not exceed the user-specified threshold of 525W. If the power cap value is set to be lower than the minimum recommended threshold, iDRAC may not be able maintain the requested power cap.
NOTE: The Power Configuration link is available only if the server power supply unit supports power monitoring. The iDRAC Settings Power Configuration page is displayed. 2. Select Enabled to enable the Power Cap Policy Else, select Disabled . 3. Use the recommended settings, or under User Defined Power Cap Policy , enter the required limits.
• System.Power.PFC.Enable For more information, see the iDRAC8 RACADM Command Line Interface Reference Guide available at dell.com/support/manuals . Configuring Power Supply Options Using iDRAC Settings Utility To configure the power supply options: 1.
12 Inventory, Monitoring, and Configuring Network Devices You can inventory, monitor, and configure the following network devices: • Network Interface Cards (NICs) • Converged Network Adapters (CN.
Additional properties may be displayed when using RACADM or WS-MAN in addition to the properties displayed in the iDRAC Web interface. Inventory and Monitoring FC HBA Devices You can remotely monitor the health and view the inventory of the Fibre Channel Host Bus Adapters (FC HBA) devices in the managed system.
• View and configure the virtual addresses for network devices (for example, NIC, CNA, FC HBA) • Configure the initiator (for iSCSI and FCoE) and storage target settings (for iSCSI, FCoE, and FC) • Specify persistence or clearance of the configured values over a system AC power loss, cold, and warm system resets.
Manufacturer Type • QLE2662 PCIe FC16 Emulex • LPM16002 Mezz FC16 • LPe16000 PCIe FC16 • LPe16002 PCIe FC16 • LPM16002 Mezz FC16 • OCm14104-UX-D rNDC 10Gb • OCm14102-U2-D bNDC 10Gb • O.
Enabling or Disabling I/O Identity Optimization Using Web Interface To enable or disable I/O Identity Optimization: 1. In the iDRAC Web interface, go to Overview → Hardware → Network Devices . The Network Devices page is displayed. 2. Click the I/O Identity Optimization tab, select the I/O Identity Optimization option to enable this feature.
Default Values for Persistence Policy Persistence Policy AC Power Loss Cold Boot Warm Boot Virtual Address: Auxiliary Powered Devices Not selected Selected Selected Virtual Address: Non- Auxiliary Pow.
Table 23. iSCSI Initiator —Default Values iSCSI Initiator Default Values in IPv4 mode Default Values in IPv6 mode IscsiInitiatorIpAddr 0.0.0.0 :: IscsiInitiatorIpv4Addr 0.0.0.0 0.0.0.0 IscsiInitiatorIpv6Addr :: :: IscsiInitiatorSubnet 0.0.0.0 0.0.0.
iSCSI Storage Target Attributes Default Values in IPv4 mode Default Values in IPv6 mode FirstTgtChapId Value Cleared Value Cleared FirstTgtChapPwd Value Cleared Value Cleared FirstTgtIpVer Ipv4 ConnectSecondTgt Disabled Disabled SecondTgtIpAddress 0.0.
13 Managing Storage Devices In the iDRAC 2.00.00.00 release, iDRAC expands its agent-free management to include direct configuration of the new PERC9 controllers. It enables you to remotely configure the storage components attached to your system at run-time.
alarms, and so on) associated with external enclosures. Physical disks can be contained in an enclosure or attached to the backplane of a system. In addition to managing the physical disks contained in the enclosure, you can monitor the status of the fans, power supply, and temperature probes in an enclosure.
concepts, as well as some familiarity with how the RAID controllers and operating system view disk space on your system. What Is RAID? RAID is a technology for managing the storage of data on the physical disks that reside or are attached to the system.
• Stripe element size — The amount of disk space consumed by a stripe element. For example, consider a stripe that contains 64KB of disk space and has 16KB of data residing on each disk in the stripe. In this case, the stripe element size is 16KB and the stripe size is 64KB.
• RAID Level 0 (Striping) • RAID Level 1 (Mirroring) • RAID Level 5 (Striping With Distributed Parity) • RAID Level 6 (Striping With Additional Distributed Parity) • RAID Level 50 (Striping .
RAID 1 characteristics: • Groups n + n disks as one virtual disk with the capacity of n disks. The controllers currently supported by Storage Management allow the selection of two disks when creating a RAID 1. Because these disks are mirrored, the total storage capacity is equal to one disk.
RAID 5 characteristics: • Groups n disks as one large virtual disk with a capacity of ( n -1) disks. • Redundant information (parity) is alternately stored on all disks. • When a disk fails, the virtual disk still works, but it is operating in a degraded state.
RAID 6 characteristics: • Groups n disks as one large virtual disk with a capacity of ( n -2) disks. • Redundant information (parity) is alternately stored on all disks. • The virtual disk remains functional with up to two disk failures. The data is reconstructed from the surviving disks.
RAID 50 characteristics: • Groups n * s disks as one large virtual disk with a capacity of s *( n -1) disks, where s is the number of spans and n is the number of disks within each span. • Redundant information (parity) is alternately stored on all disks of each RAID 5 span.
RAID 60 characteristics: • Groups n * s disks as one large virtual disk with a capacity of s *( n -2) disks, where s is the number of spans and n is the number of disks within each span. • Redundant information (parity) is alternately stored on all disks of each RAID 6 span.
RAID 10 characteristics: • Groups n disks as one large virtual disk with a capacity of ( n /2) disks, where n is an even integer. • Mirror images of the data are striped across sets of physical disks. This level provides redundancy through mirroring.
RAID Level Data Availability Read Performanc e Write Performanc e Rebuild Performanc e Minimum Disks Required Suggested Uses logs, and critical information. RAID 5 Good Sequential reads: good. Transactiona l reads: Very good Fair, unless using writeback cache Fair N + 1 (N = at least two disks) Databases and other read intensive transactional uses.
Supported Controllers Supported RAID Controllers The iDRAC interfaces support the following PERC9 controllers: • PERC H830 • PERC H730P • PERC H730 • PERC H330 The iDRAC interfaces support the.
Feature Name PERC 9 Controllers PERC 8 Controllers PCIe SSD H830 H730 P H730 H330 H810 H710P H710 H310 Check virtual disk consistency Real- time Real- time Real- time Real- time Staged Staged Staged S.
Feature Name PERC 9 Controllers PERC 8 Controllers PCIe SSD H830 H730 P H730 H330 H810 H710P H710 H310 Check Consistency Rate Real- time Real- time Real- time Real- time Staged Staged Staged Staged No.
Feature Name PERC 9 Controllers PERC 8 Controllers PCIe SSD H830 H730 P H730 H330 H810 H710P H710 H310 Configure Backplane mode Real- time Real- time Real- time Real- time Not applica ble Not applicab.
For more information on the displayed properties and to use the filter options, see iDRAC Online Help . Monitoring Storage Device Using RACADM To view the storage device information, use the raid or storage subcommand. For more information, see the iDRAC RACADM Command Line Reference Guide available at dell.
When deleting virtual disks, all assigned global hot spares may be automatically unassigned when the last virtual disk associated with the controller is deleted. If you reset the configuration, the virtual disks are deleted and all the hot spares are unassigned.
1. Press <Ctrl+R> while restarting the server, and then select the required controller. 2. Press <F2> and select the Convert to RAID capable option, and then complete the operation. NOTE: • This task is not supported on PERC hardware controllers running in HBA mode.
Before creating a virtual disk, you should be familiar with the information in Considerations Before Creating Virtual Disks. You can create a Virtual Disk using the Physical Disks attached to the PERC controller. To create a Virtual Disk, you must have the Server Control user privilege.
b. From the Controller drop-down menu, select the controller for which you want to create the virtual disk. c. From the Layout drop-down menu, select the RAID level for the Virtual Disk.
performance since subsequent read requests can retrieve data quickly from the cache then from the disk. However, data loss may occur in the event of a system failure which prevents that data from being written on a disk. Other applications may also experience problems when actions assume that the data is available on the disk.
Initializing Virtual Disks Initializing virtual disks erases the all the data on the disk but does not change the virtual disk configuration. You must initialize a virtual disk that is configured before it is used. NOTE: Do not initialize virtual disks when attempting to recreate an existing configuration.
NOTE: Full initialize is supported only in real-time. Only few controllers support full initialization. Encrypting Virtual Disks When encryption is disabled on a controller (that is, the security key is deleted), manually enable encryption for virtual disks created using SED drives.
– No Read Ahead – Read Ahead • Edit Policy: Write Cache — Change the write cache policy to one of the following options: – Write Through – Write Back – Force Write Back • Edit Policy: .
• Create, change, or delete security keys Related Links Configuring Controller Properties Importing or Auto Importing Foreign Configuration Clearing Foreign Configuration Resetting Controller Config.
In addition, the Patrol Read operation suspends during heavy I/O activity and resumes when the I/O is complete. NOTE: For more information on how often the Patrol Read operation runs when in auto mode, see the respective controller documentation.
each encryption-capable controller. The security key is managed using the Local Key Management (LKM) feature. LKM is used to generate the key ID and the password or key required to secure the virtual disk. If you are using LKM, you must create the encryption key by providing the Security Key Identifier and the Passphrase.
• To create, modify, or delete security key to encrypt virtual drives: racadm storage createsecuritykey:<Controller FQDD> -key <Key id> -passwd <passphrase> racadm storage modifyse.
This task is not supported on PERC hardware controllers running in HBA mode. NOTE: It is not recommended to remove an external enclosure cable while the operating system is running on the system. Removing the cable could result in a foreign configuration when the connection is re-established.
physical disk contains a foreign configuration (virtual disk) by checking the physical disk state. If the physical disk state is Foreign, then the physical disk contains all or some portion of a virtual disk. You can clear or erase the virtual disk information from the newly attached physical disks.
Based on the selected operation mode, the settings are applied. Resetting Controller Configuration Using RACADM To reset the controller configuration, use the following command: racadm storage resetconfig:<Controller FQDD> For more information, see the iDRAC RACADM Command Line Reference Guide available at dell.
SMART performs predictive failure analysis on each disk and sends alerts if a disk failure is predicted. The controllers check physical disks for failure predictions and, if found, pass this information to iDRAC.
Level Cell (SLC) and Multi-Level Cell (MLC) NAND flash technology with a high-speed PCIe 2.0 or PCIe 3.0 compliant interface. Using iDRAC interfaces, you can view and configure NVMe PCIe SSDs.
To view PCIe SSD backplane information: racadm storage get enclosures NOTE: For all the mentioned commands, PERC devices are also displayed. For more information, see the iDRAC RACADM Command Line Reference Guide available at dell.
If the job is not created, a message indicating that the job creation was not successful is displayed. Also, the message ID and the recommended response action is displayed. If the job is created successfully, a message indicating that the job ID is created for the selected controller is displayed.
4. From the Apply Operation Mode drop-down menu, select one of the following options: • At Next Reboot — Select this option to apply the actions during the next system reboot.
Viewing Universal Slots Setting SGPIO Mode Configuring Backplane Mode The 13th generation Dell PowerEdge servers supports a new internal storage topology, where two storage controllers (PERCs) can be connected to a set of internal drives through a single expander.
• Split 4. From the Apply Operation Mode drop-down menu, select Apply Now to apply the actions immediately, and then click Apply . A job ID is created. 5. Go to the Job Queue page and verify that it displays the status as Completed for the job. 6. Power cycle the system for the setting to take affect.
The output is: BackplaneRequestedMode=SplitMode 9. Run the following command to cold reboot the server: serveraction powercycle 10. After the system completes POST and CSIOR, type the following command to verify the backplanerequestedmode : get storage.
Setting SGPIO Mode The storage controller can connect to the backplane in I2C mode (default setting for Dell backplanes) or Serial General Purpose Input/Output (SGPIO) mode. This connection is required for blinking LEDs on the drives. Dell PERC controllers and backplane support both these modes.
• Overview → Storage → Pending Operations 2. Select one of the following from the Apply Operation Mode drop-down menu: • Apply Now — Select this option to apply the settings immediately. This option is available for PERC 9 controllers only. If there are jobs to be completed, then this option is grayed-out.
The Pending Operations page is displayed. 2. From the Component drop-down menu, select the controller for which you want to view, commit, or delete the pending operations.
Storage Devices — Apply Operation Scenarios Case 1: Selected an Apply Operation (Apply Now, At Next Reboot, or At Scheduled Time) and there are no existing pending operations If you have selected Ap.
– Click OK to remain on the page to perform more storage configuration operations. – Click Pending Operations to view the pending operations for the device. Until the job is created on the selected controller, these pending operations are not applied.
• Overview → Storage → Virtual Disks → Identify - Displays the Identify Virtual Disks page where you can blink or unblink the virtual disks. 2. If you are on the Identify Component LED page: • Select or deselect all component LEDs — Select the Select/Deselect All option and click Blink to start blinking the component LEDs.
14 Configuring and Using Virtual Console You can use the virtual console to manage a remote system using the keyboard, video, and mouse on your management station to control the corresponding devices on a managed server. This is a licensed feature for rack and tower servers.
Screen Resolution Refresh Rate (Hz) 1024x768 60, 70, 72, 75, 85 1280x1024 60 It is recommended that you configure your monitor display resolution to 1280x1024 pixels or higher.
Related Links Configuring Virtual Console Configuring IE to Use ActiveX Plug-in You must configure the IE browser settings before you launch and run ActiveX based Virtual Console and Virtual Media applications. The ActiveX applications are delivered as signed CAB files from the iDRAC server.
Additional Settings for Windows Vista or Newer Microsoft Operating Systems The Internet Explorer browsers in Windows Vista or newer operating systems have an additional security feature called Protected Mode . To launch and run ActiveX applications in Internet Explorer browsers with Protected Mode : 1.
The Java Cache viewer is displayed. 2. Delete the items titled iDRAC Virtual Console Client. Importing CA Certificates to Management Station When you launch Virtual Console or Virtual Media, prompts are displayed to verify the certificates.
Configuring Web Browsers to Use Virtual Console Launching Virtual Console Configuring Virtual Console Using Web Interface To configure Virtual Console using iDRAC Web interface: 1. Go to Overview → Server → Virtual Console . The Virtual Console page is displayed.
While launching Virtual Console using 32-bit or 64-bit IE browsers, the required plug-in (Java or ActiveX) is available in the respective browser. The Internet Options settings are common for both the browsers. While launching the Virtual Console using Java plug-in, occasionally you may see a Java compilation error.
• Control Panel → Power Options → High–Performance → Advanced Settings → Hard Disk → Turnoff Hard Disk After <time_out> Launching Virtual Console Using URL To launch the Virtual Console using the URL: 1. Open a supported Web browser and in the address box, type the following URL in lower case: https://iDRAC_ip/console 2.
NOTE: If the remote server is powered off, the message ’No Signal’ is displayed. The Virtual Console Viewer title bar displays the DNS name or the IP address of the iDRAC you are connected to from the management station. If iDRAC does not have a DNS name, then the IP address is displayed.
If synchronization problems continue, do the following additional change in the <user_home>/.gconf/ desktop/gnome/peripherals/mouse/%gconf.xml file: Change the values for motion_threshold and motion_acceleration to -1 .
Java-based Virtual Console Session running on Windows Operating System • Ctrl+Alt+Del key is not sent to the managed system, but always interpreted by the management station.
– echo "1" > /proc/sys/kernel/sysrq • When Pass all keystrokes to server is enabled, the magic SysRq keys are sent to the operating system on the managed system.
15 Managing Virtual Media Virtual media allows the managed server to access media devices on the management station or ISO CD/DVD images on a network share as if they were devices on the managed server.
Figure 4. Virtual Media Setup Supported Drives and Devices The following table lists the drives supported through virtual media. Table 27. Supported Drives and Devices Drive Supported Storage Media Virtual Optical Drives • Legacy 1.44 floppy drive with a 1.
Configuring Virtual Media Using RACADM To configure the virtual media, • Use the objects in the iDRAC.VirtualMedia group with the set command. • Use the objects in the cfgRacVirtual group with the config command. For more information, see the RACADM Command Line Reference Guide for iDRAC available at dell.
If the RFS connection is not active and you attempt to launch the Virtual Media client, the client launches successfully. You can then use the Virtual Media client to map devices and files to the Virtual Media virtual drives.
The following message is displayed: Virtual Console has been disabled. Do you want to continue using Virtual Media redirection? 3. Click OK . The Virtual Media window is displayed. 4. From the Virtual Media menu, click Map CD/DVD or Map Removable Disk .
If Virtual Media is connected, this information is displayed. If Virtual Media is not connected, the “Virtual Media is not connected” message is displayed. If the Virtual Media is launched without using the Virtual Console, then the Virtual Media section is displayed as a dialog box.
If the image is created in the default path (Desktop), when you select Map Removable Disk , the created image is available for selection in the drop-down menu. If image is created in a different location, when you select Map Removable Disk , the created image is not available for selection in the drop-down menu.
To enable the managed system to boot: 1. Boot the managed system. 2. Press <F2> to enter the System Setup page. 3. Go to System BIOS Settings → Boot Settings → BIOS Boot Settings → Boot Sequence . In the pop-up window, the virtual optical drives and virtual floppy drives are listed with the standard boot devices.
16 Installing and Using VMCLI Utility The Virtual Media Command Line Interface (VMCLI) utility is an interface that provides virtual media features from the management station to iDRAC on the managed system.
VMCLI Syntax The VMCLI interface is identical on both Windows and Linux systems. The VMCLI syntax is: VMCLI [parameter] [operating_system_shell_options] For example, vmcli -r iDRAC-IP-address:iDRAC-SSL-port The parameter enables VMCLI to connect to the specified server, access iDRAC, and map to the specified virtual media.
If the file is not write-protected, Virtual Media may write to the image file. To make sure that Virtual Media does not write to the media: • Configure the operating system to write-protect a floppy image file that must not be overwritten. • Use the write-protection feature of the device.
17 Managing vFlash SD Card The vFlash SD card is a Secure Digital (SD) card that plugs into the vFlash SD card slot in the system. You can use a card with a maximum of 16 GB capacity. After you insert the card, you must enable vFlash functionality to create and manage partitions.
Viewing vFlash SD Card Properties Using Web Interface To view the vFlash SD card properties, in the iDRAC Web interface, go to Overview → Server → vFlash . The SD Card Properties page is displayed. For information about the displayed properties, see the iDRAC Online Help .
Enabling or Disabling vFlash Functionality Using RACADM To enable or disable the vFlash functionality using RACADM, use one of the following: • Using config command: – To enable vFlash: racadm con.
• Using vFlashSD command: racadm vflashsd initialize • Using set command: racadm set iDRAC.vflashsd.Initialized 1 All existing partitions are deleted and the card is reformatted. For more information about these commands, see the iDRAC8 RACADM Command Line Interface Reference Guide available at dell.
• Attaching or Detaching Partitions • Deleting Existing Partitions • Downloading Partition Contents • Booting to a Partition NOTE: If you click any option on the vFlash pages when an applicati.
Creating a Partition Using an Image File You can create a new partition on the vFlash SD card using an image file (available in the .img or .iso format.) The partitions are of emulation types: Floppy ( .img ), Hard Disk ( .img ), or CD ( .iso ). The created partition size is equal to the image file size.
NOTE: This feature is not supported in local RACADM. NOTE: Creating vFlash partition from an image file located on the CFS or NFS IPv6 enabled network share is not supported. Formatting a Partition You can format an existing partition on the vFlash SD card based on the type of file system.
racadm vflashpartition status -a NOTE: The -a option is valid only with the status action. Modifying a Partition You can change a read-only partition to read-write or vice-versa. Before modifying the partition, make sure that: • The vFlash functionality is enabled.
racadm set iDRAC.vflashpartition.<index>.EmulationType <HDD, Floppy, or CD-DVD> Attaching or Detaching Partitions When you attach one or more partitions, they are visible to the operating system and BIOS as USB mass storage devices.
racadm set iDRAC.vflashpartition.<index>.AttachState 0 Operating System Behavior for Attached Partitions For Windows and Linux operating systems: • The operating system controls and assigns the drive letters to the attached partitions. • Read-only partitions are read-only drives in the operating system.
Before downloading the partition contents, make sure that: • You have Access Virtual Media privileges. • The vFlash functionality is enabled. • An initialize operation is not being performed on the card. • For a read-write partition, it must not be attached.
18 Using SMCLP The Server Management Command Line Protocol (SMCLP) specification enables CLI-based systems management. It defines a protocol for management commands transmitted over standard character oriented streams. This protocol accesses a Common Information Model Object Manager (CIMOM) using a human-oriented command set.
SMCLP prompts: • yx1x blade servers use -$ . • yx1x rack and tower servers use admin-> . • yx2x blade, rack, and tower servers use admin-> . where, y is a alpha-numeric character such as M (for blade servers), R (for rack servers), and T (for tower servers) and x is a number.
Table 31. SMCLP Targets Target Definitions admin1 admin domain admin1/profiles1 Registered profiles in iDRAC admin1/hdwr1 Hardware admin1/system1 Managed system target admin1/system1/capabilities1 Man.
Target Definitions admin1/system1/sp1/settings1 Service Processor settings collection admin1/system1/sp1/settings1/ clpsetting1 CLP service settings data admin1/system1/sp1/clpsvc1 CLP service protoco.
Target Definitions admin1/system1/sp1/rolesvc3/Role1-3 CLP role admin1/system1/sp1/rolesvc3/Role1-3/ privilege1 CLP role privilege Related Links Running SMCLP Commands Usage Examples Navigating the MA.
Using the -level Option The show -level option executes show over additional levels beneath the specified target. To see all targets and properties in the address space, use the -l all option. Using the -output Option The -output option specifies one of four formats for the output of SM-CLP verbs: text , clpcsv , keyword , and clpxml .
The following message is displayed: system1 has been reset successfully SEL Management The following examples show how to use the SMCLP to perform SEL-related operations on the managed system.
show help exit version • To view the SEL record: show/system1/logs1/log1 The following output is displayed : /system1/logs1/log1/record4 Properties: LogCreationClassName= CIM_RecordLog CreationClassName= CIM_LogRecord LogName= IPMI SEL RecordID= 1 MessageTimeStamp= 20050620100512.
MAP Target Navigation The following examples show how to use the cd verb to navigate the MAP. In all examples, the initial default target is assumed to be /. Type the following commands at the SMCLP command prompt: • To navigate to the system target and reboot: cd system1 reset The current default target is /.
19 Using iDRAC Service Module The iDRAC Service Module is a software application that is recommended to be installed on the server (it is not installed by default).
• Replicate Lifecycle Controller logs to operating system logs • Perform automatic system recovery options • Populate Windows Management Instrumentation (WMI) Management Providers • Integrate with Technical Support Report. This is applicable only if iDRAC Service Module Version 2.
The classes can be accessed using any of the standard WMI client interfaces. For more information, see the profile documents. The following example is using the DCIM_account class to illustrate the capability that WMI information feature provides in iDRAC Service Module.
Co-existence of OpenManage Server Administrator and iDRAC Service Module In a system, both OpenManage Server Administrator and the iDRAC Service Module can co-exist and continue to function correctly and independently.
20 Using USB Port for Server Management In Dell PowerEdge 12 th generation servers, all USB ports are dedicated to the server. With the 13 th generation of servers, one of the front panel USB port is used by iDRAC for management purposes such as pre-provisioning and troubleshooting.
5. After using, disconnect the cable. The LED turns off. Configuring iDRAC Using Server Configuration Profile on USB Device With the new iDRAC Direct feature, you can configure iDRAC at-the-server.
• Allowed notifications: Email, SNMP trap, remote syslog and WS-Eventing. • Actions: None. An error message is displayed and logged to Lifecycle Controller log when: • You try to configure the USB management port without the Server Control user privilege.
The iDRAC Settings Media and USB Port Settings page is displayed. 2. From the USB Management Port Mode drop-down menu, do the following: • Automatic — USB Port is used by iDRAC or the server’s operating system. • Standard OS Use — USB port is used by the server OS.
• Set iDRAC Managed: USB XML Configuration to Enabled with default credentials or Enabled . 2. Insert the USB key (that has the configuration.xml and the control.xml file) to the iDRAC USB port. 3. The server configuration profile is discovered on the USB device in the System_Configuration_XML sub-directory under the USB device root directory.
• Service tag – Data is recorded after the import operation has either returned a job ID or returned an error. • Job ID – Data is recorded after the import operation has returned a job ID. • Start Date and Time of Job - Data is recorded after the import operation has returned a job ID.
21 Using iDRAC Quick Sync A few 13 th generation Dell PowerEdge servers have the Quick Sync bezel that supports the Quick Sync feature. This feature enables at-the-server management with a mobile device.
Configuring iDRAC Quick Sync Using iDRAC Web interface or RACADM, you can configure iDRAC Quick Sync feature to allow access to the mobile device: • Read-write access – Allows you to configure the basic iDRAC settings. • Read-only access – Allows you to view inventory and monitoring information.
The settings are applied. Using Mobile Device to View iDRAC Information To view iDRAC information from the mobile device, see the OpenManage Mobile User’s Guide available at dell.
22 Deploying Operating Systems You can use any of the following utilities to deploy operating systems to managed systems: • Virtual Media Command Line Interface (CLI) • Virtual Media Console • R.
vmdeploy.bat -r <iDRAC-IPAddress or file> -u <iDRAC-user> -p <iDRAC-user- passwd> [ -f {<floppy-image> | < device-name>} | -c { <device-name>|<image- file>} ] [-i <DeviceID>] NOTE: vmdeploy does not support IPv6, since IPv6 does not support the IPMI tool.
NOTE: While creating the image file, follow standard network-based installation procedures, and mark the deployment image as read-only to make sure that each target system boots and executes the same deployment procedure. To deploy an operating system using RFS: 1.
If you update the iDRAC firmware from version 1.30.30 to 1.50.50 firmware while there is an active RFS connection and the Virtual Media Attach Mode is set to Attach or Auto Attach , the iDRAC attempts to re- establish the RFS connection after the firmware upgrade is completed and the iDRAC reboots.
This displays the text that identifies the device (example, SCSI device sdc). This procedure also applies to Virtual Media when you are using Linux distributions in runlevel init 3.
Configuring Virtual Media Setting First Boot Device Configuring iDRAC Installing Operating System From Multiple Disks 1. Unmap the existing CD/DVD. 2. Insert the next CD/DVD into the remote optical drive. 3. Remap the CD/DVD drive. Deploying Embedded Operating System On SD Card To install an embedded hypervisor on an SD card: 1.
You can view the status, health, and the availability of IDSDM using iDRAC Web Interface or RACADM. The SD card redundancy status and failure events are logged to SEL, displayed on the front panel, and PET alerts are generated if alerts are enabled.
23 Troubleshooting Managed System Using iDRAC You can diagnose and troubleshoot a remote managed system using: • Diagnostic console • Post code • Boot and crash capture videos • Last system cr.
reboot or maintenance cycle (similar to updates). When diagnostics are run, the results are collected and stored in the internal iDRAC storage. You can then export the results to an NFS or CIFS network share using the diagnostics export racadm command.
To export the last run remote diagnostics results, use the following command: racadm diagnostics export -f <file name> -l <NFS / CIFS share> -u <username> -p <password> For more information about the options, see the iDRAC8 RACADM Command Line Interface Reference Guide available at dell.
Viewing Logs You can view System Event Logs (SELs) and Lifecycle logs. For more information, see Viewing System Event Log and Viewing Lifecycle Log . Viewing Last System Crash Screen The last crash screen feature captures a screenshot of the most recent system crash, saves, and displays it in iDRAC.
To view LCD front panel status using RACADM, use the objects in the System.LCD group. For more information, see the iDRAC8 RACADM Command Line Interface Reference Guide available at dell.
CAUTION: You should only perform troubleshooting and simple repairs as authorized in your product documentation, or as directed by online or telephone service and support team. Damage due to servicing that is not authorized by Dell is not covered by your warranty.
The report is generated in the standard ZIP format. The report contains information that is similar to the information available in the DSET report such as: • Hardware inventory for all components .
NOTE: While specifying the network share settings, it is recommended to avoid special characters for user name and password or percent encode the special characters.
NOTE: – CentOS is supported only for iDRAC Service Module 2.0 or later. – If the IPMI modules are not present, then you can install the respective modules from the OS distribution media.
11. Select the I agree to allow Technical Support to use this data option and click Export to export the data to the specified location. Generating Technical Support Report Manually Using RACADM To generate the TSR using RACADM, use the techsupreport subcommand.
The Lifecycle Controller Data option erases any content such as the LC Log, configuration database, rollback firmware, factory as-shipped logs, and the configuration information from the FP SPI (or management riser).
24 Frequently Asked Questions This section lists the frequently asked questions for the following: • System Event Log • Network Security • Active Directory • Single Sign On • Smart Card Logi.
upload a iDRAC server certificate issued by a trusted CA (for example, Microsoft Certificate Authority, Thawte or Verisign). Why the DNS server not registering iDRAC? Some DNS servers register iDRAC names that contain only up to 31 characters.
– The Group Name and Group Domain Name matches the Active Directory configuration if you are using standard schema. – If the user and the iDRAC object is in different domain, then do not select the User Domain from Login option. Instead select Specify a Domain option and enter the domain name where the iDRAC object resides.
If you are using standard schema and all the users and role groups are in the same domain, Global Catalog Address(es) are not required. If you are using extended schema, the Global Catalog Address is not used. How does standard schema query work? iDRAC connects to the configured domain controller address(es) first.
Single Sign-On SSO login fails on Windows Server 2008 R2 x64. What are the settings required to resolve this? 1. Run the technet.microsoft.com/en-us/library/dd560670(WS.10).aspx for the domain controller and domain policy. 2. Configure the computers to use the DES-CBC-MD5 cipher suite.
12. Close the Registry Editor window. You can now log in to iDRAC using SSO. If you have enabled SSO for iDRAC and you are using Internet Explorer to log in to iDRAC, SSO fails and you are prompted to enter your user name and password.
Can the local user also turn off or turn on the video? When the local console is disabled, the local user cannot turn off or turn on the video. Does switching off the local video also switch off the local keyboard and mouse? No.
Can a keyboard or mouse be used while installing a Microsoft operating system remotely through the Virtual Console? No. When you remotely install a supported Microsoft operating system on a system with Virtual Console enabled in the BIOS, an EMS Connection Message is sent that requires that you select OK remotely.
When starting a Virtual Console session from iDRAC Web interface, why is an ActiveX security popup displayed? iDRAC may not be in the trusted site list. To prevent the security popup from appearing every time you begin a Virtual Console session, add iDRAC to the trusted site list in the client browser: 1.
3. Press Ctrl + Alt +Print Screen . 4. Release only Print Screen . 5. Press Print Screen+Ctrl+Alt . NOTE: The SysRq feature is currently not supported with Internet Explorer and Java.
• 1.44 Floppy disk or floppy image • A USB key that is recognized by the operating system as a removable disk • A USB key image How to make the USB key a bootable device? You can also boot with a Windows 98 startup disk and copy system files from the startup disk to the USB key.
where: /dev/sdx is the device name found in step 4 and /mnt/floppy is the mount point. Why are the virtual drives attached the server removed after performing a remote firmware update using the iDRAC Web interface? Firmware updates cause the iDRAC to reset, drop the remote connection, and unmount the virtual drives.
The vFlash SD card is locked when an operation is in-progress. For example, during an initialize operation. SNMP Authentication Why is the message 'Remote Access: SNMP Authentication Failure' displayed? As part of discovery, IT Assistant attempts to verify the get and set community names of the device.
• Click Start → Control Panel → Programs and Features . The version of the installed iDRAC Service Module is listed in the Version tab. • Go to My Computer → Uninstall or change a program .
mode. After the uninstallation, the virtual switch vSwitchiDRACvusb and the port group iDRAC Network are not deleted. To delete it manually, perform one of the following steps: • Go to vSphere Client Configuration wizard and delete the entries.
Clear the ARP table on your system. Remote RACADM fails to connect to iDRAC from SUSE Linux Enterprise Server (SLES) 11 SP1. Make sure that the official openssl and libopenssl versions are installed.
IP Address = 192.168.0.1 Subnet Mask = 255.255.255.0 Gateway = 192.168.0.1 Using LCD : On the Main Menu, highlight the Server and press the check button and select the required server and press the check button. How to find the CMC IP address related to the blade server? From iDRAC Web interface : Click Overview → iDRAC Settings → CMC .
• Make sure that NIC settings, IPv4 and IPv6 settings and either Static or DHCP is enabled for your network. Inserted the blade server into the chassis and pressed the power switch, but it did not power on. • iDRAC requires up to two minutes to initialize before the server can power on.
25 Use Case Scenarios This section helps you in navigating to specific sections in the guide to perform typical use case scenarios. Troubleshooting An Inaccessible Managed System After receiving alert.
Using iDRAC Service Module Obtaining System Information and Assess System Health To obtain system information and assess system health: • In iDRAC Web interface, go to Overview → Server → System Summary to view the system information and access various links on this page to asses system health.
• Lifecycle Controller–Remote Services • Lifecycle Controller • Dell Remote Access Configuration Tool (DRACT) Performing Graceful Shutdown To perform graceful shutdown, in iDRAC Web interface, go to one of the following locations: • Overview → Server → Power/Thermal → Power Configuration → Power Control .
Managing Rack Density Suppose two servers are installed in a rack. To add two additional servers, need to determine how much capacity is left in the rack. To assess the capacity of a rack to add additional servers: 1. View the current power consumption data and historical power consumption data for the servers.
デバイスDell iDRAC8の購入後に(又は購入する前であっても)重要なポイントは、説明書をよく読むことです。その単純な理由はいくつかあります:
Dell iDRAC8をまだ購入していないなら、この製品の基本情報を理解する良い機会です。まずは上にある説明書の最初のページをご覧ください。そこにはDell iDRAC8の技術情報の概要が記載されているはずです。デバイスがあなたのニーズを満たすかどうかは、ここで確認しましょう。Dell iDRAC8の取扱説明書の次のページをよく読むことにより、製品の全機能やその取り扱いに関する情報を知ることができます。Dell iDRAC8で得られた情報は、きっとあなたの購入の決断を手助けしてくれることでしょう。
Dell iDRAC8を既にお持ちだが、まだ読んでいない場合は、上記の理由によりそれを行うべきです。そうすることにより機能を適切に使用しているか、又はDell iDRAC8の不適切な取り扱いによりその寿命を短くする危険を犯していないかどうかを知ることができます。
ですが、ユーザガイドが果たす重要な役割の一つは、Dell iDRAC8に関する問題の解決を支援することです。そこにはほとんどの場合、トラブルシューティング、すなわちDell iDRAC8デバイスで最もよく起こりうる故障・不良とそれらの対処法についてのアドバイスを見つけることができるはずです。たとえ問題を解決できなかった場合でも、説明書にはカスタマー・サービスセンター又は最寄りのサービスセンターへの問い合わせ先等、次の対処法についての指示があるはずです。